Author of the publication

Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption.

, , , , and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 495-508. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy., , , , and . ESORICS (2), volume 11736 of Lecture Notes in Computer Science, page 283-303. Springer, (2019)Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security., , , , and . ESORICS (2), volume 11099 of Lecture Notes in Computer Science, page 228-246. Springer, (2018)Rethinking Practical Blockchain-Based Symmetric Searchable Encryption Services., , , , and . TrustCom, page 307-317. IEEE, (2023)A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability., , , , , and . ISPEC, volume 14341 of Lecture Notes in Computer Science, page 380-398. Springer, (2023)Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption., , , , and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 495-508. Springer, (2016)Efficient Certificate-Based Signature and Its Aggregation., , , and . ISPEC, volume 10701 of Lecture Notes in Computer Science, page 391-408. Springer, (2017)Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach., , , , , , , , and . ISPEC, volume 13107 of Lecture Notes in Computer Science, page 327-344. Springer, (2021)Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey., , , , and . NSS, volume 11928 of Lecture Notes in Computer Science, page 37-52. Springer, (2019)A Multi-client DSSE Scheme Supporting Range Queries., , , and . Inscrypt, volume 11449 of Lecture Notes in Computer Science, page 289-307. Springer, (2018)An Encrypted Database with Enforced Access Control and Blockchain Validation., , , , , and . Inscrypt, volume 11449 of Lecture Notes in Computer Science, page 260-273. Springer, (2018)