Ke-Fei Chen

From MaRDI portal
Person:1028367

Available identifiers

zbMath Open chen.kefeiMaRDI QIDQ1028367

List of research outcomes

PublicationDate of PublicationType
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles2022-10-28Paper
Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC2022-10-14Paper
Blockchain-based efficient public integrity auditing for cloud storage against malicious auditors2021-12-08Paper
CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN2021-09-06Paper
Attribute-based proxy re-encryption from standard lattices2021-04-08Paper
Functional broadcast encryption with applications to data sharing for cloud storage2021-02-04Paper
A more efficient leveled strongly-unforgeable fully homomorphic signature scheme2020-10-07Paper
Access control encryption with efficient verifiable sanitized decryption2020-09-22Paper
Insight of the protection for data security under selective opening attacks2020-07-02Paper
A new identification algorithm2019-10-10Paper
https://portal.mardi4nfdi.de/entity/Q51941652019-09-20Paper
Revocable identity-based encryption from the computational Diffie-Hellman problem2018-09-26Paper
https://portal.mardi4nfdi.de/entity/Q31804092017-01-06Paper
Attribute-based key-insulated signature and its applications2016-07-11Paper
Non-malleability Under Selective Opening Attacks: Implication and Separation2016-03-10Paper
Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext2015-11-20Paper
Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited2015-10-16Paper
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security2015-08-27Paper
https://portal.mardi4nfdi.de/entity/Q55009182015-08-10Paper
Optimal assignment schemes for general access structures based on linear programming2015-03-12Paper
An efficient threshold key-insulated signature scheme2014-03-27Paper
https://portal.mardi4nfdi.de/entity/Q49174502013-04-30Paper
Annihilators of Fast Discrete Fourier Spectra Attacks2013-04-04Paper
A Generic Construction of Accountable Decryption and Its Applications2012-09-07Paper
Accountable authority key policy attribute-based encryption2012-08-17Paper
Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator2012-07-23Paper
https://portal.mardi4nfdi.de/entity/Q28880682012-05-30Paper
https://portal.mardi4nfdi.de/entity/Q31006702011-11-21Paper
https://portal.mardi4nfdi.de/entity/Q31707532011-09-29Paper
Self-generated-certificate public key encryption without pairing and its application2011-06-22Paper
Key updating technique in identity-based encryption2011-06-22Paper
Lightweight Delegated Subset Test with Privacy Protection2011-05-19Paper
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings2011-01-28Paper
Some remarks on the TKIP key mixing function of IEEE 802.11i2011-01-05Paper
Distributed certificateless key encapsulation mechanism secure against the adaptive adversary2011-01-05Paper
A universal composability framework for analysis of proxy threshold signature2011-01-05Paper
Formal analysis of authentication in 802.11i2011-01-05Paper
https://portal.mardi4nfdi.de/entity/Q30534602010-10-29Paper
Building representative-based data aggregation tree in wireless sensor networks2010-04-23Paper
Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism2010-03-11Paper
Identity-Based Strong Key-Insulated Signature Without Random Oracles2010-02-12Paper
A tabu search approach for the minimum sum-of-squares clustering problem2009-10-30Paper
Democratic group signatures with collective traceability2009-10-15Paper
Filling the gap between voters and cryptography in e-voting2009-06-30Paper
A synthetic indifferentiability analysis of some block-cipher-based hash functions2009-03-31Paper
https://portal.mardi4nfdi.de/entity/Q36109832009-03-06Paper
A Tamper-Evident Voting Machine Resistant to Covert Channels2009-01-27Paper
Identity-Based Key-Insulated Signature with Secure Key-Updates2009-01-15Paper
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings2009-01-09Paper
Some New Characters on the Wire-Tap Channel of Type II2008-12-21Paper
Identity-Based Threshold Key-Insulated Encryption without Random Oracles2008-04-24Paper
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction2008-04-11Paper
Certificateless threshold cryptosystem secure against chosen-ciphertext attack2008-01-03Paper
Pirate decoder for the broadcast encryption schemes from Crypto 20052007-10-12Paper
https://portal.mardi4nfdi.de/entity/Q53078552007-09-18Paper
Efficient Partially Blind Signature Scheme with Provable Security2007-09-10Paper
ID-based threshold decryption secure against adaptive chosen-ciphertext attack2007-06-08Paper
Trust based pervasive computing2007-06-01Paper
A generic solution to realize public verifiability of signcryption2007-06-01Paper
https://portal.mardi4nfdi.de/entity/Q34310802007-04-05Paper
On the orders of transformation matrices (mod \(n\)) and two types of generalized Arnold transformation matrices2007-02-20Paper
Optimistic fair exchange e-commerce protocol based on secret sharing2007-02-14Paper
ID-based threshold decryption secure against chosen plaintext attack2006-11-15Paper
Buffer overflow detection on binary code2006-11-15Paper
Verifiable encrypted signatures without random oracles2006-11-15Paper
How to play E-lottery games via voting2006-11-15Paper
Cryptology and Network Security2006-11-14Paper
Information and Communications Security2006-10-24Paper
Information Security2006-10-20Paper
A provably secure asynchronous proactive RSA scheme2006-10-04Paper
A dynamic threshold commercial key escrow scheme based on conic2006-05-18Paper
ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings2005-11-16Paper
Identity oriented signature scheme based on quadratic residues2005-11-04Paper
https://portal.mardi4nfdi.de/entity/Q57009812005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q57009872005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q57009952005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q57009982005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q57009992005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q57010002005-11-02Paper
Multiparty authentication services and key agreement protocols with semi-trusted third party.2004-07-01Paper
https://portal.mardi4nfdi.de/entity/Q44507422004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44084332003-06-29Paper
https://portal.mardi4nfdi.de/entity/Q47086742003-06-18Paper
https://portal.mardi4nfdi.de/entity/Q43396491997-12-15Paper
On the Non - Existence of Perfect Codes with Rank Distance1996-11-18Paper
https://portal.mardi4nfdi.de/entity/Q48464291995-08-23Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Ke-Fei Chen