Author of the publication

Security of Identity-Based Encryption Schemes from Quadratic Residues.

, , , and . SECITC, volume 10006 of Lecture Notes in Computer Science, page 63-77. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Boneh-Gentry-Hamburg's Identity-based Encryption Schemes Revisited., , , and . IACR Cryptology ePrint Archive, (2016)Key-Policy Attribute-Based Encryption from Bilinear Maps., , and . SECITC, volume 10543 of Lecture Notes in Computer Science, page 28-42. Springer, (2017)On Anonymization of Cocks' Identity-based Encryption Scheme., and . Comput. Sci. J. Moldova, 27 (3): 283-298 (2019)Security of Identity-based Encryption Schemes from Quadratic Residues., , , and . IACR Cryptol. ePrint Arch., (2022)On the Distribution of Quadratic Residues and Non-residues Modulo Composite Integers and Applications to Cryptography., , , and . IACR Cryptology ePrint Archive, (2019)Practically Efficient Attribute-Based Encryption for Compartmented and Multilevel Access Structures., , and . ICETE (Selected Papers), volume 1484 of Communications in Computer and Information Science, page 129-150. Springer, (2020)Security of Identity-Based Encryption Schemes from Quadratic Residues., , , and . SECITC, volume 10006 of Lecture Notes in Computer Science, page 63-77. (2016)On the distribution of quadratic residues and non-residues modulo composite integers and applications to cryptography., , , and . Appl. Math. Comput., (2020)Practically Efficient Attribute-based Encryption for Compartmented Access Structures., , and . ICETE (2), page 201-212. ScitePress, (2020)