The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Rui Zhang 0002: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Peng Yang 0002, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang 0002, Kanta Matsuura, Hideki Imai
    Applying Fujisaki-Okamoto to Identity-Based Encryption. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:183-192 [Conf]
  2. Takashi Kitagawa, Peng Yang 0002, Goichiro Hanaoka, Rui Zhang 0002, Hajime Watanabe, Kanta Matsuura, Hideki Imai
    Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:348-359 [Conf]
  3. Rui Zhang 0002, Jun Furukawa, Hideki Imai
    Short Signature and Universal Designated Verifier Signature Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:483-498 [Conf]
  4. Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
    On the Security of Cryptosystems with All-or-Nothing Transform. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:76-90 [Conf]
  5. Rui Zhang 0002, Hideki Imai
    Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:96-110 [Conf]
  6. Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang 0002
    Efficient Identity-Based Encryption with Tight Security Reduction. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:19-36 [Conf]
  7. Rui Zhang 0002, Hideki Imai
    Improvements on Security Proofs of Some Identity Based Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:28-41 [Conf]
  8. Nuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang 0002, Rui Zhang 0002
    Relations Among Notions of Security for Identity Based Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    LATIN, 2006, pp:130-141 [Conf]
  9. Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, Hideki Imai
    On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:360-374 [Conf]
  10. Rui Zhang 0002
    Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:323-339 [Conf]
  11. Rui Zhang 0002, Hideki Imai
    Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:159-174 [Conf]
  12. Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang 0002
    Formal Security Treatments for Signatures from Identity-Based Encryption. [Citation Graph (0, 0)][DBLP]
    ProvSec, 2007, pp:218-227 [Conf]

  13. A generic construction of useful client puzzles. [Citation Graph (, )][DBLP]


  14. Orthogonality between Key Privacy and Data Privacy, Revisited. [Citation Graph (, )][DBLP]


  15. Strong Anonymous Signatures. [Citation Graph (, )][DBLP]


  16. Generic Construction of Stateful Identity Based Encryption. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002