Author of the publication

Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange.

, , and . IACR Cryptology ePrint Archive, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leakage-Resilient Tweakable Encryption from One-Way Functions., , , and . IACR Cryptology ePrint Archive, (2017)Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction., , and . ProvSec, volume 9451 of Lecture Notes in Computer Science, page 149-166. Springer, (2015)Inverse-Sybil Attacks in Automated Contact Tracing., , , , , , and . IACR Cryptol. ePrint Arch., (2020)Universally Composable Subversion-Resilient Cryptography., , , and . EUROCRYPT (1), volume 13275 of Lecture Notes in Computer Science, page 272-302. Springer, (2022)Witness Maps and Applications., , and . Public Key Cryptography (1), volume 12110 of Lecture Notes in Computer Science, page 220-246. Springer, (2020)An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks., , , and . IACR Cryptology ePrint Archive, (2015)Public Key Encryption Resilient to Post-challenge Leakage and Tampering Attacks., and . CT-RSA, volume 11405 of Lecture Notes in Computer Science, page 23-43. Springer, (2019)Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge., , and . IACR Cryptol. ePrint Arch., (2022)New approach to practical leakage-resilient public-key cryptography., , and . J. Math. Cryptol., 14 (1): 172-201 (2020)COA-Secure Obfuscation and Applications., , , , , and . EUROCRYPT (1), volume 13275 of Lecture Notes in Computer Science, page 731-758. Springer, (2022)