Identity-based encryption with security against the KGC: A formal model and its instantiations | 0 | 0.34 | 2022 |
Verifiable Functional Encryption Using Intel SGX | 0 | 0.34 | 2021 |
Adaptively Secure Revocable Hierarchical Ibe From K-Linear Assumption | 0 | 0.34 | 2021 |
An Anonymous Trust-Marking Scheme on Blockchain Systems | 0 | 0.34 | 2021 |
Efficient Revocable Identity-Based Encryption With Short Public Parameters | 0 | 0.34 | 2021 |
On The Security Of Keyed-Homomorphic Pke: Preventing Key Recovery Attacks And Ciphertext Validity Attacks | 0 | 0.34 | 2021 |
Efficient Identity-Based Encryption With Hierarchical Key-Insulation From Hibe | 0 | 0.34 | 2021 |
A Privacy-Preserving Enforced Bill Collection System using Smart Contracts | 0 | 0.34 | 2021 |
Privacy-Preserving Data Analysis: Providing Traceability Without Big Brother | 0 | 0.34 | 2021 |
Group Signatures with Time-bound Keys Revisited: A New Model, an Efficient Construction, and its Implementation | 1 | 0.36 | 2020 |
A Revocable Group Signature Scheme With Scalability From Simple Assumptions | 0 | 0.34 | 2020 |
Secure-channel free searchable encryption with multiple keywords: A generic construction, an instantiation, and its implementation | 0 | 0.34 | 2020 |
A Generic Construction of Integrated Secure-Channel Free PEKS and PKE and its Application to EMRs in Cloud Storage. | 1 | 0.35 | 2019 |
Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2 | 1 | 0.36 | 2019 |
Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings | 0 | 0.34 | 2019 |
Session details: Invited Talk | 0 | 0.34 | 2019 |
Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions | 0 | 0.34 | 2019 |
A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Application to Identity Management. | 0 | 0.34 | 2019 |
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions and Its Implementations. | 0 | 0.34 | 2019 |
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems. | 0 | 0.34 | 2018 |
Road-to-Vehicle Communications With Time-Dependent Anonymity: A Lightweight Construction and Its Experimental Results. | 0 | 0.34 | 2018 |
Fully Anonymous Group Signature with Verifier-Local Revocation. | 0 | 0.34 | 2018 |
Generic Constructions For Fully Secure Revocable Attribute-Based Encryption | 0 | 0.34 | 2018 |
A Generic Construction Of Integrated Secure-Channel Free Peks And Pke | 0 | 0.34 | 2018 |
A Revocable Group Signature Scheme With Scalability From Simple Assumptions And Its Implementation | 0 | 0.34 | 2018 |
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures. | 1 | 0.35 | 2018 |
Group Signatures with Time-bound Keys Revisited: A New Model and an Efficient Construction. | 1 | 0.35 | 2017 |
Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementation. | 0 | 0.34 | 2017 |
Mis-operation Resistant Searchable Homomorphic Encryption. | 1 | 0.35 | 2017 |
New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters. | 5 | 0.40 | 2017 |
A Framework of Privacy Preserving Anomaly Detection: Providing Traceability without Big Brother. | 0 | 0.34 | 2017 |
A Generic Construction of Secure-Channel Free Searchable Encryption with Multiple Keywords. | 1 | 0.35 | 2017 |
Toward securing tire pressure monitoring systems: A case of PRESENT-based implementation | 0 | 0.34 | 2016 |
Shortening The Libert-Peters-Yung Revocable Group Signature Scheme By Using The Random Oracle Methodology | 1 | 0.34 | 2016 |
Semi-Generic Transformation Of Revocable Hierarchical Identity-Based Encryption And Its Dbdh Instantiation | 2 | 0.36 | 2016 |
Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation | 5 | 0.45 | 2016 |
Revocable hierarchical identity-based encryption via history-free approach. | 2 | 0.36 | 2016 |
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency. | 0 | 0.34 | 2016 |
Time-specific encryption from forward-secure encryption: generic and direct constructions. | 0 | 0.34 | 2016 |
A KEM/DEM-Based Construction for Secure and Anonymous Communication | 2 | 0.36 | 2015 |
Disavowable Public Key Encryption with Non-interactive Opening | 1 | 0.38 | 2015 |
Dynamic Threshold Public-Key Encryption With Decryption Consistency From Static Assumptions | 2 | 0.38 | 2015 |
A Light-Weight Group Signature Scheme with Time-Token Dependent Linking. | 3 | 0.40 | 2015 |
Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts. | 8 | 0.50 | 2015 |
SKENO: Secret key encryption with non-interactive opening. | 0 | 0.34 | 2015 |
Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability | 1 | 0.35 | 2015 |
Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption | 3 | 0.37 | 2015 |
Revocable Group Signature with Constant-Size Revocation List. | 0 | 0.34 | 2015 |
Revocable Identity-Based Encryption With Rejoin Functionality | 4 | 0.39 | 2014 |
A Privacy-Enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures | 0 | 0.34 | 2014 |