Author of the publication

Identity-Based Encryption Secure against Selective Opening Attack.

, , and . IACR Cryptology ePrint Archive, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Separating IND-CPA and Circular Security for Unbounded Length Key Cycles., , and . Public Key Cryptography (1), volume 10174 of Lecture Notes in Computer Science, page 232-246. Springer, (2017)Full-Domain Subgroup Hiding and Constant-Size Group Signatures., and . Public Key Cryptography, volume 4450 of Lecture Notes in Computer Science, page 1-15. Springer, (2007)Collusion Resistant Broadcast and Trace from Positional Witness Encryption., , and . Public Key Cryptography (2), volume 11443 of Lecture Notes in Computer Science, page 3-33. Springer, (2019)Indistinguishability Obfuscation for Turing Machines with Unbounded Memory., , and . STOC, page 419-428. ACM, (2015)Why Proving HIBE Systems Secure is Difficult., and . IACR Cryptology ePrint Archive, (2013)Deterministic Public-Key Encryption under Continual Leakage., , , and . IACR Cryptology ePrint Archive, (2014)New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts., and . IACR Cryptology ePrint Archive, (2009)How to Leak on Key Updates., , and . IACR Cryptology ePrint Archive, (2010)Conjunctive, Subset, and Range Queries on Encrypted Data., and . TCC, volume 4392 of Lecture Notes in Computer Science, page 535-554. Springer, (2007)A New Approach for Non-Interactive Zero-Knowledge from Learning with Errors.. IACR Cryptol. ePrint Arch., (2024)