Blockchain-Based Auditable Privacy-Preserving Data Classification for Internet of Things | 0 | 0.34 | 2022 |
Improved Security Model for Public-Key Authenticated Encryption with Keyword Search | 0 | 0.34 | 2021 |
Forward-Secure Revocable Identity-Based Encryption | 0 | 0.34 | 2021 |
Key regeneration-free ciphertext-policy attribute-based encryption and its application. | 1 | 0.40 | 2020 |
Space efficient revocable IBE for mobile devices in cloud computing | 0 | 0.34 | 2020 |
Public-key authenticated encryption with keyword search revisited: Security model and constructions. | 3 | 0.38 | 2020 |
An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted Medical Internet of Things | 1 | 0.35 | 2020 |
Robust digital signature revisited | 0 | 0.34 | 2020 |
A QR Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things | 0 | 0.34 | 2019 |
Constructions Of 2-Rotation Symmetric Semi-Bent Functions With Degree Bigger Than 2 | 0 | 0.34 | 2019 |
Tightly Secure Lossy Trapdoor Functions: Constructions and Applications. | 0 | 0.34 | 2019 |
Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing. | 1 | 0.35 | 2019 |
(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance. | 2 | 0.36 | 2019 |
Regular lossy functions and their applications in leakage-resilient cryptography. | 2 | 0.37 | 2018 |
LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF. | 0 | 0.34 | 2018 |
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness. | 0 | 0.34 | 2018 |
Bounded Revocable and Outsourceable ABE for Secure Data Sharing. | 0 | 0.34 | 2018 |
Regularly Lossy Functions and Applications | 0 | 0.34 | 2018 |
Chameleon all-but-one extractable hash proof and its applications. | 0 | 0.34 | 2018 |
A new construction on randomized message-locked encryption in the standard model via UCEs. | 2 | 0.44 | 2017 |
An Efficient Privacy-Preserving Outsourced Computation over Public Data. | 8 | 0.44 | 2017 |
New Efficient Chosen Ciphertext Secure Elgamal Encryption Schemes For Secure Cloud Storage Service | 1 | 0.36 | 2017 |
Public key encryption resilient to leakage and tampering attacks. | 0 | 0.34 | 2017 |
Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman. | 0 | 0.34 | 2017 |
How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks. | 0 | 0.34 | 2016 |
RKA-Secure Public Key Encryptions Against Efficiently Invertible Functions. | 1 | 0.35 | 2016 |
Certificateless encryption secure against selective opening attack. | 0 | 0.34 | 2016 |
Privacy-Preserving Outsourced Calculation on Floating Point Numbers. | 16 | 0.57 | 2016 |
Privacy-Preserving Patient-Centric Clinical Decision Support System on Naive Bayesian Classification | 45 | 1.29 | 2016 |
Escrow free attribute-based signature with self-revealability. | 0 | 0.34 | 2016 |
A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains. | 4 | 0.41 | 2016 |
Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption | 30 | 0.87 | 2015 |
Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience | 7 | 0.74 | 2015 |
Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited. | 8 | 0.50 | 2015 |
Server-Aided Revocable Identity-Based Encryption. | 6 | 0.45 | 2015 |
Leakage-resilient lossy trapdoor functions and public-key encryption | 6 | 0.42 | 2013 |
Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter. | 25 | 0.71 | 2013 |
Fixing the Sender-Equivocable Encryption Scheme in Eurocrypt 2010 | 6 | 0.55 | 2013 |
Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem. | 3 | 0.39 | 2013 |
Efficient chosen ciphertext secure public-key encryption under factoring assumption. | 3 | 0.39 | 2013 |
Sender-Equivocable Encryption Schemes Secure Against Chosen-Ciphertext Attacks Revisited | 5 | 0.41 | 2012 |
New left-to-right minimal weight signed-digit radix-r representation | 2 | 0.41 | 2009 |
Cryptanalysis of a type of CRT-based RSA algorithms | 1 | 0.35 | 2008 |
Cryptanalysis of server-aided RSA key generation protocols at MADNES 2005 | 1 | 0.35 | 2007 |
Security Analysis of wrNAF and SPA Resistant Scalar Multiplication | 0 | 0.34 | 2007 |
Wide-w-NAF Method for Scalar Multiplication on Koblitz Curves | 0 | 0.34 | 2007 |