Man Ho Au

From MaRDI portal
Person:266277

Available identifiers

zbMath Open au.man-hoMaRDI QIDQ266277

List of research outcomes





PublicationDate of PublicationType
Adaptively secure identity-based encryption from middle-product learning with errors2024-01-11Paper
Ideal dynamic threshold multi-secret data sharing in smart environments for sustainable cities2023-09-08Paper
Public-key watermarking schemes for pseudorandom functions2023-06-28Paper
Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting2023-03-21Paper
Collusion resistant watermarkable PRFs from standard assumptions2022-11-09Paper
DualRing: generic construction of ring signatures with efficient instantiations2022-03-31Paper
Anonymous post-quantum cryptocash2021-03-17Paper
RingCT 3.0 for blockchain confidential transaction: shorter size and stronger security2021-02-08Paper
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation2020-11-06Paper
Efficient attribute-based encryption with attribute revocation for assured data deletion2020-10-07Paper
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters2020-09-22Paper
Practical Range Proof for Cryptocurrency Monero with Provable Security2020-07-20Paper
Efficient lattice-based zero-knowledge arguments with standard soundness: construction and applications2020-05-20Paper
Strongly secure authenticated key exchange from supersingular isogenies2020-05-20Paper
Collusion resistant watermarking schemes for cryptographic functionalities2020-05-20Paper
Ring signatures based on Middle-Product Learning with Errors problems2020-05-06Paper
Raptor: a practical lattice-based (linkable) ring signature2020-01-30Paper
Strong leakage and tamper-resilient PKE from refined hash proof system2020-01-30Paper
A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices2020-01-28Paper
An efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks using online/offline certificateless aggregate signature2020-01-10Paper
Simulation-based selective opening security for receivers under chosen-ciphertext attacks2019-05-24Paper
Fuzzy public-key encryption based on biometric data2018-11-07Paper
Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps2018-10-22Paper
Unforgeable watermarking schemes with public extraction2018-10-17Paper
Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice ringct v1.0)2018-09-26Paper
Lattice-based universal accumulator with nonmembership arguments2018-09-26Paper
Practical signatures from the Partial Fourier Recovery problem revisited: a provably-secure and Gaussian-distributed construction2018-09-26Paper
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation2018-09-26Paper
Hedged nonce-based public-key encryption: adaptive security under randomness failures2018-05-16Paper
Functional encryption for computational hiding in prime order groups via pair encodings2018-01-26Paper
A general framework for secure sharing of personal health records in cloud system2017-09-15Paper
Exploring effect of location number on map-based graphical password authentication2017-08-25Paper
<inline-formula><tex-math>$k$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="huang-ieq1-2366741.gif"/></alternatives></inline-formula>-Times Attribute-Based Anonymous Access Control for Cloud Computing2017-05-16Paper
Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator2016-12-19Paper
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups2016-10-21Paper
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security2016-09-02Paper
Leakage-Resilient Functional Encryption via Pair Encodings2016-08-31Paper
Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy2016-08-31Paper
Relations between robustness and RKA security under public-key encryption2016-04-13Paper
Complete Robustness in Identity-Based Encryption2015-09-29Paper
PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption2015-07-27Paper
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents2015-06-25Paper
Optimistic fair exchange in the enhanced chosen-key model2014-12-02Paper
Attribute-based optimistic fair exchange: how to restrict brokers with policies2014-03-13Paper
Efficient Semi-static Secure Broadcast Encryption Scheme2014-02-18Paper
Anonymous Signcryption against Linear Related-Key Attacks2013-10-23Paper
Fairness in Concurrent Signatures Revisited2013-06-28Paper
Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt”2013-06-28Paper
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction2013-02-19Paper
Efficient Escrow-Free Identity-Based Signature2012-11-06Paper
Electronic Cash with Anonymous User Suspension2011-07-07Paper
Oblivious Transfer with Access Control : Realizing Disjunction without Duplication2010-11-26Paper
A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)2010-10-12Paper
Escrowed Deniable Identification Schemes2010-04-23Paper
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?2009-12-11Paper
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems2009-04-29Paper
Practical Compact E-Cash2009-03-06Paper
Constant-Size Dynamic k-TAA2008-11-27Paper
Traceable and Retrievable Identity-Based Encryption2008-06-13Paper
Compact E-Cash from Bounded Accumulator2008-04-17Paper
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature2008-04-11Paper
(Convertible) Undeniable Signatures Without Random Oracles2008-03-25Paper
Short E-Cash2008-03-17Paper
Event-Oriented k-Times Revocable-iff-Linked Group Signatures2007-09-07Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper

Research outcomes over time

This page was built for person: Man Ho Au