Fuchun Guo

From MaRDI portal
Revision as of 06:27, 7 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:300389

Available identifiers

zbMath Open guo.fuchunMaRDI QIDQ300389

List of research outcomes





PublicationDate of PublicationType
Robust decentralized multi-client functional encryption: motivation, definition, and inner-product constructions2024-09-13Paper
Compact accountable ring signatures in the plain model2024-07-17Paper
Compact ring signatures with post-quantum security in standard model2024-07-17Paper
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts2024-04-11Paper
A tightly secure ID-based signature scheme under DL assumption in AGM2024-01-11Paper
Efficient unique ring signatures from lattices2023-07-28Paper
Multimodal private signatures2023-06-28Paper
Optimal tightness for chain-based unique signatures2022-08-30Paper
Lattice-based IBE with equality test supporting flexible authorization in the standard model2022-07-06Paper
Generic construction for tightly-secure signatures from discrete log2021-09-27Paper
Certificateless aggregate signature scheme secure against fully chosen-key attacks2021-03-31Paper
Accountable identity-based encryption with distributed private key generators2021-03-16Paper
Generalized public-key cryptography with tight security2021-02-05Paper
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters2020-09-22Paper
Privacy-enhanced attribute-based private information retrieval2020-09-08Paper
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes2020-07-20Paper
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts2020-01-29Paper
Strongly leakage resilient authenticated key exchange, revisited2019-11-07Paper
Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems2019-03-26Paper
Introduction to Security Reduction2018-07-18Paper
Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost2018-02-06Paper
Functional encryption for computational hiding in prime order groups via pair encodings2018-01-26Paper
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample2017-11-15Paper
Strong authenticated key exchange with auxiliary inputs2017-09-15Paper
A note on the strong authenticated key exchange with auxiliary inputs2017-09-15Paper
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions2017-02-01Paper
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction2017-01-06Paper
Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update2017-01-06Paper
Oblivious Keyword Search with Authorization2017-01-06Paper
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups2016-10-21Paper
One-Round Strong Oblivious Signature-Based Envelope2016-09-02Paper
Public Key Encryption with Authorized Keyword Search2016-09-02Paper
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing2016-09-02Paper
Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance2016-08-31Paper
Generalized closest substring encryption2016-06-27Paper
Strongly Leakage-Resilient Authenticated Key Exchange2016-04-08Paper
Efficient dynamic threshold identity-based encryption with constant-size ciphertext2015-12-08Paper
A New General Framework for Secure Public Key Encryption with Keyword Search2015-10-20Paper
Improved Identity-Based Online/Offline Encryption2015-10-20Paper
Efficient and secure stored-value cards with leakage resilience2013-08-19Paper
Membership Encryption and Its Applications2013-06-28Paper
A Pre-computable Signature Scheme with Efficient Verification for RFID2012-06-29Paper
Online/Offline Verification of Short Signatures2011-07-29Paper
Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase2011-07-29Paper
How to Prove Security of a Signature with a Tighter Security Reduction2009-12-11Paper
Multi-identity management for identity-based cryptography2009-04-28Paper
Identity-Based Online/Offline Encryption2009-02-12Paper
Multi-Identity Single-Key Decryption without Random Oracles2009-02-10Paper
Optimal Online/Offline Signature: How to Sign a Message without Online Computation2009-01-27Paper
Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles2008-04-15Paper
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key2007-11-29Paper

Research outcomes over time

This page was built for person: Fuchun Guo