Author of the publication

Short Signature and Universal Designated Verifier Signature Without Random Oracles.

, , and . ACNS, volume 3531 of Lecture Notes in Computer Science, page 483-498. (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Controlled Joining on Encrypted Relational Database., and . Pairing, volume 7708 of Lecture Notes in Computer Science, page 46-64. Springer, (2012)A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low., , , and . INDOCRYPT, volume 5365 of Lecture Notes in Computer Science, page 116-129. Springer, (2008)Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys., , and . ASIACRYPT, volume 4284 of Lecture Notes in Computer Science, page 161-177. Springer, (2006)Request-Based Comparable Encryption.. ESORICS, volume 8134 of Lecture Notes in Computer Science, page 129-146. Springer, (2013)Efficient Identity-Based Encryption with Tight Security Reduction., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 90-A (9): 1803-1813 (2007)An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization., , and . Towards Trustworthy Elections, volume 6000 of Lecture Notes in Computer Science, page 141-154. Springer, (2010)An Efficient Group Signature Scheme from Bilinear Maps., and . ACISP, volume 3574 of Lecture Notes in Computer Science, page 455-467. Springer, (2005)An Efficient Compiler from Sigma-Protocol to 2-Move Deniable Zero-Knowledge., , and . ICALP (2), volume 4052 of Lecture Notes in Computer Science, page 46-57. Springer, (2006)IC-SECURE: Intelligent System for Assisting Security Experts in Generating Playbooks for Automated Incident Response., , , , , , and . CoRR, (2023)A Secrecy Criterion for Outsourcing Encrypted Databases Based on Inference Analysis., , , and . IEICE Trans. Inf. Syst., 98-D (6): 1161-1165 (2015)