BOOK-CHAPTER

Anonymous Public Key Encryption Under Corruptions

Zhengan HuangJunzuo LaiShuai HanLin LyuJian Weng

Year: 2022 Lecture notes in computer science Pages: 423-453   Publisher: Springer Science+Business Media
Keywords:
Computer science Anonymity Computer security Encryption Public-key cryptography Confidentiality Key (lock) Hash function Scheme (mathematics) Cryptography Mathematics

Metrics

6
Cited By
2.19
FWCI (Field Weighted Citation Impact)
23
Refs
0.90
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Complexity and Algorithms in Graphs
Physical Sciences →  Computer Science →  Computational Theory and Mathematics
Cryptographic Implementations and Security
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Improving the security of direct anonymous attestation under host corruptions

Hyoseung KimKwangsu LeeJong Hwan ParkDong Hoon Lee

Journal:   International Journal of Information Security Year: 2020 Vol: 20 (4)Pages: 475-492
BOOK-CHAPTER

Anonymous Authentication from Public-Key Encryption Revisited

Daniel Slamanig

Lecture notes in computer science Year: 2011 Pages: 247-249
BOOK-CHAPTER

Anonymous, Robust Post-quantum Public Key Encryption

Paul GrubbsVarun MaramKenneth G. Paterson

Lecture notes in computer science Year: 2022 Pages: 402-432
© 2026 ScienceGate Book Chapters — All rights reserved.