Author of the publication

Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction.

, , , , , and . ASIACRYPT (2), volume 10032 of Lecture Notes in Computer Science, page 745-776. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mix-Compress-Mix Revisited: Dispensing with Non-invertible Random Injection Oracles., and . IACR Cryptology ePrint Archive, (2012)informal publication.Identity-based conditional proxy re-encryption with fine grain policy., , , and . Comput. Stand. Interfaces, (2017)Post-quantum secure group signature with verifier local revocation and backward unlinkability., , , , and . Comput. Stand. Interfaces, (March 2024)A Noise Study of the PSW Signature Family: Patching DRS with Uniform Distribution †., , and . Inf., 11 (3): 133 (2020)Identity-based trapdoor mercurial commitments and applications., , , , and . Theor. Comput. Sci., 412 (39): 5498-5512 (2011)Lattice-based Signcryption with Equality Test in Standard Model., , , , , and . CoRR, (2020)Publicly Verifiable Databases With All Efficient Updating Operations., , , , , , and . IEEE Trans. Knowl. Data Eng., 33 (12): 3729-3740 (2021)Collusion-Resistant Identity-based Proxy Re-Encryption: Lattice-based Constructions in Standard Model., , , and . CoRR, (2020)Securing DSR against wormhole attacks in multirate ad hoc networks., , , and . J. Netw. Comput. Appl., 36 (2): 582-592 (2013)Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds., , , , and . IEEE Trans. Inf. Forensics Secur., (2024)