Author of the publication

Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.

, , , , , , and . AFRICACRYPT, volume 6055 of Lecture Notes in Computer Science, page 333-350. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Group Discovery with Linear Complexity., , and . ACNS, volume 6123 of Lecture Notes in Computer Science, page 420-437. (2010)Provably Secure Framework for Information Aggregation is Sensor Networks., and . IACR Cryptology ePrint Archive, (2007)Plaintext Awareness in Identity-Based Key Encapsulation., , and . IACR Cryptology ePrint Archive, (2012)Linkable Democratic Group Signatures., , and . ISPEC, volume 3903 of Lecture Notes in Computer Science, page 187-201. Springer, (2006)Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security., , and . ASIACRYPT, volume 7073 of Lecture Notes in Computer Science, page 468-485. Springer, (2011)Provably Secure Framework for Information Aggregation in Sensor Networks., and . ICCSA (1), volume 4705 of Lecture Notes in Computer Science, page 603-621. Springer, (2007)Securing group key exchange against strong corruptions and key registration attacks., and . IJACT, 1 (2): 91-107 (2008)Private discovery of common social contacts., , and . Int. J. Inf. Sec., 12 (1): 49-65 (2013)Security and privacy for digital ecosystems., , and . Inf. Sec. Techn. Report, 17 (3): 45 (2013)Security-Focused Survey on Group Key Exchange Protocols.. IACR Cryptology ePrint Archive, (2006)