Author of the publication

Leakage-Resilient Functional Encryption via Pair Encodings.

, , , , and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 443-460. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage., , , and . IEEE Trans. Inf. Forensics Secur., 12 (1): 78-88 (2017)Expressive attribute-based keyword search with constant-size ciphertext., , , , , and . Soft Comput., 22 (15): 5163-5177 (2018)Attribute-Based Information Flow Control., , , , , , and . Comput. J., 62 (8): 1214-1231 (2019)DFE-IP: Delegatable functional encryption for inner product., , , , and . Inf. Sci., (November 2023)Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper)., , , , and . ISPEC, volume 10701 of Lecture Notes in Computer Science, page 566-575. Springer, (2017)Privacy-Preserving Traceable Functional Encryption for Inner Product., and . CoRR, (2024)Full Verifiability for Outsourced Decryption in Attribute Based Encryption., , , and . IEEE Trans. Serv. Comput., 13 (3): 478-487 (2020)A Blockchain-Based Public Auditing Scheme for Cloud Storage Environment without Trusted Auditors., , , and . Wirel. Commun. Mob. Comput., (2020)Lightweight ID-based broadcast signcryption for cloud-fog-assisted IoT., , , , and . J. Syst. Archit., (2022)A Generic Construction of Dynamic Single Sign-on with Strong Security., , , and . SecureComm, volume 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 181-198. Springer, (2010)