Author of the publication

Chosen Ciphertext Secure Public Key Encryption with a Simple Structure.

, , , and . IWSEC, volume 5312 of Lecture Notes in Computer Science, page 20-33. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An improvement of discrete Tardos fingerprinting codes., , , , , , and . IACR Cryptology ePrint Archive, (2008)Chosen Ciphertext Secure Public Key Encryption with a Simple Structure., , , and . IWSEC, volume 5312 of Lecture Notes in Computer Science, page 20-33. Springer, (2008)Efficient Provider Authentication for Bidirectional Broadcasting Service., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (6): 1039-1051 (2010)Short Lattice Signatures in the Standard Model with Efficient Tag Generation., , , and . ProvSec, volume 12505 of Lecture Notes in Computer Science, page 85-102. Springer, (2020)A Tracing Algorithm for Short 2-Secure Probabilistic Fingerprinting Codes Strongly Protecting Innocent Users., , , , , , and . CCNC, page 1068-1072. IEEE, (2007)Content and Key Management to Trace Traitors in Broadcasting Services., , and . STM, volume 9331 of Lecture Notes in Computer Science, page 236-252. Springer, (2015)Efficient Broadcast Encryption with Personalized Messages., , and . ProvSec, volume 6402 of Lecture Notes in Computer Science, page 214-228. Springer, (2010)Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service., , and . ACISP, volume 4058 of Lecture Notes in Computer Science, page 123-135. Springer, (2006)Privacy Preserving System for Real-Time Enriched-Integrated Service with Feedback to Providers., , and . HCI (29), volume 11594 of Lecture Notes in Computer Science, page 385-403. Springer, (2019)Flexible License Transfer System Using Mobile Terminal., , , , and . SECRYPT, page 397-404. INSTICC Press, (2006)