Author of the publication

A Quasipolynomial Reduction for Generalized Selective Decryption on Trees.

, , and . IACR Cryptology ePrint Archive, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constrained PRFs for Unbounded Inputs with Short Keys., and . ACNS, volume 9696 of Lecture Notes in Computer Science, page 445-463. Springer, (2016)A Classification of Computational Assumptions in the Algebraic Group Model., , and . CRYPTO (2), volume 12171 of Lecture Notes in Computer Science, page 121-151. Springer, (2020)Breaking Existential Unforgeability of a Signature Scheme from Asiacrypt 2014.. IACR Cryptology ePrint Archive, (2014)Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures., and . IACR Cryptology ePrint Archive, (2008)Efficient Rational Secret Sharing in Standard Communication Networks., , and . IACR Cryptology ePrint Archive, (2008)BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme., , , and . ACM Conference on Computer and Communications Security, page 1614-1625. ACM, (2016)Blind Schnorr Signatures in the Algebraic Group Model., , and . IACR Cryptology ePrint Archive, (2019)The One-More Discrete Logarithm Assumption in the Generic Group Model., , and . ASIACRYPT (4), volume 13093 of Lecture Notes in Computer Science, page 587-617. Springer, (2021)Fair Blind Signatures without Random Oracles., and . AFRICACRYPT, volume 6055 of Lecture Notes in Computer Science, page 16-33. Springer, (2010)Structure-Preserving Signatures and Commitments to Group Elements., , , , and . J. Cryptol., 29 (2): 363-421 (2016)