Fuchun Guo

According to our database1, Fuchun Guo
  • authored at least 81 papers between 2006 and 2018.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Efficient k-out-of-n oblivious transfer scheme with the ideal communication cost.
Theor. Comput. Sci., 2018

Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes.
Inf. Sci., 2018

Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing.
Future Generation Comp. Syst., 2018

Functional encryption for computational hiding in prime order groups via pair encodings.
Des. Codes Cryptography, 2018

2017
Privacy-Preserving Mutual Authentication in RFID with Designated Readers.
Wireless Personal Communications, 2017

EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud.
IEEE Trans. Information Forensics and Security, 2017

Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices.
IEEE Trans. Dependable Sec. Comput., 2017

Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city.
Personal and Ubiquitous Computing, 2017

Private Keyword-Search for Database Systems Against Insider Attacks.
J. Comput. Sci. Technol., 2017

Sequence aware functional encryption and its application in searchable encryption.
J. Inf. Sec. Appl., 2017

Efficient identity-based online/offline encryption and signcryption with short ciphertext.
Int. J. Inf. Sec., 2017

Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample.
IACR Cryptology ePrint Archive, 2017

Strong Authenticated Key Exchange with Auxiliary Inputs.
IACR Cryptology ePrint Archive, 2017

A note on the strong authenticated key exchange with auxiliary inputs.
Des. Codes Cryptography, 2017

Strong authenticated key exchange with auxiliary inputs.
Des. Codes Cryptography, 2017

Secure-channel free keyword search with authorization in manager-centric databases.
Computers & Security, 2017

Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization.
Comput. J., 2017

Fuzzy Extractors for Biometric Identification.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data.
IEEE Trans. Information Forensics and Security, 2016

Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption.
IEEE Trans. Information Forensics and Security, 2016

Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage.
IEEE Trans. Information Forensics and Security, 2016

Server-Aided Public Key Encryption With Keyword Search.
IEEE Trans. Information Forensics and Security, 2016

Efficient dynamic threshold identity-based encryption with constant-size ciphertext.
Theor. Comput. Sci., 2016

Centralized keyword search on encrypted data for cloud applications.
Security and Communication Networks, 2016

Functional Encryption for Computational Hiding in Prime Order Groups via Pair Encodings.
IACR Cryptology ePrint Archive, 2016

A Tag Based Encoding: An Efficient Encoding for Predicate Encoding in Prime Order Groups.
IACR Cryptology ePrint Archive, 2016

Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction.
IACR Cryptology ePrint Archive, 2016

Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
IACR Cryptology ePrint Archive, 2016

Strongly Leakage-Resilient Authenticated Key Exchange.
IACR Cryptology ePrint Archive, 2016

Generalized closest substring encryption.
Des. Codes Cryptography, 2016

Online/Offline Ciphertext Retrieval on Resource Constrained Devices.
Comput. J., 2016

A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Oblivious Keyword Search with Authorization.
Proceedings of the Provable Security, 2016

Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update.
Proceedings of the Provable Security, 2016

Privacy-Preserving Cloud Auditing with Multiple Uploaders.
Proceedings of the Information Security Practice and Experience, 2016

Strongly Leakage-Resilient Authenticated Key Exchange.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Public Key Encryption with Authorized Keyword Search.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

One-Round Strong Oblivious Signature-Based Envelope.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication.
IEEE Trans. Information Forensics and Security, 2015

Vulnerabilities of an ECC-based RFID authentication scheme.
Security and Communication Networks, 2015

Improved Identity-Based Online/Offline Encryption.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

A New General Framework for Secure Public Key Encryption with Keyword Search.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
CP-ABE With Constant-Size Keys for Lightweight Devices.
IEEE Trans. Information Forensics and Security, 2014

Subset Membership Encryption and Its Applications to Oblivious Transfer.
IEEE Trans. Information Forensics and Security, 2014

Efficient authentication and integrity protection for the border gateway protocol.
IJSN, 2014

Server-Aided Signature Verification for Lightweight Devices.
Comput. J., 2014

Privacy-Preserving Authorized RFID Authentication Protocols.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014

Attribute-Based Signature with Message Recovery.
Proceedings of the Information Security Practice and Experience, 2014

POSTER: Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme.
Wireless Personal Communications, 2013

Server-aided identity-based anonymous broadcast encryption.
IJSN, 2013

On RFID Authentication Protocols with Wide-Strong Privacy.
Proceedings of the Radio Frequency Identification System Security, 2013

Membership Encryption and Its Applications.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Efficient and secure stored-value cards with leakage resilience.
Computers & Electrical Engineering, 2012

A Pre-computable Signature Scheme with Efficient Verification for RFID.
Proceedings of the Information Security Practice and Experience, 2012

Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Improving security of q-SDH based digital signatures.
Journal of Systems and Software, 2011

Short Signatures with a Tighter Security Reduction Without Random Oracles.
Comput. J., 2011

Self-certified ring signatures.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Online/Offline Verification of Short Signatures.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
How to Prove Security of a Signature with a Tighter Security Reduction.
Proceedings of the Provable Security, Third International Conference, 2009

2008
Optimal Online/Offline Signature: How to Sign a Message without Online Computation.
Proceedings of the Provable Security, Second International Conference, 2008

Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles.
Proceedings of the Advances in Information and Computer Security, 2008

On the Security of WAI Protocol in the Third Version of WAPI.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Hierarchical Identity-Based Online/Offline Encryption.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Identity-Based Online/Offline Encryption.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

2007
Private Key Management in Hierarchical Identity-Based Encryption.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

Identity Based Private Matching.
Proceedings of the Third International Workshop on Security, 2007

Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key.
Proceedings of the Pairing-Based Cryptography, 2007

Routing Protocols Based on Double Auction for Ad Hoc Networks.
Proceedings of the International Conference on Networking, 2007

Multi-Identity Single-Key Decryption without Random Oracles.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

2006
Secure and Efficient Trust Negotiation.
Proceedings of the Computational Intelligence and Security, International Conference, 2006


  Loading...