Kefei Chen

From MaRDI portal
Person:1028367

Available identifiers

zbMath Open chen.kefeiMaRDI QIDQ1028367

List of research outcomes





PublicationDate of PublicationType
An efficient privacy-preserving scheme for weak password collection in Internet of Things2024-07-19Paper
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles2022-10-28Paper
Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC2022-10-14Paper
Blockchain-based efficient public integrity auditing for cloud storage against malicious auditors2021-12-08Paper
CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN2021-09-06Paper
Attribute-based proxy re-encryption from standard lattices2021-04-08Paper
Functional broadcast encryption with applications to data sharing for cloud storage2021-02-04Paper
A more efficient leveled strongly-unforgeable fully homomorphic signature scheme2020-10-07Paper
Access control encryption with efficient verifiable sanitized decryption2020-09-22Paper
Insight of the protection for data security under selective opening attacks2020-07-02Paper
A new identification algorithm2019-10-10Paper
https://portal.mardi4nfdi.de/entity/Q51941652019-09-20Paper
Revocable identity-based encryption from the computational Diffie-Hellman problem2018-09-26Paper
https://portal.mardi4nfdi.de/entity/Q31804092017-01-06Paper
Attribute-based key-insulated signature and its applications2016-07-11Paper
Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext2015-11-20Paper
Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited2015-10-16Paper
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security2015-08-27Paper
https://portal.mardi4nfdi.de/entity/Q55009182015-08-10Paper
Optimal assignment schemes for general access structures based on linear programming2015-03-12Paper
An efficient threshold key-insulated signature scheme2014-03-27Paper
https://portal.mardi4nfdi.de/entity/Q49174502013-04-30Paper
Annihilators of Fast Discrete Fourier Spectra Attacks2013-04-04Paper
A Generic Construction of Accountable Decryption and Its Applications2012-09-07Paper
Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator2012-07-23Paper
Transitive signature scheme from LFSR2012-05-30Paper
https://portal.mardi4nfdi.de/entity/Q31006702011-11-21Paper
https://portal.mardi4nfdi.de/entity/Q31707532011-09-29Paper
Self-generated-certificate public key encryption without pairing and its application2011-06-22Paper
Key updating technique in identity-based encryption2011-06-22Paper
Lightweight Delegated Subset Test with Privacy Protection2011-05-19Paper
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings2011-01-28Paper
Some remarks on the TKIP key mixing function of IEEE 802.11i2011-01-05Paper
Distributed certificateless key encapsulation mechanism secure against the adaptive adversary2011-01-05Paper
A universal composability framework for analysis of proxy threshold signature2011-01-05Paper
Formal analysis of authentication in 802.11i2011-01-05Paper
https://portal.mardi4nfdi.de/entity/Q30534602010-10-29Paper
Building representative-based data aggregation tree in wireless sensor networks2010-04-23Paper
Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism2010-03-11Paper
Identity-Based Strong Key-Insulated Signature Without Random Oracles2010-02-12Paper
A tabu search approach for the minimum sum-of-squares clustering problem2009-10-30Paper
Democratic group signatures with collective traceability2009-10-15Paper
Filling the gap between voters and cryptography in e-voting2009-06-30Paper
A synthetic indifferentiability analysis of some block-cipher-based hash functions2009-03-31Paper
A reliable pairwise key-updating scheme for sensor networks2009-03-06Paper
A Tamper-Evident Voting Machine Resistant to Covert Channels2009-01-27Paper
Identity-Based Key-Insulated Signature with Secure Key-Updates2009-01-15Paper
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings2009-01-09Paper
Some New Characters on the Wire-Tap Channel of Type II2008-12-21Paper
Identity-Based Threshold Key-Insulated Encryption without Random Oracles2008-04-24Paper
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction2008-04-11Paper
Certificateless threshold cryptosystem secure against chosen-ciphertext attack2008-01-03Paper
Pirate decoder for the broadcast encryption schemes from Crypto 20052007-10-12Paper
Provably secure convertible user designating confirmer partially blind signatures2007-09-18Paper
Efficient Partially Blind Signature Scheme with Provable Security2007-09-10Paper
ID-based threshold decryption secure against adaptive chosen-ciphertext attack2007-06-08Paper
Trust based pervasive computing2007-06-01Paper
A generic solution to realize public verifiability of signcryption2007-06-01Paper
Adaptive chosen ciphertext secure threshold key escrow scheme from pairing2007-04-05Paper
On the orders of transformation matrices (mod \(n\)) and two types of generalized Arnold transformation matrices2007-02-20Paper
Optimistic fair exchange e-commerce protocol based on secret sharing2007-02-14Paper
Verifiable encrypted signatures without random oracles2006-11-15Paper
ID-based threshold decryption secure against chosen plaintext attack2006-11-15Paper
Buffer overflow detection on binary code2006-11-15Paper
How to play E-lottery games via voting2006-11-15Paper
Cryptology and Network Security2006-11-14Paper
Information and Communications Security2006-10-24Paper
Information Security2006-10-20Paper
A provably secure asynchronous proactive RSA scheme2006-10-04Paper
A dynamic threshold commercial key escrow scheme based on conic2006-05-18Paper
ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings2005-11-16Paper
Identity oriented signature scheme based on quadratic residues2005-11-04Paper
https://portal.mardi4nfdi.de/entity/Q57009992005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q57009872005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q57009982005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q57009952005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q57009812005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q57010002005-11-02Paper
Multiparty authentication services and key agreement protocols with semi-trusted third party.2004-07-01Paper
https://portal.mardi4nfdi.de/entity/Q44507422004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44084332003-06-29Paper
https://portal.mardi4nfdi.de/entity/Q47086742003-06-18Paper
https://portal.mardi4nfdi.de/entity/Q43396491997-12-15Paper
On the Non - Existence of Perfect Codes with Rank Distance1996-11-18Paper
https://portal.mardi4nfdi.de/entity/Q48464291995-08-23Paper

Research outcomes over time

This page was built for person: Kefei Chen