Author of the publication

Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption.

, , , , , and . CANS, volume 10052 of Lecture Notes in Computer Science, page 350-364. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Token-Based Multi-input Functional Encryption., , , , , and . ProvSec, volume 11192 of Lecture Notes in Computer Science, page 147-164. Springer, (2018)Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes., , , , , , , and . IWSEC, volume 9836 of Lecture Notes in Computer Science, page 91-110. Springer, (2016)DBMS-Friendly Searchable Symmetric Encryption: Constructing Index Generation Suitable for Database Management Systems., , and . DSC, page 1-8. IEEE, (2021)SEPM: Efficient Partial Keyword Search on Encrypted Data., , , and . CANS, volume 9476 of Lecture Notes in Computer Science, page 75-91. Springer, (2015)Homomorphic encryption based cancelable biometrics secure against replay and its related attack., , , , and . ISITA, page 421-425. IEEE, (2012)Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption., , and . ISPEC, volume 11125 of Lecture Notes in Computer Science, page 160-175. Springer, (2018)Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting., , , , , , and . IMACC, volume 7089 of Lecture Notes in Computer Science, page 190-209. Springer, (2011)Public-Key Cryptosystems with Primitive Power Roots of Unity., , and . ACISP, volume 5107 of Lecture Notes in Computer Science, page 98-112. Springer, (2008)Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data., , , , and . ACISP (2), volume 10343 of Lecture Notes in Computer Science, page 214-234. Springer, (2017)Determination of Parameters Balancing between Security and Search Performance on Searchable Encryption., , , and . ICMU, page 1-8. IEEE, (2021)