Fuchun Guo

From MaRDI portal
Person:300389



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Robust decentralized multi-client functional encryption: motivation, definition, and inner-product constructions2024-09-13Paper
Compact accountable ring signatures in the plain model2024-07-17Paper
Compact ring signatures with post-quantum security in standard model2024-07-17Paper
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts
Information Sciences
2024-04-11Paper
A tightly secure ID-based signature scheme under DL assumption in AGM2024-01-11Paper
Efficient unique ring signatures from lattices
Computer Security – ESORICS 2022
2023-07-28Paper
Multimodal private signatures
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Optimal tightness for chain-based unique signatures2022-08-30Paper
Lattice-based IBE with equality test supporting flexible authorization in the standard model
(available as arXiv preprint)
2022-07-06Paper
Generic construction for tightly-secure signatures from discrete log
Theoretical Computer Science
2021-09-27Paper
Certificateless aggregate signature scheme secure against fully chosen-key attacks
Information Sciences
2021-03-31Paper
Accountable identity-based encryption with distributed private key generators
Information Sciences
2021-03-16Paper
Generalized public-key cryptography with tight security
Information Sciences
2021-02-05Paper
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters
Information Sciences
2020-09-22Paper
Privacy-enhanced attribute-based private information retrieval
Information Sciences
2020-09-08Paper
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes
Information Sciences
2020-07-20Paper
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts
Theoretical Computer Science
2020-01-29Paper
Strongly leakage resilient authenticated key exchange, revisited
Designs, Codes and Cryptography
2019-11-07Paper
Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems
Theoretical Computer Science
2019-03-26Paper
Introduction to security reduction2018-07-18Paper
Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost
Theoretical Computer Science
2018-02-06Paper
Functional encryption for computational hiding in prime order groups via pair encodings
Designs, Codes and Cryptography
2018-01-26Paper
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample2017-11-15Paper
Strong authenticated key exchange with auxiliary inputs
Designs, Codes and Cryptography
2017-09-15Paper
A note on the strong authenticated key exchange with auxiliary inputs
Designs, Codes and Cryptography
2017-09-15Paper
Cryptographic reverse firewall via malleable smooth projective hash functions
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Iterated random oracle: a universal approach for finding loss in security reduction
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Ciphertext-policy attribute based encryption supporting access policy update
Provable Security
2017-01-06Paper
Oblivious keyword search with authorization
Provable Security
2017-01-06Paper
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups
Lecture Notes in Computer Science
2016-10-21Paper
Public Key Encryption with Authorized Keyword Search
Information Security and Privacy
2016-09-02Paper
Anonymous identity-based broadcast encryption with revocation for file sharing
Information Security and Privacy
2016-09-02Paper
One-round strong oblivious signature-based envelope
Information Security and Privacy
2016-09-02Paper
Ciphertext-policy attribute-based encryption with key-delegation abuse resistance
Information Security and Privacy
2016-08-31Paper
Generalized closest substring encryption
Designs, Codes and Cryptography
2016-06-27Paper
Strongly leakage-resilient authenticated key exchange
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
Efficient dynamic threshold identity-based encryption with constant-size ciphertext
Theoretical Computer Science
2015-12-08Paper
A new general framework for secure public key encryption with keyword search
Information Security and Privacy
2015-10-20Paper
Improved identity-based online/offline encryption
Information Security and Privacy
2015-10-20Paper
Efficient and secure stored-value cards with leakage resilience
Computers and Electrical Engineering
2013-08-19Paper
Efficient and secure stored-value cards with leakage resilience
Computers and Electrical Engineering
2013-08-19Paper
Membership encryption and its applications
Information Security and Privacy
2013-06-28Paper
A pre-computable signature scheme with efficient verification for RFID
Information Security Practice and Experience
2012-06-29Paper
Online/offline verification of short signatures
Information Security and Cryptology
2011-07-29Paper
Efficient online/offline signatures with computational leakage resilience in online phase
Information Security and Cryptology
2011-07-29Paper
How to prove security of a signature with a tighter security reduction
Provable Security
2009-12-11Paper
Multi-identity management for identity-based cryptography
Journal of Discrete Mathematical Sciences and Cryptography
2009-04-28Paper
Identity-Based Online/Offline Encryption
Financial Cryptography and Data Security
2009-02-12Paper
Multi-Identity Single-Key Decryption without Random Oracles
Information Security and Cryptology
2009-02-10Paper
Optimal Online/Offline Signature: How to Sign a Message without Online Computation
Provable Security
2009-01-27Paper
Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles
Cryptology and Network Security
2008-04-15Paper
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key
Pairing-Based Cryptography – Pairing 2007
2007-11-29Paper


Research outcomes over time


This page was built for person: Fuchun Guo