Publication | Date of Publication | Type |
---|
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts | 2024-04-11 | Paper |
DSH: Deniable Secret Handshake Framework | 2023-06-30 | Paper |
Efficient Traceable Oblivious Transfer and Its Applications | 2023-06-30 | Paper |
Multimodal private signatures | 2023-06-28 | Paper |
Public key encryption with fuzzy matching | 2023-04-13 | Paper |
A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key | 2022-12-22 | Paper |
Group-Based Source-Destination Verifiable Encryption with Blacklist Checking | 2022-12-09 | Paper |
Attribute based broadcast encryption with short ciphertext and decryption key | 2022-08-19 | Paper |
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved | 2022-05-18 | Paper |
Privacy-enhanced remote data integrity checking with updatable timestamp | 2021-04-19 | Paper |
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation | 2020-10-07 | Paper |
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters | 2020-09-22 | Paper |
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes | 2020-07-20 | Paper |
Location based encryption | 2020-05-27 | Paper |
The Wiener attack on RSA revisited: a quest for the exact bound | 2020-05-27 | Paper |
Towards enhanced security for certificateless public-key authenticated encryption with keyword search | 2020-01-10 | Paper |
Strongly leakage resilient authenticated key exchange, revisited | 2019-11-07 | Paper |
Outsourced ciphertext-policy attribute-based encryption with equality test | 2019-10-31 | Paper |
Cooperative secret sharing using QR codes and symmetric keys | 2019-10-30 | Paper |
A privacy preserving source verifiable encryption scheme | 2018-12-07 | Paper |
A new public remote integrity checking scheme with user and data privacy | 2018-11-26 | Paper |
Efficient attribute-based encryption with blackbox traceability | 2018-11-07 | Paper |
Deniable ring authentication based on projective hash functions | 2018-11-07 | Paper |
One-Round Attribute-Based Key Exchange in the Multi-Party Setting | 2018-02-23 | Paper |
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample | 2017-11-15 | Paper |
Strong authenticated key exchange with auxiliary inputs | 2017-09-15 | Paper |
A note on the strong authenticated key exchange with auxiliary inputs | 2017-09-15 | Paper |
Privacy-preserving \(k\)-time authenticated secret handshakes | 2017-08-25 | Paper |
Hierarchical functional encryption for linear transformations | 2017-08-25 | Paper |
Mergeable and revocable identity-based encryption | 2017-08-25 | Paper |
A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange | 2017-07-28 | Paper |
Comments on "Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting | 2017-07-27 | Paper |
Achieving IND-CCA Security for Functional Encryption for Inner Products | 2017-05-05 | Paper |
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions | 2017-02-01 | Paper |
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction | 2017-01-06 | Paper |
One-Round Attribute-Based Key Exchange in the Multi-party Setting | 2017-01-06 | Paper |
One-Round Strong Oblivious Signature-Based Envelope | 2016-09-02 | Paper |
Proxy Signature with Revocation | 2016-09-02 | Paper |
Edit Distance Based Encryption and Its Application | 2016-09-02 | Paper |
Linear Encryption with Keyword Search | 2016-09-02 | Paper |
Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing | 2016-08-31 | Paper |
Threshold Broadcast Encryption with Keyword Search | 2016-07-25 | Paper |
Strongly Leakage-Resilient Authenticated Key Exchange | 2016-04-08 | Paper |
An Efficient Privacy-Preserving E-coupon System | 2015-11-25 | Paper |
A New General Framework for Secure Public Key Encryption with Keyword Search | 2015-10-20 | Paper |
A New Public Remote Integrity Checking Scheme with User Privacy | 2015-10-20 | Paper |
Efficient Hidden Vector Encryption with Constant-Size Ciphertext | 2015-07-24 | Paper |
Ambiguous optimistic fair exchange: definition and constructions | 2014-12-02 | Paper |
Identity based identification from algebraic coding theory | 2014-01-13 | Paper |
k-time Proxy Signature: Formal Definition and Efficient Construction | 2013-10-23 | Paper |
Certificateless cryptography with KGC trust level 3 | 2011-10-10 | Paper |
Certificateless public key encryption: a new generic construction and two pairing-free schemes | 2011-02-21 | Paper |
Dynamic Group Key Exchange Revisited | 2010-12-07 | Paper |
Probabilistic Public Key Encryption with Equality Test | 2010-03-16 | Paper |
Efficient Non-interactive Range Proof | 2009-07-23 | Paper |
A More Natural Way to Construct Identity-Based Identification Schemes | 2009-03-10 | Paper |
Ambiguous Optimistic Fair Exchange | 2009-02-10 | Paper |
Two-factor mutual authentication based on smart cards and passwords | 2008-11-19 | Paper |
A new framework for the design and analysis of identity-based identification schemes | 2008-11-18 | Paper |
Traceable and Retrievable Identity-Based Encryption | 2008-06-13 | Paper |
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles | 2008-04-24 | Paper |
Efficient Anonymous Roaming and Its Security Analysis | 2007-09-24 | Paper |
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices | 2007-06-13 | Paper |
Public Key Cryptography - PKC 2006 | 2007-05-02 | Paper |
Information Security | 2006-10-20 | Paper |
Information Security and Privacy | 2006-06-22 | Paper |