Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Non-Interactive Zero-Knowledge Subset Sum, Decision Knapsack And Range Arguments., and . IACR Cryptology ePrint Archive, (2012)A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument., and . IACR Cryptology ePrint Archive, (2011)An Efficient E2E Verifiable E-voting System without Setup Assumptions., , and . IEEE Secur. Priv., 15 (3): 14-23 (2017)UC Secure Private Branching Program and Decision Tree Evaluation., , , , and . IACR Cryptol. ePrint Arch., (2021)PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices., , , , , and . Future Gener. Comput. Syst., (2022)Practical Constructions for Single Input Functionality against a Dishonest Majority., , , and . IACR Cryptol. ePrint Arch., (2023)Publicly auditable conditional blind signatures., , , and . J. Comput. Secur., 29 (2): 229-271 (2021)Fine-grained Policy Constraints for Distributed Point Function., , and . IACR Cryptol. ePrint Arch., (2023)Secure Computation for G-Module and its Applications., , , , and . IACR Cryptol. ePrint Arch., (2021)Proof-Carrying Cloud Computation: The Case of Convex Optimization., , , , and . IEEE Trans. Inf. Forensics Secur., 9 (11): 1790-1803 (2014)