Loading…
Function-Hiding Inner Product Encryption Is Practical
Kim, Sam, Lewi, Kevin, Mandal, Avradip, Montgomery, Hart, Roy, Arnab, Wu, David J.
Published in Security and Cryptography for Networks (2018)
Published in Security and Cryptography for Networks (2018)
Get full text
Book Chapter
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Account Management in Proof of Stake Ledgers
Karakostas, Dimitris, Kiayias, Aggelos, Larangeira, Mario
Published in Security and Cryptography for Networks (2020)
Published in Security and Cryptography for Networks (2020)
Get full text
Book Chapter
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Higher-Order Masked Saber
Kundu, Suparna, D’Anvers, Jan-Pieter, Van Beirendonck, Michiel, Karmakar, Angshuman, Verbauwhede, Ingrid
Published in Security and Cryptography for Networks (2022)
Published in Security and Cryptography for Networks (2022)
Get full text
Book Chapter
Loading…
Loading…
Short Threshold Dynamic Group Signatures
Camenisch, Jan, Drijvers, Manu, Lehmann, Anja, Neven, Gregory, Towa, Patrick
Published in Security and Cryptography for Networks (2020)
Published in Security and Cryptography for Networks (2020)
Get full text
Book Chapter
Loading…
Loading…
Loading…
Key-Policy ABE with Switchable Attributes
Delerablée, Cécile, Gouriou, Lénaïck, Pointcheval, David
Published in Security and Cryptography for Networks (2022)
Published in Security and Cryptography for Networks (2022)
Get full text
Book Chapter
Loading…