Author of the publication

Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards.

, , , and . ACISP, volume 4586 of Lecture Notes in Computer Science, page 274-292. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Certificateless Cryptography.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Hybrid Cryptography.. IACR Cryptology ePrint Archive, (2004)Aggregate Signcryption.. IACR Cryptology ePrint Archive, (2012)A survey of certificateless encryption schemes and security models.. Int. J. Inf. Sec., 7 (5): 349-377 (2008)Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards., , , and . IACR Cryptology ePrint Archive, (2006)A Brief History of Provably-Secure Public-Key Encryption.. IACR Cryptology ePrint Archive, (2009)The Cramer-Shoup Encryption Scheme is Plaintext Aware in the Standard Model.. IACR Cryptology ePrint Archive, (2005)A Brief History of Security Models for Confidentiality.. ProvSec, volume 5848 of Lecture Notes in Computer Science, page 1. Springer, (2009)A Brief History of Provably-Secure Public-Key Encryption.. AFRICACRYPT, volume 5023 of Lecture Notes in Computer Science, page 357-370. Springer, (2008)Relations Among Notions of Plaintext Awareness., and . Public Key Cryptography, volume 4939 of Lecture Notes in Computer Science, page 47-64. Springer, (2008)