Author of the publication

A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains.

, , , , and . IEEE Trans. Computers, 65 (12): 3567-3579 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Qin, Baodong
add a person with the name Qin, Baodong
 

Other publications of authors with the same name

Cryptanalysis of a Type of CRT-Based RSA Algorithms., , and . J. Comput. Sci. Technol., 23 (2): 214-221 (2008)A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains., , , , and . IEEE Trans. Computers, 65 (12): 3567-3579 (2016)Fuzzy Public-Key Encryption Based on Biometric Data., , , , and . ProvSec, volume 10592 of Lecture Notes in Computer Science, page 400-409. Springer, (2017)Server-Aided Revocable Identity-Based Encryption., , , and . ESORICS (1), volume 9326 of Lecture Notes in Computer Science, page 286-304. Springer, (2015)Regularly Lossy Functions and Applications., , and . CT-RSA, volume 10808 of Lecture Notes in Computer Science, page 491-511. Springer, (2018)Leakage-resilient lossy trapdoor functions and public-key encryption., , , and . AsiaPKC@AsiaCCS, page 3-12. ACM, (2013)Non-Malleable Functions and Their Applications., , , , and . IACR Cryptology ePrint Archive, (2015)Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited., , and . IACR Cryptology ePrint Archive, (2012)Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing., and . IACR Cryptology ePrint Archive, (2015)Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem., , and . ACISP, volume 7959 of Lecture Notes in Computer Science, page 136-151. Springer, (2013)