Author of the publication

Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption.

, , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 103-A (1): 107-113 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wildcarded identity-based ring signatures based on linearly homomorphic signatures., and . J. Inf. Secur. Appl., (June 2023)Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption., and . CANS, volume 11124 of Lecture Notes in Computer Science, page 417-439. Springer, (2018)Time-Specific Encryption with Constant-Size Secret-Keys Secure under Standard Assumption., and . IACR Cryptol. ePrint Arch., (2020)Time-Specific Signatures., and . ISC, volume 12472 of Lecture Notes in Computer Science, page 20-38. Springer, (2020)Multi-dimensional sub/super-range signatures., and . J. Inf. Secur. Appl., (2022)Multi-Dimensional Sub/Super-Range Signatures., and . IACR Cryptol. ePrint Arch., (2021)Attribute-Based Signatures for Range of Inner Product and Its Applications., and . ICISC, volume 13849 of Lecture Notes in Computer Science, page 382-407. Springer, (2022)Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption., , , , and . ISITA, page 707-711. IEEE, (2018)Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications., and . ACISP, volume 13915 of Lecture Notes in Computer Science, page 291-319. Springer, (2023)Consideration on Data Conformance Toward Building Trust in Supply Chain., , , , , , , and . EuCNC, page 128-132. IEEE, (2020)