Author of the publication

Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions.

, , , and . EUROCRYPT (1), volume 12696 of Lecture Notes in Computer Science, page 404-434. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constrained PRFs for Bit-fixing from OWFs with Constant Collusion Resistance., , , and . IACR Cryptology ePrint Archive, (2018)Constrained PRFs for \mathrmNC^1 in Traditional Groups., , , , and . CRYPTO (2), volume 10992 of Lecture Notes in Computer Science, page 543-574. Springer, (2018)A Multi-trapdoor Commitment Scheme from the RSA Assumption., , and . ACISP, volume 6168 of Lecture Notes in Computer Science, page 182-199. Springer, (2010)Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES., and . Des. Codes Cryptogr., 77 (1): 61-98 (2015)Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices., , , , and . Public Key Cryptography, volume 8383 of Lecture Notes in Computer Science, page 95-112. Springer, (2014)Compact NIZKs from Standard Assumptions on Bilinear Maps., , , and . EUROCRYPT (3), volume 12107 of Lecture Notes in Computer Science, page 379-409. Springer, (2020)Publicly Verifiable Deletion from Minimal Assumptions., , and . TCC (4), volume 14372 of Lecture Notes in Computer Science, page 228-245. Springer, (2023)Exploring Constructions of Compact NIZKs from Various Assumptions., , , and . CRYPTO (3), volume 11694 of Lecture Notes in Computer Science, page 639-669. Springer, (2019)Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication., , , and . ASIACRYPT (1), volume 13090 of Lecture Notes in Computer Science, page 606-636. Springer, (2021)KDM Security for the Fujisaki-Okamoto Transformations in the QROM., and . Public Key Cryptography (2), volume 13178 of Lecture Notes in Computer Science, page 286-315. Springer, (2022)