Nuttapong Attrapadung

From MaRDI portal
Person:417984

Available identifiers

zbMath Open attrapadung.nuttapongWikidataQ86929911 ScholiaQ86929911MaRDI QIDQ417984

List of research outcomes

PublicationDate of PublicationType
Public‐Key Encryption and Security Notions2023-08-04Paper
Maliciously circuit-private multi-key FHE and MPC based on LWE2023-04-28Paper
Unbounded dynamic predicate compositions in ABE from standard assumptions2023-03-29Paper
Efficient oblivious evaluation protocol and conditional disclosure of secrets for DFA2022-11-09Paper
Generic constructions for fully secure revocable attribute-based encryption2022-08-25Paper
Constant-round client-aided secure comparison protocol2022-08-25Paper
Constructive \(t\)-secure homomorphic secret sharing for low degree polynomials2022-07-06Paper
Evolving homomorphic secret sharing for hierarchical access structures2022-04-22Paper
Client-Aided Two-Party Secure Interval Test Protocol2020-07-20Paper
Field extension in secret-shared form and its applications to efficient secure computation2020-05-27Paper
Unbounded dynamic predicate compositions in attribute-based encryption2020-02-04Paper
Adaptively single-key secure constrained PRFs for \(\text{NC}^1\)2020-01-28Paper
Attribute-based signatures for unbounded languages from standard assumptions2019-01-23Paper
Token-based multi-input functional encryption2018-11-07Paper
Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups2018-09-26Paper
Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits2017-06-13Paper
Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings2017-01-06Paper
New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security2016-12-19Paper
Attribute-Based Encryption for Range Attributes2016-10-21Paper
Attribute Based Encryption with Direct Efficiency Tradeoff2016-10-04Paper
A Framework for Identity-Based Encryption with Almost Tight Security2016-06-10Paper
Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs2016-06-10Paper
Attribute-Based Signatures for Circuits from Bilinear Map2016-04-13Paper
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings2016-03-02Paper
A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List2014-07-07Paper
Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More2014-05-27Paper
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption2014-03-25Paper
Time-Specific Encryption from Forward-Secure Encryption2012-09-25Paper
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication2012-07-20Paper
Attribute-based encryption schemes with constant-size ciphertexts2012-05-14Paper
Functional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negation2011-11-15Paper
Homomorphic Network Coding Signatures in the Standard Model2011-03-15Paper
Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption2011-03-15Paper
Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts2011-03-15Paper
Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation2010-05-28Paper
Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes2010-01-07Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Conjunctive Broadcast and Attribute-Based Encryption2009-08-18Paper
A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low2009-01-22Paper
Efficient Identity-Based Encryption with Tight Security Reduction2009-01-09Paper
Relations Among Notions of Security for Identity Based Encryption Schemes2008-09-18Paper
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function2008-06-10Paper
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys2008-04-24Paper
Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations2008-03-18Paper
Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys2007-11-28Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Nuttapong Attrapadung