Author of the publication

Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond.

, , , , and . CCS, page 2825-2839. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control., , , , , , and . ISC, volume 13640 of Lecture Notes in Computer Science, page 269-289. Springer, (2022)Redactable Blockchain Supporting Supervision and Self-Management., , , , and . AsiaCCS, page 844-858. ACM, (2021)Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption., , , , and . AsiaCCS, page 901-906. ACM, (2016)An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries., , , , and . ESORICS (1), volume 9878 of Lecture Notes in Computer Science, page 154-172. Springer, (2016)Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption., , , , , , and . CCS, page 763-780. ACM, (2018)RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero., , , and . ESORICS (2), volume 10493 of Lecture Notes in Computer Science, page 456-474. Springer, (2017)RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security., , , , , , and . Financial Cryptography, volume 12059 of Lecture Notes in Computer Science, page 464-483. Springer, (2020)Geometric Range Search on Encrypted Data With Forward/Backward Security., , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (1): 698-716 (2022)Toward Forward Secure SSE Supporting Conjunctive Keyword Search., , , , and . IEEE Access, (2019)Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy., , , , and . ESORICS (2), volume 11736 of Lecture Notes in Computer Science, page 283-303. Springer, (2019)