Publication | Date of Publication | Type |
---|
Post-quantum verifiable random function from symmetric primitives in PoS blockchain | 2023-07-21 | Paper |
Compact Ring Signature in the Standard Model for Blockchain | 2023-06-30 | Paper |
Post-quantum ID-based ring signatures from symmetric-key primitives | 2022-11-09 | Paper |
Revocable and Linkable Ring Signature | 2022-10-14 | Paper |
Public-Key Puncturable Encryption: Modular and Compact Constructions | 2022-10-13 | Paper |
Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security | 2022-08-25 | Paper |
DGM: a \underline{D}ynamic and revocable \underline{G}roup \underline{M}erkle signature | 2022-08-25 | Paper |
Dynamic searchable symmetric encryption with forward and stronger backward privacy | 2022-08-25 | Paper |
Generic multi-keyword ranked search on encrypted cloud data | 2022-08-25 | Paper |
An efficient non-interactive multi-client searchable encryption with support for Boolean queries | 2022-08-19 | Paper |
DualRing: generic construction of ring signatures with efficient instantiations | 2022-03-31 | Paper |
Efficient lattice-based polynomial evaluation and batch ZK arguments | 2022-03-25 | Paper |
Towards efficient and strong backward private searchable encryption with secure enclaves | 2022-03-21 | Paper |
Lattice-based zero-knowledge arguments for additive and multiplicative relations | 2021-05-10 | Paper |
Building a dynamic searchable encrypted medical database for multi-client | 2021-04-19 | Paper |
Accelerating forward and backward private searchable encryption using trusted execution | 2021-02-23 | Paper |
RingCT 3.0 for blockchain confidential transaction: shorter size and stronger security | 2021-02-08 | Paper |
Access control encryption with efficient verifiable sanitized decryption | 2020-09-22 | Paper |
Senarai: A Sustainable Public Blockchain-Based Permanent Storage Protocol | 2020-07-20 | Paper |
Lattice RingCT v2.0 with multiple input and multiple output wallets | 2020-05-27 | Paper |
Fast-to-finalize Nakamoto-like consensus | 2020-05-27 | Paper |
Risk of asynchronous protocol update: attacks to Monero protocols | 2020-05-27 | Paper |
Lattice-based zero-knowledge proofs: new techniques for shorter and faster constructions and applications | 2020-05-20 | Paper |
Short lattice-based one-out-of-many proofs and applications to ring signatures | 2020-01-30 | Paper |
Strong leakage and tamper-resilient PKE from refined hash proof system | 2020-01-30 | Paper |
Evaluating cryptonote-style blockchains | 2019-10-31 | Paper |
An encrypted database with enforced access control and blockchain validation | 2019-10-31 | Paper |
A multi-client DSSE scheme supporting range queries | 2019-10-31 | Paper |
Analyzing use of high privileges on Android: an empirical case study of screenshot and screen recording applications | 2019-10-31 | Paper |
A generic construction of tightly secure signatures in the multi-user setting | 2019-05-29 | Paper |
A new public remote integrity checking scheme with user and data privacy | 2018-11-26 | Paper |
A new blockchain-based value-added tax system | 2018-11-07 | Paper |
Expressive attribute-based keyword search with constant-size ciphertext | 2018-10-23 | Paper |
Revocable identity-based encryption from the computational Diffie-Hellman problem | 2018-09-26 | Paper |
Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice ringct v1.0) | 2018-09-26 | Paper |
Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation List | 2018-08-10 | Paper |
A general framework for secure sharing of personal health records in cloud system | 2017-09-15 | Paper |
Attribute-based encryption with expressive and authorized keyword search | 2017-08-25 | Paper |
Towards revocable fine-grained encryption of cloud data: reducing trust upon cloud | 2017-08-25 | Paper |
Multi-user cloud-based secure keyword search | 2017-08-25 | Paper |
<inline-formula><tex-math>$k$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="huang-ieq1-2366741.gif"/></alternatives></inline-formula>-Times Attribute-Based Anonymous Access Control for Cloud Computing | 2017-05-16 | Paper |
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security | 2017-05-16 | Paper |
Two-Factor Data Security Protection Mechanism for Cloud Storage System | 2017-05-16 | Paper |
Towards Certificate-Based Group Encryption | 2017-01-06 | Paper |
Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator | 2016-12-19 | Paper |
On the security of two identity-based conditional proxy re-encryption schemes | 2016-11-04 | Paper |
On Lightweight Security Enforcement in Cyber-Physical Systems | 2016-02-22 | Paper |
Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach | 2016-01-27 | Paper |
A New Public Remote Integrity Checking Scheme with User Privacy | 2015-10-20 | Paper |
Towards Anonymous Ciphertext Indistinguishability with Identity Leakage | 2013-10-23 | Paper |
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction | 2013-02-19 | Paper |
Efficient Escrow-Free Identity-Based Signature | 2012-11-06 | Paper |
Online/Offline Identity-Based Signcryption Revisited | 2011-07-29 | Paper |
Identity-Based Server-Aided Decryption | 2011-07-07 | Paper |
A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) | 2010-10-12 | Paper |
Sanitizable Signatures Revisited | 2009-01-09 | Paper |
Efficient Certificate-Based Encryption in the Standard Model | 2008-11-20 | Paper |
Certificate-Based Signature Schemes without Pairings or Random Oracles | 2008-11-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q3518418 | 2008-08-07 | Paper |
Traceable and Retrievable Identity-Based Encryption | 2008-06-13 | Paper |
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature | 2008-04-11 | Paper |
(Convertible) Undeniable Signatures Without Random Oracles | 2008-03-25 | Paper |
On the Security Models of (Threshold) Ring Signature Schemes | 2008-03-17 | Paper |
Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |
ENHANCED SECURITY MODELS AND A GENERIC CONSTRUCTION APPROACH FOR LINKABLE RING SIGNATURE | 2007-02-08 | Paper |
Information Security and Cryptology | 2006-11-14 | Paper |
Information Security and Cryptology - ICISC 2003 | 2005-12-27 | Paper |
Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
Information Security Practice and Experience | 2005-09-13 | Paper |
Information Security and Privacy | 2005-09-07 | Paper |