Publication | Date of Publication | Type |
---|
Leakage-resilient identity-based cryptography from minimal assumptions | 2023-11-07 | Paper |
An Efficient and Provably Secure Private Polynomial Evaluation Scheme | 2023-06-30 | Paper |
Public-key encryption scheme with optimal continuous leakage resilience | 2023-01-30 | Paper |
Novel generic construction of leakage-resilient PKE scheme with CCA security | 2021-06-24 | Paper |
Improvement of attribute-based encryption using Blakley secret sharing | 2021-06-08 | Paper |
Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family | 2021-04-19 | Paper |
Efficient attribute-based encryption with attribute revocation for assured data deletion | 2020-10-07 | Paper |
Secure rational numbers equivalence test based on threshold cryptosystem with rational numbers | 2020-09-22 | Paper |
Witness-based searchable encryption | 2020-09-08 | Paper |
A construction of highly nonlinear Boolean functions with optimal algebraic immunity and low hardware implementation cost | 2020-08-31 | Paper |
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security | 2020-01-29 | Paper |
Provably secure proactive secret sharing without the adjacent assumption | 2020-01-10 | Paper |
Novel updatable identity-based hash proof system and its applications | 2019-12-27 | Paper |
Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model | 2019-12-10 | Paper |
Continuous leakage-resilient identity-based encryption with leakage amplification | 2019-09-12 | Paper |
An alternative approach to public cloud data auditing supporting data dynamics | 2019-08-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q5382005 | 2019-06-21 | Paper |
The generic construction of continuous leakage-resilient identity-based cryptosystems | 2019-05-17 | Paper |
基于身份的多接收者(多消息)匿名混合签密机制 | 2018-10-22 | Paper |
Verifiable secret sharing based on hyperplane geometry with its applications to optimal resilient proactive cryptosystems | 2018-09-26 | Paper |
Anonymous identity-based hash proof system from lattices in the standard model | 2018-09-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q3175581 | 2018-07-18 | Paper |
Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing | 2017-11-22 | Paper |
Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures | 2017-07-12 | Paper |
Anonymous spatial encryption under affine space delegation functionality with full security | 2017-01-31 | Paper |
https://portal.mardi4nfdi.de/entity/Q2824410 | 2016-10-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q2993249 | 2016-08-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q2993252 | 2016-08-10 | Paper |
Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing | 2016-04-07 | Paper |
On security against the server in designated tester public key encryption with keyword search | 2015-09-15 | Paper |
Effective error-tolerant keyword search for secure cloud computing | 2014-10-07 | Paper |
Constructions of balanced Boolean functions with high nonlinearity and high algebraic degree | 2014-05-20 | Paper |
A secure scalar product protocol against malicious adversaries | 2014-02-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4926906 | 2013-06-20 | Paper |
LR-UESDE: A Continual-Leakage Resilient Encryption with Unbounded Extensible Set Delegation | 2012-11-06 | Paper |
Group-oriented setting's multisigncryption scheme with threshold designcryption | 2012-07-13 | Paper |
Anonymous Encryption with Partial-Order Subset Delegation Functionality | 2011-09-16 | Paper |
Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem | 2009-01-27 | Paper |
A potential approach of internet worm propagation based on P2P | 2007-06-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4473569 | 2004-08-04 | Paper |