Showing results 1 to 6 of 6
Title | Author(s) | Issue Date | Views | |
---|---|---|---|---|
Achieving flexibility for ABE with outsourcing via proxy re-encryption Proceeding/Conference:ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security | 2018 | 17 | ||
Collusion resistant watermarking schemes for cryptographic functionalities Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2019 | 17 | ||
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2018 | 22 | ||
Lattice-based universal accumulator with nonmembership arguments Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2018 | 14 | ||
Simulation-based selective opening security for receivers under chosen-ciphertext attacks Journal:Designs, Codes, and Cryptography | 2019 | 21 | ||
Unforgeable watermarking schemes with public extraction Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2018 |