Author of the publication

Deterministic Public-Key Encryption Under Continual Leakage.

, , , and . ACNS, volume 9696 of Lecture Notes in Computer Science, page 304-323. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts., and . IACR Cryptology ePrint Archive, (2009)How to Leak on Key Updates., , and . IACR Cryptology ePrint Archive, (2010)Why Proving HIBE Systems Secure is Difficult., and . IACR Cryptology ePrint Archive, (2013)Deterministic Public-Key Encryption under Continual Leakage., , , and . IACR Cryptology ePrint Archive, (2014)Indistinguishability Obfuscation for Turing Machines with Unbounded Memory., , and . STOC, page 419-428. ACM, (2015)Conjunctive, Subset, and Range Queries on Encrypted Data., and . TCC, volume 4392 of Lecture Notes in Computer Science, page 535-554. Springer, (2007)The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions., , and . CT-RSA, volume 7779 of Lecture Notes in Computer Science, page 310-325. Springer, (2013)Efficient pseudorandom functions from the decisional linear assumption and weaker variants., and . ACM Conference on Computer and Communications Security, page 112-120. ACM, (2009)PPE Circuits: Formal Definition to Software Automation., , and . ACM Conference on Computer and Communications Security, page 391-408. ACM, (2020)New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques., and . CRYPTO, volume 7417 of Lecture Notes in Computer Science, page 180-198. Springer, (2012)