Man Ho Au

According to our database1, Man Ho Au authored at least 237 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Identity-Based Encryption with Equality Test scheme for healthcare social apps.
Comput. Stand. Interfaces, January, 2024

PRLAP-IoD: A PUF-based Robust and Lightweight Authentication Protocol for Internet of Drones.
Comput. Networks, January, 2024

Neural Networks with (Low-Precision) Polynomial Approximations: New Insights and Techniques for Accuracy Improvement.
CoRR, 2024

2023
Secure Traffic Monitoring With Spatio-Temporal Metadata Protection Using Oblivious RAM.
IEEE Trans. Intell. Transp. Syst., December, 2023

Ideal dynamic threshold Multi-secret data sharing in smart environments for sustainable cities.
Inf. Sci., November, 2023

Secure channel free public key authenticated encryption with multi-keyword search on healthcare systems.
Future Gener. Comput. Syst., August, 2023

Dual-Anonymous Off-Line Electronic Cash for Mobile Payment.
IEEE Trans. Mob. Comput., June, 2023

Federated learning for green shipping optimization and management.
Adv. Eng. Informatics, April, 2023

An identity-based traceable ring signatures based on lattice.
Peer Peer Netw. Appl., March, 2023

ePoSt: Practical and Client-Friendly Proof of Storage-Time.
IEEE Trans. Inf. Forensics Secur., 2023

Towards Practical Auditing of Dynamic Data in Decentralized Storage.
IEEE Trans. Dependable Secur. Comput., 2023

Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security.
Inf., 2023

A Lattice-Based Certificateless Traceable Ring Signature Scheme.
Inf., 2023

Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA.
IACR Cryptol. ePrint Arch., 2023

Stateful Switch: Optimized Time Series Release with Local Differential Privacy.
Proceedings of the IEEE INFOCOM 2023, 2023

Blockchain-based Trustless Fair Payment Protocol for Verifiable Confidential Outsourcing Computation.
Proceedings of the IEEE International Conference on Blockchain, 2023

Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
LF-GDPR: A Framework for Estimating Graph Metrics With Local Differential Privacy.
IEEE Trans. Knowl. Data Eng., 2022

Efficient Verifiably Encrypted ECDSA-Like Signatures and Their Applications.
IEEE Trans. Inf. Forensics Secur., 2022

Geometric Range Search on Encrypted Data With Forward/Backward Security.
IEEE Trans. Dependable Secur. Comput., 2022

Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain.
IEEE Trans. Dependable Secur. Comput., 2022

Public-Key Watermarking Schemes for Pseudorandom Functions.
IACR Cryptol. ePrint Arch., 2022

Efficient Online-friendly Two-Party ECDSA Signature.
IACR Cryptol. ePrint Arch., 2022

AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains.
IACR Cryptol. ePrint Arch., 2022

Secure-Channel Free Certificateless Searchable Public Key Authenticated Encryption with Keyword Search.
Proceedings of the Provable and Practical Security, 2022

Practical Anonymous Multi-hop Locks for Lightning Network Compatible Payment Channel Networks.
Proceedings of the Network and System Security - 16th International Conference, 2022

Metadata Privacy Preservation for Blockchain-Based Healthcare Systems.
Proceedings of the Database Systems for Advanced Applications, 2022

2021
PPFilter: Provider Privacy-Aware Encrypted Filtering System.
IEEE Trans. Serv. Comput., 2021

Efficient and Adaptive Procurement Protocol with Purchasing Privacy.
IEEE Trans. Serv. Comput., 2021

Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability.
IEEE Trans. Dependable Secur. Comput., 2021

A fog-based collaborative intrusion detection framework for smart grid.
Int. J. Netw. Manag., 2021

Toward a blockchain-based framework for challenge-based collaborative intrusion detection.
Int. J. Inf. Sec., 2021

DualRing: Generic Construction of Ring Signatures with Efficient Instantiations.
IACR Cryptol. ePrint Arch., 2021

Happer: Unpacking Android Apps via a Hardware-Assisted Approach.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Bidl: A High-throughput, Low-latency Permissioned Blockchain Framework for Datacenter Networks.
Proceedings of the SOSP '21: ACM SIGOPS 28th Symposium on Operating Systems Principles, 2021

Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

Blockchain-Based Supply Chain System for Traceability, Regulation and Anti-Counterfeiting.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

2020
Practical Escrow Protocol for Bitcoin.
IEEE Trans. Inf. Forensics Secur., 2020

Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation.
Theor. Comput. Sci., 2020

Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments.
J. Netw. Comput. Appl., 2020

Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions.
IEICE Trans. Inf. Syst., 2020

Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting.
IACR Cryptol. ePrint Arch., 2020

Collusion Resistant Watermarkable PRFs from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2020

Compact Authenticated Key Exchange in the Quantum Random Oracle Model.
IACR Cryptol. ePrint Arch., 2020

Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach.
IACR Cryptol. ePrint Arch., 2020

Detecting insider attacks in medical cyber-physical networks based on behavioral profiling.
Future Gener. Comput. Syst., 2020

Special Issue on Cryptographic Currency and Blockchain Technology.
Future Gener. Comput. Syst., 2020

Efficient Message Authentication with Revocation Transparency Using Blockchain for Vehicular Networks.
Comput. Electr. Eng., 2020

Towards Locally Differentially Private Generic Graph Metric Estimation.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Cloud Password Shield: A Secure Cloud-based Firewall against DDoS on Authentication Servers.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

PGC: Decentralized Confidential Payment System with Auditability.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Blockchain based secure data sharing system for Internet of vehicles: A position paper.
Veh. Commun., 2019

A Distributed Trust Evaluation Protocol with Privacy Protection for Intercloud.
IEEE Trans. Parallel Distributed Syst., 2019

A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices.
IEEE Trans. Computers, 2019

A game-theoretic method based on Q-learning to invalidate criminal smart contracts.
Inf. Sci., 2019

Efficient attribute-based encryption with attribute revocation for assured data deletion.
Inf. Sci., 2019

Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters.
Inf. Sci., 2019

Meta-Key: A Secure Data-Sharing Protocol Under Blockchain-Based Decentralized Storage Architecture.
IEEE Netw. Lett., 2019

RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security.
IACR Cryptol. ePrint Arch., 2019

Re-thinking untraceability in the CryptoNote-style blockchain.
IACR Cryptol. ePrint Arch., 2019

Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications.
IACR Cryptol. ePrint Arch., 2019

(Linkable) Ring Signature from Hash-Then-One-Way Signature.
IACR Cryptol. ePrint Arch., 2019

An efficient linkable group signature for payer tracing in anonymous cryptocurrencies.
Future Gener. Comput. Syst., 2019

Simulation-based selective opening security for receivers under chosen-ciphertext attacks.
Des. Codes Cryptogr., 2019

Matrix Bloom Filter: An Efficient Probabilistic Data Structure for 2-tuple Batch Lookup.
CoRR, 2019

A Secure Decentralized Trustless E-Voting System Based on Smart Contract.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Constructing Strong Designated Verifier Signatures from Key Encapsulation Mechanisms.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Virtual Laboratory: Facilitating Teaching and Learning in Cybersecurity for Students with Diverse Disciplines.
Proceedings of the IEEE International Conference on Engineering, Technology and Education, 2019

Blockchain-Based Threshold Electronic Voting System.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks Using Online/Offline Certificateless Aggregate Signature.
Proceedings of the Provable Security, 2019

Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization.
Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications, 2019

A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter.
Proceedings of the Network and System Security - 13th International Conference, 2019

New Empirical Traceability Analysis of CryptoNote-Style Blockchains.
Proceedings of the Financial Cryptography and Data Security, 2019

Strongly Secure Authenticated Key Exchange from Supersingular Isogenies.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

Ring Signatures Based on Middle-Product Learning with Errors Problems.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019

Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System.
Proceedings of the Applied Cryptography and Network Security, 2019

Towards Blockchained Challenge-Based Collaborative Intrusion Detection.
Proceedings of the Applied Cryptography and Network Security Workshops, 2019

Accountable Anonymous Credentials.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2018
Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps.
Soft Comput., 2018

Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing.
Secur. Commun. Networks, 2018

Platform-independent Secure Blockchain-Based Voting System.
IACR Cryptol. ePrint Arch., 2018

Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0).
IACR Cryptol. ePrint Arch., 2018

Raptor: A Practical Lattice-Based (Linkable) Ring Signature.
IACR Cryptol. ePrint Arch., 2018

Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments for Arithmetic Circuit Satisfiability.
IACR Cryptol. ePrint Arch., 2018

Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures.
IACR Cryptol. ePrint Arch., 2018

Towards leakage-resilient fine-grained access control in fog computing.
Future Gener. Comput. Syst., 2018

Position based cryptography with location privacy: A step for Fog Computing.
Future Gener. Comput. Syst., 2018

Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat.
Future Gener. Comput. Syst., 2018

Functional encryption for computational hiding in prime order groups via pair encodings.
Des. Codes Cryptogr., 2018

A Survey on Access Control in Fog Computing.
IEEE Commun. Mag., 2018

Order-Hiding Range Query over Encrypted Data without Search Pattern Leakage.
Comput. J., 2018

When Query Authentication Meets Fine-Grained Access Control: A Zero-Knowledge Approach.
Proceedings of the 2018 International Conference on Management of Data, 2018

Unforgeable Watermarking Schemes with Public Extraction.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database.
Proceedings of the Computer Security, 2018

Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Lattice-Based Universal Accumulator with Nonmembership Arguments.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed Construction.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2017

Towards secure and cost-effective fuzzy access control in mobile cloud computing.
Soft Comput., 2017

A Quantitative Risk Assessment Model Involving Frequency and Threat Degree under Line-of-Business Services for Infrastructure of Emerging Sensor Networks.
Sensors, 2017

Erratum to: Special issue on security and privacy for smart cities.
Pers. Ubiquitous Comput., 2017

Special issue on security and privacy for smart cities.
Pers. Ubiquitous Comput., 2017

CloudBot: Advanced mobile botnets using ubiquitous cloud technologies.
Pervasive Mob. Comput., 2017

A general framework for secure sharing of personal health records in cloud system.
J. Comput. Syst. Sci., 2017

Anonymous Post-Quantum Cryptocash.
IACR Cryptol. ePrint Arch., 2017

Decentralized Blacklistable Anonymous Credentials with Reputation.
IACR Cryptol. ePrint Arch., 2017

Collusion Resistant Watermarking Schemes for Cryptographic Functionalities.
IACR Cryptol. ePrint Arch., 2017

Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak PRF with Efficient Protocols from LWR.
IACR Cryptol. ePrint Arch., 2017

RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
IACR Cryptol. ePrint Arch., 2017

Cloud computing security and privacy: Standards and regulations.
Comput. Stand. Interfaces, 2017

Anonymous Announcement System (AAS) for Electric Vehicle in VANETs.
Comput. J., 2017

AutoFlowLeaker: Circumventing Web Censorship through Automation Services.
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017

A Nonoutsourceable Puzzle Under GHOST Rule.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Fuzzy Public-Key Encryption Based on Biometric Data.
Proceedings of the Provable Security, 2017

Harvesting Smartphone Privacy Through Enhanced Juice Filming Charging Attacks.
Proceedings of the Information Security - 20th International Conference, 2017

An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks.
Proceedings of the Information Security Practice and Experience, 2017

Towards Statistical Trust Computation for Medical Smartphone Networks Based on Behavioral Profiling.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017

Practical Range Proof for Cryptocurrency Monero with Provable Security.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Evaluating Challenge-Based Trust Mechanism in Medical Smartphone Networks: An Empirical Study.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
Proceedings of the Computer Security - ESORICS 2017, 2017

Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Exploring Effect of Location Number on Map-Based Graphical Password Authentication.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

An Introduction to Various Privacy Models.
Proceedings of the Mobile Security and Privacy, 2017

Performance of Digital Signature Schemes on Mobile Devices.
Proceedings of the Mobile Security and Privacy, 2017

Mobile Security and Privacy.
Proceedings of the Mobile Security and Privacy, 2017

2016
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services.
IEEE Trans. Inf. Forensics Secur., 2016

Relations between robustness and RKA security under public-key encryption.
Theor. Comput. Sci., 2016

A Tag Based Encoding: An Efficient Encoding for Predicate Encoding in Prime Order Groups.
IACR Cryptol. ePrint Arch., 2016

Cloud data integrity checking with an identity-based auditing mechanism from RSA.
Future Gener. Comput. Syst., 2016

Security and privacy in big data.
Concurr. Comput. Pract. Exp., 2016

Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles.
Comput. J., 2016

Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction.
Comput. J., 2016

Authentication and Transaction Verification Using QR Codes with a Mobile Device.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords.
Proceedings of the Network and System Security - 10th International Conference, 2016

While Mobile Encounters with Clouds.
Proceedings of the Network and System Security - 10th International Conference, 2016

Anonymous Identification for Ad Hoc Group.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Leakage-Resilient Functional Encryption via Pair Encodings.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

MUSE: Towards Robust and Stealthy Mobile Botnets via Multiple Message Push Services.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Comments on a Public Auditing Mechanism for Shared Cloud Data Service.
IEEE Trans. Serv. Comput., 2015

Time-Bound Anonymous Authentication for Roaming Networks.
IEEE Trans. Inf. Forensics Secur., 2015

Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext.
IEEE Trans. Inf. Forensics Secur., 2015

Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption.
IEEE Trans. Inf. Forensics Secur., 2015

AAC-OT: Accountable Oblivious Transfer With Access Control.
IEEE Trans. Inf. Forensics Secur., 2015

Optimistic fair exchange in the enhanced chosen-key model.
Theor. Comput. Sci., 2015

k-Times Attribute-Based Anonymous Access Control for Cloud Computing.
IEEE Trans. Computers, 2015

Secure sharing and searching for real-time video data in mobile cloud.
IEEE Netw., 2015

Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage.
Int. J. Inf. Sec., 2015

Proof of retrievability with public verifiability resilient against related-key attacks.
IET Inf. Secur., 2015

Remote data possession checking with enhanced security for cloud storage.
Future Gener. Comput. Syst., 2015

A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing.
Future Gener. Comput. Syst., 2015

Secure Delegation of Signing Power from Factorization.
Comput. J., 2015

Revisiting Security Against the Arbitrator in Optimistic Fair Exchange.
Comput. J., 2015

PEVTS: Privacy-Preserving Electric Vehicles Test-Bedding Scheme.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

2014
A New Payment System for Enhancing Location Privacy of Electric Vehicles.
IEEE Trans. Veh. Technol., 2014

Linkable Ring Signature with Unconditional Anonymity.
IEEE Trans. Knowl. Data Eng., 2014

Collusion-Resistance in Optimistic Fair Exchange.
IEEE Trans. Inf. Forensics Secur., 2014

Revisiting Optimistic Fair Exchange Based on Ring Signatures.
IEEE Trans. Inf. Forensics Secur., 2014

A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
IEEE Trans. Inf. Forensics Secur., 2014

Attribute-based optimistic fair exchange: How to restrict brokers with policies.
Theor. Comput. Sci., 2014

Security pitfalls of an efficient threshold proxy signature scheme for mobile agents.
Inf. Process. Lett., 2014

Anonymous broadcast encryption with an untrusted gateway.
Int. J. Secur. Networks, 2014

PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2014

Cryptography in Cloud Computing.
Future Gener. Comput. Syst., 2014

Improved security of a dynamic remote data possession checking protocol for cloud storage.
Expert Syst. Appl., 2014

Improvements on an authentication scheme for vehicular sensor networks.
Expert Syst. Appl., 2014

(Strong) multidesignated verifiers signatures secure against rogue key attack.
Concurr. Comput. Pract. Exp., 2014

Signcryption Secure Against Linear Related-Key Attacks.
Comput. J., 2014

Public-Key Encryption Resilient against Linear Related-Key Attacks Revisited.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Complete Robustness in Identity-Based Encryption.
Proceedings of the Provable Security - 8th International Conference, 2014

An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing.
Proceedings of the Information Security Practice and Experience, 2014

Two-Party (Blind) Ring Signatures and Their Applications.
Proceedings of the Information Security Practice and Experience, 2014

A Visual One-Time Password Authentication Scheme Using Mobile Devices.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era.
Proceedings of the Computer Security - ESORICS 2014, 2014

PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Realizing Fully Secure Unrestricted ID-Based Ring Signature in the Standard Model Based on HIBE.
IEEE Trans. Inf. Forensics Secur., 2013

Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction.
Theor. Comput. Sci., 2013

Constant-Size Dynamic $k$ -Times Anonymous Authentication.
IEEE Syst. J., 2013

Server-aided signatures verification secure against collusion attack.
Inf. Secur. Tech. Rep., 2013

Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt".
IACR Cryptol. ePrint Arch., 2013

Efficient Linkable and/or Threshold Ring Signature Without Random Oracles.
Comput. J., 2013

Privacy-Enhanced Keyword Search in Clouds.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Verifiable and Anonymous Encryption in Asymmetric Bilinear Maps.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Public-Key Encryption Resilient to Linear Related-Key Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2013

Anonymous Signcryption against Linear Related-Key Attacks.
Proceedings of the Provable Security - 7th International Conference, 2013

Efficient Semi-static Secure Broadcast Encryption Scheme.
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013

Threshold-Oriented Optimistic Fair Exchange.
Proceedings of the Network and System Security - 7th International Conference, 2013

Fairness in Concurrent Signatures Revisited.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Perfect Ambiguous Optimistic Fair Exchange.
IACR Cryptol. ePrint Arch., 2012

Enhancing Location Privacy for Electric Vehicles (at the right time).
IACR Cryptol. ePrint Arch., 2012

Efficient Escrow-Free Identity-Based Signature.
Proceedings of the Provable Security - 6th International Conference, 2012

(Strong) Multi-Designated Verifiers Signatures Secure against Rogue Key Attack.
Proceedings of the Network and System Security - 6th International Conference, 2012

BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Forward Secure Attribute-Based Signatures.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

PERM: practical reputation-based blacklisting without TTPS.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users.
ACM Trans. Inf. Syst. Secur., 2011

Privacy-Preserved Access Control for Cloud Computing.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Threshold ring signature without random oracles.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Electronic Cash with Anonymous User Suspension.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs.
ACM Trans. Inf. Syst. Secur., 2010

A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract).
Proceedings of the Provable Security - 4th International Conference, 2010

Oblivious Transfer with Access Control : Realizing Disjunction without Duplication.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model.
Proceedings of the Computer Security, 2010

Attribute-based signature and its applications.
Proceedings of the 5th ACM Symposium on Information, 2010

Proof-of-Knowledge of Representation of Committed Value and Its Applications.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?
Proceedings of the Provable Security, Third International Conference, 2009

Online/Offline Ring Signature Scheme.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Escrowed Deniable Identification Schemes.
Proceedings of the Security Technology, 2009

Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems.
Proceedings of the Topics in Cryptology, 2009

2008
Constant-Size Dynamic k-TAA.
IACR Cryptol. ePrint Arch., 2008

PEREA: towards practical TTP-free revocation in anonymous authentication.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

Traceable and Retrievable Identity-Based Encryption.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
(Convertible) Undeniable Signatures without Random Oracles.
IACR Cryptol. ePrint Arch., 2007

Structural Identity-Based Encryption.
IACR Cryptol. ePrint Arch., 2007

Practical Anonymous Divisible E-Cash From Bounded Accumulators.
IACR Cryptol. ePrint Arch., 2007

Practical Compact E-Cash.
IACR Cryptol. ePrint Arch., 2007

Certificate Based (Linkable) Ring Signature.
Proceedings of the Information Security Practice and Experience, 2007

Compact E-Cash from Bounded Accumulator.
Proceedings of the Topics in Cryptology, 2007

Blacklistable anonymous credentials: blocking misbehaving users without ttps.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model.
IACR Cryptol. ePrint Arch., 2006

Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles.
IACR Cryptol. ePrint Arch., 2006

Malicious KGC Attacks in Certificateless Cryptography.
IACR Cryptol. ePrint Arch., 2006

Constant-Size Dynamic <i>k</i>-TAA.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

ID-Based Ring Signature Scheme Secure in the Standard Model.
Proceedings of the Advances in Information and Computer Security, 2006

Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature.
Proceedings of the Progress in Cryptology, 2006

Short Linkable Ring Signatures Revisited.
Proceedings of the Public Key Infrastructure, 2006

Event-Oriented <i>k</i>-Times Revocable-iff-Linked Group Signatures.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity.
IACR Cryptol. ePrint Arch., 2005

Short E-Cash.
Proceedings of the Progress in Cryptology, 2005

2004
Separable Linkable Threshold Ring Signatures.
IACR Cryptol. ePrint Arch., 2004

ID-based Cryptography from Composite Degree Residuosity.
IACR Cryptol. ePrint Arch., 2004


  Loading...