Author of the publication

Tightly CCA-Secure Encryption Without Pairings.

, , , and . EUROCRYPT (1), volume 9665 of Lecture Notes in Computer Science, page 1-27. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions., , , and . CCS, page 647-664. ACM, (2017)Partially Encrypted Machine Learning using Functional Encryption., , , , and . CoRR, (2019)Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification., , , and . EUROCRYPT (3), volume 12698 of Lecture Notes in Computer Science, page 97-126. Springer, (2021)Multi-authority ABE for Non-monotonic Access Structures., and . Public Key Cryptography (2), volume 13941 of Lecture Notes in Computer Science, page 306-335. Springer, (2023)Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption., , and . CRYPTO (2), volume 9216 of Lecture Notes in Computer Science, page 485-502. Springer, (2015)From Single-Input to Multi-client Inner-Product Functional Encryption., , and . ASIACRYPT (3), volume 11923 of Lecture Notes in Computer Science, page 552-582. Springer, (2019)Decentralized Multi-Client Functional Encryption for Inner Product., , , , and . ASIACRYPT (2), volume 11273 of Lecture Notes in Computer Science, page 703-732. Springer, (2018)Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings., , , , and . CRYPTO (1), volume 10991 of Lecture Notes in Computer Science, page 597-627. Springer, (2018)A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials.. Public Key Cryptography (1), volume 12110 of Lecture Notes in Computer Science, page 95-120. Springer, (2020)On Instantiating Unleveled Fully-Homomorphic Signatures from Falsifiable Assumptions., and . Public Key Cryptography (1), volume 14601 of Lecture Notes in Computer Science, page 74-104. Springer, (2024)