Author of the publication

Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning with Errors over Rings.

, , and . Trustcom/BigDataSE/ISPA, page 1759-1764. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CRAB: Blockchain Based Criminal Record Management System., , , and . SpaCCS, volume 11342 of Lecture Notes in Computer Science, page 294-303. Springer, (2018)KIMAP: Key-Insulated Mutual Authentication Protocol for RFID, and . CoRR, (2012)Efficient and Low-Cost RFID Authentication Schemes, , and . CoRR, (2012)Constructing Secure-channel Free Searchable Encryption from Anonymous IBE with Partitioned Ciphertext Structure., and . SECRYPT, page 84-93. SciTePress, (2012)Efficient and Low-Cost RFID Authentication Schemes., , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2 (3): 4-25 (2011)Integrating Blockchain With Artificial Intelligence for Privacy-Preserving Recommender Systems., , , and . IEEE Trans. Netw. Sci. Eng., 8 (2): 1009-1018 (2021)Towards A Transparent and Privacy-preserving Healthcare Platform with Blockchain for Smart Cities., , , , , , and . TrustCom, page 1291-1296. IEEE, (2020)On the Leakage Resilient Cryptography in Game-Theoretic Settings., , and . Trustcom/BigDataSE/ISPA, page 1984-1989. IEEE, (2016)Accountable Cross-Border Data Sharing Using Blockchain Under Relaxed Trust Assumption., , , , , and . IEEE Trans. Engineering Management, 67 (4): 1476-1486 (2020)Privacy-Preserving Data Mining: A Game-Theoretic Approach., and . DBSec, volume 6818 of Lecture Notes in Computer Science, page 186-200. Springer, (2011)