Cited By
View all- Chiku SHara KHashimoto KTomita TShikata J(2024)How to Apply Fujisaki-Okamoto Transformation to Registration-Based EncryptionCryptology and Network Security10.1007/978-981-97-8016-7_7(145-165)Online publication date: 24-Sep-2024
- Datta PPal TYamada S(2024)Registered FE Beyond Predicates: (Attribute-Based) Linear Functions and MoreAdvances in Cryptology – ASIACRYPT 202410.1007/978-981-96-0875-1_3(65-104)Online publication date: 10-Dec-2024
- Champion JWu D(2024)Distributed Broadcast Encryption from LatticesTheory of Cryptography10.1007/978-3-031-78020-2_6(156-189)Online publication date: 2-Dec-2024
- Show More Cited By