|
Search the dblp DataBase
Rui Zhang 0002:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Peng Yang 0002, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang 0002, Kanta Matsuura, Hideki Imai
Applying Fujisaki-Okamoto to Identity-Based Encryption. [Citation Graph (0, 0)][DBLP] AAECC, 2006, pp:183-192 [Conf]
- Takashi Kitagawa, Peng Yang 0002, Goichiro Hanaoka, Rui Zhang 0002, Hajime Watanabe, Kanta Matsuura, Hideki Imai
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. [Citation Graph (0, 0)][DBLP] ACISP, 2006, pp:348-359 [Conf]
- Rui Zhang 0002, Jun Furukawa, Hideki Imai
Short Signature and Universal Designated Verifier Signature Without Random Oracles. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:483-498 [Conf]
- Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
On the Security of Cryptosystems with All-or-Nothing Transform. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:76-90 [Conf]
- Rui Zhang 0002, Hideki Imai
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP] ACNS, 2003, pp:96-110 [Conf]
- Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang 0002
Efficient Identity-Based Encryption with Tight Security Reduction. [Citation Graph (0, 0)][DBLP] CANS, 2006, pp:19-36 [Conf]
- Rui Zhang 0002, Hideki Imai
Improvements on Security Proofs of Some Identity Based Encryption Schemes. [Citation Graph (0, 0)][DBLP] CISC, 2005, pp:28-41 [Conf]
- Nuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang 0002, Rui Zhang 0002
Relations Among Notions of Security for Identity Based Encryption Schemes. [Citation Graph (0, 0)][DBLP] LATIN, 2006, pp:130-141 [Conf]
- Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, Hideki Imai
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2004, pp:360-374 [Conf]
- Rui Zhang 0002
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions. [Citation Graph (0, 0)][DBLP] ACNS, 2007, pp:323-339 [Conf]
- Rui Zhang 0002, Hideki Imai
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:159-174 [Conf]
- Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang 0002
Formal Security Treatments for Signatures from Identity-Based Encryption. [Citation Graph (0, 0)][DBLP] ProvSec, 2007, pp:218-227 [Conf]
A generic construction of useful client puzzles. [Citation Graph (, )][DBLP]
Orthogonality between Key Privacy and Data Privacy, Revisited. [Citation Graph (, )][DBLP]
Strong Anonymous Signatures. [Citation Graph (, )][DBLP]
Generic Construction of Stateful Identity Based Encryption. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|