Bennian Dou

According to our database1, Bennian Dou authored at least 11 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enabling privacy-preserving data validation from multi-writer encryption with aggregated keywords search.
Wirel. Networks, July, 2024

2023
Optimization of Functional Bootstrap with Large LUT and Packing Key Switching.
IACR Cryptol. ePrint Arch., 2023

2021
Multi-user search on the encrypted multimedia database: lattice-based searchable encryption scheme with time-controlled proxy re-encryption.
Multim. Tools Appl., 2021

2020
Conjunctive Keywords Searchable Encryption Scheme Against Inside Keywords Guessing Attack from Lattice.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

2013
Key Substitution Attacks on Multisignature Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Rogue Key Attacks on Lu et al.'s Verifiably Encrypted Signature Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Message and Key Substitution Attacks on Verifiably Encrypted Signature Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

On the Security of the Verifiably Encrypted Signature Scheme of Boneh, Gentry, Lynn and Shacham Revisited.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

2012
Key Substitution Attacks on the CFS Signature.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

2011
Cyclic codes over R = F<sub>p</sub> + uF<sub>p</sub> ++ u<sup>k-1</sup>F<sub>p</sub> with length p<sup>s</sup>n.
Inf. Sci., 2011

2009
Identity-Based Sequential Aggregate Signature from RSA.
Proceedings of the Fourth ChinaGrid Annual Conference, ChinaGrid 2009, Yantai, Shandong, 2009


  Loading...