Author of the publication

Token-Based Multi-input Functional Encryption.

, , , , , and . ProvSec, volume 11192 of Lecture Notes in Computer Science, page 147-164. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards., , , and . ACISP, volume 4586 of Lecture Notes in Computer Science, page 274-292. Springer, (2007)Forward-Secure Public Key Encryption Without Key Update from Proof-of-Stake Blockchain., , and . INDOCRYPT, volume 13143 of Lecture Notes in Computer Science, page 436-461. Springer, (2021)Wildcarded Identity-Based Encryption., , , , , , , and . J. Cryptol., 24 (1): 42-82 (2011)On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 100-A (1): 73-90 (2017)Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation., , , , , , , and . IACR Cryptol. ePrint Arch., (2021)Oblivious Linear Group Actions and Applications., , , , , , , and . CCS, page 630-650. ACM, (2021)On signatures with tight security in the multi-user setting., and . ISITA, page 91-95. IEEE, (2016)Signatures from Trapdoor Commitments with Strong Openings., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 100-A (9): 1924-1931 (2017)Efficient Convertible Undeniable Signatures with Delegatable Verification., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (1): 71-83 (2011)PoS Blockchain-Based Forward-Secure Public Key Encryption with Immutable Keys and Post-Compromise Security Guarantees., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 106 (3): 212-227 (March 2023)