Duncan S. Wong

From MaRDI portal
Person:391760

Available identifiers

zbMath Open wong.duncan-sMaRDI QIDQ391760

List of research outcomes

PublicationDate of PublicationType
Lightweight delegatable proofs of storage2022-08-19Paper
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing2020-02-06Paper
Identity-based aggregate signcryption in the standard model from multilinear maps2019-01-22Paper
How to protect privacy in optimistic fair exchange of digital signatures2018-05-18Paper
Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe2016-03-10Paper
Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors2015-12-02Paper
Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts2015-11-25Paper
Ambiguous One-Move Nominative Signature Without Random Oracles2015-10-16Paper
Practical (fully) distributed signatures provably secure in the standard model2015-07-24Paper
Efficient algorithms for secure outsourcing of bilinear pairings2014-12-02Paper
Ambiguous optimistic fair exchange: definition and constructions2014-12-02Paper
Concurrent signature without random oracles2014-12-02Paper
Extending concurrent signature to multiple parties2014-08-27Paper
The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles2014-08-01Paper
Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts2014-06-06Paper
Practical Distributed Signatures in the Standard Model2014-03-28Paper
P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures2014-03-28Paper
Identity based identification from algebraic coding theory2014-01-13Paper
Fairness in Concurrent Signatures Revisited2013-06-28Paper
A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles2013-06-04Paper
Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones2013-05-28Paper
Short and efficient convertible undeniable signature schemes without random oracles2013-04-17Paper
One-Move Convertible Nominative Signature in the Standard Model2012-11-06Paper
Generic security-amplifying methods of ordinary digital signatures2012-10-17Paper
Generalized First Pre-image Tractable Random Oracle Model and Signature Schemes2012-09-07Paper
The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles2012-07-20Paper
Group-oriented fair exchange of signatures2012-07-13Paper
Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles2011-11-22Paper
Concurrent Signatures with Fully Negotiable Binding Control2011-09-16Paper
Short Convertible Undeniable Signature in the Standard Model2011-05-19Paper
A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange2010-11-26Paper
Oblivious Transfer with Access Control : Realizing Disjunction without Duplication2010-11-26Paper
A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)2010-10-12Paper
Efficient Group Signature with Forward Secure Revocation2010-04-23Paper
Probabilistic Public Key Encryption with Equality Test2010-03-16Paper
Signcryption from randomness recoverable public key encryption2010-03-11Paper
Certificateless threshold ring signature2009-10-01Paper
Efficient Non-interactive Range Proof2009-07-23Paper
On the security of a visual cryptography scheme for color images2009-04-03Paper
Generic Transformation to Strongly Unforgeable Signatures2009-03-10Paper
A More Natural Way to Construct Identity-Based Identification Schemes2009-03-10Paper
On the Relation among Various Security Models for Certificateless Cryptography2009-03-09Paper
Generic Certificateless Key Encapsulation Mechanism2009-03-06Paper
Certificateless Signature Revisited2009-03-06Paper
On the relation among various security models for certificateless cryptography2009-02-24Paper
An efficient one-move nominative signature scheme2009-02-24Paper
On Secret Reconstruction in Secret Sharing Schemes2009-02-24Paper
Ambiguous Optimistic Fair Exchange2009-02-10Paper
Two-factor mutual authentication based on smart cards and passwords2008-11-19Paper
A new framework for the design and analysis of identity-based identification schemes2008-11-18Paper
Traceable and Retrievable Identity-Based Encryption2008-06-13Paper
Generic Security-Amplifying Methods of Ordinary Digital Signatures2008-06-13Paper
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles2008-04-24Paper
An Efficient Password-Only Two-Server Authenticated Key Exchange System2008-03-25Paper
Formal Definition and Construction of Nominative Signature2008-03-25Paper
On the Security Models of (Threshold) Ring Signature Schemes2008-03-17Paper
Progress in Cryptology - INDOCRYPT 20032007-11-29Paper
Efficient Anonymous Roaming and Its Security Analysis2007-09-24Paper
Certificateless signature: a new security model and an improved generic construction2007-09-20Paper
Key Replacement Attack Against a Generic Construction of Certificateless Signature2007-09-07Paper
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures2007-09-04Paper
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices2007-06-13Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Applied Cryptography and Network Security2007-05-02Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Topics in Cryptology – CT-RSA 20062007-02-12Paper
ENHANCED SECURITY MODELS AND A GENERIC CONSTRUCTION APPROACH FOR LINKABLE RING SIGNATURE2007-02-08Paper
Generalised cumulative arrays in secret sharing2006-11-22Paper
Information Security2006-10-20Paper
RESILIENT LKH: SECURE MULTICAST KEY DISTRIBUTION SCHEMES2006-10-16Paper
Information Security and Privacy2006-06-22Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Information Security Practice and Experience2005-09-13Paper
Information Security and Privacy2005-09-07Paper
https://portal.mardi4nfdi.de/entity/Q44741802004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44084312003-06-29Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Duncan S. Wong