Author of the publication

Secure Cloud-Assisted Data Pub/Sub Service With Fine-Grained Bilateral Access Control.

, , , , and . IEEE Trans. Inf. Forensics Secur., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leakage-resilient attribute based encryption in prime-order groups via predicate encodings., , , , and . Des. Codes Cryptogr., 86 (6): 1339-1366 (2018)Almost-tight Identity Based Encryption against Selective Opening Attack., , , and . IACR Cryptol. ePrint Arch., (2015)Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health Cloud., , , and . IEEE Trans. Inf. Forensics Secur., (2024)Traitor Tracing with N1/3-Size Ciphertexts and O(1)-Size Keys from k-Lin., , and . EUROCRYPT (3), volume 14006 of Lecture Notes in Computer Science, page 637-668. Springer, (2023)Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently., , , , and . ESORICS (2), volume 9879 of Lecture Notes in Computer Science, page 551-569. Springer, (2016)Extended Nested Dual System Groups, Revisited., , , , and . Public Key Cryptography (1), volume 9614 of Lecture Notes in Computer Science, page 133-163. Springer, (2016)Revocable identity-based matchmaking encryption in the standard model., , , , , and . IET Inf. Secur., 17 (4): 567-581 (July 2023)Blockchain-Based Fair Payment for ABE with Outsourced Decryption., , , and . Peer Peer Netw. Appl., 16 (1): 312-327 (January 2023)Extended Nested Dual System Groups, Revisited., , , , and . IACR Cryptol. ePrint Arch., (2015)Simple and Efficient FE for Quadratic Functions., and . IACR Cryptol. ePrint Arch., (2020)