Author of the publication

New efficient chosen ciphertext secure Elgamal encryption schemes for secure Cloud storage service.

, , , , and . Int. J. Web Grid Serv., 13 (3): 246-269 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of a Type of CRT-Based RSA Algorithms., , and . J. Comput. Sci. Technol., 23 (2): 214-221 (2008)Regular lossy functions and their applications in leakage-resilient cryptography., , and . Theor. Comput. Sci., (2018)Regularly Lossy Functions and Applications., , and . CT-RSA, volume 10808 of Lecture Notes in Computer Science, page 491-511. Springer, (2018)An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted Medical Internet of Things., , and . Wirel. Commun. Mob. Comput., (2020)A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains., , , , and . IEEE Trans. Computers, 65 (12): 3567-3579 (2016)Non-Malleable Functions and Their Applications., , , , and . IACR Cryptol. ePrint Arch., (2015)A lattice-based designated-server public-key authenticated encryption with keyword search., , and . J. Syst. Archit., (December 2023)Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing., and . IACR Cryptol. ePrint Arch., (2015)Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited., , and . IACR Cryptol. ePrint Arch., (2012)Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem., , and . ACISP, volume 7959 of Lecture Notes in Computer Science, page 136-151. Springer, (2013)