Cited By
View all- Shinoki HSato HYoshino M(2025)Simple Construction of PEKS from LWE-Based IBE in the Standard ModelProvable and Practical Security10.1007/978-981-96-0954-3_9(168-186)Online publication date: 1-Feb-2025
- Zheng YZhang WSong WWang XFu C(2024)Encrypted Video Search with Single/Multiple WritersACM Transactions on Multimedia Computing, Communications, and Applications10.1145/3643887Online publication date: 5-Feb-2024
- Xu SCao YChen XGuo YYang YGuo FYiu SSerra ESpezzano F(2024)Post-Quantum Searchable Encryption Supporting User-Authorization for Outsourced Data ManagementProceedings of the 33rd ACM International Conference on Information and Knowledge Management10.1145/3627673.3679522(2702-2711)Online publication date: 21-Oct-2024
- Show More Cited By