Author of the publication

Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions.

, , and . J. Cryptology, 27 (3): 544-593 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fully non-interactive onion routing with forward secrecy., , , , and . Int. J. Inf. Sec., 12 (1): 33-47 (2013)Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions., , and . Des. Codes Cryptogr., 86 (10): 2197-2246 (2018)Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings., , , , and . IACR Cryptology ePrint Archive, (2017)Efficient Network Coding Signatures in the Standard Model., , and . IACR Cryptology ePrint Archive, (2011)Color opponency watermarking scheme for digital images., , , and . Security and Watermarking of Multimedia Contents, volume 3971 of SPIE Proceedings, page 510-515. SPIE, (2000)Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication., , and . J. Cryptology, 20 (1): 115-149 (2007)Generalizing Homomorphic MACs for Arithmetic Circuits., , , and . Public Key Cryptography, volume 8383 of Lecture Notes in Computer Science, page 538-555. Springer, (2014)Efficient Network Coding Signatures in the Standard Model., , and . Public Key Cryptography, volume 7293 of Lecture Notes in Computer Science, page 680-696. Springer, (2012)Zero-Knowledge Sets with Short Proofs., , and . EUROCRYPT, volume 4965 of Lecture Notes in Computer Science, page 433-450. Springer, (2008)Computing Inverses over a Shared Secret Modulus., , and . EUROCRYPT, volume 1807 of Lecture Notes in Computer Science, page 190-206. Springer, (2000)