Author of the publication

Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption.

, , and . IACR Cryptology ePrint Archive, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Discrete Logarithm Algorithm using Pre-computation., , and . IACR Cryptology ePrint Archive, (2011)Provably Secure Group Signature Schemes From Code-Based Assumptions., , , , and . IEEE Trans. Inf. Theory, 66 (9): 5754-5773 (2020)New RSA-Based Public Key Encryption with Authorized Equality Test., , , , , and . ICOIN, page 299-304. IEEE, (2024)A Survey on Epoch-based In-Memory Database Systems., , , and . ICTC, page 788-792. IEEE, (2023)A Review on AI-Enabled Congestion Control Schemes for Content Centric Networks., , , , , , and . ICTC, page 659-662. IEEE, (2023)Efficient public key encryption with equality test in the standard model., , , , and . Theor. Comput. Sci., (2019)Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017., , and . ACISP, volume 10946 of Lecture Notes in Computer Science, page 780-786. Springer, (2018)Experimenting With Non-Interactive Range Proofs Based on the Strong RSA Assumption., and . IEEE Access, (2019)CCA2 Attack and Modification of Huang et al.'s Public Key Encryption with Authorized Equality Test., , , and . Comput. J., 59 (11): 1689-1694 (2016)A New Additive Homomorphic Encryption based on the co-ACD Problem., , and . ACM Conference on Computer and Communications Security, page 287-298. ACM, (2014)