Search

Your search keyword '"Weng, Jian"' showing total 96 results

Search Constraints

Start Over You searched for: Author "Weng, Jian" Remove constraint Author: "Weng, Jian" Publisher springer berlin heidelberg Remove constraint Publisher: springer berlin heidelberg
96 results on '"Weng, Jian"'

Search Results

1. Kleptography

5. Tightly Secure IBE Under Constant-Size Master Public Key

8. Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof (Extended Abstract)

9. (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond

10. The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions

12. Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack

14. Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters

15. Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles

16. Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks

17. Accountable Authority Identity-Based Encryption with Public Traceability

18. A Generic Approach for Providing Revocation Support in Secret Handshake

19. Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption

20. New Chosen Ciphertext Secure Public Key Encryption in the Standard Model with Public Verifiability

21. On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010

22. Optionally Identifiable Private Handshakes

23. Generic Constructions of Parallel Key-Insulated Encryption

24. Zero-Knowledge Argument for Simultaneous Discrete Logarithms

25. Efficient Unidirectional Proxy Re-Encryption

26. Self-enforcing Private Inference Control

27. Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security

28. Conditional Proxy Broadcast Re-Encryption

29. Chosen-Ciphertext Secure Proxy Re-encryption without Pairings

30. Identity-Based Threshold Key-Insulated Encryption without Random Oracles

31. Identity-Based Key-Insulated Signature Without Random Oracles

32. Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction

33. Identity-Based Key-Insulated Signature with Secure Key-Updates

Catalog

Books, media, physical & digital resources