Author of the publication

Fully Dynamic Multi Target Homomorphic Attribute-Based Encryption.

, and . IACR Cryptology ePrint Archive, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption., , and . ISPEC, volume 11125 of Lecture Notes in Computer Science, page 160-175. Springer, (2018)Dynamic Multi Target Homomorphic Attribute-Based Encryption., and . IMACC, volume 10655 of Lecture Notes in Computer Science, page 25-43. Springer, (2017)Secret Handshake Scheme with Request-Based-Revealing., and . EuroPKI, volume 7163 of Lecture Notes in Computer Science, page 1-16. Springer, (2011)Predicate- and Attribute-Hiding Inner Product Encryption in a Public Key Setting., and . Pairing, volume 8365 of Lecture Notes in Computer Science, page 113-130. Springer, (2013)Outsourcing the Re-encryption Key Generation: Flexible Ciphertext-Policy Attribute-Based Proxy Re-encryption.. ISPEC, volume 9065 of Lecture Notes in Computer Science, page 301-315. Springer, (2015)Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption., , , , , and . CANS, volume 10052 of Lecture Notes in Computer Science, page 350-364. (2016)Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 102-A (1): 81-98 (2019)Fully Dynamic Multi Target Homomorphic Attribute-Based Encryption., and . IACR Cryptology ePrint Archive, (2017)Master key updatable attribute-based encryption on the dual pairing vector space.. ISITA, page 226-230. IEEE, (2016)Towards Restricting Plaintext Space in Public Key Encryption., , , , and . IWSEC, volume 7038 of Lecture Notes in Computer Science, page 193-209. Springer, (2011)