Man Ho Au

From MaRDI portal
(Redirected from Person:266277)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Adaptively secure identity-based encryption from middle-product learning with errors2024-01-11Paper
Ideal dynamic threshold multi-secret data sharing in smart environments for sustainable cities
Information Sciences
2023-09-08Paper
Public-key watermarking schemes for pseudorandom functions
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting2023-03-21Paper
Collusion resistant watermarkable PRFs from standard assumptions2022-11-09Paper
DualRing: generic construction of ring signatures with efficient instantiations2022-03-31Paper
Anonymous post-quantum cryptocash2021-03-17Paper
RingCT 3.0 for blockchain confidential transaction: shorter size and stronger security2021-02-08Paper
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
Theoretical Computer Science
2020-11-06Paper
Efficient attribute-based encryption with attribute revocation for assured data deletion
Information Sciences
2020-10-07Paper
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters
Information Sciences
2020-09-22Paper
Practical Range Proof for Cryptocurrency Monero with Provable Security
Information and Communications Security
2020-07-20Paper
Efficient lattice-based zero-knowledge arguments with standard soundness: construction and applications2020-05-20Paper
Strongly secure authenticated key exchange from supersingular isogenies2020-05-20Paper
Collusion resistant watermarking schemes for cryptographic functionalities2020-05-20Paper
Ring signatures based on Middle-Product Learning with Errors problems2020-05-06Paper
Raptor: a practical lattice-based (linkable) ring signature2020-01-30Paper
Strong leakage and tamper-resilient PKE from refined hash proof system2020-01-30Paper
A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices
IEEE Transactions on Computers
2020-01-28Paper
An efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks using online/offline certificateless aggregate signature2020-01-10Paper
Simulation-based selective opening security for receivers under chosen-ciphertext attacks
Designs, Codes and Cryptography
2019-05-24Paper
Fuzzy public-key encryption based on biometric data2018-11-07Paper
Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps
Soft Computing
2018-10-22Paper
Unforgeable watermarking schemes with public extraction2018-10-17Paper
Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice ringct v1.0)2018-09-26Paper
Lattice-based universal accumulator with nonmembership arguments2018-09-26Paper
Practical signatures from the Partial Fourier Recovery problem revisited: a provably-secure and Gaussian-distributed construction2018-09-26Paper
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
Information Security and Privacy
2018-09-26Paper
Hedged nonce-based public-key encryption: adaptive security under randomness failures2018-05-16Paper
Functional encryption for computational hiding in prime order groups via pair encodings
Designs, Codes and Cryptography
2018-01-26Paper
A general framework for secure sharing of personal health records in cloud system
Journal of Computer and System Sciences
2017-09-15Paper
Exploring effect of location number on map-based graphical password authentication2017-08-25Paper
<inline-formula><tex-math>$k$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="huang-ieq1-2366741.gif"/></alternatives></inline-formula>-Times Attribute-Based Anonymous Access Control for Cloud Computing
IEEE Transactions on Computers
2017-05-16Paper
Fully secure ciphertext-policy attribute based encryption with security mediator
Information and Communications Security
2016-12-19Paper
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups
Lecture Notes in Computer Science
2016-10-21Paper
Generic anonymous identity-based broadcast encryption with chosen-ciphertext security
Information Security and Privacy
2016-09-02Paper
Leakage-resilient functional encryption via pair encodings
Information Security and Privacy
2016-08-31Paper
Public cloud data auditing with practical key update and zero knowledge privacy
Information Security and Privacy
2016-08-31Paper
Relations between robustness and RKA security under public-key encryption
Theoretical Computer Science
2016-04-13Paper
Complete robustness in identity-based encryption
Provable Security
2015-09-29Paper
PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption
Computer Security - ESORICS 2014
2015-07-27Paper
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents
Information Processing Letters
2015-06-25Paper
Optimistic fair exchange in the enhanced chosen-key model
Theoretical Computer Science
2014-12-02Paper
Attribute-based optimistic fair exchange: how to restrict brokers with policies
Theoretical Computer Science
2014-03-13Paper
Efficient semi-static secure broadcast encryption scheme
Pairing-Based Cryptography – Pairing 2013
2014-02-18Paper
Anonymous signcryption against linear related-key attacks
Provable Security
2013-10-23Paper
Fairness in concurrent signatures revisited
Information Security and Privacy
2013-06-28Paper
Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt”
Information Security and Privacy
2013-06-28Paper
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction
Theoretical Computer Science
2013-02-19Paper
Efficient escrow-free identity-based signature
Provable Security
2012-11-06Paper
Electronic cash with anonymous user suspension
Information Security and Privacy
2011-07-07Paper
Oblivious transfer with access control: realizing disjunction without duplication
Lecture Notes in Computer Science
2010-11-26Paper
A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)
Provable Security
2010-10-12Paper
Escrowed deniable identification schemes
Security Technology
2010-04-23Paper
Is the notion of divisible on-line/off-line signatures stronger than on-line/off-line signatures?
Provable Security
2009-12-11Paper
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
Practical Compact E-Cash
Information Security and Privacy
2009-03-06Paper
Constant-Size Dynamic k-TAA
Lecture Notes in Computer Science
2008-11-27Paper
Traceable and Retrievable Identity-Based Encryption
Applied Cryptography and Network Security
2008-06-13Paper
Compact E-Cash from Bounded Accumulator
Lecture Notes in Computer Science
2008-04-17Paper
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
(Convertible) Undeniable Signatures Without Random Oracles
Information and Communications Security
2008-03-25Paper
Short E-Cash
Progress in Cryptology - INDOCRYPT 2005
2008-03-17Paper
Event-Oriented k-Times Revocable-iff-Linked Group Signatures
Information Security and Privacy
2007-09-07Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper


Research outcomes over time


This page was built for person: Man Ho Au