Author of the publication

Secure Generalized Vickrey Auction Using Homomorphic Encryption.

, and . Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, page 239-249. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure distributed constraint satisfaction: reaching agreement without revealing private information., , and . Artif. Intell., 161 (1-2): 229-245 (2005)Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage., , and . IWSEC, volume 6434 of Lecture Notes in Computer Science, page 164-180. Springer, (2010)Strongly secure authenticated key exchange from factoring, codes, and lattices., , , and . Des. Codes Cryptogr., 76 (3): 469-504 (2015)RFID privacy issues and technical challenges., , and . Commun. ACM, 48 (9): 66-71 (2005)M+1-st Price Auction Using Homomorphic Encryption., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 86-A (1): 136-141 (2003)Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (6): 1345-1355 (2014)Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices., , , and . IACR Cryptol. ePrint Arch., (2012)Sufficient Condition for Identity-Based Authenticated Key Exchange Resilient to Leakage of Secret Keys., and . ICISC, volume 7259 of Lecture Notes in Computer Science, page 490-509. Springer, (2011)Revocable Hierarchical Identity-Based Authenticated Key Exchange., , , , , and . ICISC, volume 13218 of Lecture Notes in Computer Science, page 3-27. Springer, (2021)Fully Resilient Traitor Tracing Scheme using Key Update., , and . IACR Cryptology ePrint Archive, (2007)