Author of the publication

Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency.

, , , , and . Theor. Comput. Sci., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved, black-box, non-malleable encryption from semantic security., , , and . Des. Codes Cryptogr., 86 (3): 641-663 (2018)(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens., , , , and . J. Cryptol., 32 (2): 459-497 (2019)Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication., , , and . Cryptology and Network Security, volume 4856 of Lecture Notes in Computer Science, page 265-281. Springer, (2007)Deterministic, Stash-Free Write-Only ORAM., , , and . CCS, page 507-521. ACM, (2017)On the Privacy of Sublinear-Communication Jaccard Index Estimation via Min-hash Sketching., , , , and . IACR Cryptol. ePrint Arch., (2023)Managing Cloud Storage Obliviously., , , , , and . CLOUD, page 990-993. IEEE Computer Society, (2016)Semantically Rich Access Control in Cloud EHR Systems Based on MA-ABE., , , and . BigDataSecurity/HPSC/IDS, page 1-10. IEEE, (2022)POPE: Partial Order Preserving Encoding., , , and . ACM Conference on Computer and Communications Security, page 1131-1142. ACM, (2016)A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions, , , , , and . Advances in Cyber Security: Principles, Techniques, and Applications, Springer, Singapore, (2019)POPE: Partial Order-Preserving Encoding., , , and . IACR Cryptology ePrint Archive, (2015)