Author of the publication

Identity-Based Traitor Tracing.

, , , , , and . Public Key Cryptography, volume 4450 of Lecture Notes in Computer Science, page 361-376. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A survey of certificateless encryption schemes and security models.. Int. J. Inf. Sec., 7 (5): 349-377 (2008)Certificateless Cryptography.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Hybrid Cryptography.. IACR Cryptology ePrint Archive, (2004)Aggregate Signcryption.. IACR Cryptology ePrint Archive, (2012)Relations Among Notions of Plaintext Awareness., and . Public Key Cryptography, volume 4939 of Lecture Notes in Computer Science, page 47-64. Springer, (2008)Certificateless Encryption Schemes Strongly Secure in the Standard Model., , and . Public Key Cryptography, volume 4939 of Lecture Notes in Computer Science, page 344-359. Springer, (2008)A Brief History of Provably-Secure Public-Key Encryption.. AFRICACRYPT, volume 5023 of Lecture Notes in Computer Science, page 357-370. Springer, (2008)A Brief History of Security Models for Confidentiality.. ProvSec, volume 5848 of Lecture Notes in Computer Science, page 1. Springer, (2009)Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards., , , and . IACR Cryptology ePrint Archive, (2006)The Cramer-Shoup Encryption Scheme is Plaintext Aware in the Standard Model.. IACR Cryptology ePrint Archive, (2005)