Secret Sharing with Cheaters Using Multi-Receiver Authentication.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Efficient outsourcing of secure k-nearest neighbour query over encrypted database.
Comput. Secur., 2017
Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation.
Proceedings of the Advances in Information and Computer Security, 2017
VIGraph - A Framework for Verifiable Information.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017
Hypercubes and Private Information Retrieval.
Proceedings of the Information and Communications Security - 19th International Conference, 2017
An Experimental Study of the BDD Approach for the Search LWE Problem.
Proceedings of the Applied Cryptography and Network Security, 2017
User-in-a-context: A blueprint for context-aware identification.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Note on Some Recent Cheater Identifiable Secret Sharing Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters.
IACR Cryptol. ePrint Arch., 2015
An Efficient t-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency.
IACR Cryptol. ePrint Arch., 2014
An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014
Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication.
Proceedings of the Advances in Information and Computer Security, 2014
Secure k-NN query on encrypted cloud database without key-sharing.
Int. J. Electron. Secur. Digit. Forensics, 2013
On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary.
Proceedings of the Advances in Information and Computer Security, 2013
Secure k-NN computation on encrypted cloud data without sharing key with query users.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013