From post

Efficient Lattice HIBE in the Standard Model with Shorter Public Parameters.

, , и . ICT-EurAsia, том 8407 из Lecture Notes in Computer Science, стр. 542-553. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy Preserving CACTUS Algorithm for Clustering over Vertically Partitioned Databases., и . DMIN, стр. 308-314. CSREA Press, (2007)A note on the Certificateless Multi-receiver Signcryption Scheme., , и . IACR Cryptology ePrint Archive, (2009)Compact CCA-Secure Encryption with Ciphertext Verifiability., , и . IACR Cryptology ePrint Archive, (2011)Foundations of Group Key Management - Framework, Security Model and a Generic Construction., , , и . IACR Cryptology ePrint Archive, (2008)A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers., , и . IACR Cryptology ePrint Archive, (2016)Brief announcement: communication efficient asynchronous byzantine agreement., и . PODC, стр. 243-244. ACM, (2010)Brief announcement: on the round complexity of distributed consensus over synchronous networks., , , , и . PODC, стр. 397. ACM, (2004)Possibility and complexity of probabilistic reliable communication in directed networks., и . PODC, стр. 265-274. ACM, (2006)Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries., , и . ACISP, том 2384 из Lecture Notes in Computer Science, стр. 497-512. Springer, (2002)On Proactive Perfectly Secure Message Transmission., , и . ACISP, том 4586 из Lecture Notes in Computer Science, стр. 461-473. Springer, (2007)