Duong Hieu Phan

From MaRDI portal
Person:378261

Available identifiers

zbMath Open phan.duong-hieuMaRDI QIDQ378261

List of research outcomes





PublicationDate of PublicationType
Public-key anamorphism in (CCA-secure) public-key encryption and beyond2024-12-04Paper
Fully dynamic attribute-based signatures for circuits from codes2024-11-12Paper
Verifiable decentralized multi-client functional encryption for inner product2024-09-13Paper
Anamorphic signatures: secrecy from a dictator who only permits authentication!2024-02-02Paper
\textsf{Catalic}: delegated PSI cardinality with applications to contact tracing2023-03-29Paper
Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms2022-11-02Paper
Zero-knowledge proofs for committed symmetric Boolean functions2022-03-22Paper
Linearly-homomorphic signatures and scalable mix-nets2021-12-01Paper
A concise bounded anonymous broadcast yielding combinatorial trace-and-revoke schemes2021-02-23Paper
Traceable inner product functional encryption2020-08-05Paper
Downgradable identity-based encryption and applications2020-01-28Paper
Decentralized multi-client functional encryption for inner product2019-01-23Paper
A new technique for compacting secret key in attribute-based broadcast encryption2018-10-26Paper
A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption2018-04-04Paper
Hardness of \(k\)-LWE and applications in traitor tracing2018-01-05Paper
Identity-based encryption from codes with rank metric2017-10-27Paper
Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate2014-08-21Paper
Hardness of k-LWE and Applications in Traitor Tracing2014-08-07Paper
Black-box Trace\&Revoke codes2013-11-11Paper
Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model2013-06-07Paper
Key-Leakage Resilient Revoke Scheme Resisting Pirates 2.0 in Bounded Leakage Model2013-06-07Paper
Decentralized Dynamic Broadcast Encryption2012-09-25Paper
Message-Based Traitor Tracing with Optimal Ciphertext Rate2012-09-21Paper
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts2012-09-07Paper
Identity-Based Trace and Revoke Schemes2011-09-16Paper
Security Notions for Broadcast Encryption2011-06-28Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Traitors Collaborating in Public: Pirates 2.02009-05-12Paper
A CCA Secure Hybrid Damgård’s ElGamal Encryption2009-01-27Paper
Efficient Traitor Tracing from Collusion Secure Codes2009-01-09Paper
Hybrid Damgård Is CCA1-Secure under the DDH Assumption2009-01-09Paper
Traitor Tracing with Optimal Transmission Rate2008-06-24Paper
Public Traceability in Traitor Tracing Schemes2008-05-06Paper
Optimal Asymmetric Encryption and Signature Paddings2007-09-24Paper
Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability2007-09-11Paper
Identity-Based Traitor Tracing2007-09-04Paper
Security in Communication Networks2006-10-10Paper
Selected Areas in Cryptography2006-10-10Paper
OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding2005-08-12Paper

Research outcomes over time

This page was built for person: Duong Hieu Phan