Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicate Encryption for Multi-Dimensional Range Queries from Lattices., , and . IACR Cryptology ePrint Archive, (2014)Déjà Q: Encore! Un Petit IBE.. IACR Cryptology ePrint Archive, (2015)New Protocols for Conditional Disclosure of Secrets (and More)., , and . IACR Cryptology ePrint Archive, (2017)Compressibility Lower Bounds in Oracle Settings. Electronic Colloquium on Computational Complexity (ECCC), (2003)On Hardness Amplification of One-Way Functions., , and . TCC, volume 3378 of Lecture Notes in Computer Science, page 34-49. Springer, (2005)Toward Privacy in Public Databases., , , , and . TCC, volume 3378 of Lecture Notes in Computer Science, page 363-385. Springer, (2005)Shorter IBE and Signatures via Asymmetric Pairings., , , , and . Pairing, volume 7708 of Lecture Notes in Computer Science, page 122-140. Springer, (2012)Improved Non-committing Encryption with Applications to Adaptively Secure Protocols., , , and . ASIACRYPT, volume 5912 of Lecture Notes in Computer Science, page 287-302. Springer, (2009)Improved Inner-Product Encryption with Adaptive Security and Full Attribute-Hiding., , and . ASIACRYPT (2), volume 11273 of Lecture Notes in Computer Science, page 673-702. Springer, (2018)Predicate Encryption for Multi-dimensional Range Queries from Lattices., , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 752-776. Springer, (2015)