Author of the publication

Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric.

, , , and . CANS, volume 13099 of Lecture Notes in Computer Science, page 435-459. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Per-session security: Password-based cryptography revisited., , , and . J. Comput. Secur., 27 (1): 75-111 (2019)Anonymity-preserving Public-Key Encryption: A Constructive Approach., , , , and . IACR Cryptol. ePrint Arch., (2013)Toward an algebraic theory of systems., , , , and . Theor. Comput. Sci., (2018)Robust Authenticated Encryption and the Limits of Symmetric Cryptography., , , , and . IMACC, volume 9496 of Lecture Notes in Computer Science, page 112-129. Springer, (2015)Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric., , , and . CANS, volume 13099 of Lecture Notes in Computer Science, page 435-459. Springer, (2021)The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3., and . CRYPTO (1), volume 9814 of Lecture Notes in Computer Science, page 247-276. Springer, (2016)Synchrony amplification., and . ISIT, page 1583-1587. IEEE, (2012)Universal Composition with Global Subroutines: Capturing Global Setup Within Plain UC., , , , and . TCC (3), volume 12552 of Lecture Notes in Computer Science, page 1-30. Springer, (2020)Causal Boxes: Quantum Information-Processing Systems Closed under Composition., , , , and . CoRR, (2015)Secure Event Tickets on a Blockchain.. DPM/CBT@ESORICS, volume 10436 of Lecture Notes in Computer Science, page 437-444. Springer, (2017)