Author of the publication

A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups.

, and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 377-398. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decentralizing Attribute-Based Encryption., and . IACR Cryptology ePrint Archive, (2010)Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption., , , and . IACR Cryptology ePrint Archive, (2014)Bounded-Collusion IBE from Key Homomorphism., , and . TCC, volume 7194 of Lecture Notes in Computer Science, page 564-581. Springer, (2012)New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts., and . TCC, volume 5978 of Lecture Notes in Computer Science, page 455-479. Springer, (2010)Decentralizing Attribute-Based Encryption., and . EUROCRYPT, volume 6632 of Lecture Notes in Computer Science, page 568-588. Springer, (2011)How to leak on key updates., , and . STOC, page 725-734. ACM, (2011)Revocation Systems with Very Small Private Keys., , and . IEEE Symposium on Security and Privacy, page 273-285. IEEE Computer Society, (2010)Formulas Resilient to Short-Circuit Errors., , and . FOCS, page 490-499. IEEE Computer Society, (2012)Revocation Systems with Very Small Private Keys., , and . IACR Cryptology ePrint Archive, (2008)Achieving Leakage Resilience through Dual System Encryption., , and . TCC, volume 6597 of Lecture Notes in Computer Science, page 70-88. Springer, (2011)