Author of the publication

An Anonymous Trace-and-Revoke Broadcast Encryption Scheme.

, , , , and . ACISP, volume 13083 of Lecture Notes in Computer Science, page 214-233. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Large Universe Subset Predicate Encryption Based on Static Assumption (without Random Oracle)., and . IACR Cryptology ePrint Archive, (2018)Keyword Search Meets Membership Testing: Adaptive Security from SXDH., and . INDOCRYPT, volume 11356 of Lecture Notes in Computer Science, page 21-43. Springer, (2018)Secure and efficient wildcard search over encrypted data., , , , , and . Int. J. Inf. Sec., 20 (2): 199-244 (2021)Segmentation of Blood Vessels, Optic Disc Localization, Detection of Exudates and Diabetic Retinopathy Diagnosis from Digital Fundus Images., , , and . CoRR, (2022)Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data., and . IWSEC, volume 8639 of Lecture Notes in Computer Science, page 276-285. Springer, (2014)An Anonymous Trace-and-Revoke Broadcast Encryption Scheme., , , , and . ACISP, volume 13083 of Lecture Notes in Computer Science, page 214-233. Springer, (2021)Statistically Consistent Broadcast Authenticated Encryption with Keyword Search - Adaptive Security from Standard Assumptions.. ACISP, volume 13915 of Lecture Notes in Computer Science, page 523-552. Springer, (2023)CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient., , and . INDOCRYPT, volume 10698 of Lecture Notes in Computer Science, page 85-106. Springer, (2017)Efficient Protocol for Authenticated Email Search., , and . SPACE, volume 9354 of Lecture Notes in Computer Science, page 1-20. Springer, (2015)An Anonymous Trace-and-Revoke Broadcast Encryption Scheme., , , , and . IACR Cryptol. ePrint Arch., (2022)