From post

Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security.

, , , и . ASIACRYPT (1), том 12491 из Lecture Notes in Computer Science, стр. 128-158. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

New identity based signcryption schemes from pairings., и . IACR Cryptology ePrint Archive, (2003)Hierarchical Identity-Based (Lossy) Trapdoor Functions., , , и . IACR Cryptology ePrint Archive, (2012)Efficient Accountable Authority Identity-Based Encryption under Static Complexity Assumptions, и . CoRR, (2008)Group Signatures with Message-Dependent Opening in the Standard Model., и . CT-RSA, том 8366 из Lecture Notes in Computer Science, стр. 286-306. Springer, (2014)Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems., и . Inscrypt, том 7537 из Lecture Notes in Computer Science, стр. 1-21. Springer, (2011)Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs., и . TCC, том 5978 из Lecture Notes in Computer Science, стр. 499-517. Springer, (2010)Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions., , и . SCN, том 4116 из Lecture Notes in Computer Science, стр. 63-77. Springer, (2006)Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares., , и . Theor. Comput. Sci., (2016)SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions., и . Des. Codes Cryptogr., 89 (5): 895-923 (2021)Multi-Client Functional Encryption for Linear Functions in the Standard Model from LWE., и . ASIACRYPT (3), том 11923 из Lecture Notes in Computer Science, стр. 520-551. Springer, (2019)