Author of the publication

Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack.

, , , , and . IACR Cryptol. ePrint Arch., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generic yet Practical ZK Arguments from any Public-Coin HVZK, , , and . Electron. Colloquium Comput. Complex., (2005)Efficient revocable certificateless encryption against decryption key exposure., , , and . IET Inf. Secur., 9 (3): 158-166 (2015)Unforgeability of an improved certificateless signature scheme in the standard model., , , , and . IET Inf. Secur., 8 (5): 273-276 (2014)Privacy-Preserving Boolean Range Query With Temporal Access Control in Mobile Computing., , , , , and . IEEE Trans. Knowl. Data Eng., 35 (5): 5159-5172 (May 2023)EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry., , , , , and . CoRR, (2022)Special Issue on FinTech Security and Privacy., , and . Future Gener. Comput. Syst., (2020)Authenticable Data Analytics Over Encrypted Data in the Cloud., , , , and . IEEE Trans. Inf. Forensics Secur., (2023)Privacy-Enhancing and Robust Backdoor Defense for Federated Learning on Heterogeneous Data., , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Accountable and Fine-Grained Controllable Rewriting in Blockchains., , , , and . IEEE Trans. Inf. Forensics Secur., (2023)K-Time Modifiable and Epoch-Based Redactable Blockchain., , , , and . IEEE Trans. Inf. Forensics Secur., (2021)