Author of the publication

Security with Functional Re-encryption from CPA.

, , and . TCC (2), volume 14370 of Lecture Notes in Computer Science, page 279-305. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Cryptomania to Obfustopia Through Secret-Key Functional Encryption., , , and . J. Cryptol., 33 (2): 357-405 (2020)Leveled Fully Homomorphic Signatures from Standard Lattices.. IACR Cryptology ePrint Archive, (2014)Barriers in Cryptography with Weak, Correlated and Leaky Sources.. IACR Cryptology ePrint Archive, (2012)On the Communication Complexity of Secure Function Evaluation with Long Output., and . IACR Cryptology ePrint Archive, (2014)One-time Computable and Uncomputable Functions., , and . IACR Cryptology ePrint Archive, (2010)The Edited Truth., , and . TCC (1), volume 10677 of Lecture Notes in Computer Science, page 305-340. Springer, (2017)Multi-instance Randomness Extraction and Security Against Bounded-Storage Mass Surveillance., , and . TCC (3), volume 14371 of Lecture Notes in Computer Science, page 93-122. Springer, (2023)Succinct LWE Sampling, Random Polynomials, and Obfuscation., , , , and . TCC (2), volume 13043 of Lecture Notes in Computer Science, page 256-287. Springer, (2021)Updatable Public Key Encryption in the Standard Model., , and . TCC (3), volume 13044 of Lecture Notes in Computer Science, page 254-285. Springer, (2021)Adaptively Secure MPC with Sublinear Communication Complexity., , and . CRYPTO (2), volume 11693 of Lecture Notes in Computer Science, page 30-60. Springer, (2019)