Author of the publication

Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption.

, , , and . IEEE Trans. Inf. Theory, 54 (11): 5155-5171 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Construction of Order-Preserving Encryption Using Pseudo Random Function., , and . IEICE Trans. Commun., 98-B (7): 1276-1283 (2015)Data Randomization for Lightweight Secure Data Aggregation in Sensor Network., , , , and . UIC, volume 5061 of Lecture Notes in Computer Science, page 338-351. Springer, (2008)Efficient Broadcast Encryption Using Multiple Interpolation Methods., , , and . ICISC, volume 3506 of Lecture Notes in Computer Science, page 87-103. Springer, (2004)Authorized Client-Side Deduplication Using CP-ABE in Cloud Storage., , , and . Wirel. Commun. Mob. Comput., (2019)A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network., , and . ISA, volume 5576 of Lecture Notes in Computer Science, page 190-199. Springer, (2009)On the Design of a Privacy-Preserving Communication Scheme for Cloud-Based Digital Twin Environments Using Blockchain., , , , , and . IEEE Access, (2022)Fully Dynamic Data Management in Cloud Storage Systems with Secure Proof of Retrievability., , and . IEICE Trans. Inf. Syst., 105-D (11): 1872-1879 (November 2022)A Key Leakage Preventive White-box Cryptographic Implementation., , and . IACR Cryptol. ePrint Arch., (2018)Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption., , , and . IEEE Trans. Inf. Theory, 54 (11): 5155-5171 (2008)New broadcast encryption scheme using tree-based circle., , , and . Digital Rights Management Workshop, page 37-44. ACM, (2005)