Willy Susilo

From MaRDI portal
Person:300390

Available identifiers

zbMath Open susilo.willyDBLP12/3447WikidataQ8022615 ScholiaQ8022615MaRDI QIDQ300390

List of research outcomes





PublicationDate of PublicationType
Improved computation of polynomial roots over number fields when using complex embeddings2025-01-27Paper
Robust decentralized multi-client functional encryption: motivation, definition, and inner-product constructions2024-09-13Paper
Compact accountable ring signatures in the plain model2024-07-17Paper
Compact ring signatures with post-quantum security in standard model2024-07-17Paper
Group encryption: full dynamicity, message filtering and code-based instantiation2024-06-28Paper
Bicameral and auditably private signatures2024-06-26Paper
Towards secure asynchronous messaging with forward secrecy and mutual authentication2024-05-02Paper
Provably secure group authentication in the asynchronous communication model2024-04-19Paper
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts2024-04-11Paper
A fully secure lattice-based signcryption with designated equality test in standard model2024-02-13Paper
A tightly secure ID-based signature scheme under DL assumption in AGM2024-01-11Paper
DFE-IP: delegatable functional encryption for inner product2023-09-08Paper
Puncturable signature: a generic construction and instantiations2023-07-28Paper
Efficient unique ring signatures from lattices2023-07-28Paper
Spatial encryption revisited: from delegatable multiple inner product encryption and more2023-07-21Paper
Zero-knowledge range arguments for signed fractional numbers from lattices2023-07-21Paper
Multimodal private signatures2023-06-28Paper
Public-key watermarking schemes for pseudorandom functions2023-06-28Paper
A generalized attack on the multi-prime power RSA2023-06-02Paper
Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy2023-05-26Paper
A new attack on some RSA variants2023-05-19Paper
Efficient Unique Ring Signature for Blockchain Privacy Protection2023-04-13Paper
Concise Mercurial Subvector Commitments: Definitions and Constructions2023-04-13Paper
Forward-Secure Group Encryptions from Lattices2023-04-13Paper
Puncturable Identity-Based Encryption from Lattices2023-04-13Paper
Broadcast Authenticated Encryption with Keyword Search2023-04-13Paper
Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting2023-03-21Paper
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption2022-12-22Paper
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy2022-12-09Paper
A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard Model2022-10-14Paper
A novel identity-based multi-signature scheme over NTRU lattices2022-09-27Paper
Using Freivalds' algorithm to accelerate lattice-based signature verifications2022-08-30Paper
Optimal tightness for chain-based unique signatures2022-08-30Paper
Practical post-quantum signature schemes from isomorphism problems of trilinear forms2022-08-30Paper
Lattice-based public-key encryption with equality test supporting flexible authorization in standard model2022-08-25Paper
Puncturable identity-based and attribute-based encryption from lattices2022-08-25Paper
Attribute based broadcast encryption with short ciphertext and decryption key2022-08-19Paper
Cryptanalysis of RSA variants with primes sharing most significant bits2022-07-13Paper
Lattice-based IBE with equality test supporting flexible authorization in the standard model2022-07-06Paper
Lattice-based HRA-secure attribute-based proxy re-encryption in standard model2022-06-24Paper
Privacy-preserving file sharing on cloud storage with certificateless signcryption2022-05-31Paper
Password protected secret sharing from lattices2022-03-21Paper
Chosen-ciphertext lattice-based public key encryption with equality test in standard model2022-02-01Paper
Wildcarded identity-based encryption from lattices2022-01-18Paper
Group encryption: full dynamicity, message filtering and code-based instantiation2021-12-21Paper
Generic construction for tightly-secure signatures from discrete log2021-09-27Paper
A Wiener-type attack on an RSA-like cryptosystem constructed from cubic Pell equations2021-09-06Paper
Lattice blind signatures with forward security2021-06-08Paper
A new improved AES S-box with enhanced properties2021-06-08Paper
Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model2021-06-08Paper
Short principal ideal problem in multicubic fields2021-05-03Paper
Certificateless aggregate signature scheme secure against fully chosen-key attacks2021-03-31Paper
Leakage-resilient group signature: definitions and constructions2021-03-18Paper
Efficient chameleon hash functions in the enhanced collision resistant model2021-03-18Paper
Accountable identity-based encryption with distributed private key generators2021-03-16Paper
Trapdoor delegation and HIBE from middle-product LWE in standard model2021-02-23Paper
Efficient anonymous multi-group broadcast encryption2021-02-23Paper
Generalized public-key cryptography with tight security2021-02-05Paper
Robust digital signature revisited2020-10-21Paper
Universal designated verifier signature scheme with non-delegatability in the standard model2020-10-07Paper
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters2020-09-22Paper
Witness-based searchable encryption2020-09-08Paper
Privacy-enhanced attribute-based private information retrieval2020-09-08Paper
Privacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attack2020-09-08Paper
A generic scheme of plaintext-checkable database encryption2020-07-20Paper
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes2020-07-20Paper
Ciphertext-delegatable CP-ABE for a dynamic credential: a modular approach2020-05-27Paper
The Wiener attack on RSA revisited: a quest for the exact bound2020-05-27Paper
A lattice-based public key encryption with equality test in standard model2020-05-27Paper
Location based encryption2020-05-27Paper
Improving the security of the DRS scheme with uniformly chosen random noise2020-05-27Paper
Dimensionality reduction and visualization of network intrusion detection data2020-05-27Paper
Revocable identity-based encryption with server-aided ciphertext evolution2020-04-06Paper
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts2020-01-29Paper
Lattice-based IBE with equality test in standard model2020-01-10Paper
Towards enhanced security for certificateless public-key authenticated encryption with keyword search2020-01-10Paper
Improved cryptanalysis of the KMOV elliptic curve cryptosystem2020-01-10Paper
Enhancing Goldreich, Goldwasser and Halevi's scheme with intersecting lattices2019-11-28Paper
Strongly leakage resilient authenticated key exchange, revisited2019-11-07Paper
Cloud-based data-sharing scheme using verifiable and CCA-secure re-encryption from indistinguishability obfuscation2019-10-31Paper
Cooperative secret sharing using QR codes and symmetric keys2019-10-30Paper
Leakage-resilient ring signature schemes2019-01-18Paper
An efficient key-policy attribute-based searchable encryption in prime-order groups2018-11-07Paper
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system2018-10-10Paper
Policy controlled system with anonymity2018-09-24Paper
Introduction to Security Reduction2018-07-18Paper
How to protect privacy in optimistic fair exchange of digital signatures2018-05-18Paper
Identity-based quotable ring signature2018-05-17Paper
Functional encryption for computational hiding in prime order groups via pair encodings2018-01-26Paper
A generalized attack on RSA type cryptosystems2017-11-16Paper
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample2017-11-15Paper
Dirichlet product for Boolean functions2017-11-10Paper
Strong authenticated key exchange with auxiliary inputs2017-09-15Paper
A note on the strong authenticated key exchange with auxiliary inputs2017-09-15Paper
A general framework for secure sharing of personal health records in cloud system2017-09-15Paper
A QR code watermarking approach based on the DWT-DCT technique2017-08-25Paper
Dynamic searchable symmetric encryption with physical deletion and small leakage2017-08-25Paper
Mergeable and revocable identity-based encryption2017-08-25Paper
Identity-Based Secure DistributedData Storage Schemes2017-06-20Paper
<inline-formula><tex-math>$k$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="huang-ieq1-2366741.gif"/></alternatives></inline-formula>-Times Attribute-Based Anonymous Access Control for Cloud Computing2017-05-16Paper
Two-Factor Data Security Protection Mechanism for Cloud Storage System2017-05-16Paper
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions2017-02-01Paper
Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update2017-01-06Paper
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction2017-01-06Paper
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups2016-10-21Paper
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing2016-09-02Paper
One-Round Strong Oblivious Signature-Based Envelope2016-09-02Paper
Edit Distance Based Encryption and Its Application2016-09-02Paper
A New Attack on Three Variants of the RSA Cryptosystem2016-09-02Paper
Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy2016-08-31Paper
Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing2016-08-31Paper
Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance2016-08-31Paper
Towards Efficient Fully Randomized Message-Locked Encryption2016-08-31Paper
Generalized closest substring encryption2016-06-27Paper
Strongly Leakage-Resilient Authenticated Key Exchange2016-04-08Paper
Provably Secure Identity Based Provable Data Possession2016-01-27Paper
Identity-based chameleon hashing and signatures without key exposure2016-01-14Paper
Solutions to the anti-piracy problem in oblivious transfer2015-12-30Paper
Efficient dynamic threshold identity-based encryption with constant-size ciphertext2015-12-08Paper
Lattice Reduction for Modular Knapsack2015-12-04Paper
Improved Identity-Based Online/Offline Encryption2015-10-20Paper
Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy2015-10-20Paper
LLL for ideal lattices: re-evaluation of the security of Gentry-Halevi's FHE scheme2015-09-29Paper
Public key encryption with keyword search secure against keyword guessing attacks without random oracle2015-09-23Paper
https://portal.mardi4nfdi.de/entity/Q55009152015-08-10Paper
Collusion-resistant convertible ring signature schemes2015-08-05Paper
PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption2015-07-27Paper
Efficient Hidden Vector Encryption with Constant-Size Ciphertext2015-07-24Paper
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents2015-06-25Paper
Privacy-preserving encryption scheme using DNA parentage test2015-05-18Paper
Optimistic fair exchange in the enhanced chosen-key model2014-12-02Paper
Efficient algorithms for secure outsourcing of bilinear pairings2014-12-02Paper
Ambiguous optimistic fair exchange: definition and constructions2014-12-02Paper
On the Internal Structure of Alpha-MAC2014-08-21Paper
A New Signature Scheme Without Random Oracles from Bilinear Pairings2014-08-21Paper
Escrowed Linkability of Ring Signatures and Its Applications2014-08-21Paper
The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles2014-08-01Paper
P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures2014-03-28Paper
Attribute-based optimistic fair exchange: how to restrict brokers with policies2014-03-13Paper
Efficient Semi-static Secure Broadcast Encryption Scheme2014-02-18Paper
Identity based identification from algebraic coding theory2014-01-13Paper
Efficient and secure stored-value cards with leakage resilience2013-08-19Paper
Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt”2013-06-28Paper
Adaptive Precision Floating Point LLL2013-06-28Paper
Fairness in Concurrent Signatures Revisited2013-06-28Paper
Membership Encryption and Its Applications2013-06-28Paper
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction2013-02-19Paper
Provably secure proxy signature scheme from factorization2013-01-24Paper
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search2012-11-27Paper
Efficient Escrow-Free Identity-Based Signature2012-11-06Paper
On Capabilities of Hash Domain Extenders to Preserve Enhanced Security Properties2012-11-06Paper
Breaking a 3D-Based CAPTCHA Scheme2012-11-01Paper
Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes2012-11-01Paper
Efficient oblivious transfers with access control2012-09-30Paper
The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles2012-07-20Paper
Group-oriented fair exchange of signatures2012-07-13Paper
A Pre-computable Signature Scheme with Efficient Verification for RFID2012-06-29Paper
Enhanced STE3D-CAP: A Novel 3D CAPTCHA Family2012-06-29Paper
Fault Analysis of the KATAN Family of Block Ciphers2012-06-29Paper
On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers2012-06-29Paper
Identity-based trapdoor mercurial commitments and applications2011-10-10Paper
Concurrent Signatures with Fully Negotiable Binding Control2011-09-16Paper
Provably secure server-aided verification signatures2011-08-28Paper
Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase2011-07-29Paper
Electronic Cash with Anonymous User Suspension2011-07-07Paper
Certificateless threshold signature scheme from bilinear maps2011-01-28Paper
Improvement of Lattice-Based Cryptography Using CRT2010-12-21Paper
Towards a Cryptographic Treatment of Publish/Subscribe Systems2010-12-07Paper
A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange2010-11-26Paper
A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)2010-10-12Paper
Differential Fault Analysis of LEX2010-09-10Paper
Recursive Lattice Reduction2010-09-10Paper
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships2010-07-13Paper
Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting2010-05-28Paper
Escrowed Deniable Identification Schemes2010-04-23Paper
How to Prove Security of a Signature with a Tighter Security Reduction2009-12-11Paper
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?2009-12-11Paper
Anonymous Conditional Proxy Re-encryption without Random Oracle2009-12-11Paper
Universal Designated Verifier Signatures with Threshold-Signers2009-10-28Paper
https://portal.mardi4nfdi.de/entity/Q36390712009-10-28Paper
A five-round algebraic property of AES and its application to the ALPHA-MAC2009-10-12Paper
Enhanced Target Collision Resistant Hash Functions Revisited2009-08-11Paper
Efficient Non-interactive Range Proof2009-07-23Paper
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders2009-06-25Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Asymmetric Group Key Agreement2009-05-12Paper
Privacy for Private Key in Signatures2009-04-29Paper
Publicly Verifiable Privacy-Preserving Group Decryption2009-04-29Paper
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems2009-04-29Paper
Short fail-stop signature scheme based on factorization and discrete logarithm assumptions2009-03-17Paper
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme2009-03-10Paper
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure2009-03-10Paper
Fuzzy Identity-based Encryption: New and Efficient Schemes2009-03-09Paper
Concurrent Signatures without a Conventional Keystone2009-03-09Paper
Practical Compact E-Cash2009-03-06Paper
Certificateless Signature Revisited2009-03-06Paper
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures2009-02-24Paper
Efficient lattice-based signature scheme2009-02-24Paper
Ambiguous Optimistic Fair Exchange2009-02-10Paper
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility2009-02-10Paper
Efficient Partially Blind Signatures with Provable Security2009-02-10Paper
Server-Aided Verification Signatures: Definitions and New Constructions2009-01-27Paper
Sanitizable Signatures Revisited2009-01-09Paper
Constant-Size Dynamic k-TAA2008-11-27Paper
A Five-Round Algebraic Property of the Advanced Encryption Standard2008-11-20Paper
Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework)2008-11-20Paper
Certificate-Based Signature Schemes without Pairings or Random Oracles2008-11-20Paper
Efficient generic on-line/off-line (threshold) signatures without key exposure2008-11-20Paper
RFID Privacy Models Revisited2008-10-27Paper
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings2008-09-09Paper
Multi-party Concurrent Signatures2008-06-17Paper
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search2008-06-17Paper
Traceable and Retrievable Identity-Based Encryption2008-06-13Paper
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles2008-04-24Paper
Compact E-Cash from Bounded Accumulator2008-04-17Paper
A Generic Construction for Universally-Convertible Undeniable Signatures2008-04-15Paper
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature2008-04-11Paper
Formal Definition and Construction of Nominative Signature2008-03-25Paper
New Construction of Group Secret Handshakes Based on Pairings2008-03-25Paper
(Convertible) Undeniable Signatures Without Random Oracles2008-03-25Paper
Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature)2008-03-18Paper
Short E-Cash2008-03-17Paper
A Digital Signature Scheme Based on CVP  ∞2008-03-05Paper
Progress in Cryptology - INDOCRYPT 20032007-11-29Paper
Progress in Cryptology - INDOCRYPT 20032007-11-29Paper
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length2007-11-29Paper
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security2007-09-07Paper
Event-Oriented k-Times Revocable-iff-Linked Group Signatures2007-09-07Paper
Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures2007-09-04Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Cryptology and Network Security2006-11-14Paper
Cryptology and Network Security2006-11-14Paper
Information and Communications Security2006-10-24Paper
Information Security2006-10-20Paper
Information Security and Privacy2006-06-22Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Financial Cryptography and Data Security2005-12-22Paper
Public Key Cryptography - PKC 20052005-12-07Paper
Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'032005-11-22Paper
Information Security Practice and Experience2005-09-13Paper
Information Security and Privacy2005-09-07Paper
Information and Communications Security2005-08-19Paper
Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making2005-08-17Paper
Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making2005-08-17Paper
Applied Cryptography and Network Security2005-06-13Paper
Applied Cryptography and Network Security2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q44724282004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44133132003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q31497082002-09-26Paper
https://portal.mardi4nfdi.de/entity/Q31497622002-09-26Paper
https://portal.mardi4nfdi.de/entity/Q27086332001-07-17Paper
https://portal.mardi4nfdi.de/entity/Q27076032001-07-08Paper
https://portal.mardi4nfdi.de/entity/Q27211372001-07-01Paper
https://portal.mardi4nfdi.de/entity/Q44950802000-08-10Paper
https://portal.mardi4nfdi.de/entity/Q42506321999-06-17Paper

Research outcomes over time

This page was built for person: Willy Susilo