Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework., , , and . CT-RSA, volume 4964 of Lecture Notes in Computer Science, page 335-351. Springer, (2008)Double-Authentication-Preventing Signatures in the Standard Model., , and . SCN, volume 12238 of Lecture Notes in Computer Science, page 338-358. Springer, (2020)Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication., , and . J. Cryptol., 20 (1): 115-149 (2007)Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions., , and . Des. Codes Cryptogr., 86 (10): 2197-2246 (2018)Efficient Network Coding Signatures in the Standard Model., , and . IACR Cryptol. ePrint Arch., (2011)Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings., , , , and . IACR Cryptol. ePrint Arch., (2017)Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality., , , and . CT-RSA, volume 11405 of Lecture Notes in Computer Science, page 127-148. Springer, (2019)Efficient Network Coding Signatures in the Standard Model., , and . Public Key Cryptography, volume 7293 of Lecture Notes in Computer Science, page 680-696. Springer, (2012)Adaptively Secure Single Secret Leader Election from DDH., , and . PODC, page 430-439. ACM, (2022)Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures., , and . ASIACRYPT (4), volume 13794 of Lecture Notes in Computer Science, page 159-188. Springer, (2022)