Sherman S. M. Chow

From MaRDI portal
Revision as of 18:03, 24 September 2023 by Import230924090903 (talk | contribs) (Created automatically from import230924090903)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:1710611

Available identifiers

zbMath Open chow.sherman-s-mMaRDI QIDQ1710611

List of research outcomes

PublicationDate of PublicationType
Multi-client oblivious RAM with poly-logarithmic communication2023-03-21Paper
Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE2022-11-09Paper
Forward-Secure Searchable Encryption on Labeled Bipartite Graphs2022-07-01Paper
Non-malleable functions and their applications2022-04-04Paper
Access control encryption from group encryption2022-03-21Paper
Real Hidden Identity-Based Signatures2021-03-17Paper
Fast-to-finalize Nakamoto-like consensus2020-05-27Paper
Let a non-barking watchdog bite: cliptographic signatures with an offline watchdog2020-01-28Paper
Structure-preserving certificateless encryption and its application2020-01-28Paper
Multi-key homomorphic signatures unforgeable under insider corruption2019-01-23Paper
Another look at anonymous communication. Security and modular constructions2017-10-23Paper
Privacy-Preserving Public Auditing for Secure Cloud Storage2017-07-12Paper
Secure Cloud Storage Meets with Secure Network Coding2017-05-16Paper
Towards Proofs of Ownership Beyond Bounded Leakage2017-01-06Paper
Combiners for Chosen-Ciphertext Security2016-09-02Paper
Cryptography for Parallel RAM from Indistinguishability Obfuscation2016-04-15Paper
Non-Malleable Functions and Their Applications2016-04-13Paper
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model2016-01-27Paper
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement2015-12-02Paper
Security of Direct Anonymous Authentication Using TPM 2.0 Signature2015-11-25Paper
Trapdoors for Ideal Lattices with Applications2015-11-25Paper
Practical (fully) distributed signatures provably secure in the standard model2015-07-24Paper
Post-challenge leakage in public-key encryption2015-02-24Paper
Escrowed Linkability of Ring Signatures and Its Applications2014-08-21Paper
All-but-One Dual Projective Hashing and Its Applications2014-07-07Paper
Practical Dual-Receiver Encryption2014-03-28Paper
Practical Distributed Signatures in the Standard Model2014-03-28Paper
PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation2013-10-23Paper
Towards Anonymous Ciphertext Indistinguishability with Identity Leakage2013-10-23Paper
Zero-knowledge argument for simultaneous discrete logarithms2012-11-21Paper
Identity-Based Encryption Resilient to Continual Auxiliary Leakage2012-06-29Paper
Dynamic Secure Cloud Storage with Provenance2012-06-08Paper
Efficient Secure Two-Party Exponentiation2011-02-11Paper
Non-interactive Confirmer Signatures2011-02-11Paper
Zero-Knowledge Argument for Simultaneous Discrete Logarithms2010-07-20Paper
Efficient Unidirectional Proxy Re-Encryption2010-05-04Paper
Real Traceable Signatures2009-12-09Paper
Conditional Proxy Broadcast Re-Encryption2009-06-25Paper
Identity Based Ring Signature: Why, How and What Next2009-04-23Paper
https://portal.mardi4nfdi.de/entity/Q36158842009-03-24Paper
Removing Escrow from Identity-Based Encryption2009-03-24Paper
Security Mediated Certificateless Signatures2009-03-10Paper
Timed-Release Encryption Revisited2009-01-27Paper
General Certificateless Encryption and Timed-Release Encryption2008-11-20Paper
Proxy Re-signatures in the Standard Model2008-11-20Paper
https://portal.mardi4nfdi.de/entity/Q35184182008-08-07Paper
Batch Pairing Delegation2008-07-25Paper
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension2008-06-24Paper
Token-Controlled Public Key Encryption in the Standard Model2008-06-24Paper
Identity Based Threshold Ring Signature2008-03-17Paper
Short E-Cash2008-03-17Paper
Efficient Identity Based Ring Signature2007-09-24Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Information Security and Cryptology2006-11-14Paper
Information and Communications Security2006-10-24Paper
Progress in Cryptology – Mycrypt 20052006-10-05Paper
Information Security and Privacy2006-06-22Paper
Information Security and Privacy2006-06-22Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Forward-secure multisignature and blind signature schemes2005-11-04Paper
Information and Communications Security2005-08-19Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Sherman S. M. Chow