Author of the publication

Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters.

, , , , , and . ICITS, volume 10015 of Lecture Notes in Computer Science, page 3-23. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-group Secret Sharing for Secure Cloud Storage Service., , , , and . IMCOM, page 63:1-63:8. ACM, (2016)CMCAP: Ephemeral Sandboxes for Adaptive Access Control., , and . SACMAT, page 207-212. ACM, (2019)Investing Data with Untrusted Parties using HE., , , and . SECRYPT, page 845-853. SCITEPRESS, (2021)Efficient Protocols Achieving the Commitment Capacity of Noisy Correlations., , , and . ISIT, page 1432-1436. IEEE, (2006)Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions., , , , and . J. Supercomput., 73 (10): 4275-4301 (2017)An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency., , , , and . SPACE, volume 8804 of Lecture Notes in Computer Science, page 47-58. Springer, (2014)LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces., , and . J. Supercomput., 70 (3): 1405-1432 (2014)Generalized Oblivious Transfer Protocols Based on Noisy Channels., and . MMM-ACNS, volume 2052 of Lecture Notes in Computer Science, page 219-229. Springer, (2001)Verifying OAuth Implementations Through Encrypted Network Analysis., , and . SACMAT, page 227-229. ACM, (2019)Semantic security for the McEliece cryptosystem without random oracles., , , and . Des. Codes Cryptogr., 49 (1-3): 289-305 (2008)