Nuttapong Attrapadung

From MaRDI portal
Person:417984


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A modular approach to registered ABE for unbounded predicates
 
2024-12-13Paper
Signature for objects: formalizing how to authenticate physical data and more
 
2024-07-17Paper
Public‐Key Encryption and Security Notions
Asymmetric Cryptography
2023-08-04Paper
Maliciously circuit-private multi-key FHE and MPC based on LWE
Designs, Codes and Cryptography
2023-04-28Paper
Unbounded dynamic predicate compositions in ABE from standard assumptions
 
2023-03-29Paper
Efficient oblivious evaluation protocol and conditional disclosure of secrets for DFA
 
2022-11-09Paper
Generic constructions for fully secure revocable attribute-based encryption
 
2022-08-25Paper
Constant-round client-aided secure comparison protocol
 
2022-08-25Paper
Constructive \(t\)-secure homomorphic secret sharing for low degree polynomials
 
2022-07-06Paper
Evolving homomorphic secret sharing for hierarchical access structures
 
2022-04-22Paper
Client-aided two-party secure interval test protocol
Cryptology and Network Security
2020-07-20Paper
Field extension in secret-shared form and its applications to efficient secure computation
 
2020-05-27Paper
Unbounded dynamic predicate compositions in attribute-based encryption
 
2020-02-04Paper
Adaptively single-key secure constrained PRFs for \(\text{NC}^1\)
 
2020-01-28Paper
Attribute-based signatures for unbounded languages from standard assumptions
 
2019-01-23Paper
Token-based multi-input functional encryption
 
2018-11-07Paper
Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups
 
2018-09-26Paper
Dual system framework in multilinear settings and applications to fully secure (compact) ABE for unbounded-size circuits
Lecture Notes in Computer Science
2017-06-13Paper
Dual system encryption framework in prime-order groups via computational pair encodings
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
New security proof for the Boneh-Boyen IBE: tight reduction in unbounded multi-challenge security
Information and Communications Security
2016-12-19Paper
Attribute-based encryption for range attributes
Lecture Notes in Computer Science
2016-10-21Paper
Attribute Based Encryption with Direct Efficiency Tradeoff
Applied Cryptography and Network Security
2016-10-04Paper
A Framework for Identity-Based Encryption with Almost Tight Security
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Attribute-based signatures for circuits from bilinear map
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
Lecture Notes in Computer Science
2016-03-02Paper
A revocable group signature scheme from identity-based revocation techniques: achieving constant-size revocation list
Applied Cryptography and Network Security
2014-07-07Paper
Dual system encryption via doubly selective security: framework, fully secure functional encryption for regular languages, and more
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
A framework and compact constructions for non-monotonic attribute-based encryption
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Time-specific encryption from forward-secure encryption
Lecture Notes in Computer Science
2012-09-25Paper
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication
Public Key Cryptography – PKC 2012
2012-07-20Paper
Attribute-based encryption schemes with constant-size ciphertexts
Theoretical Computer Science
2012-05-14Paper
Functional encryption for public-attribute inner products: achieving constant-size ciphertexts with adaptive security or support for negation
Journal of Mathematical Cryptology
2011-11-15Paper
Homomorphic network coding signatures in the standard model
Public Key Cryptography – PKC 2011
2011-03-15Paper
Generic constructions for chosen-ciphertext secure attribute based encryption
Public Key Cryptography – PKC 2011
2011-03-15Paper
Expressive key-policy attribute-based encryption with constant-size ciphertexts
Public Key Cryptography – PKC 2011
2011-03-15Paper
Functional encryption for inner product: achieving constant-size ciphertexts with adaptive security or support for negation
Public Key Cryptography – PKC 2010
2010-05-28Paper
Attribute-based encryption supporting direct/indirect revocation modes
Cryptography and Coding
2010-01-07Paper
Advances in Cryptology - ASIACRYPT 2003
Lecture Notes in Computer Science
2010-01-05Paper
Conjunctive Broadcast and Attribute-Based Encryption
Pairing-Based Cryptography – Pairing 2009
2009-08-18Paper
A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
Efficient Identity-Based Encryption with Tight Security Reduction
Cryptology and Network Security
2009-01-09Paper
Relations Among Notions of Security for Identity Based Encryption Schemes
LATIN 2006: Theoretical Informatics
2008-09-18Paper
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function
Provable Security
2008-06-10Paper
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations
Lecture Notes in Computer Science
2008-03-18Paper
Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys
Automata, Languages and Programming
2007-11-28Paper


Research outcomes over time


This page was built for person: Nuttapong Attrapadung