From post

Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards.

, , , и . ACISP, том 4586 из Lecture Notes in Computer Science, стр. 274-292. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards., , , и . ACISP, том 4586 из Lecture Notes in Computer Science, стр. 274-292. Springer, (2007)On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks., , , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 100-A (1): 73-90 (2017)Wildcarded Identity-Based Encryption., , , , , , , и . J. Cryptol., 24 (1): 42-82 (2011)Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation., , , , , , , и . IACR Cryptol. ePrint Arch., (2021)Oblivious Linear Group Actions and Applications., , , , , , , и . CCS, стр. 630-650. ACM, (2021)Forward-Secure Public Key Encryption Without Key Update from Proof-of-Stake Blockchain., , и . INDOCRYPT, том 13143 из Lecture Notes in Computer Science, стр. 436-461. Springer, (2021)On signatures with tight security in the multi-user setting., и . ISITA, стр. 91-95. IEEE, (2016)Signatures from Trapdoor Commitments with Strong Openings., и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 100-A (9): 1924-1931 (2017)An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification., и . IACR Cryptology ePrint Archive, (2009)Efficient Convertible Undeniable Signatures with Delegatable Verification., и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (1): 71-83 (2011)