# Fuchun Guo

According to our database

Collaborative distances:

^{1}, Fuchun Guo authored at least 100 papers between 2006 and 2020.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Other## Links

#### On csauthors.net:

## Bibliography

2020

Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts.

Theor. Comput. Sci., 2020

Certificateless aggregate signature scheme secure against fully chosen-key attacks.

Inf. Sci., 2020

IEEE Internet Things J., 2020

Future Gener. Comput. Syst., 2020

Comput. J., 2020

Improving the Leakage Rate of Ciphertext-Policy Attribute-Based Encryption for Cloud Computing.

IEEE Access, 2020

Proceedings of the Computer Security - ESORICS 2020, 2020

2019

Proceedings of the Encyclopedia of Big Data Technologies., 2019

Wirel. Pers. Commun., 2019

Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems.

Theor. Comput. Sci., 2019

A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks.

Sensors, 2019

J. Comput. Sci. Technol., 2019

Inf. Sci., 2019

Inf. Sci., 2019

Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters.

Inf. Sci., 2019

Int. J. Inf. Sec., 2019

A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups.

IACR Cryptol. ePrint Arch., 2019

Des. Codes Cryptogr., 2019

Comput. J., 2019

Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption.

IEEE Access, 2019

2018

Efficient <i>k</i>-out-of-<i>n</i> oblivious transfer scheme with the ideal communication cost.

Theor. Comput. Sci., 2018

Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes.

Inf. Sci., 2018

Inf. Sci., 2018

Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes.

Int. J. Inf. Sec., 2018

Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts.

Int. J. Inf. Sec., 2018

Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing.

Future Gener. Comput. Syst., 2018

Functional encryption for computational hiding in prime order groups via pair encodings.

Des. Codes Cryptogr., 2018

Comput. J., 2018

Springer, ISBN: 978-3-319-93048-0, 2018

2017

Wirel. Pers. Commun., 2017

EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud.

IEEE Trans. Inf. Forensics Secur., 2017

Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices.

IEEE Trans. Dependable Secur. Comput., 2017

Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city.

Pers. Ubiquitous Comput., 2017

J. Comput. Sci. Technol., 2017

Sequence aware functional encryption and its application in searchable encryption.

J. Inf. Secur. Appl., 2017

Efficient identity-based online/offline encryption and signcryption with short ciphertext.

Int. J. Inf. Sec., 2017

Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample.

IACR Cryptol. ePrint Arch., 2017

Des. Codes Cryptogr., 2017

Des. Codes Cryptogr., 2017

Secure-channel free keyword search with authorization in manager-centric databases.

Comput. Secur., 2017

Comput. J., 2017

Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption.

Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016

IEEE Trans. Inf. Forensics Secur., 2016

IEEE Trans. Inf. Forensics Secur., 2016

IEEE Trans. Inf. Forensics Secur., 2016

IEEE Trans. Inf. Forensics Secur., 2016

Efficient dynamic threshold identity-based encryption with constant-size ciphertext.

Theor. Comput. Sci., 2016

Secur. Commun. Networks, 2016

A Tag Based Encoding: An Efficient Encoding for Predicate Encoding in Prime Order Groups.

IACR Cryptol. ePrint Arch., 2016

Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction.

IACR Cryptol. ePrint Arch., 2016

IACR Cryptol. ePrint Arch., 2016

IACR Cryptol. ePrint Arch., 2016

Des. Codes Cryptogr., 2016

Comput. J., 2016

A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups.

Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Proceedings of the Provable Security, 2016

Proceedings of the Provable Security, 2016

Proceedings of the Information Security Practice and Experience, 2016

Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext.

Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance.

Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015

BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication.

IEEE Trans. Inf. Forensics Secur., 2015

Secur. Commun. Networks, 2015

Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014

IEEE Trans. Inf. Forensics Secur., 2014

IEEE Trans. Inf. Forensics Secur., 2014

Efficient authentication and integrity protection for the border gateway protocol.

Int. J. Secur. Networks, 2014

Comput. J., 2014

Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014

Proceedings of the Information Security Practice and Experience, 2014

POSTER: Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption.

Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013

Wirel. Pers. Commun., 2013

Int. J. Secur. Networks, 2013

Proceedings of the Radio Frequency Identification System Security, 2013

Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012

Comput. Electr. Eng., 2012

Proceedings of the Information Security Practice and Experience, 2012

Proceedings of the Computer Security - ESORICS 2012, 2012

2011

J. Syst. Softw., 2011

Comput. J., 2011

Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010

Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase.

Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009

Proceedings of the Provable Security, Third International Conference, 2009

2008

Optimal Online/Offline Signature: How to Sign a Message without Online Computation.

Proceedings of the Provable Security, Second International Conference, 2008

Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles.

Proceedings of the Advances in Information and Computer Security, 2008

Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

2007

Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

Proceedings of the Third International Workshop on Security, 2007

Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key.

Proceedings of the Pairing-Based Cryptography, 2007

Proceedings of the International Conference on Networking, 2007

Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

2006

Proceedings of the Computational Intelligence and Security, International Conference, 2006