Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage., , , , and . ASIACRYPT (2), volume 12492 of Lecture Notes in Computer Science, page 3-35. Springer, (2020)Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys., , and . CRYPTO (2), volume 9216 of Lecture Notes in Computer Science, page 254-274. Springer, (2015)Vector Commitment Techniques and Applications to Verifiable Decentralized Storage., , , , and . IACR Cryptol. ePrint Arch., (2020)On the Security Notions for Homomorphic Signatures., , and . IACR Cryptol. ePrint Arch., (2016)Multi-key Homomorphic Authenticators., , , and . ASIACRYPT (2), volume 10032 of Lecture Notes in Computer Science, page 499-530. (2016)Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions., , and . Des. Codes Cryptogr., 86 (10): 2197-2246 (2018)Witness-Authenticated Key Exchange Revisited: Improved Models, Simpler Constructions, Extensions to Groups., , , and . IACR Cryptol. ePrint Arch., (2022)Witness-Authenticated Key Exchange, Revisited: Extensions to Groups, Improved Models, Simpler Constructions., , , and . FC (1), volume 13950 of Lecture Notes in Computer Science, page 112-128. Springer, (2023)Transferable Anonymous Payments via TumbleBit in Permissioned Blockchains., , , and . DLT@ITASEC, volume 2334 of CEUR Workshop Proceedings, page 56-67. CEUR-WS.org, (2019)Multi-key homomorphic authenticators., , , and . IET Inf. Secur., 13 (6): 618-638 (2019)