Author of the publication

An Efficient Privacy-Preserving Outsourced Computation over Public Data.

, , , and . IEEE Trans. Serv. Comput., 10 (5): 756-770 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Regular lossy functions and their applications in leakage-resilient cryptography., , and . Theor. Comput. Sci., (2018)An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted Medical Internet of Things., , and . Wirel. Commun. Mob. Comput., (2020)A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains., , , , and . IEEE Trans. Computers, 65 (12): 3567-3579 (2016)Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited., , and . IACR Cryptol. ePrint Arch., (2012)A lattice-based designated-server public-key authenticated encryption with keyword search., , and . J. Syst. Archit., (December 2023)Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing., and . IACR Cryptol. ePrint Arch., (2015)Non-Malleable Functions and Their Applications., , , , and . IACR Cryptol. ePrint Arch., (2015)Regularly Lossy Functions and Applications., , and . CT-RSA, volume 10808 of Lecture Notes in Computer Science, page 491-511. Springer, (2018)Cryptanalysis of a Type of CRT-Based RSA Algorithms., , and . J. Comput. Sci. Technol., 23 (2): 214-221 (2008)Server-Aided Revocable Identity-Based Encryption., , , and . ESORICS (1), volume 9326 of Lecture Notes in Computer Science, page 286-304. Springer, (2015)