Showing results 2 to 4 of 4
< previous
Title | Author(s) | Issue Date | |
---|---|---|---|
Efficient non-interactive range proof Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2009 | ||
Escrowed deniable identification schemes Proceeding/Conference:Communications in Computer and Information Science | 2009 | ||
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2011 |