Author of the publication

Efficient Public Key Encryption Based on Ideal Lattices.

, , , and . ASIACRYPT, volume 5912 of Lecture Notes in Computer Science, page 617-635. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices., , , , and . IACR Cryptology ePrint Archive, (2015)Groth-Sahai Proofs Revisited Again: A Bug in Öptimized" Randomization.. IACR Cryptology ePrint Archive, (2016)Practical Cryptanalysis of a Public-key Encryption Scheme Based on Non-linear Indeterminate Equations at SAC 2017.. IACR Cryptology ePrint Archive, (2017)Cryptanalysis of Compact-LWE., , and . CT-RSA, volume 10808 of Lecture Notes in Computer Science, page 80-97. Springer, (2018)Improved Quantum Multicollision-Finding Algorithm., , , and . PQCrypto, volume 11505 of Lecture Notes in Computer Science, page 350-367. Springer, (2019)Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge., and . ProvSec, volume 5848 of Lecture Notes in Computer Science, page 198-213. Springer, (2009)Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions., and . LATINCRYPT, volume 9230 of Lecture Notes in Computer Science, page 3-20. Springer, (2015)Secure Hierarchical Identity-Based Identification without Random Oracles., , and . ISC, volume 7483 of Lecture Notes in Computer Science, page 258-273. Springer, (2012)Practical Cryptanalysis of a Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations at SAC 2017.. PQCrypto, volume 10786 of Lecture Notes in Computer Science, page 142-161. Springer, (2018)Non-malleable Multiple Public-Key Encryption., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (6): 1318-1334 (2014)