Author of the publication

Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption.

, , , and . EUROCRYPT (2), volume 13276 of Lecture Notes in Computer Science, page 736-763. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deterministic Public-Key Encryption under Continual Leakage., , , and . IACR Cryptology ePrint Archive, (2014)The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions., , and . CT-RSA, volume 7779 of Lecture Notes in Computer Science, page 310-325. Springer, (2013)Indistinguishability Obfuscation for Turing Machines with Unbounded Memory., , and . STOC, page 419-428. ACM, (2015)Conjunctive, Subset, and Range Queries on Encrypted Data., and . TCC, volume 4392 of Lecture Notes in Computer Science, page 535-554. Springer, (2007)Constrained Pseudorandom Functions for Unconstrained Inputs., , and . EUROCRYPT (2), volume 9666 of Lecture Notes in Computer Science, page 124-153. Springer, (2016)Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption., , and . EUROCRYPT (2), volume 10211 of Lecture Notes in Computer Science, page 528-557. (2017)New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques., and . CRYPTO, volume 7417 of Lecture Notes in Computer Science, page 180-198. Springer, (2012)Witness Encryption from Instance Independent Assumptions., , and . CRYPTO (1), volume 8616 of Lecture Notes in Computer Science, page 426-443. Springer, (2014)Circular Security Separations for Arbitrary Length Cycles from LWE., and . CRYPTO (2), volume 9815 of Lecture Notes in Computer Science, page 681-700. Springer, (2016)Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys., , and . CRYPTO, volume 3621 of Lecture Notes in Computer Science, page 258-275. Springer, (2005)