From post

Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak PRF with Efficient Protocols from LWR.

, , , , и . IACR Cryptology ePrint Archive, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fully Secure Cipertext-Policy Hiding CP-ABE., , и . ISPEC, том 6672 из Lecture Notes in Computer Science, стр. 24-39. Springer, (2011)Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption., , , , и . AsiaCCS, стр. 659-672. ACM, (2018)Unforgeable Watermarking Schemes with Public Extraction., , , , и . SCN, том 11035 из Lecture Notes in Computer Science, стр. 63-80. Springer, (2018)Simulation-based selective opening security for receivers under chosen-ciphertext attacks., , , , , и . Des. Codes Cryptogr., 87 (6): 1345-1371 (2019)Multi-authority anonymous authentication with public accountability for incentive-based applications., , , , , и . Comput. Networks, (июля 2023)Attribute-Based Encryption With Verifiable Outsourced Decryption., , , и . IEEE Trans. Inf. Forensics Secur., 8 (8): 1343-1354 (2013)Non-interactive Zero-Knowledge Functional Proofs., , , , , , , и . ASIACRYPT (5), том 14442 из Lecture Notes in Computer Science, стр. 236-268. Springer, (2023)Verifiable Computation on Outsourced Encrypted Data., , , и . ESORICS (1), том 8712 из Lecture Notes in Computer Science, стр. 273-291. Springer, (2014)Practical Federated Learning for Samples with Different IDs., , , и . ProvSec, том 13600 из Lecture Notes in Computer Science, стр. 176-195. Springer, (2022)Adaptable Ciphertext-Policy Attribute-Based Encryption., , , и . Pairing, том 8365 из Lecture Notes in Computer Science, стр. 199-214. Springer, (2013)