Author of the publication

Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage.

, , and . IMACC, volume 9496 of Lecture Notes in Computer Science, page 311-328. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Structure-Preserving and Re-randomizable RCCA-Secure Public Key Encryption and Its Applications., , , and . ASIACRYPT (3), volume 11923 of Lecture Notes in Computer Science, page 159-190. Springer, (2019)Non-malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate., and . CRYPTO (2), volume 11693 of Lecture Notes in Computer Science, page 448-479. Springer, (2019)Real-world Universal zkSNARKs are non-malleable., , and . IACR Cryptol. ePrint Arch., (2024)Predictable Arguments of Knowledge., , and . Public Key Cryptography (1), volume 10174 of Lecture Notes in Computer Science, page 121-150. Springer, (2017)Improving the Efficiency of Re-randomizable and Replayable CCA Secure Public Key Encryption., and . ACNS (1), volume 12146 of Lecture Notes in Computer Science, page 271-291. Springer, (2020)Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage., , and . IMACC, volume 9496 of Lecture Notes in Computer Science, page 311-328. Springer, (2015)Auditable Asymmetric Password Authenticated Public Key Establishment., , , and . IACR Cryptol. ePrint Arch., (2020)Proofs of Space: When Space Is of the Essence., , , and . SCN, volume 8642 of Lecture Notes in Computer Science, page 538-557. Springer, (2014)Non-malleable Secret Sharing Against Bounded Joint-Tampering Attacks in the Plain Model., , , , and . CRYPTO (3), volume 12172 of Lecture Notes in Computer Science, page 127-155. Springer, (2020)Mix-Nets from Re-randomizable and Replayable CCA-Secure Public-Key Encryption., and . SCN, volume 13409 of Lecture Notes in Computer Science, page 172-196. Springer, (2022)