Author of the publication

Efficient Anonymous Identity-Based Broadcast Encryption without Random Oracles.

, and . IJDCF, 6 (2): 40-51 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability., , , , and . AsiaCCS, page 293-303. ACM, (2016)JPEG encryption for image rescaling in the encrypted domain., , and . J. Visual Communication and Image Representation, (2015)Fully CCA2 secure identity based broadcast encryption without random oracles., and . Inf. Process. Lett., 109 (11): 527-533 (2009)Analysis of the k-Error Linear Complexity and Error Sequence for 2pn-Periodic Binary Sequence., , , and . IEICE Transactions, 101-A (8): 1197-1203 (2018)New Fuzzy Identity-Based Encryption in the Standard Model., , , and . Informatica, Lith. Acad. Sci., 21 (3): 393-407 (2010)Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction., , , and . IEEE Trans. Information Forensics and Security, 6 (4): 1223-1232 (2011)Compressing Encrypted Images With Auxiliary Information., , , , and . IEEE Trans. Multimedia, 16 (5): 1327-1336 (2014)Anonymous Hierarchical Identity-Based Encryption in Prime Order Groups., , and . ICDKE, volume 7696 of Lecture Notes in Computer Science, page 230-242. Springer, (2012)PAC Learning Depth-3 $AC^0$ Circuits of Bounded Top Fanin., , and . ALT, volume 76 of Proceedings of Machine Learning Research, page 667-680. PMLR, (2017)Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations., , , , and . IJDSN, (2015)