Publication | Date of Publication | Type |
---|
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts | 2024-04-11 | Paper |
A New Design of Online/Offline Signatures Based on Lattice | 2023-06-30 | Paper |
Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE | 2023-05-12 | Paper |
Privacy-preserving authentication for tree-structured data with designated verification in outsourced environments | 2023-03-21 | Paper |
Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption | 2023-03-21 | Paper |
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment | 2022-12-22 | Paper |
Linearly Homomorphic Signatures with Designated Entities | 2022-12-09 | Paper |
Dissemination of authenticated tree-structured data with privacy protection and fine-grained control in outsourced databases | 2022-08-25 | Paper |
Ring Trapdoor Redactable Signatures from Lattice | 2022-08-11 | Paper |
Universal product learning with errors: a new variant of \textsf{LWE} for lattice-based cryptography | 2022-05-31 | Paper |
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved | 2022-05-18 | Paper |
Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control | 2022-03-23 | Paper |
An efficient blind signature scheme based on SM2 signature algorithm | 2021-12-08 | Paper |
Blockchain-based system for secure outsourcing of bilinear pairings | 2021-04-19 | Paper |
Functional broadcast encryption with applications to data sharing for cloud storage | 2021-02-04 | Paper |
A code-based signature scheme from the Lyubashevsky framework | 2020-08-17 | Paper |
Equilibrium competition binding assay: inhibition mechanism from a single dose response | 2020-05-06 | Paper |
Supporting dynamic updates in storage clouds with the Akl-Taylor scheme | 2020-02-06 | Paper |
Revocable threshold attribute-based signature against signing key exposure | 2018-12-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4558030 | 2018-11-27 | Paper |
Secure publicly verifiable computation with polynomial commitment in cloud computing | 2018-09-26 | Paper |
Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security | 2018-05-14 | Paper |
Self-adaptive trust management based on game theory in fuzzy large-scale networks | 2018-02-27 | Paper |
Dual trapdoor identity-based encryption with keyword search | 2018-02-27 | Paper |
A general framework for secure sharing of personal health records in cloud system | 2017-09-15 | Paper |
Towards revocable fine-grained encryption of cloud data: reducing trust upon cloud | 2017-08-25 | Paper |
<inline-formula><tex-math>$k$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="huang-ieq1-2366741.gif"/></alternatives></inline-formula>-Times Attribute-Based Anonymous Access Control for Cloud Computing | 2017-05-16 | Paper |
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security | 2017-05-16 | Paper |
Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing | 2017-05-16 | Paper |
Secure Distributed Deduplication Systems with Improved Reliability | 2017-05-16 | Paper |
A new universal designated verifier transitive signature scheme for big graph data | 2016-09-16 | Paper |
Accelerating Oblivious Transfer with Batch Multi-exponentiation | 2016-08-31 | Paper |
Forgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanism | 2014-10-07 | Paper |
Certificate-based signcryption with enhanced security features | 2013-07-25 | Paper |
Efficient Escrow-Free Identity-Based Signature | 2012-11-06 | Paper |
Dynamic Secure Cloud Storage with Provenance | 2012-06-08 | Paper |
Provably secure server-aided verification signatures | 2011-08-28 | Paper |
Certificateless threshold signature scheme from bilinear maps | 2011-01-28 | Paper |
Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting | 2010-05-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q3639071 | 2009-10-28 | Paper |
Further Observations on Certificateless Public Key Encryption | 2009-04-29 | Paper |
Certificateless Signature Revisited | 2009-03-06 | Paper |
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures | 2009-02-24 | Paper |
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility | 2009-02-10 | Paper |
Server-Aided Verification Signatures: Definitions and New Constructions | 2009-01-27 | Paper |
Efficient and Short Certificateless Signature | 2009-01-09 | Paper |
A Generic Construction for Universally-Convertible Undeniable Signatures | 2008-04-15 | Paper |
Formal Definition and Construction of Nominative Signature | 2008-03-25 | Paper |
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length | 2007-11-29 | Paper |
Cryptology and Network Security | 2006-11-14 | Paper |