Author of the publication

Efficient Ciphertext-Policy Attribute Based Encryption with Hidden Policy.

, , , , and . IDCS, volume 7646 of Lecture Notes in Computer Science, page 146-159. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

JPEG encryption for image rescaling in the encrypted domain., , and . J. Visual Communication and Image Representation, (2015)Fully CCA2 secure identity based broadcast encryption without random oracles., and . Inf. Process. Lett., 109 (11): 527-533 (2009)New Fuzzy Identity-Based Encryption in the Standard Model., , , and . Informatica, Lith. Acad. Sci., 21 (3): 393-407 (2010)Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction., , , and . IEEE Trans. Information Forensics and Security, 6 (4): 1223-1232 (2011)Compressing Encrypted Images With Auxiliary Information., , , , and . IEEE Trans. Multimedia, 16 (5): 1327-1336 (2014)Analysis of the k-Error Linear Complexity and Error Sequence for 2pn-Periodic Binary Sequence., , , and . IEICE Transactions, 101-A (8): 1197-1203 (2018)Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability., , , , and . AsiaCCS, page 293-303. ACM, (2016)Efficient reversible data hiding in encrypted images., , , and . J. Visual Communication and Image Representation, 25 (2): 322-328 (2014)Compressing Encrypted Image Using Compressive Sensing., , , and . IIH-MSP, page 222-225. IEEE Computer Society, (2011)Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations., , , , and . IJDSN, (2015)