Author of the publication

Rounding in the Rings.

, and . CRYPTO (2), volume 12171 of Lecture Notes in Computer Science, page 296-326. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FE for Inner Products and Its Application to Decentralized ABE., , and . Public Key Cryptography (2), volume 11443 of Lecture Notes in Computer Science, page 97-127. Springer, (2019)Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More., , and . Public Key Cryptography (1), volume 12110 of Lecture Notes in Computer Science, page 652-681. Springer, (2020)Leakage-Resilient IBE/ ABE with Optimal Leakage Rates from Lattices., , and . Public Key Cryptography (2), volume 13178 of Lecture Notes in Computer Science, page 225-255. Springer, (2022)Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor Against Correlated-Source Attacks., , and . Public Key Cryptography (1), volume 12710 of Lecture Notes in Computer Science, page 421-450. Springer, (2021)New Lattice Two-Stage Sampling Technique and Its Applications to Functional Encryption - Stronger Security and Smaller Ciphertexts., , and . EUROCRYPT (1), volume 12696 of Lecture Notes in Computer Science, page 498-527. Springer, (2021)Leakage-Resilient IBE/ABE with Optimal Leakage Rates from Lattices., , and . IACR Cryptol. ePrint Arch., (2021)Rounding in the Rings., and . CRYPTO (2), volume 12171 of Lecture Notes in Computer Science, page 296-326. Springer, (2020)Functional Encryption Against Probabilistic Queries: Definition, Construction and Applications., , , and . Public Key Cryptography (2), volume 13941 of Lecture Notes in Computer Science, page 429-458. Springer, (2023)Identity-Based Encryption from Lattices with More Compactness in the Standard Model., , , , , and . IACR Cryptol. ePrint Arch., (2024)Ring-Based Identity Based Encryption - Asymptotically Shorter MPK and Tighter Security., , , and . TCC (3), volume 13044 of Lecture Notes in Computer Science, page 157-187. Springer, (2021)