File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Don’t Tamper with Dual System Encryption: Beyond Polynomial Related-Key Security of IBE

TitleDon’t Tamper with Dual System Encryption: Beyond Polynomial Related-Key Security of IBE
Authors
Issue Date2022
PublisherSpringer.
Citation
The 20th International Conference on Applied Cryptography and Network Security, (ACNS 2022) , v. 13269, p. 419-439 How to Cite?
Persistent Identifierhttp://hdl.handle.net/10722/317526
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorYuen, TH-
dc.contributor.authorZhang, C-
dc.contributor.authorChow, SSM-
dc.date.accessioned2022-10-07T10:22:07Z-
dc.date.available2022-10-07T10:22:07Z-
dc.date.issued2022-
dc.identifier.citationThe 20th International Conference on Applied Cryptography and Network Security, (ACNS 2022) , v. 13269, p. 419-439-
dc.identifier.urihttp://hdl.handle.net/10722/317526-
dc.languageeng-
dc.publisherSpringer. -
dc.relation.ispartofThe 20th International Conference on Applied Cryptography and Network Security, (ACNS 2022) -
dc.rightsThis version of the article has been accepted for publication, after peer review (when applicable) and is subject to Springer Nature’s AM terms of use, but is not the Version of Record and does not reflect post-acceptance improvements, or any corrections. The Version of Record is available online at: https://doi.org/[insert DOI]-
dc.titleDon’t Tamper with Dual System Encryption: Beyond Polynomial Related-Key Security of IBE-
dc.typeConference_Paper-
dc.identifier.emailYuen, TH: johnyuen@hku.hk-
dc.identifier.authorityYuen, TH=rp02426-
dc.identifier.doi10.1007/978-3-031-09234-3_21-
dc.identifier.hkuros338184-
dc.identifier.volume13269-
dc.identifier.spage419-
dc.identifier.epage439-
dc.identifier.isiWOS:000876727100021-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats