The following pages link to Man Ho Au (Q266277):
Displayed 50 items.
- Relations between robustness and RKA security under public-key encryption (Q266278) (← links)
- Optimistic fair exchange in the enhanced chosen-key model (Q476842) (← links)
- Fuzzy public-key encryption based on biometric data (Q1616901) (← links)
- Functional encryption for computational hiding in prime order groups via pair encodings (Q1692153) (← links)
- Hedged nonce-based public-key encryption: adaptive security under randomness failures (Q1749284) (← links)
- Lattice-based universal accumulator with nonmembership arguments (Q1784485) (← links)
- Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice ringct v1.0) (Q1784493) (← links)
- Practical signatures from the Partial Fourier Recovery problem revisited: a provably-secure and Gaussian-distributed construction (Q1784515) (← links)
- Unforgeable watermarking schemes with public extraction (Q1796781) (← links)
- Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps (Q1797829) (← links)
- Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction (Q1935797) (← links)
- Efficient attribute-based encryption with attribute revocation for assured data deletion (Q2004758) (← links)
- Exploring effect of location number on map-based graphical password authentication (Q2014622) (← links)
- Collusion resistant watermarkable PRFs from standard assumptions (Q2096500) (← links)
- DualRing: generic construction of ring signatures with efficient instantiations (Q2120078) (← links)
- Ring signatures based on Middle-Product Learning with Errors problems (Q2177624) (← links)
- Efficient lattice-based zero-knowledge arguments with standard soundness: construction and applications (Q2181848) (← links)
- Strongly secure authenticated key exchange from supersingular isogenies (Q2181884) (← links)
- Collusion resistant watermarking schemes for cryptographic functionalities (Q2181887) (← links)
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters (Q2200685) (← links)
- RingCT 3.0 for blockchain confidential transaction: shorter size and stronger security (Q2226609) (← links)
- An efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks using online/offline certificateless aggregate signature (Q2283600) (← links)
- Raptor: a practical lattice-based (linkable) ring signature (Q2291380) (← links)
- Strong leakage and tamper-resilient PKE from refined hash proof system (Q2291404) (← links)
- Security pitfalls of an efficient threshold proxy signature scheme for mobile agents (Q2350583) (← links)
- A general framework for secure sharing of personal health records in cloud system (Q2403233) (← links)
- Simulation-based selective opening security for receivers under chosen-ciphertext attacks (Q2416939) (← links)
- Attribute-based optimistic fair exchange: how to restrict brokers with policies (Q2437777) (← links)
- Anonymous post-quantum cryptocash (Q2656947) (← links)
- Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting (Q2692342) (← links)
- Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy (Q2817477) (← links)
- Leakage-Resilient Functional Encryption via Pair Encodings (Q2817484) (← links)
- Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security (Q2817814) (← links)
- A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups (Q2827707) (← links)
- Anonymous Signcryption against Linear Related-Key Attacks (Q2856164) (← links)
- Complete Robustness in Identity-Based Encryption (Q2948163) (← links)
- <inline-formula><tex-math>$k$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="huang-ieq1-2366741.gif"/></alternatives></inline-formula>-Times Attribute-Based Anonymous Access Control for C (Q2982110) (← links)
- Electronic Cash with Anonymous User Suspension (Q3012986) (← links)
- Oblivious Transfer with Access Control : Realizing Disjunction without Duplication (Q3059644) (← links)
- Practical Range Proof for Cryptocurrency Monero with Provable Security (Q3297505) (← links)
- Traceable and Retrievable Identity-Based Encryption (Q3506404) (← links)
- Constant-Size Dynamic k-TAA (Q3541882) (← links)
- Escrowed Deniable Identification Schemes (Q3557759) (← links)
- Practical Compact E-Cash (Q3608938) (← links)
- Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems (Q3623053) (← links)
- Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? (Q3651586) (← links)
- A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) (Q4933219) (← links)
- Efficient Escrow-Free Identity-Based Signature (Q5200580) (← links)
- A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices (Q5211693) (← links)
- PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption (Q5264485) (← links)