Author of the publication

Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack.

, , , , and . IACR Cryptol. ePrint Arch., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage., and . ProvSec, volume 6980 of Lecture Notes in Computer Science, page 348-365. Springer, (2011)Computationally-Fair Group and Identity-Based Key-Exchange., and . TAMC, volume 7287 of Lecture Notes in Computer Science, page 237-247. Springer, (2012)Interactive Zero-Knowledge with Restricted Random Oracles., and . TCC, volume 3876 of Lecture Notes in Computer Science, page 21-40. Springer, (2006)Small Field Attack, and Revisiting RLWE-Based Authenticated Key Exchange from Eurocrypt'15., and . IACR Cryptology ePrint Archive, (2016)Deniable Internet Key-Exchange., , , and . IACR Cryptology ePrint Archive, (2007)Aggregation of Gamma-Signatures and Applications to Bitcoin.. IACR Cryptology ePrint Archive, (2018)A New Framework for RFID Privacy., , , , and . IACR Cryptology ePrint Archive, (2010)Practical Constant-Size Ring Signature., , and . J. Comput. Sci. Technol., 33 (3): 533-541 (2018)Concurrent Knowledge Extraction in Public-Key Models., , and . J. Cryptol., 29 (1): 156-219 (2016)Reduction Zero-Knowledge., , , and . SCN, volume 2576 of Lecture Notes in Computer Science, page 303-317. Springer, (2002)