Showing results 1 to 2 of 2
Title | Author(s) | Issue Date | |
---|---|---|---|
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2018 | ||
Simulation-based selective opening security for receivers under chosen-ciphertext attacks Journal:Designs, Codes, and Cryptography | 2019 |