Nuttapong Attrapadung

From MaRDI portal
Person:417984

Available identifiers

zbMath Open attrapadung.nuttapongDBLP23/1509WikidataQ86929911 ScholiaQ86929911MaRDI QIDQ417984

List of research outcomes





PublicationDate of PublicationType
A modular approach to registered ABE for unbounded predicates2024-12-13Paper
Signature for objects: formalizing how to authenticate physical data and more2024-07-17Paper
Public‐Key Encryption and Security Notions2023-08-04Paper
Maliciously circuit-private multi-key FHE and MPC based on LWE2023-04-28Paper
Unbounded dynamic predicate compositions in ABE from standard assumptions2023-03-29Paper
Efficient oblivious evaluation protocol and conditional disclosure of secrets for DFA2022-11-09Paper
Generic constructions for fully secure revocable attribute-based encryption2022-08-25Paper
Constant-round client-aided secure comparison protocol2022-08-25Paper
Constructive \(t\)-secure homomorphic secret sharing for low degree polynomials2022-07-06Paper
Evolving homomorphic secret sharing for hierarchical access structures2022-04-22Paper
Client-aided two-party secure interval test protocol2020-07-20Paper
Field extension in secret-shared form and its applications to efficient secure computation2020-05-27Paper
Unbounded dynamic predicate compositions in attribute-based encryption2020-02-04Paper
Adaptively single-key secure constrained PRFs for \(\text{NC}^1\)2020-01-28Paper
Attribute-based signatures for unbounded languages from standard assumptions2019-01-23Paper
Token-based multi-input functional encryption2018-11-07Paper
Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups2018-09-26Paper
Dual system framework in multilinear settings and applications to fully secure (compact) ABE for unbounded-size circuits2017-06-13Paper
Dual system encryption framework in prime-order groups via computational pair encodings2017-01-06Paper
New security proof for the Boneh-Boyen IBE: tight reduction in unbounded multi-challenge security2016-12-19Paper
Attribute-based encryption for range attributes2016-10-21Paper
Attribute Based Encryption with Direct Efficiency Tradeoff2016-10-04Paper
A Framework for Identity-Based Encryption with Almost Tight Security2016-06-10Paper
Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs2016-06-10Paper
Attribute-based signatures for circuits from bilinear map2016-04-13Paper
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings2016-03-02Paper
A revocable group signature scheme from identity-based revocation techniques: achieving constant-size revocation list2014-07-07Paper
Dual system encryption via doubly selective security: framework, fully secure functional encryption for regular languages, and more2014-05-27Paper
A framework and compact constructions for non-monotonic attribute-based encryption2014-03-25Paper
Time-specific encryption from forward-secure encryption2012-09-25Paper
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication2012-07-20Paper
Attribute-based encryption schemes with constant-size ciphertexts2012-05-14Paper
Functional encryption for public-attribute inner products: achieving constant-size ciphertexts with adaptive security or support for negation2011-11-15Paper
Homomorphic network coding signatures in the standard model2011-03-15Paper
Generic constructions for chosen-ciphertext secure attribute based encryption2011-03-15Paper
Expressive key-policy attribute-based encryption with constant-size ciphertexts2011-03-15Paper
Functional encryption for inner product: achieving constant-size ciphertexts with adaptive security or support for negation2010-05-28Paper
Attribute-based encryption supporting direct/indirect revocation modes2010-01-07Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Conjunctive Broadcast and Attribute-Based Encryption2009-08-18Paper
A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low2009-01-22Paper
Efficient Identity-Based Encryption with Tight Security Reduction2009-01-09Paper
Relations Among Notions of Security for Identity Based Encryption Schemes2008-09-18Paper
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function2008-06-10Paper
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys2008-04-24Paper
Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations2008-03-18Paper
Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys2007-11-28Paper

Research outcomes over time

This page was built for person: Nuttapong Attrapadung