Author of the publication

Privacy in Encrypted Content Distribution Using Private Broadcast Encryption.

, , and . Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, page 52-64. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impossibility of Simulation Secure Functional Encryption Even with Random Oracles., , and . TCC (1), volume 11239 of Lecture Notes in Computer Science, page 659-688. Springer, (2018)Efficient pseudorandom functions from the decisional linear assumption and weaker variants., and . ACM Conference on Computer and Communications Security, page 112-120. ACM, (2009)PPE Circuits: Formal Definition to Software Automation., , and . ACM Conference on Computer and Communications Security, page 391-408. ACM, (2020)Batch Arguments for NP and More from Standard Bilinear Group Assumptions., and . IACR Cryptol. ePrint Arch., (2022)Black-Box Non-Interactive Non-Malleable Commitments., , , and . IACR Cryptol. ePrint Arch., (2020)Conjunctive, Subset, and Range Queries on Encrypted Data., and . TCC, volume 4392 of Lecture Notes in Computer Science, page 535-554. Springer, (2007)Deterministic Public-Key Encryption under Continual Leakage., , , and . IACR Cryptology ePrint Archive, (2014)The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions., , and . CT-RSA, volume 7779 of Lecture Notes in Computer Science, page 310-325. Springer, (2013)Constrained Pseudorandom Functions for Unconstrained Inputs., , and . EUROCRYPT (2), volume 9666 of Lecture Notes in Computer Science, page 124-153. Springer, (2016)Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption., , and . EUROCRYPT (2), volume 10211 of Lecture Notes in Computer Science, page 528-557. (2017)