Author of the publication

Improving the Message-Ciphertext Rate of Lewko's Fully Secure IBE Scheme.

, , , and . ISPEC, volume 7863 of Lecture Notes in Computer Science, page 105-116. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

L2-L∞ consensus of stochastic delayed multi-agent systems with ADT switching interaction topologies., , , , , and . Appl. Math. Comput., (2020)Long-Term Privacy-Preserving Aggregation With User-Dynamics for Federated Learning., , and . IEEE Trans. Inf. Forensics Secur., (2023)On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP., , , , and . CANS, volume 8813 of Lecture Notes in Computer Science, page 34-49. Springer, (2014)Approximate-Deterministic Public Key Encryption from Hard Learning Problems., , , , and . INDOCRYPT, volume 10095 of Lecture Notes in Computer Science, page 25-42. (2016)A New Structured Domain Adversarial Neural Network for Transfer Fault Diagnosis of Rolling Bearings Under Different Working Conditions., , , , and . IEEE Trans. Instrum. Meas., (2021)(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus., , , , , and . AsiaCCS, page 907-912. ACM, (2016)Resilient fault-tolerant anti-synchronization for stochastic delayed reaction-diffusion neural networks with semi-Markov jump parameters., , , , and . Neural Networks, (2020)Lossy Key Encapsulation Mechanism and Its Applications., , , and . ICISC, volume 10157 of Lecture Notes in Computer Science, page 126-144. (2016)Improving the Message-Ciphertext Rate of Lewko's Fully Secure IBE Scheme., , , and . ISPEC, volume 7863 of Lecture Notes in Computer Science, page 105-116. Springer, (2013)Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation., , , and . ProvSec, volume 8782 of Lecture Notes in Computer Science, page 162-177. Springer, (2014)