Author of the publication

CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts.

, , , and . IACR Cryptology ePrint Archive, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bogus Data Filtering in Sensor Networks., , , and . PAKDD Workshops, volume 4819 of Lecture Notes in Computer Science, page 629-635. Springer, (2007)A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme., and . ISPEC, volume 4991 of Lecture Notes in Computer Science, page 101-115. Springer, (2008)A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (9): 1620-1631 (2010)A Variant of Park-Lee Identity-Based Encryption System., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 99-A (3): 720-732 (2016)Transmission-Efficient Broadcast Encryption Scheme with Personalized Messages., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 96-A (4): 796-806 (2013)Security Analysis of a Multi-Receiver Identity-Based Key Encapsulation Mechanism., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (1): 329-331 (2009)Cryptanalysis of Chatterjee-Sarkar Hierarchical Identity-Based Encryption Scheme at PKC 06., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (7): 1724-1726 (2009)An efficient public key functional encryption for inner product evaluations., , and . Neural Comput. Appl., 32 (17): 13117-13128 (2020)Generic construction of designated tester public-key encryption with keyword search., , and . Inf. Sci., (2012)Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption., , , , and . FGIT-EL/DTA/UNESST, volume 352 of Communications in Computer and Information Science, page 99-102. Springer, (2012)