Kefei Chen

From MaRDI portal
(Redirected from Person:1028367)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
An efficient privacy-preserving scheme for weak password collection in Internet of Things2024-07-19Paper
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
Science China Information Sciences
2022-10-28Paper
Certificateless identity-concealed authenticated encryption under multi-KGC
Information Security and Cryptology
2022-10-14Paper
Blockchain-based efficient public integrity auditing for cloud storage against malicious auditors2021-12-08Paper
CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN
Theoretical Computer Science
2021-09-06Paper
Attribute-based proxy re-encryption from standard lattices
Theoretical Computer Science
2021-04-08Paper
Functional broadcast encryption with applications to data sharing for cloud storage
Information Sciences
2021-02-04Paper
A more efficient leveled strongly-unforgeable fully homomorphic signature scheme
Information Sciences
2020-10-07Paper
Access control encryption with efficient verifiable sanitized decryption
Information Sciences
2020-09-22Paper
Insight of the protection for data security under selective opening attacks
Information Sciences
2020-07-02Paper
A new identification algorithm
Cryptography: Policy and Algorithms
2019-10-10Paper
scientific article; zbMATH DE number 7108581 (Why is no real title available?)2019-09-20Paper
Revocable identity-based encryption from the computational Diffie-Hellman problem2018-09-26Paper
On the linear span of the extended WG sequences2017-01-06Paper
Attribute-based key-insulated signature and its applications
Information Sciences
2016-07-11Paper
Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext
Science China Information Sciences
2015-11-20Paper
Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited
International Journal of Applied Mathematics and Computer Science
2015-10-16Paper
Continuous non-malleable key derivation and its application to related-key security
Lecture Notes in Computer Science
2015-08-27Paper
Homomorphic linear authentication schemes from \(\varepsilon\)-ASU\(_2\) functions for proofs of retrievability2015-08-10Paper
Optimal assignment schemes for general access structures based on linear programming
Designs, Codes and Cryptography
2015-03-12Paper
An efficient threshold key-insulated signature scheme
Journal of Shanghai Jiaotong University (Science)
2014-03-27Paper
Identity-based key-insulated signcryption2013-04-30Paper
Annihilators of fast discrete Fourier spectra attacks
Advances in Information and Computer Security
2013-04-04Paper
A generic construction of accountable decryption and its applications
Information Security and Privacy
2012-09-07Paper
Attack based on direct sum decomposition against the nonlinear filter generator
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
Transitive signature scheme from LFSR
JISE. Journal of Information Science and Engineering
2012-05-30Paper
Cryptographic protocol. Security analysis based on trusted freshness.2011-11-21Paper
Security analysis of cryptographic protocols based on fine-grained freshness2011-09-29Paper
Self-generated-certificate public key encryption without pairing and its application
Information Sciences
2011-06-22Paper
Key updating technique in identity-based encryption
Information Sciences
2011-06-22Paper
Lightweight delegated subset test with privacy protection
Information Security Practice and Experience
2011-05-19Paper
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
Information Sciences
2011-01-28Paper
Some remarks on the TKIP key mixing function of IEEE 802.11i
Journal of Shanghai Jiaotong University (Science)
2011-01-05Paper
Distributed certificateless key encapsulation mechanism secure against the adaptive adversary
Journal of Shanghai Jiaotong University (Science)
2011-01-05Paper
A universal composability framework for analysis of proxy threshold signature
Journal of Shanghai Jiaotong University (Science)
2011-01-05Paper
Formal analysis of authentication in 802.11i
Journal of Shanghai Jiaotong University (Science)
2011-01-05Paper
Analysis and improvements of two identity-based perfect concurrent signature schemes2010-10-29Paper
Building representative-based data aggregation tree in wireless sensor networks
Mathematical Problems in Engineering
2010-04-23Paper
Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism
Information Sciences
2010-03-11Paper
Identity-Based Strong Key-Insulated Signature Without Random Oracles
Journal of Software
2010-02-12Paper
A tabu search approach for the minimum sum-of-squares clustering problem
Information Sciences
2009-10-30Paper
Democratic group signatures with collective traceability
Computers and Electrical Engineering
2009-10-15Paper
Filling the gap between voters and cryptography in e-voting
Journal of Shanghai Jiaotong University (Science)
2009-06-30Paper
A synthetic indifferentiability analysis of some block-cipher-based hash functions
Designs, Codes and Cryptography
2009-03-31Paper
A reliable pairwise key-updating scheme for sensor networks2009-03-06Paper
A Tamper-Evident Voting Machine Resistant to Covert Channels
Provable Security
2009-01-27Paper
Identity-Based Key-Insulated Signature with Secure Key-Updates
Information Security and Cryptology
2009-01-15Paper
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
Cryptology and Network Security
2009-01-09Paper
Some New Characters on the Wire-Tap Channel of Type II
IEEE Transactions on Information Theory
2008-12-21Paper
Identity-Based Threshold Key-Insulated Encryption without Random Oracles
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Certificateless threshold cryptosystem secure against chosen-ciphertext attack
Information Sciences
2008-01-03Paper
Pirate decoder for the broadcast encryption schemes from Crypto 2005
Science in China. Series F
2007-10-12Paper
Provably secure convertible user designating confirmer partially blind signatures2007-09-18Paper
Efficient Partially Blind Signature Scheme with Provable Security
Lecture Notes in Computer Science
2007-09-10Paper
ID-based threshold decryption secure against adaptive chosen-ciphertext attack
Computers and Electrical Engineering
2007-06-08Paper
Trust based pervasive computing
Wuhan University Journal of Natural Sciences
2007-06-01Paper
A generic solution to realize public verifiability of signcryption
Wuhan University Journal of Natural Sciences
2007-06-01Paper
Adaptive chosen ciphertext secure threshold key escrow scheme from pairing2007-04-05Paper
On the orders of transformation matrices (mod \(n\)) and two types of generalized Arnold transformation matrices
Science in China. Series F
2007-02-20Paper
Optimistic fair exchange e-commerce protocol based on secret sharing
Journal of Systems Engineering and Electronics
2007-02-14Paper
Verifiable encrypted signatures without random oracles
Journal of Shanghai Jiaotong University (Science)
2006-11-15Paper
ID-based threshold decryption secure against chosen plaintext attack
Journal of Shanghai Jiaotong University (Science)
2006-11-15Paper
Buffer overflow detection on binary code
Journal of Shanghai Jiaotong University (Science)
2006-11-15Paper
How to play E-lottery games via voting
Journal of Shanghai Jiaotong University (Science)
2006-11-15Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Information Security
Lecture Notes in Computer Science
2006-10-20Paper
A provably secure asynchronous proactive RSA scheme
Journal of Shanghai Jiaotong University (Science)
2006-10-04Paper
A dynamic threshold commercial key escrow scheme based on conic
Applied Mathematics and Computation
2006-05-18Paper
ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings
Applied Mathematics and Computation
2005-11-16Paper
Identity oriented signature scheme based on quadratic residues
Applied Mathematics and Computation
2005-11-04Paper
scientific article; zbMATH DE number 2222201 (Why is no real title available?)2005-11-02Paper
scientific article; zbMATH DE number 2222192 (Why is no real title available?)2005-11-02Paper
scientific article; zbMATH DE number 2222200 (Why is no real title available?)2005-11-02Paper
scientific article; zbMATH DE number 2222198 (Why is no real title available?)2005-11-02Paper
scientific article; zbMATH DE number 2222188 (Why is no real title available?)2005-11-02Paper
scientific article; zbMATH DE number 2222202 (Why is no real title available?)2005-11-02Paper
Multiparty authentication services and key agreement protocols with semi-trusted third party.
Journal of Computer Science and Technology
2004-07-01Paper
scientific article; zbMATH DE number 2043318 (Why is no real title available?)2004-02-16Paper
scientific article; zbMATH DE number 1941237 (Why is no real title available?)2003-06-29Paper
scientific article; zbMATH DE number 1930142 (Why is no real title available?)2003-06-18Paper
scientific article; zbMATH DE number 1021808 (Why is no real title available?)1997-12-15Paper
On the Non - Existence of Perfect Codes with Rank Distance
Mathematische Nachrichten
1996-11-18Paper
scientific article; zbMATH DE number 789825 (Why is no real title available?)1995-08-23Paper


Research outcomes over time


This page was built for person: Kefei Chen