The SCEAS System
| |||||||

## Search the dblp DataBase
Rui Zhang 0002:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Peng Yang 0002, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang 0002, Kanta Matsuura, Hideki Imai
**Applying Fujisaki-Okamoto to Identity-Based Encryption.**[Citation Graph (0, 0)][DBLP] AAECC, 2006, pp:183-192 [Conf] - Takashi Kitagawa, Peng Yang 0002, Goichiro Hanaoka, Rui Zhang 0002, Hajime Watanabe, Kanta Matsuura, Hideki Imai
**Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT.**[Citation Graph (0, 0)][DBLP] ACISP, 2006, pp:348-359 [Conf] - Rui Zhang 0002, Jun Furukawa, Hideki Imai
**Short Signature and Universal Designated Verifier Signature Without Random Oracles.**[Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:483-498 [Conf] - Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
**On the Security of Cryptosystems with All-or-Nothing Transform.**[Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:76-90 [Conf] - Rui Zhang 0002, Hideki Imai
**Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem.**[Citation Graph (0, 0)][DBLP] ACNS, 2003, pp:96-110 [Conf] - Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang 0002
**Efficient Identity-Based Encryption with Tight Security Reduction.**[Citation Graph (0, 0)][DBLP] CANS, 2006, pp:19-36 [Conf] - Rui Zhang 0002, Hideki Imai
**Improvements on Security Proofs of Some Identity Based Encryption Schemes.**[Citation Graph (0, 0)][DBLP] CISC, 2005, pp:28-41 [Conf] - Nuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang 0002, Rui Zhang 0002
**Relations Among Notions of Security for Identity Based Encryption Schemes.**[Citation Graph (0, 0)][DBLP] LATIN, 2006, pp:130-141 [Conf] - Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, Hideki Imai
**On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2004, pp:360-374 [Conf] - Rui Zhang 0002
**Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions.**[Citation Graph (0, 0)][DBLP] ACNS, 2007, pp:323-339 [Conf] - Rui Zhang 0002, Hideki Imai
**Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption.**[Citation Graph (0, 0)][DBLP] CANS, 2007, pp:159-174 [Conf] - Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang 0002
**Formal Security Treatments for Signatures from Identity-Based Encryption.**[Citation Graph (0, 0)][DBLP] ProvSec, 2007, pp:218-227 [Conf] **A generic construction of useful client puzzles.**[Citation Graph (, )][DBLP]**Orthogonality between Key Privacy and Data Privacy, Revisited.**[Citation Graph (, )][DBLP]**Strong Anonymous Signatures.**[Citation Graph (, )][DBLP]**Generic Construction of Stateful Identity Based Encryption.**[Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |