Author of the publication

A Combinatorial Approach to Deriving Lower Bounds for Perfectly Secure Oblivious Transfer Reductions.

, , and . IEEE Trans. Inf. Theory, 54 (6): 2566-2571 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Private Conjunctive Query over Encrypted Data., and . AFRICACRYPT, volume 10239 of Lecture Notes in Computer Science, page 149-164. (2017)Simple Direct Reduction of String (1, 2)-OT to Rabin's OT without Privacy Amplification., and . ICITS, volume 5155 of Lecture Notes in Computer Science, page 199-209. Springer, (2008)Theoretical Analysis of chi2 Attack on RC6., , and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 142-153. Springer, (2003)Almost-Fully Secured Fully Dynamic Group Signatures with Efficient Verifier-Local Revocation and Time-Bound Keys., and . IDCS, volume 11226 of Lecture Notes in Computer Science, page 134-147. Springer, (2018)Achieving Strong Security and Member Registration for Lattice-based Group Signature Scheme with Verifier-local Revocation., and . J. Internet Serv. Inf. Secur., 8 (4): 1-15 (2018)Achieving Almost-Full Security for Lattice-Based Fully Dynamic Group Signatures with Verifier-Local Revocation., and . ISPEC, volume 11125 of Lecture Notes in Computer Science, page 229-247. Springer, (2018)Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics., , , , and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 55-74. Springer, (2013)Computational Indistinguishability Between Quantum States and Its Cryptographic Application., , , and . J. Cryptol., 25 (3): 528-555 (2012)Perfectly Secure Message Transmission against Rational Adversaries., , and . CoRR, (2020)Perfectly Secure Message Transmission Scheme against Rational Adversaries., and . IACR Cryptology ePrint Archive, (2017)