The following pages link to Nuttapong Attrapadung (Q417984):
Displayed 45 items.
- Attribute-based encryption schemes with constant-size ciphertexts (Q417988) (← links)
- Token-based multi-input functional encryption (Q1616650) (← links)
- Attribute-based signatures for unbounded languages from standard assumptions (Q1710613) (← links)
- Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups (Q1784106) (← links)
- Efficient oblivious evaluation protocol and conditional disclosure of secrets for DFA (Q2096633) (← links)
- Evolving homomorphic secret sharing for hierarchical access structures (Q2128751) (← links)
- Constructive \(t\)-secure homomorphic secret sharing for low degree polynomials (Q2152064) (← links)
- Generic constructions for fully secure revocable attribute-based encryption (Q2167729) (← links)
- Constant-round client-aided secure comparison protocol (Q2167759) (← links)
- Field extension in secret-shared form and its applications to efficient secure computation (Q2183935) (← links)
- Adaptively single-key secure constrained PRFs for \(\text{NC}^1\) (Q2289431) (← links)
- Unbounded dynamic predicate compositions in attribute-based encryption (Q2292639) (← links)
- Unbounded dynamic predicate compositions in ABE from standard assumptions (Q2691592) (← links)
- Maliciously circuit-private multi-key FHE and MPC based on LWE (Q2701482) (← links)
- Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings (Q2790032) (← links)
- Attribute-Based Signatures for Circuits from Bilinear Map (Q2798779) (← links)
- A Framework for Identity-Based Encryption with Almost Tight Security (Q2811145) (← links)
- Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs (Q2811147) (← links)
- Attribute Based Encryption with Direct Efficiency Tradeoff (Q2822674) (← links)
- Attribute-Based Encryption for Range Attributes (Q2827709) (← links)
- Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication (Q2900221) (← links)
- Time-Specific Encryption from Forward-Secure Encryption (Q2912795) (← links)
- Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings (Q2953790) (← links)
- Homomorphic Network Coding Signatures in the Standard Model (Q3084338) (← links)
- Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption (Q3084341) (← links)
- Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts (Q3084342) (← links)
- Functional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negation (Q3096952) (← links)
- Client-Aided Two-Party Secure Interval Test Protocol (Q3297629) (← links)
- Conjunctive Broadcast and Attribute-Based Encryption (Q3392916) (← links)
- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function (Q3503871) (← links)
- Relations Among Notions of Security for Identity Based Encryption Schemes (Q3525754) (← links)
- Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation (Q3562910) (← links)
- Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes (Q3654624) (← links)
- A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List (Q5168559) (← links)
- A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption (Q5402976) (← links)
- Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More (Q5418716) (← links)
- Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys (Q5428834) (← links)
- Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations (Q5451066) (← links)
- Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys (Q5459077) (← links)
- Efficient Identity-Based Encryption with Tight Security Reduction (Q5502732) (← links)
- A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low (Q5504617) (← links)
- New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security (Q5507374) (← links)
- Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits (Q5738750) (← links)
- Advances in Cryptology - ASIACRYPT 2003 (Q5902394) (← links)
- Public‐Key Encryption and Security Notions (Q6167179) (← links)