List of research outcomes
This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!
| Publication | Date of Publication | Type |
|---|---|---|
| Fuzzy conditional proxy re-encryption Science China Information Sciences | 2021-12-15 | Paper |
| A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system Designs, Codes and Cryptography | 2018-10-10 | Paper |
| Public key encryption with keyword search secure against keyword guessing attacks without random oracle Information Sciences | 2015-09-23 | Paper |
| Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search Theoretical Computer Science | 2012-11-27 | Paper |
| Chosen ciphertext secure fuzzy identity based encryption without ROM Journal of Shanghai Jiaotong University (Science) | 2012-01-01 | Paper |
| Anonymous conditional proxy re-encryption without random oracle Provable Security | 2009-12-11 | Paper |
| A secret redistribution scheme based on bilinear pairing | 2009-11-11 | Paper |
| scientific article; zbMATH DE number 5524925 (Why is no real title available?) | 2009-03-06 | Paper |
Research outcomes over time
This page was built for person: Li-Ming Fang