Duncan S. Wong

From MaRDI portal
(Redirected from Person:391760)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Lightweight delegatable proofs of storage2022-08-19Paper
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Information Sciences
2020-02-06Paper
Identity-based aggregate signcryption in the standard model from multilinear maps
Frontiers of Computer Science
2019-01-22Paper
How to protect privacy in optimistic fair exchange of digital signatures
Information Sciences
2018-05-18Paper
Practical ciphertext-policy attribute-based encryption: traitor tracing, revocation, and large universe
Applied Cryptography and Network Security
2016-03-10Paper
Low-weight primes for lightweight elliptic curve cryptography on 8-bit AVR processors
Information Security and Cryptology
2015-12-02Paper
Fully collusion-resistant traceable key-policy attribute-based encryption with sub-linear size ciphertexts
Information Security and Cryptology
2015-11-25Paper
Ambiguous one-move nominative signature without random oracles
Information Security and Cryptology -- ICISC 2013
2015-10-16Paper
Practical (fully) distributed signatures provably secure in the standard model
Theoretical Computer Science
2015-07-24Paper
Efficient algorithms for secure outsourcing of bilinear pairings
Theoretical Computer Science
2014-12-02Paper
Ambiguous optimistic fair exchange: definition and constructions
Theoretical Computer Science
2014-12-02Paper
Concurrent signature without random oracles
Theoretical Computer Science
2014-12-02Paper
Extending concurrent signature to multiple parties
Theoretical Computer Science
2014-08-27Paper
The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles
Information Sciences
2014-08-01Paper
Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
Theoretical Computer Science
2014-06-06Paper
P\(^2\)OFE: privacy-preserving optimistic fair exchange of digital signatures
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Practical distributed signatures in the standard model
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Identity based identification from algebraic coding theory
Theoretical Computer Science
2014-01-13Paper
Fairness in concurrent signatures revisited
Information Security and Privacy
2013-06-28Paper
A CCA-secure identity-based conditional proxy re-encryption without random oracles
Lecture Notes in Computer Science
2013-06-04Paper
Touch gestures based biometric authentication scheme for touchscreen mobile phones
Information Security and Cryptology
2013-05-28Paper
Short and efficient convertible undeniable signature schemes without random oracles
Theoretical Computer Science
2013-04-17Paper
One-move convertible nominative signature in the standard model
Provable Security
2012-11-06Paper
Generic security-amplifying methods of ordinary digital signatures
Information Sciences
2012-10-17Paper
Generalized First Pre-image Tractable Random Oracle Model and Signature Schemes
Information Security and Privacy
2012-09-07Paper
The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles
Public Key Cryptography – PKC 2012
2012-07-20Paper
Group-oriented fair exchange of signatures
Information Sciences
2012-07-13Paper
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles
Computer Security – ESORICS 2011
2011-11-22Paper
Concurrent signatures with fully negotiable binding control
Provable Security
2011-09-16Paper
Short Convertible Undeniable Signature in the Standard Model
Information Security Practice and Experience
2011-05-19Paper
Oblivious transfer with access control: realizing disjunction without duplication
Lecture Notes in Computer Science
2010-11-26Paper
A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange
Lecture Notes in Computer Science
2010-11-26Paper
A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)
Provable Security
2010-10-12Paper
Efficient Group Signature with Forward Secure Revocation
Security Technology
2010-04-23Paper
Probabilistic public key encryption with equality test
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Signcryption from randomness recoverable public key encryption
Information Sciences
2010-03-11Paper
Certificateless threshold ring signature
Information Sciences
2009-10-01Paper
Efficient Non-interactive Range Proof
Lecture Notes in Computer Science
2009-07-23Paper
On the security of a visual cryptography scheme for color images
Pattern Recognition
2009-04-03Paper
Generic Transformation to Strongly Unforgeable Signatures
Applied Cryptography and Network Security
2009-03-10Paper
A More Natural Way to Construct Identity-Based Identification Schemes
Applied Cryptography and Network Security
2009-03-10Paper
On the Relation among Various Security Models for Certificateless Cryptography
Coding and Cryptology
2009-03-09Paper
Certificateless Signature Revisited
Information Security and Privacy
2009-03-06Paper
Generic Certificateless Key Encapsulation Mechanism
Information Security and Privacy
2009-03-06Paper
On the relation among various security models for certificateless cryptography
International Journal of Applied Cryptography
2009-02-24Paper
On Secret Reconstruction in Secret Sharing Schemes
IEEE Transactions on Information Theory
2009-02-24Paper
An efficient one-move nominative signature scheme
International Journal of Applied Cryptography
2009-02-24Paper
Ambiguous Optimistic Fair Exchange
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
Two-factor mutual authentication based on smart cards and passwords
Journal of Computer and System Sciences
2008-11-19Paper
A new framework for the design and analysis of identity-based identification schemes
Theoretical Computer Science
2008-11-18Paper
Traceable and Retrievable Identity-Based Encryption
Applied Cryptography and Network Security
2008-06-13Paper
Generic Security-Amplifying Methods of Ordinary Digital Signatures
Applied Cryptography and Network Security
2008-06-13Paper
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
An Efficient Password-Only Two-Server Authenticated Key Exchange System
Information and Communications Security
2008-03-25Paper
Formal Definition and Construction of Nominative Signature
Information and Communications Security
2008-03-25Paper
On the Security Models of (Threshold) Ring Signature Schemes
Lecture Notes in Computer Science
2008-03-17Paper
Progress in Cryptology - INDOCRYPT 2003
Lecture Notes in Computer Science
2007-11-29Paper
Efficient Anonymous Roaming and Its Security Analysis
Applied Cryptography and Network Security
2007-09-24Paper
Certificateless signature: a new security model and an improved generic construction
Designs, Codes and Cryptography
2007-09-20Paper
Key Replacement Attack Against a Generic Construction of Certificateless Signature
Information Security and Privacy
2007-09-07Paper
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures
Public Key Cryptography – PKC 2007
2007-09-04Paper
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
Theoretical Computer Science
2007-06-13Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2007-05-02Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
ENHANCED SECURITY MODELS AND A GENERIC CONSTRUCTION APPROACH FOR LINKABLE RING SIGNATURE
International Journal of Foundations of Computer Science
2007-02-08Paper
Generalised cumulative arrays in secret sharing
Designs, Codes and Cryptography
2006-11-22Paper
Information Security
Lecture Notes in Computer Science
2006-10-20Paper
RESILIENT LKH: SECURE MULTICAST KEY DISTRIBUTION SCHEMES
International Journal of Foundations of Computer Science
2006-10-16Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Information Security Practice and Experience
Lecture Notes in Computer Science
2005-09-13Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
scientific article; zbMATH DE number 2081071 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 1941235 (Why is no real title available?)2003-06-29Paper


Research outcomes over time


This page was built for person: Duncan S. Wong