The following pages link to Fuchun Guo (Q300389):
Displaying 49 items.
- Generalized closest substring encryption (Q300391) (← links)
- Efficient and secure stored-value cards with leakage resilience (Q361709) (← links)
- Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes (Q781862) (← links)
- Generic construction for tightly-secure signatures from discrete log (Q820557) (← links)
- Efficient dynamic threshold identity-based encryption with constant-size ciphertext (Q897859) (← links)
- Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample (Q1680228) (← links)
- Functional encryption for computational hiding in prime order groups via pair encodings (Q1692153) (← links)
- Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost (Q1694723) (← links)
- Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems (Q1733051) (← links)
- Lattice-based IBE with equality test supporting flexible authorization in the standard model (Q2152055) (← links)
- Optimal tightness for chain-based unique signatures (Q2170062) (← links)
- Privacy-enhanced attribute-based private information retrieval (Q2195304) (← links)
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters (Q2200685) (← links)
- Generalized public-key cryptography with tight security (Q2225176) (← links)
- Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts (Q2290624) (← links)
- Strongly leakage resilient authenticated key exchange, revisited (Q2334443) (← links)
- Strong authenticated key exchange with auxiliary inputs (Q2402976) (← links)
- A note on the strong authenticated key exchange with auxiliary inputs (Q2402977) (← links)
- Accountable identity-based encryption with distributed private key generators (Q2656754) (← links)
- Certificateless aggregate signature scheme secure against fully chosen-key attacks (Q2660717) (← links)
- Strongly Leakage-Resilient Authenticated Key Exchange (Q2799004) (← links)
- Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance (Q2817487) (← links)
- One-Round Strong Oblivious Signature-Based Envelope (Q2817800) (← links)
- Public Key Encryption with Authorized Keyword Search (Q2817811) (← links)
- Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing (Q2817815) (← links)
- A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups (Q2827707) (← links)
- A Pre-computable Signature Scheme with Efficient Verification for RFID (Q2894338) (← links)
- Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction (Q2953795) (← links)
- Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update (Q2953847) (← links)
- Oblivious Keyword Search with Authorization (Q2953857) (← links)
- Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions (Q2958150) (← links)
- Online/Offline Verification of Short Signatures (Q3019936) (← links)
- Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase (Q3019947) (← links)
- Introduction to Security Reduction (Q3174853) (← links)
- A New General Framework for Secure Public Key Encryption with Keyword Search (Q3194589) (← links)
- Improved Identity-Based Online/Offline Encryption (Q3194595) (← links)
- Multi-Identity Single-Key Decryption without Random Oracles (Q3600348) (← links)
- Identity-Based Online/Offline Encryption (Q3603012) (← links)
- Multi-identity management for identity-based cryptography (Q3622776) (← links)
- How to Prove Security of a Signature with a Tighter Security Reduction (Q3651583) (← links)
- Membership Encryption and Its Applications (Q5300947) (← links)
- Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key (Q5429252) (← links)
- Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles (Q5458490) (← links)
- Optimal Online/Offline Signature: How to Sign a Message without Online Computation (Q5505461) (← links)
- Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts (Q6205019) (← links)
- A tightly secure ID-based signature scheme under DL assumption in AGM (Q6535485) (← links)
- Compact accountable ring signatures in the plain model (Q6573648) (← links)
- Compact ring signatures with post-quantum security in standard model (Q6573652) (← links)
- Robust decentralized multi-client functional encryption: motivation, definition, and inner-product constructions (Q6604927) (← links)