Author of the publication

Anonymous Public Key Encryption Under Corruptions.

, , , , and . ASIACRYPT (3), volume 13793 of Lecture Notes in Computer Science, page 423-453. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem., , and . ACISP, volume 7959 of Lecture Notes in Computer Science, page 136-151. Springer, (2013)Non-interactive Zero-Knowledge Functional Proofs., , , , , , , and . ASIACRYPT (5), volume 14442 of Lecture Notes in Computer Science, page 236-268. Springer, (2023)Simulation-based selective opening security for receivers under chosen-ciphertext attacks., , , , , and . Des. Codes Cryptogr., 87 (6): 1345-1371 (2019)Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited., , and . Public Key Cryptography, volume 7778 of Lecture Notes in Computer Science, page 369-385. Springer, (2013)Practical public key encryption with selective opening security for receivers., , , , and . Inf. Sci., (2019)Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures., , , , , and . Public Key Cryptography (1), volume 10769 of Lecture Notes in Computer Science, page 253-279. Springer, (2018)Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-challenge Setting., , , , , and . ASIACRYPT (1), volume 12491 of Lecture Notes in Computer Science, page 191-220. Springer, (2020)Asymmetric Group Message Franking: Definitions and Constructions., , , , , and . EUROCRYPT (5), volume 14008 of Lecture Notes in Computer Science, page 67-97. Springer, (2023)Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption from Indistinguishability Obfuscation., , , and . ACISP, volume 10946 of Lecture Notes in Computer Science, page 805-812. Springer, (2018)Receiver selective opening security for identity-based encryption in the multi-challenge setting., , , and . Des. Codes Cryptogr., 91 (4): 1233-1259 (April 2023)