Search for persons
X
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
1
Compact Ring Signatures with Post-Quantum Security in Stand..:
, In:
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
2
Compact Accountable Ring Signatures in the Plain Model:
, In:
?
Security, Privacy, and Applied Cryptography Engineering; Lecture Notes in Computer Science ,
3
Logarithmic-Size (Linkable) Ring Signatures from Lattice Is..:
, In:
?
Advances in Cryptology – ASIACRYPT 2023; Lecture Notes in Computer Science ,
4
Robust Decentralized Multi-client Functional Encryption: Mo..:
, In:
?
Information Security and Privacy; Lecture Notes in Computer Science ,
5
A Tightly Secure ID-Based Signature Scheme Under DL Assumpt..:
, In:
?
Advances in Cryptology – CRYPTO 2022; Lecture Notes in Computer Science ,
6
Multimodal Private Signatures:
, In:
?
Advances in Cryptology – EUROCRYPT 2022; Lecture Notes in Computer Science ,
7
Optimal Tightness for Chain-Based Unique Signatures:
, In:
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
8
Efficient Unique Ring Signatures from Lattices:
, In:
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
9
Public Cloud Data Auditing Revisited: Removing the Tradeoff..:
, In:
?
Computer Security – ESORICS 2020; Lecture Notes in Computer Science ,
10
Secure Cloud Auditing with Efficient Ownership Transfer:
, In:
?
Progress in Cryptology – INDOCRYPT 2020; Lecture Notes in Computer Science ,
11
Lattice-Based IBE with Equality Test Supporting Flexible Au..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
12
A New Encoding Framework for Predicate Encryption with Non-..:
, In:
?
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security ,
13
An Efficient KP-ABE with Short Ciphertexts in Prime OrderGr..:
, In:
?
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security ,
14
Recipient Revocable Identity-Based Broadcast Encryption ..:
, In:
?
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security ,
15