Author of the publication

Universal Composition with Responsive Environments.

, , , , and . ASIACRYPT (2), volume 10032 of Lecture Notes in Computer Science, page 807-840. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

To pass or not to pass: Privacy-preserving physical access control., , and . Comput. Secur., (January 2024)To Pass or Not to Pass: Privacy-Preserving Physical Access Control., , and . IACR Cryptol. ePrint Arch., (2023)Malicious Clients in Distributed Secret Sharing Based Storage Networks., , and . Security Protocols Workshop, volume 10368 of Lecture Notes in Computer Science, page 206-214. Springer, (2016)Towards the Adoption of Secure Cloud Identity Services., , , , , , , and . ARES, page 90:1-90:7. ACM, (2017)Practical Group-Signatures with Privacy-Friendly Openings., , and . ARES, page 10:1-10:10. ACM, (2019)Towards Privacy in Geographic Message Dissemination for Connected Vehicles., and . CoRR, (2020)Secure and Privacy-Preserving Identity Management in the Cloud., , and . ERCIM News, (2016)Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing., , and . CANS, volume 10052 of Lecture Notes in Computer Science, page 211-227. (2016)Single-Use Delegatable Signatures Based on Smart Contracts., and . CoRR, (2022)Privacy-preserving Analytics for Data Markets using MPC., , , and . CoRR, (2021)