Two-Round Multi-Signatures from Okamoto Signatures. | 0 | 0.34 | 2022 |
Improving The Security Of Direct Anonymous Attestation Under Host Corruptions | 0 | 0.34 | 2021 |
Tight security for the generic construction of identity-based signature (in the multi-instance setting). | 0 | 0.34 | 2020 |
Comments on “Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption” | 2 | 0.40 | 2020 |
On the Analysis of the Revocable-Storage Identity-Based Encryption Scheme. | 0 | 0.34 | 2019 |
Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers | 0 | 0.34 | 2019 |
CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts | 0 | 0.34 | 2019 |
Ciphertext Outdate Attacks on Xu et al.'s Revocable Attribute-Based Encryption Scheme. | 0 | 0.34 | 2018 |
Multi-Client Order-Revealing Encryption. | 1 | 0.36 | 2018 |
Revocable Hierarchical Identity-Based Encryption with Shorter Private Keys and Update Keys. | 0 | 0.34 | 2018 |
Two-Input Functional Encryption For Inner Products From Bilinear Maps | 2 | 0.39 | 2018 |
Efficient Revocable Identity-Based Encryption via Subset Difference Methods. | 6 | 0.44 | 2017 |
Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness. | 0 | 0.34 | 2017 |
Efficient Hidden Vector Encryptions and Its Applications. | 0 | 0.34 | 2017 |
Revocable Hierarchical Identity-Based Encryption from Multilinear Maps. | 0 | 0.34 | 2016 |
Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups. | 0 | 0.34 | 2016 |
Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System. | 2 | 0.36 | 2016 |
Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups. | 0 | 0.34 | 2016 |
Sequential aggregate signatures with short public keys without random oracles | 0 | 0.34 | 2015 |
Anonymous HIBE with short ciphertexts: full security in prime order groups | 5 | 0.40 | 2015 |
New Constructions of Revocable Identity-Based Encryption from Multilinear Maps | 21 | 0.77 | 2015 |
Identity-Based Revocation From Subset Difference Methods Under Simple Assumptions | 0 | 0.34 | 2015 |
Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation. | 0 | 0.34 | 2015 |
New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem | 0 | 0.34 | 2015 |
Self-Updatable Encryption with Short Public Parameters and Its Extensions. | 3 | 0.39 | 2014 |
Security analysis of an identity-based strongly unforgeable signature scheme | 2 | 0.41 | 2014 |
Public-Key Revocation and Tracing Schemes with Subset Difference Methods. | 1 | 0.36 | 2013 |
Sequential aggregate signatures made shorter | 1 | 0.35 | 2013 |
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency | 9 | 0.53 | 2013 |
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency. | 5 | 0.40 | 2013 |
Fully secure hidden vector encryption under standard assumptions | 6 | 0.54 | 2013 |
Adaptively secure broadcast encryption under standard assumptions with better efficiency | 5 | 0.41 | 2013 |
On The Security Of Luo Et Al.'S Fully Secure Hierarchical Identity Based Encryption Scheme | 1 | 0.37 | 2012 |
Privacy preserving revocable predicate encryption revisited. | 1 | 0.35 | 2012 |
Improved hidden vector encryption with short ciphertexts and tokens | 7 | 0.43 | 2011 |
New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups | 7 | 5.76 | 2010 |
The measurement of the dielectric and optical properties of nano thin films by THz differential time-domain spectroscopy | 1 | 0.51 | 2003 |
New DSA-verifiable signcryption schemes | 29 | 1.14 | 2002 |