Author of the publication

Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction.

, , , , and . WISA, volume 12583 of Lecture Notes in Computer Science, page 245-257. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Computation of Shared Secrets and Its Applications., , and . WISA, volume 13009 of Lecture Notes in Computer Science, page 119-131. Springer, (2021)Strongly Secure Certificateless Public Key Encryption Without Pairing., , and . CANS, volume 4856 of Lecture Notes in Computer Science, page 194-208. Springer, (2007)Secure Communication in Civil Drones., , and . ICISSP (Revised Selected Papers), volume 576 of Communications in Computer and Information Science, page 177-195. Springer, (2015)A privacy preserving and fine-grained access control scheme in DaaS based on efficient DSP re-encryption., , and . Int. J. High Perform. Comput. Netw., 11 (3): 231-241 (2018)Public Key Encryption with Keyword Search Revisited., , and . IACR Cryptology ePrint Archive, (2005)Inspecting TLS Anytime Anywhere: A New Approach to TLS Interception., , and . AsiaCCS, page 116-126. ACM, (2020)Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof., , , and . WISA, volume 11897 of Lecture Notes in Computer Science, page 206-216. Springer, (2019)Efficient Anonymous Multi-group Broadcast Encryption., , , , and . ACNS (1), volume 12146 of Lecture Notes in Computer Science, page 251-270. Springer, (2020)A New Encoding Framework for Predicate Encryption with Non-linear Structures in Prime Order Groups., , , , and . ACNS, volume 11464 of Lecture Notes in Computer Science, page 406-425. Springer, (2019)Identity-Based Threshold Decryption., and . Public Key Cryptography, volume 2947 of Lecture Notes in Computer Science, page 262-276. Springer, (2004)