Simulation-Based Bi-Selective Opening Security for Public Key Encryption. | 0 | 0.34 | 2021 |
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks | 0 | 0.34 | 2021 |
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-challenge Setting. | 0 | 0.34 | 2020 |
Collusion Resistant Watermarkable PRFs from Standard Assumptions. | 0 | 0.34 | 2020 |
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience | 0 | 0.34 | 2019 |
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications | 0 | 0.34 | 2019 |
New Empirical Traceability Analysis of CryptoNote-Style Blockchains. | 1 | 0.35 | 2019 |
Public-Key Encryption With Keyword Search via Obfuscation. | 0 | 0.34 | 2019 |
Position based cryptography with location privacy: A step for Fog Computing. | 0 | 0.34 | 2018 |
Towards leakage-resilient fine-grained access control in fog computing. | 7 | 0.42 | 2018 |
Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption. | 0 | 0.34 | 2018 |
Unforgeable Watermarking Schemes with Public Extraction. | 0 | 0.34 | 2018 |
Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption. | 0 | 0.34 | 2018 |
Decentralized Blacklistable Anonymous Credentials with Reputation. | 0 | 0.34 | 2018 |
Lattice-Based Universal Accumulator With Nonmembership Arguments | 0 | 0.34 | 2018 |
Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak PRF with Efficient Protocols from LWR. | 0 | 0.34 | 2017 |
Leakage-Resilient Functional Encryption via Pair Encodings. | 4 | 0.37 | 2016 |
Public-key encryption with keyword search secure against continual memory attacks | 1 | 0.35 | 2016 |
Weak Leakage Resilient Extractable Hash Proof System And Construction For Weak Leakage Resilient Cca-Secure Public-Key Encryption | 0 | 0.34 | 2015 |
Updatable Hash Proof System and Its Applications. | 8 | 0.42 | 2015 |
Weak-Key Leakage Resilient Cryptography. | 0 | 0.34 | 2014 |
A Generic Chosen-Ciphertext Key-Leakage Secure Public Key Encryption Scheme from Hash Proof System. | 0 | 0.34 | 2013 |