Author of the publication

Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model.

, , , , and . Frontiers Comput. Sci., 8 (3): 469-477 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More., , and . Public Key Cryptography (1), volume 12110 of Lecture Notes in Computer Science, page 652-681. Springer, (2020)Leakage-Resilient IBE/ ABE with Optimal Leakage Rates from Lattices., , and . Public Key Cryptography (2), volume 13178 of Lecture Notes in Computer Science, page 225-255. Springer, (2022)Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor Against Correlated-Source Attacks., , and . Public Key Cryptography (1), volume 12710 of Lecture Notes in Computer Science, page 421-450. Springer, (2021)Identity-based Matchmaking Encryption with Stronger Security and Instantiation on Lattices., , , and . IACR Cryptol. ePrint Arch., (2022)Leakage-Resilient IBE/ABE with Optimal Leakage Rates from Lattices., , and . IACR Cryptol. ePrint Arch., (2021)Algebraic isomorphic spaces of ideal lattices, reduction of Ring-SIS problem, and new reduction of Ring-LWE problem., , , and . IACR Cryptol. ePrint Arch., (2023)New Lattice Two-Stage Sampling Technique and Its Applications to Functional Encryption - Stronger Security and Smaller Ciphertexts., , and . EUROCRYPT (1), volume 12696 of Lecture Notes in Computer Science, page 498-527. Springer, (2021)Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes., , , , , and . J. Comput. Sci. Technol., 33 (6): 1243-1260 (2018)Lattice-based multi-use unidirectional proxy re-encryption., , , , and . Secur. Commun. Networks, 8 (18): 3796-3803 (2015)Ring/Module Learning with Errors under Linear Leakage - Hardness and Applications., , and . IACR Cryptol. ePrint Arch., (2023)