Author of the publication

Efficient Dynamic Searchable Encryption with Forward Privacy under the Decent Leakage.

, , , and . CODASPY, page 312-323. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sequential aggregate authentication codes with information theoretic security., , and . CISS, page 192-197. IEEE, (2016)Unconditionally secure searchable encryption., , and . CISS, page 1-6. IEEE, (2017)Lattice-Based Revocable Identity-Based Encryption with Bounded Decryption Key Exposure Resistance., and . ACISP (1), volume 10342 of Lecture Notes in Computer Science, page 184-204. Springer, (2017)Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-Offs Between Communication and Storage., and . ProvSec, volume 9451 of Lecture Notes in Computer Science, page 489-502. Springer, (2015)Information-Theoretically Secure Entity Authentication in the Multi-user Setting., , and . ICISC, volume 8565 of Lecture Notes in Computer Science, page 400-417. Springer, (2013)Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions., , and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 16-28. Springer, (2013)Broadcast Encryption with Guessing Secrecy.. ICITS, volume 10681 of Lecture Notes in Computer Science, page 39-57. Springer, (2017)Adaptively secure revocable hierarchical IBE from k-linear assumption., , and . Des. Codes Cryptogr., 89 (7): 1535-1574 (2021)Timed-release computational secret sharing and threshold encryption., and . Des. Codes Cryptogr., 86 (1): 17-54 (2018)State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption., , , , and . IACR Cryptol. ePrint Arch., (2021)