All Stories

  1. An Accuracy-Lossless Perturbation Method for Defending Privacy Attacks in Federated Learning
  2. Efficient multiple sources network coding signature in the standard model
  3. Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
  4. Multi-Use Unidirectional Proxy Re-Encryption
  5. Unidirectional Identity-Based Proxy Re-Signature
  6. Identity-Based Conditional Proxy Re-Encryption
  7. Anonymous proxy re-encryption
  8. Proxy re-encryption with keyword search
  9. An improved deniable authentication protocol