Duncan S. Wong

From MaRDI portal
Person:391760

Available identifiers

zbMath Open wong.duncan-sMaRDI QIDQ391760

List of research outcomes





PublicationDate of PublicationType
Lightweight delegatable proofs of storage2022-08-19Paper
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing2020-02-06Paper
Identity-based aggregate signcryption in the standard model from multilinear maps2019-01-22Paper
How to protect privacy in optimistic fair exchange of digital signatures2018-05-18Paper
Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe2016-03-10Paper
Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors2015-12-02Paper
Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts2015-11-25Paper
Ambiguous One-Move Nominative Signature Without Random Oracles2015-10-16Paper
Practical (fully) distributed signatures provably secure in the standard model2015-07-24Paper
Efficient algorithms for secure outsourcing of bilinear pairings2014-12-02Paper
Ambiguous optimistic fair exchange: definition and constructions2014-12-02Paper
Concurrent signature without random oracles2014-12-02Paper
Extending concurrent signature to multiple parties2014-08-27Paper
The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles2014-08-01Paper
Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts2014-06-06Paper
P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures2014-03-28Paper
Practical Distributed Signatures in the Standard Model2014-03-28Paper
Identity based identification from algebraic coding theory2014-01-13Paper
Fairness in Concurrent Signatures Revisited2013-06-28Paper
A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles2013-06-04Paper
Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones2013-05-28Paper
Short and efficient convertible undeniable signature schemes without random oracles2013-04-17Paper
One-Move Convertible Nominative Signature in the Standard Model2012-11-06Paper
Generic security-amplifying methods of ordinary digital signatures2012-10-17Paper
Generalized First Pre-image Tractable Random Oracle Model and Signature Schemes2012-09-07Paper
The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles2012-07-20Paper
Group-oriented fair exchange of signatures2012-07-13Paper
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles2011-11-22Paper
Concurrent signatures with fully negotiable binding control2011-09-16Paper
Short Convertible Undeniable Signature in the Standard Model2011-05-19Paper
Oblivious transfer with access control: realizing disjunction without duplication2010-11-26Paper
A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange2010-11-26Paper
A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)2010-10-12Paper
Efficient Group Signature with Forward Secure Revocation2010-04-23Paper
Probabilistic public key encryption with equality test2010-03-16Paper
Signcryption from randomness recoverable public key encryption2010-03-11Paper
Certificateless threshold ring signature2009-10-01Paper
Efficient Non-interactive Range Proof2009-07-23Paper
On the security of a visual cryptography scheme for color images2009-04-03Paper
Generic Transformation to Strongly Unforgeable Signatures2009-03-10Paper
A More Natural Way to Construct Identity-Based Identification Schemes2009-03-10Paper
On the Relation among Various Security Models for Certificateless Cryptography2009-03-09Paper
Certificateless Signature Revisited2009-03-06Paper
Generic Certificateless Key Encapsulation Mechanism2009-03-06Paper
On the relation among various security models for certificateless cryptography2009-02-24Paper
On Secret Reconstruction in Secret Sharing Schemes2009-02-24Paper
An efficient one-move nominative signature scheme2009-02-24Paper
Ambiguous Optimistic Fair Exchange2009-02-10Paper
Two-factor mutual authentication based on smart cards and passwords2008-11-19Paper
A new framework for the design and analysis of identity-based identification schemes2008-11-18Paper
Traceable and Retrievable Identity-Based Encryption2008-06-13Paper
Generic Security-Amplifying Methods of Ordinary Digital Signatures2008-06-13Paper
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles2008-04-24Paper
An Efficient Password-Only Two-Server Authenticated Key Exchange System2008-03-25Paper
Formal Definition and Construction of Nominative Signature2008-03-25Paper
On the Security Models of (Threshold) Ring Signature Schemes2008-03-17Paper
Progress in Cryptology - INDOCRYPT 20032007-11-29Paper
Efficient Anonymous Roaming and Its Security Analysis2007-09-24Paper
Certificateless signature: a new security model and an improved generic construction2007-09-20Paper
Key Replacement Attack Against a Generic Construction of Certificateless Signature2007-09-07Paper
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures2007-09-04Paper
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices2007-06-13Paper
Applied Cryptography and Network Security2007-05-02Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Topics in Cryptology – CT-RSA 20062007-02-12Paper
ENHANCED SECURITY MODELS AND A GENERIC CONSTRUCTION APPROACH FOR LINKABLE RING SIGNATURE2007-02-08Paper
Generalised cumulative arrays in secret sharing2006-11-22Paper
Information Security2006-10-20Paper
RESILIENT LKH: SECURE MULTICAST KEY DISTRIBUTION SCHEMES2006-10-16Paper
Information Security and Privacy2006-06-22Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Information Security Practice and Experience2005-09-13Paper
Information Security and Privacy2005-09-07Paper
https://portal.mardi4nfdi.de/entity/Q44741802004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44084312003-06-29Paper

Research outcomes over time

This page was built for person: Duncan S. Wong