Author of the publication

Chosen Ciphertext Security via UCE.

, and . Public Key Cryptography, volume 8383 of Lecture Notes in Computer Science, page 56-76. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tag-KEM/DEM Framework for Public-Key Encryption with Non-Interactive Opening., , and . IEICE Trans. Inf. Syst., 101-D (11): 2677-2687 (2018)Adaptive Antenna Selection for Two-Hop Full-Duplex UAV Relay Networks., , and . ICCE-Taiwan, page 647-648. IEEE, (2023)Improving QoE Fairness Using the IEEE 802.11e Priority Control Mechanism., , , , and . ICCE-TW, page 1-2. IEEE, (2020)Two-Dimensional Dynamic Fusion for Continuous Authentication., , , , , , , , , and . IJCB, page 1-9. IEEE, (2023)Receiver Selective Opening Chosen Ciphertext Secure Identity-Based Encryption., , and . APKC@AsiaCCS, page 51-59. ACM, (2021)On the Security of Linear Sketch Schemes against Recovering Attacks., , and . ICETE (2), page 242-253. SciTePress, (2018)Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms., and . TCC (1), volume 9014 of Lecture Notes in Computer Science, page 561-590. Springer, (2015)Link Quality Classifier with Compressed Sensing Based on ell_1-ell_2 Optimization., , and . IEEE Communications Letters, 15 (10): 1117-1119 (2011)On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups., , and . CRYPTO, volume 7417 of Lecture Notes in Computer Science, page 812-831. Springer, (2012)A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function., , , , and . ProvSec, volume 4784 of Lecture Notes in Computer Science, page 68-84. Springer, (2007)