Author of the publication

Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.

, , , , , , and . AFRICACRYPT, volume 6055 of Lecture Notes in Computer Science, page 333-350. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Functional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negation., and . J. Mathematical Cryptology, 5 (2): 115-158 (2012)A New Framework for Privacy-Preserving Aggregation of Time-Series Data., , and . ACM Trans. Inf. Syst. Secur., 18 (3): 10:1-10:21 (2016)Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption., and . IEEE Trans. Information Theory, 57 (3): 1786-1802 (2011)Certificateless Encryption Schemes Strongly Secure in the Standard Model., , and . IACR Cryptology ePrint Archive, (2007)A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data., and . Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, page 111-125. Springer, (2013)Fully Forward-Secure Group Signatures., and . Cryptography and Security, volume 6805 of Lecture Notes in Computer Science, page 156-184. Springer, (2012)Lossy Algebraic Filters with Short Tags., and . Public Key Cryptography (1), volume 11442 of Lecture Notes in Computer Science, page 34-65. Springer, (2019)Parallel Key-Insulated Public Key Encryption Without Random Oracles., , and . Public Key Cryptography, volume 4450 of Lecture Notes in Computer Science, page 298-314. Springer, (2007)Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys., and . Public Key Cryptography, volume 5443 of Lecture Notes in Computer Science, page 235-255. Springer, (2009)Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption., and . Public Key Cryptography, volume 4939 of Lecture Notes in Computer Science, page 360-379. Springer, (2008)