Author of the publication

Security Definitions on Time-Lock Puzzles.

, , , , and . ICISC, volume 12593 of Lecture Notes in Computer Science, page 3-15. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ring Signature With Unconditional Anonymity in the Plain Model., and . IEEE Access, (2021)Tightly secure ring signatures in the standard model., and . Theor. Comput. Sci., (2021)Effects of GA Based Mediation Protocol for Utilities that Change Over Time., and . Next Frontier in Agent-Based Complex Automated Negotiation, volume 596 of Studies in Computational Intelligence, Springer, (2015)Incentive based smart pricing scheme using scoring rule., , and . ISGT Europe, page 1-5. IEEE, (2013)Chosen Ciphertext Security for (Hierarchical) Identity-Based Matchmaking Encryption., , and . IACR Cryptol. ePrint Arch., (2024)A Mediation Mechanism for Automated Negotiating Agents Whose Utility Changes over Time., and . AAAI, page 1613-1614. AAAI Press, (2013)Simulation-Based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions., , , , and . SCN, volume 11035 of Lecture Notes in Computer Science, page 140-159. Springer, (2018)Forward Secure Message Franking., , , , and . ICISC, volume 13218 of Lecture Notes in Computer Science, page 339-358. Springer, (2021)Identity-Based Matchmaking Encryption Secure Against Key Generation Center., , and . ProvSec, volume 14217 of Lecture Notes in Computer Science, page 251-273. Springer, (2023)Efficient Two-Party Exponentiation from Quotient Transfer., , , , and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 643-662. Springer, (2022)