Author of the publication

Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency.

, , , , and . Theor. Comput. Sci., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Public Key Broadcast Encryption Schemes With Shorter Transmissions., , , and . TBC, 54 (3): 401-411 (2008)Stabilization of hybrid wheeled and legged mobile robot based on ZMP., , , and . SCIS&ISIS, page 2044-2046. IEEE, (2012)Anonymous HIBE: Compact Construction Over Prime-Order Groups., and . IEEE Trans. Inf. Theory, 59 (4): 2531-2541 (2013)EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method., , , and . Int. J. Inf. Sec., 19 (4): 383-399 (2020)Construction of a New Biometric-Based Key Derivation Function and Its Application., , , , , and . Secur. Commun. Networks, (2018)Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency., , , , and . ASIACRYPT (1), volume 8269 of Lecture Notes in Computer Science, page 235-254. Springer, (2013)Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited., , , and . ESORICS (2), volume 8713 of Lecture Notes in Computer Science, page 1-18. Springer, (2014)Efficient Certificateless Signature Schemes., , , and . ACNS, volume 4521 of Lecture Notes in Computer Science, page 443-458. Springer, (2007)New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem., , and . Inf. Sci., (2015)An Efficient Predicate Encryption with Constant Pairing Computations and Minimum Costs., , , and . IEEE Trans. Computers, 65 (10): 2947-2958 (2016)