Author of the publication

Cloud-Based Data-Sharing Scheme Using Verifiable and CCA-Secure Re-encryption from Indistinguishability Obfuscation.

, , , , and . Inscrypt, volume 11449 of Lecture Notes in Computer Science, page 240-259. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Susilo, Willy
add a person with the name Susilo, Willy
 

Other publications of authors with the same name

Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search., , , and . Theor. Comput. Sci., (2012)Short fail-stop signature scheme based on factorization and discrete logarithm assumptions.. Theor. Comput. Sci., 410 (8-10): 736-744 (2009)Efficient Generic On-Line/Off-Line Signatures Without Key Exposure., , , and . ACNS, volume 4521 of Lecture Notes in Computer Science, page 18-30. Springer, (2007)A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack., , , and . ACNS, volume 5536 of Lecture Notes in Computer Science, page 143-155. (2009)Secure AODV Routing Protocol Using One-Time Signature., , and . MSN, volume 3794 of Lecture Notes in Computer Science, page 288-297. Springer, (2005)Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings., , and . MSN, volume 4325 of Lecture Notes in Computer Science, page 521-532. Springer, (2006)Identity-Based Proxy Signature from Pairings., , , , and . ATC, volume 4610 of Lecture Notes in Computer Science, page 22-31. Springer, (2007)Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme)., , , , and . ATC, volume 4158 of Lecture Notes in Computer Science, page 531-540. Springer, (2006)(Strong) Multi-Designated Verifiers Signatures Secure against Rogue Key Attack., , , and . NSS, volume 7645 of Lecture Notes in Computer Science, page 334-347. Springer, (2012)Restricted Universal Designated Verifier Signature., , , and . UIC, volume 4159 of Lecture Notes in Computer Science, page 874-882. Springer, (2006)