From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Multi-Client Functional Encryption for Linear Functions in the Standard Model from LWE., и . ASIACRYPT (3), том 11923 из Lecture Notes in Computer Science, стр. 520-551. Springer, (2019)Homomorphic Network Coding Signatures in the Standard Model., и . Public Key Cryptography, том 6571 из Lecture Notes in Computer Science, стр. 17-34. Springer, (2011)Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation., и . Public Key Cryptography, том 6056 из Lecture Notes in Computer Science, стр. 384-402. Springer, (2010)SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions., и . Des. Codes Cryptogr., 89 (5): 895-923 (2021)Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares., , и . Theor. Comput. Sci., (2016)Efficient Accountable Authority Identity-Based Encryption under Static Complexity Assumptions, и . CoRR, (2008)New identity based signcryption schemes from pairings., и . IACR Cryptology ePrint Archive, (2003)Hierarchical Identity-Based (Lossy) Trapdoor Functions., , , и . IACR Cryptology ePrint Archive, (2012)Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems., и . Inscrypt, том 7537 из Lecture Notes in Computer Science, стр. 1-21. Springer, (2011)Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps., , , и . ASIACRYPT, том 3788 из Lecture Notes in Computer Science, стр. 515-532. Springer, (2005)