Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Puncturable identity-based and attribute-based encryption from lattices., , , and . Theor. Comput. Sci., (2022)Compact Accountable Ring Signatures in the Plain Model., , , , , and . Inscrypt (1), volume 14526 of Lecture Notes in Computer Science, page 23-43. Springer, (2023)Puncturable Identity-Based Encryption from Lattices., , , and . ACISP, volume 13083 of Lecture Notes in Computer Science, page 571-589. Springer, (2021)Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model., , , and . ACNS (1), volume 12146 of Lecture Notes in Computer Science, page 130-149. Springer, (2020)Logarithmic-Size (Linkable) Ring Signatures from Lattice Isomorphism Problems., , , , , , and . SPACE, volume 14412 of Lecture Notes in Computer Science, page 214-241. Springer, (2023)On Digital Signatures Based on Group Actions: QROM Security and Ring Signatures., , , , , , , , and . PQCrypto (1), volume 14771 of Lecture Notes in Computer Science, page 227-261. Springer, (2024)Fast secure matrix multiplications over ring-based homomorphic encryption., , , and . Inf. Secur. J. A Glob. Perspect., 30 (4): 219-234 (2021)Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption., , , and . IEEE Trans. Cloud Comput., 10 (4): 2398-2408 (2022)Wildcarded Identity-Based Encryption with Constant-size Ciphertext and Secret Key., , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 11 (2): 74-86 (2020)An efficient multivariate threshold ring signature scheme., , , and . Comput. Stand. Interfaces, (2021)