Author of the publication

CCA-Secure Deterministic Identity-Based Encryption Scheme.

, , , , , and . J. Univers. Comput. Sci., 25 (3): 245-269 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient blind filter: Location privacy protection and the access control in FinTech., , , , , and . Future Gener. Comput. Syst., (2019)FABRIC: Fast and Secure Unbounded Cross-System Encrypted Data Sharing in Cloud Computing., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (6): 5130-5142 (November 2023)Improved Probabilistic Context-Free Grammars for Passwords Using Word Extraction., , , and . ICASSP, page 2690-2694. IEEE, (2021)DABEHR: Decentralized Attribute-Based Electronic Health Record System with Constant-Size Storage Complexity., , , and . GPC, volume 10232 of Lecture Notes in Computer Science, page 611-626. (2017)A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security., , , and . INCoS, page 552-559. IEEE, (2013)DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay., , , , , , and . ESORICS (2), volume 13555 of Lecture Notes in Computer Science, page 86-104. Springer, (2022)Edit Distance Based Encryption and Its Application., , , and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 103-119. Springer, (2016)RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security., , , and . ProvSec, volume 8782 of Lecture Notes in Computer Science, page 194-205. Springer, (2014)Policy-driven Data Sharing over Attribute-Based Encryption supporting Dual Membership., , , , , and . J. Syst. Softw., (2022)CCA-Secure Deterministic Identity-Based Encryption Scheme., , , , , and . J. Univers. Comput. Sci., 25 (3): 245-269 (2019)