From post

Inner-Product Functional Encryption with Fine-Grained Access Control.

, , , и . ASIACRYPT (3), том 12493 из Lecture Notes in Computer Science, стр. 467-497. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality., , , и . CT-RSA, том 11405 из Lecture Notes in Computer Science, стр. 127-148. Springer, (2019)Efficient Network Coding Signatures in the Standard Model., , и . IACR Cryptol. ePrint Arch., (2011)Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings., , , , и . IACR Cryptol. ePrint Arch., (2017)Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework., , , и . CT-RSA, том 4964 из Lecture Notes in Computer Science, стр. 335-351. Springer, (2008)Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures., , и . ASIACRYPT (4), том 13794 из Lecture Notes in Computer Science, стр. 159-188. Springer, (2022)Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions., , и . Des. Codes Cryptogr., 86 (10): 2197-2246 (2018)Double-Authentication-Preventing Signatures in the Standard Model., , и . SCN, том 12238 из Lecture Notes in Computer Science, стр. 338-358. Springer, (2020)Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication., , и . J. Cryptol., 20 (1): 115-149 (2007)Adaptively Secure Single Secret Leader Election from DDH., , и . PODC, стр. 430-439. ACM, (2022)Zero-Knowledge Sets with Short Proofs., , и . EUROCRYPT, том 4965 из Lecture Notes in Computer Science, стр. 433-450. Springer, (2008)