Author of the publication

Short attribute-based signatures for arbitrary Turing machines from standard assumptions.

, , and . Des. Codes Cryptogr., 91 (5): 1845-1872 (May 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems., , and . J. Medical Systems, 38 (10): 120 (2014)Fully Secure Unbounded Revocable Attribute-Based Encryption in Prime Order Bilinear Groups via Subset Difference Method., , and . IACR Cryptology ePrint Archive, (2015)A Probabilistic Algebraic Attack on the Grain Family of Stream Cipher., , and . IACR Cryptology ePrint Archive, (2014)Verifiable and Delegatable Constrained Pseudorandom Functions for Unconstrained Inputs., , and . IACR Cryptology ePrint Archive, (2016)Generalized self-healing key distribution in wireless adhoc networks with trade-offs in user's pre-arranged life cycle and collusion resistance., , and . Q2SWinet, page 80-87. ACM, (2009)Cryptanalysis of Yang et al.'s Digital Rights Management Authentication Scheme Based on Smart Card., and . SNDS, volume 420 of Communications in Computer and Information Science, page 288-297. Springer, (2014)An improved biometric-based remote user authentication scheme for connected healthcare., , and . Int. J. Ad Hoc Ubiquitous Comput., 18 (1/2): 75-84 (2015)Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation., , and . Public Key Cryptography (2), volume 10175 of Lecture Notes in Computer Science, page 463-493. Springer, (2017)A privacy enabling content distribution framework for digital rights management., and . Int. J. Trust. Manag. Comput. Commun., 2 (1): 22-39 (2014)A secure password-based authentication and key agreement scheme using smart cards., , , and . J. Inf. Secur. Appl., (2015)