Author of the publication

Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions.

, , and . Des. Codes Cryptogr., 86 (10): 2197-2246 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings., , , , and . IACR Cryptol. ePrint Arch., (2017)Efficient Network Coding Signatures in the Standard Model., , and . IACR Cryptol. ePrint Arch., (2011)Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions., , and . Des. Codes Cryptogr., 86 (10): 2197-2246 (2018)Adaptively Secure Single Secret Leader Election from DDH., , and . PODC, page 430-439. ACM, (2022)Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures., , and . ASIACRYPT (4), volume 13794 of Lecture Notes in Computer Science, page 159-188. Springer, (2022)Double-Authentication-Preventing Signatures in the Standard Model., , and . SCN, volume 12238 of Lecture Notes in Computer Science, page 338-358. Springer, (2020)Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework., , , and . CT-RSA, volume 4964 of Lecture Notes in Computer Science, page 335-351. Springer, (2008)Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality., , , and . CT-RSA, volume 11405 of Lecture Notes in Computer Science, page 127-148. Springer, (2019)Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication., , and . J. Cryptol., 20 (1): 115-149 (2007)Zero-Knowledge Sets with Short Proofs., , and . EUROCRYPT, volume 4965 of Lecture Notes in Computer Science, page 433-450. Springer, (2008)