Author of the publication

An Efficient Predicate Encryption with Constant Pairing Computations and Minimum Costs.

, , , and . IEEE Trans. Computers, 65 (10): 2947-2958 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem., , and . Inf. Sci., (2015)An Efficient Predicate Encryption with Constant Pairing Computations and Minimum Costs., , , and . IEEE Trans. Computers, 65 (10): 2947-2958 (2016)Tight security for the generic construction of identity-based signature (in the multi-instance setting)., , , and . Theor. Comput. Sci., (2020)EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method., , , and . Int. J. Inf. Sec., 19 (4): 383-399 (2020)Construction of a New Biometric-Based Key Derivation Function and Its Application., , , , , and . Secur. Commun. Networks, (2018)Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency., , , , and . ASIACRYPT (1), volume 8269 of Lecture Notes in Computer Science, page 235-254. Springer, (2013)Anonymous HIBE: Compact Construction Over Prime-Order Groups., and . IEEE Trans. Inf. Theory, 59 (4): 2531-2541 (2013)Public Key Broadcast Encryption Schemes With Shorter Transmissions., , , and . TBC, 54 (3): 401-411 (2008)Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited., , , and . ESORICS (2), volume 8713 of Lecture Notes in Computer Science, page 1-18. Springer, (2014)Efficient Certificateless Signature Schemes., , , and . ACNS, volume 4521 of Lecture Notes in Computer Science, page 443-458. Springer, (2007)