Nuttapong Attrapadung

From MaRDI portal
Person:417984

Available identifiers

zbMath Open attrapadung.nuttapongDBLP23/1509WikidataQ86929911 ScholiaQ86929911MaRDI QIDQ417984

List of research outcomes





PublicationDate of PublicationType
A modular approach to registered ABE for unbounded predicates2024-12-13Paper
Signature for objects: formalizing how to authenticate physical data and more2024-07-17Paper
Public‐Key Encryption and Security Notions2023-08-04Paper
Maliciously circuit-private multi-key FHE and MPC based on LWE2023-04-28Paper
Unbounded dynamic predicate compositions in ABE from standard assumptions2023-03-29Paper
Efficient oblivious evaluation protocol and conditional disclosure of secrets for DFA2022-11-09Paper
Generic constructions for fully secure revocable attribute-based encryption2022-08-25Paper
Constant-round client-aided secure comparison protocol2022-08-25Paper
Constructive \(t\)-secure homomorphic secret sharing for low degree polynomials2022-07-06Paper
Evolving homomorphic secret sharing for hierarchical access structures2022-04-22Paper
Client-Aided Two-Party Secure Interval Test Protocol2020-07-20Paper
Field extension in secret-shared form and its applications to efficient secure computation2020-05-27Paper
Unbounded dynamic predicate compositions in attribute-based encryption2020-02-04Paper
Adaptively single-key secure constrained PRFs for \(\text{NC}^1\)2020-01-28Paper
Attribute-based signatures for unbounded languages from standard assumptions2019-01-23Paper
Token-based multi-input functional encryption2018-11-07Paper
Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups2018-09-26Paper
Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits2017-06-13Paper
Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings2017-01-06Paper
New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security2016-12-19Paper
Attribute-Based Encryption for Range Attributes2016-10-21Paper
Attribute Based Encryption with Direct Efficiency Tradeoff2016-10-04Paper
A Framework for Identity-Based Encryption with Almost Tight Security2016-06-10Paper
Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs2016-06-10Paper
Attribute-Based Signatures for Circuits from Bilinear Map2016-04-13Paper
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings2016-03-02Paper
A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List2014-07-07Paper
Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More2014-05-27Paper
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption2014-03-25Paper
Time-Specific Encryption from Forward-Secure Encryption2012-09-25Paper
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication2012-07-20Paper
Attribute-based encryption schemes with constant-size ciphertexts2012-05-14Paper
Functional encryption for public-attribute inner products: achieving constant-size ciphertexts with adaptive security or support for negation2011-11-15Paper
Homomorphic network coding signatures in the standard model2011-03-15Paper
Generic constructions for chosen-ciphertext secure attribute based encryption2011-03-15Paper
Expressive key-policy attribute-based encryption with constant-size ciphertexts2011-03-15Paper
Functional encryption for inner product: achieving constant-size ciphertexts with adaptive security or support for negation2010-05-28Paper
Attribute-based encryption supporting direct/indirect revocation modes2010-01-07Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Conjunctive Broadcast and Attribute-Based Encryption2009-08-18Paper
A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low2009-01-22Paper
Efficient Identity-Based Encryption with Tight Security Reduction2009-01-09Paper
Relations Among Notions of Security for Identity Based Encryption Schemes2008-09-18Paper
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function2008-06-10Paper
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys2008-04-24Paper
Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations2008-03-18Paper
Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys2007-11-28Paper

Research outcomes over time

This page was built for person: Nuttapong Attrapadung