Author of the publication

Sure Interpolation and Its Application to Hierarchical Threshold Secret Sharing Scheme.

, , and . ISCSCT (1), page 447-450. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

One-Round Witness Indistinguishability from Indistinguishability Obfuscation., , , , and . ISPEC, volume 9065 of Lecture Notes in Computer Science, page 559-574. Springer, (2015)Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption., , and . ACISP, volume 9144 of Lecture Notes in Computer Science, page 251-269. Springer, (2015)Efficient Concurrent npoly(logn)-Simulatable Argument of Knowledge., , and . ISPEC, volume 5451 of Lecture Notes in Computer Science, page 93-101. Springer, (2009)Concurrent Non-Malleable Witness Indistinguishable Argument from Any One-Way Function., and . Inscrypt, volume 7537 of Lecture Notes in Computer Science, page 363-378. Springer, (2011)On Zero Knowledge Argument with PQT Soundness., and . WISA, volume 9503 of Lecture Notes in Computer Science, page 326-335. Springer, (2015)Improved Zero-Knowledge Proofs for Commitments from Learning Parity with Noise., , , and . TrustCom, page 415-421. IEEE, (2022)Sure Interpolation and Its Application to Hierarchical Threshold Secret Sharing Scheme., , and . ISCSCT (1), page 447-450. IEEE Computer Society, (2008)Lattice Signature can be as Simple as Lattice Encryption., , , and . IACR Cryptol. ePrint Arch., (2022)