Author of the publication

Public-Key Encryption with Keyword Search in Multi-user, Multi-challenge Setting under Adaptive Corruptions.

, , , , and . Public Key Cryptography (4), volume 14604 of Lecture Notes in Computer Science, page 105-126. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Broadbeam for Massive MIMO Systems., , and . CoRR, (2015)Outage Analysis of Relay-Assisted mmWave Cellular Systems Employing JSDM., , and . IEEE Access, (2019)Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall., , , and . IEEE Access, (2019)Buffer-aided secure two-hop communications with adaptive link selection and on/off power control., , and . WCSP, page 1-6. IEEE, (2017)Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model., , and . Informatica, 23 (3): 443-460 (2012)Adaptively Secure Threshold Signature Scheme in the Standard Model., , and . Informatica, 20 (4): 591-612 (2009)Toward optimizing cauchy matrix for cauchy reed-solomon code., , , , and . IEEE Communications Letters, 13 (8): 603-605 (2009)Characterization of the East - West Spatial Uniformity for GOES-16/17 ABI Bands Using the Moon., , , and . Remote. Sens., 15 (7): 1881 (April 2023)Characterizing user behaviors in location-based find-and-flirt services: Anonymity and demographics - A WeChat Case Study., , , and . Peer-to-Peer Netw. Appl., 10 (2): 357-367 (2017)Design methodology for the IBM POWER7 microprocessor., , , , , , , , , and 15 other author(s). IBM J. Res. Dev., 55 (3): 9 (2011)