Author of the publication

CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts.

, , , and . Comput. J., 62 (4): 545-562 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Certificateless Signature Schemes., , , and . ACNS, volume 4521 of Lecture Notes in Computer Science, page 443-458. Springer, (2007)Construction of a New Biometric-Based Key Derivation Function and Its Application., , , , , and . Secur. Commun. Networks, (2018)Public Key Broadcast Encryption Schemes With Shorter Transmissions., , , and . TBC, 54 (3): 401-411 (2008)Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency., , , , and . ASIACRYPT (1), volume 8269 of Lecture Notes in Computer Science, page 235-254. Springer, (2013)New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem., , and . Inf. Sci., (2015)Tight security for the generic construction of identity-based signature (in the multi-instance setting)., , , and . Theor. Comput. Sci., (2020)An Efficient Predicate Encryption with Constant Pairing Computations and Minimum Costs., , , and . IEEE Trans. Computers, 65 (10): 2947-2958 (2016)Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited., , , and . ESORICS (2), volume 8713 of Lecture Notes in Computer Science, page 1-18. Springer, (2014)Stabilization of hybrid wheeled and legged mobile robot based on ZMP., , , and . SCIS&ISIS, page 2044-2046. IEEE, (2012)Anonymous HIBE: Compact Construction Over Prime-Order Groups., and . IEEE Trans. Inf. Theory, 59 (4): 2531-2541 (2013)