Dung Hoang Duong

Orcid: 0000-0001-8057-4060

According to our database1, Dung Hoang Duong authored at least 63 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Quantum-Safe Puncturable Signatures With Their Application in Blockchain.
IEEE Trans. Inf. Forensics Secur., 2024

2023
HeFUN: Homomorphic Encryption for Unconstrained Secure Neural Network Inference.
Future Internet, 2023

Logarithmic-Size (Linkable) Ring Signatures from Lattice Isomorphism Problems.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2023

Blockchain Oracles: Implications for Smart Contracts in Legal Reasoning and Addressing the Oracle Problem.
Proceedings of the 12th International Symposium on Information and Communication Technology, 2023

Threshold Ring Signature Scheme from Cryptographic Group Action.
Proceedings of the Provable and Practical Security, 2023

Compact Ring Signatures with Post-Quantum Security in Standard Model.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

Compact Accountable Ring Signatures in the Plain Model.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
Lattice-based public-key encryption with equality test supporting flexible authorization in standard model.
Theor. Comput. Sci., 2022

Wildcarded identity-based encryption from lattices.
Theor. Comput. Sci., 2022

Puncturable identity-based and attribute-based encryption from lattices.
Theor. Comput. Sci., 2022

Chosen-ciphertext lattice-based public key encryption with equality test in standard model.
Theor. Comput. Sci., 2022

Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption.
IEEE Trans. Cloud Comput., 2022

Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms.
IACR Cryptol. ePrint Arch., 2022

Efficient Unique Ring Signatures From Lattices.
IACR Cryptol. ePrint Arch., 2022

Lattice-based Public Key Encryption with Multi-Ciphertexts Equality Test in Cloud Computing.
IACR Cryptol. ePrint Arch., 2022

Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More.
IACR Cryptol. ePrint Arch., 2022

On digital signatures based on isomorphism problems: QROM security and ring signatures.
IACR Cryptol. ePrint Arch., 2022

A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing.
Comput. Stand. Interfaces, 2022

Zero-Knowledge Range Arguments for Signed Fractional Numbers from Lattices.
Proceedings of the Provable and Practical Security, 2022

Puncturable Signature: A Generic Construction and Instantiations.
Proceedings of the Computer Security - ESORICS 2022, 2022

Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Collusion-resistant identity-based Proxy Re-encryption: Lattice-based constructions in Standard Model.
Theor. Comput. Sci., 2021

Fast secure matrix multiplications over ring-based homomorphic encryption.
Inf. Secur. J. A Glob. Perspect., 2021

Attribute-based proxy re-signature from standard lattices and its applications.
Comput. Stand. Interfaces, 2021

Lattice-based signcryption with equality test in standard model.
Comput. Stand. Interfaces, 2021

An efficient multivariate threshold ring signature scheme.
Comput. Stand. Interfaces, 2021

Identity-Based Linkable Ring Signatures From Lattices.
IEEE Access, 2021

Lattice-Based HRA-secure Attribute-Based Proxy Re-Encryption in Standard Model.
Proceedings of the Computer Security - ESORICS 2021, 2021

Efficient Unique Ring Signature for Blockchain Privacy Protection.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

Puncturable Identity-Based Encryption from Lattices.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Wildcarded Identity-Based Encryption with Constant-size Ciphertext and Secret Key.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

Identity-based Unidirectional Proxy Re-Encryption and Re-Signature in Standard Model: Lattice-based Constructions.
J. Internet Serv. Inf. Secur., 2020

A New Approach to Keep the Privacy Information of the Signer in a Digital Signature Scheme.
Inf., 2020

An Efficient MQ-based Signature with Tight Security Proof.
Int. J. Netw. Comput., 2020

Impact of the modulus switching technique on some attacks against learning problems.
IET Inf. Secur., 2020

Choosing subfields for LUOV and lifting fields for rainbow.
IET Inf. Secur., 2020

Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2020

Lattice-based Unidirectional IBPRE Secure in Standard Model.
CoRR, 2020

Lattice-based public key encryption with equality test in standard model, revisited.
CoRR, 2020

Hierarchical Identity-Based Signature in Polynomial Rings.
Comput. J., 2020

A Multivariate Blind Ring Signature Scheme.
Comput. J., 2020

Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction.
Proceedings of the Information Security Applications - 21st International Conference, 2020

Lattice-Based IBE with Equality Test Supporting Flexible Authorization in the Standard Model.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

Efficient Post-quantum Identity-based Encryption with Equality Test.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model.
Proceedings of the Applied Cryptography and Network Security, 2020

Lattice Blind Signatures with Forward Security.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
The Secure Parameters and Efficient Decryption Algorithm for Multivariate Public Key Cryptosystem EFC.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

A Blind Ring Signature Based on the Short Integer Solution Problem.
Proceedings of the Information Security Applications - 20th International Conference, 2019

Lattice-Based IBE with Equality Test in Standard Model.
Proceedings of the Provable Security, 2019

An Efficient MQ-Based Signature in the QROM.
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019

A Blind Signature from Module Latices.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard Model.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

A Lattice-Based Public Key Encryption with Equality Test in Standard Model.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
An Efficient Key Generation of ZHFE Public Key Cryptosystem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Solving LWR via BDD Strategy: Modulus Switching Approach.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
CyclicSRP - A Multivariate Encryption Scheme with a Partially Cyclic Public Key.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Choosing Parameters for the Subfield Lattice Attack against overstretched NTRU.
IACR Cryptol. ePrint Arch., 2017

Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption.
Proceedings of the Information Security Practice and Experience, 2017

2016
Revisiting the Efficient Key Generation of ZHFE.
IACR Cryptol. ePrint Arch., 2016

Revisiting the Cubic UOV Signature Scheme.
IACR Cryptol. ePrint Arch., 2016

Reducing the Key Size of the SRP Encryption Scheme - Extended version.
IACR Cryptol. ePrint Arch., 2016

Reducing the Key Size of the SRP Encryption Scheme.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016


  Loading...