From post

Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience.

, , и . ESORICS, том 7459 из Lecture Notes in Computer Science, стр. 627-642. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Ring Signature Schemes for General Ad-Hoc Access Structures., и . ESAS, том 3313 из Lecture Notes in Computer Science, стр. 54-65. Springer, (2004)How to Group Attributes in Multivariate Microaggregation., , и . International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 16 (Supplement-1): 121-138 (2008)A Generic Construction for Token-Controlled Public Key Encryption., и . Financial Cryptography, том 4107 из Lecture Notes in Computer Science, стр. 177-190. Springer, (2006)Some Applications of Threshold Signature Schemes to Distributed Protocols., , и . IACR Cryptology ePrint Archive, (2002)Forking Lemmas in the Ring Signatures' Scenario., и . IACR Cryptology ePrint Archive, (2003)Kd-trees and the real disclosure risks of large statistical databases., , и . Inf. Fusion, 13 (4): 260-273 (2012)Revisiting Fully Distributed Proxy Signature Schemes., и . INDOCRYPT, том 3348 из Lecture Notes in Computer Science, стр. 356-370. Springer, (2004)On the generic construction of identity-based signatures with additional properties., , и . Adv. in Math. of Comm., 4 (4): 453-483 (2010)New results and applications for multi-secret sharing schemes., , и . Des. Codes Cryptogr., 73 (3): 841-864 (2014)Forking Lemmas for Ring Signature Schemes., и . INDOCRYPT, том 2904 из Lecture Notes in Computer Science, стр. 266-279. Springer, (2003)