Publication | Date of Publication | Type |
---|
Ideal dynamic threshold multi-secret data sharing in smart environments for sustainable cities | 2023-09-08 | Paper |
Public-key watermarking schemes for pseudorandom functions | 2023-06-28 | Paper |
Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting | 2023-03-21 | Paper |
Collusion resistant watermarkable PRFs from standard assumptions | 2022-11-09 | Paper |
DualRing: generic construction of ring signatures with efficient instantiations | 2022-03-31 | Paper |
Anonymous post-quantum cryptocash | 2021-03-17 | Paper |
RingCT 3.0 for blockchain confidential transaction: shorter size and stronger security | 2021-02-08 | Paper |
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation | 2020-11-06 | Paper |
Efficient attribute-based encryption with attribute revocation for assured data deletion | 2020-10-07 | Paper |
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters | 2020-09-22 | Paper |
Practical Range Proof for Cryptocurrency Monero with Provable Security | 2020-07-20 | Paper |
Efficient lattice-based zero-knowledge arguments with standard soundness: construction and applications | 2020-05-20 | Paper |
Strongly secure authenticated key exchange from supersingular isogenies | 2020-05-20 | Paper |
Collusion resistant watermarking schemes for cryptographic functionalities | 2020-05-20 | Paper |
Ring signatures based on Middle-Product Learning with Errors problems | 2020-05-06 | Paper |
Raptor: a practical lattice-based (linkable) ring signature | 2020-01-30 | Paper |
Strong leakage and tamper-resilient PKE from refined hash proof system | 2020-01-30 | Paper |
A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices | 2020-01-28 | Paper |
An efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks using online/offline certificateless aggregate signature | 2020-01-10 | Paper |
Simulation-based selective opening security for receivers under chosen-ciphertext attacks | 2019-05-24 | Paper |
Fuzzy public-key encryption based on biometric data | 2018-11-07 | Paper |
Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps | 2018-10-22 | Paper |
Unforgeable watermarking schemes with public extraction | 2018-10-17 | Paper |
Lattice-based universal accumulator with nonmembership arguments | 2018-09-26 | Paper |
Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice ringct v1.0) | 2018-09-26 | Paper |
Practical signatures from the Partial Fourier Recovery problem revisited: a provably-secure and Gaussian-distributed construction | 2018-09-26 | Paper |
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation | 2018-09-26 | Paper |
Hedged nonce-based public-key encryption: adaptive security under randomness failures | 2018-05-16 | Paper |
Functional encryption for computational hiding in prime order groups via pair encodings | 2018-01-26 | Paper |
A general framework for secure sharing of personal health records in cloud system | 2017-09-15 | Paper |
Exploring effect of location number on map-based graphical password authentication | 2017-08-25 | Paper |
<inline-formula><tex-math>$k$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="huang-ieq1-2366741.gif"/></alternatives></inline-formula>-Times Attribute-Based Anonymous Access Control for Cloud Computing | 2017-05-16 | Paper |
Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator | 2016-12-19 | Paper |
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups | 2016-10-21 | Paper |
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security | 2016-09-02 | Paper |
Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy | 2016-08-31 | Paper |
Leakage-Resilient Functional Encryption via Pair Encodings | 2016-08-31 | Paper |
Relations between robustness and RKA security under public-key encryption | 2016-04-13 | Paper |
Complete Robustness in Identity-Based Encryption | 2015-09-29 | Paper |
PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption | 2015-07-27 | Paper |
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents | 2015-06-25 | Paper |
Optimistic fair exchange in the enhanced chosen-key model | 2014-12-02 | Paper |
Attribute-based optimistic fair exchange: how to restrict brokers with policies | 2014-03-13 | Paper |
Efficient Semi-static Secure Broadcast Encryption Scheme | 2014-02-18 | Paper |
Anonymous Signcryption against Linear Related-Key Attacks | 2013-10-23 | Paper |
Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt” | 2013-06-28 | Paper |
Fairness in Concurrent Signatures Revisited | 2013-06-28 | Paper |
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction | 2013-02-19 | Paper |
Efficient Escrow-Free Identity-Based Signature | 2012-11-06 | Paper |
Electronic Cash with Anonymous User Suspension | 2011-07-07 | Paper |
Oblivious Transfer with Access Control : Realizing Disjunction without Duplication | 2010-11-26 | Paper |
A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) | 2010-10-12 | Paper |
Escrowed Deniable Identification Schemes | 2010-04-23 | Paper |
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? | 2009-12-11 | Paper |
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems | 2009-04-29 | Paper |
Practical Compact E-Cash | 2009-03-06 | Paper |
Constant-Size Dynamic k-TAA | 2008-11-27 | Paper |
Traceable and Retrievable Identity-Based Encryption | 2008-06-13 | Paper |
Compact E-Cash from Bounded Accumulator | 2008-04-17 | Paper |
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature | 2008-04-11 | Paper |
(Convertible) Undeniable Signatures Without Random Oracles | 2008-03-25 | Paper |
Short E-Cash | 2008-03-17 | Paper |
Event-Oriented k-Times Revocable-iff-Linked Group Signatures | 2007-09-07 | Paper |
Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |