Fuchun Guo

From MaRDI portal
Person:300389

Available identifiers

zbMath Open guo.fuchunMaRDI QIDQ300389

List of research outcomes

PublicationDate of PublicationType
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts2024-04-11Paper
Efficient unique ring signatures from lattices2023-07-28Paper
Multimodal private signatures2023-06-28Paper
Optimal tightness for chain-based unique signatures2022-08-30Paper
Lattice-based IBE with equality test supporting flexible authorization in the standard model2022-07-06Paper
Generic construction for tightly-secure signatures from discrete log2021-09-27Paper
Certificateless aggregate signature scheme secure against fully chosen-key attacks2021-03-31Paper
Accountable identity-based encryption with distributed private key generators2021-03-16Paper
Generalized public-key cryptography with tight security2021-02-05Paper
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters2020-09-22Paper
Privacy-enhanced attribute-based private information retrieval2020-09-08Paper
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes2020-07-20Paper
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts2020-01-29Paper
Strongly leakage resilient authenticated key exchange, revisited2019-11-07Paper
Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems2019-03-26Paper
Introduction to Security Reduction2018-07-18Paper
Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost2018-02-06Paper
Functional encryption for computational hiding in prime order groups via pair encodings2018-01-26Paper
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample2017-11-15Paper
Strong authenticated key exchange with auxiliary inputs2017-09-15Paper
A note on the strong authenticated key exchange with auxiliary inputs2017-09-15Paper
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions2017-02-01Paper
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction2017-01-06Paper
Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update2017-01-06Paper
Oblivious Keyword Search with Authorization2017-01-06Paper
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups2016-10-21Paper
One-Round Strong Oblivious Signature-Based Envelope2016-09-02Paper
Public Key Encryption with Authorized Keyword Search2016-09-02Paper
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing2016-09-02Paper
Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance2016-08-31Paper
Generalized closest substring encryption2016-06-27Paper
Strongly Leakage-Resilient Authenticated Key Exchange2016-04-08Paper
Efficient dynamic threshold identity-based encryption with constant-size ciphertext2015-12-08Paper
A New General Framework for Secure Public Key Encryption with Keyword Search2015-10-20Paper
Improved Identity-Based Online/Offline Encryption2015-10-20Paper
Efficient and secure stored-value cards with leakage resilience2013-08-19Paper
Membership Encryption and Its Applications2013-06-28Paper
A Pre-computable Signature Scheme with Efficient Verification for RFID2012-06-29Paper
Online/Offline Verification of Short Signatures2011-07-29Paper
Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase2011-07-29Paper
How to Prove Security of a Signature with a Tighter Security Reduction2009-12-11Paper
Multi-identity management for identity-based cryptography2009-04-28Paper
Identity-Based Online/Offline Encryption2009-02-12Paper
Multi-Identity Single-Key Decryption without Random Oracles2009-02-10Paper
Optimal Online/Offline Signature: How to Sign a Message without Online Computation2009-01-27Paper
Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles2008-04-15Paper
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key2007-11-29Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Fuchun Guo