Author of the publication

Labeled Homomorphic Encryption - Scalable and Privacy-Preserving Processing of Outsourced Data.

, , and . ESORICS (1), volume 10492 of Lecture Notes in Computer Science, page 146-166. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework., , , and . CT-RSA, volume 4964 of Lecture Notes in Computer Science, page 335-351. Springer, (2008)Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality., , , and . CT-RSA, volume 11405 of Lecture Notes in Computer Science, page 127-148. Springer, (2019)Double-Authentication-Preventing Signatures in the Standard Model., , and . SCN, volume 12238 of Lecture Notes in Computer Science, page 338-358. Springer, (2020)Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication., , and . J. Cryptol., 20 (1): 115-149 (2007)Efficient Network Coding Signatures in the Standard Model., , and . IACR Cryptol. ePrint Arch., (2011)Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings., , , , and . IACR Cryptol. ePrint Arch., (2017)Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions., , and . Des. Codes Cryptogr., 86 (10): 2197-2246 (2018)Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures., , and . ASIACRYPT (4), volume 13794 of Lecture Notes in Computer Science, page 159-188. Springer, (2022)Adaptively Secure Single Secret Leader Election from DDH., , and . PODC, page 430-439. ACM, (2022)Efficient Network Coding Signatures in the Standard Model., , and . Public Key Cryptography, volume 7293 of Lecture Notes in Computer Science, page 680-696. Springer, (2012)