Raylin Tso

Orcid: 0000-0003-1485-0164

According to our database1, Raylin Tso authored at least 125 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Cryptanalysis of a round optimal lattice-based multisignature scheme.
Inf. Process. Lett., August, 2023

Comments on "Dynamic Consensus Committee-Based for Secure Data Sharing With Authorized Multi-Receiver Searchable Encryption".
CoRR, 2023

2022
Identity-Certifying Authority-Aided Identity-Based Searchable Encryption Framework in Cloud Systems.
IEEE Syst. J., 2022

Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT.
J. Syst. Archit., 2022

Extension of elliptic curve Qu-Vanstone certificates and their applications.
J. Inf. Secur. Appl., 2022

Quantum-resistant anonymous identity-based encryption with trable identities.
IET Inf. Secur., 2022

Public-Key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-Resistant Instantiation.
Comput. J., 2022

Quantum-Resistant 1-out-of-N Oblivious Signatures from Lattices.
Proceedings of the Advances in Information and Computer Security, 2022

Blockchain-Based Confidential Payment System with Controllable Regulation.
Proceedings of the Information Security Practice and Experience, 2022

Blockchain-Based Self-Sovereign Identity System with Attribute-Based Issuance.
Proceedings of the Information Security Practice and Experience, 2022

Public Key Encryption with Hierarchical Authorized Keyword Search.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022

Cryptanalysis to Ming et al.'s Revocable Multi-Authority Attribute-Based Encryption.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

Message from the Program Co-Chairs: AsiaJCIS 2022.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

2021
Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks.
J. Supercomput., 2021

Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function.
Secur. Commun. Networks, 2021

Designated-ciphertext searchable encryption.
J. Inf. Secur. Appl., 2021

Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation.
IACR Cryptol. ePrint Arch., 2021

Quantum-resistant Anonymous IBE with Traceable Identities.
IACR Cryptol. ePrint Arch., 2021

Notes on a lattice-based proxy-oriented identity-based encryption with keyword search.
IACR Cryptol. ePrint Arch., 2021

Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud System.
IACR Cryptol. ePrint Arch., 2021

Cryptanalysis on 'An efficient identity-based proxy signcryption using lattice'.
IACR Cryptol. ePrint Arch., 2021

Public key encryption with filtered equality test revisited.
Des. Codes Cryptogr., 2021

Partially Blind ECDSA Scheme and Its Application to Bitcoin.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

Improved Proxy Re-encryption Scheme with Equality Test.
Proceedings of the 16th Asia Joint Conference on Information Security, 2021

2020
Quantum (<i>t</i>, <i>n</i>) threshold group signature based on Bell state.
Quantum Inf. Process., 2020

PrivGRU: Privacy-preserving GRU inference using additive secret sharing.
J. Intell. Fuzzy Syst., 2020

Intelligence-led response: turning theory into law enforcement practice in cyber security incidents.
Int. J. Electron. Bus., 2020

A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism.
IACR Cryptol. ePrint Arch., 2020

Practical Predicate Encryption for Inner Product.
IACR Cryptol. ePrint Arch., 2020

Quantum-resistant Public-key Authenticated Encryption with Keyword Search for Industrial Internet of Things.
IACR Cryptol. ePrint Arch., 2020

Cryptanalysis of "FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things".
IACR Cryptol. ePrint Arch., 2020

A Study on Privacy-Preserving GRU Inference Framework.
IACR Cryptol. ePrint Arch., 2020

Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing.
IEEE Access, 2020

An Enhanced Mondrian Anonymization Model based on Self-Organizing Map.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

Multi-value Private Information Retrieval using Homomorphic Encryption.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

Defense against N-pixel Attacks based on Image Reconstruction.
Proceedings of the 8th International Workshop on Security in Blockchain and Cloud Computing, 2020

2019
Efficient quantum multi-proxy signature.
Quantum Inf. Process., 2019

Quantum secret sharing by using Fourier transform on orbital angular momentum.
IET Inf. Secur., 2019

Quantum-resistant Designated-ciphertext Searchable Encryption.
IACR Cryptol. ePrint Arch., 2019

Two-in-one oblivious signatures.
Future Gener. Comput. Syst., 2019

Witness-based searchable encryption with optimal overhead for cloud-edge computing.
Future Gener. Comput. Syst., 2019

Identity-Based Blind Multisignature From Lattices.
IEEE Access, 2019

Malware Image Classification Using One-Shot Learning with Siamese Networks.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

Analyzing WannaCry Ransomware Considering the Weapons and Exploits.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

SCDP: Smart Contract-based Decentralized Privacy System for Securing Data Ownership Management.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

An Improved Non-Interactive Zero-Knowledge Range Proof for Decentralized Applications.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2019

Signcryption from NTRU Lattices Without Random Oracles.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2018
A shareable keyword search over encrypted data in cloud computing.
J. Supercomput., 2018

Untraceable and Anonymous Mobile Payment Scheme Based on Near Field Communication.
Symmetry, 2018

Establishing rational networking using the DL04 quantum secure direct communication protocol.
Quantum Inf. Process., 2018

Multi-dimensional quantum state sharing based on quantum Fourier transform.
Quantum Inf. Process., 2018

Threshold quantum state sharing based on entanglement swapping.
Quantum Inf. Process., 2018

High-capacity quantum secret sharing based on orbital angular momentum.
Quantum Inf. Comput., 2018

A k-out-of-n Ring Signature with Flexible Participation for Signers.
IACR Cryptol. ePrint Arch., 2018

Privacy-Preserving Outsourced Similarity Test for Access Over Encrypted Data in the Cloud.
IEEE Access, 2018

Policy-Controlled Signature from NTRU Lattice.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Oblivious Transfer Protocols Based on Commutative Encryption.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

2017
Privacy-Preserving Data Communication Through Secure Multi-Party Computation in Healthcare Sensor Cloud.
J. Signal Process. Syst., 2017

Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption.
J. Comput. Syst. Sci., 2017

Provable secure dual-server public key encryption with keyword search.
Proceedings of the IEEE 2nd International Verification and Security Workshop, 2017

IoT sandbox: to analysis IoT malware Zollard.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

A Survey of Secret Sharing Schemes Based on Latin Squares.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

Password-Based Authenticated Key Exchange from Lattices for Client/Server Model.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

Decentralized E-Voting Systems Based on the Blockchain Technology.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

Reputation-Based Trust Evaluation Mechanism for Decentralized Environments and Its Applications Based on Smart Contracts.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

An Off-Line Mobile Payment Protocol Providing Double-Spending Detection.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017

2016
Two-in-One Oblivious Signatures Secure in the Random Oracle Model.
Proceedings of the Network and System Security - 10th International Conference, 2016

NFC-based Mobile Payment Protocol with User Anonymity.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

Security analysis of a NTRU-based mutual authentication scheme.
Proceedings of the 18th Asia-Pacific Network Operations and Management Symposium, 2016

2015
Certificateless aggregate signature with efficient verification.
Secur. Commun. Networks, 2015

On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks.
J. Univers. Comput. Sci., 2015

Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of two Schemes.
J. Inf. Sci. Eng., 2015

PKE-AET: Public Key Encryption with Authorized Equality Test.
Comput. J., 2015

An Empirical Comparison between Kelly Criterion and Vince's Optimal F.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Semantic Secure Public Key Encryption with Filtered Equality Test - PKE-FET.
Proceedings of the SECRYPT 2015, 2015

An Adaptive Kelly Betting Strategy for Finite Repeated Games.
Proceedings of the Genetic and Evolutionary Computing, 2015

Security Analysis of an Anonymous Authentication Scheme Based on Smart Cards and Biometrics for Multi-server Environments.
Proceedings of the Genetic and Evolutionary Computing, 2015

2014
A secret sharing scheme for EBTC using steganography.
J. Intell. Manuf., 2014

On the improvement of Fermat factorization using a continued fraction technique.
Future Gener. Comput. Syst., 2014

A New Ultra-Lightweight RFID Authentication Protocol Based on Physical Unclonable Functions.
Proceedings of the Radio Frequency Identification System Security, 2014

A New Public Key Encryption with Equality Test.
Proceedings of the Network and System Security - 8th International Conference, 2014

Security Analysis and Improvement of Femtocell Access Control.
Proceedings of the Network and System Security - 8th International Conference, 2014

An Improved Visual Cryptography with Cheating Prevention.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Efficient public key encryption with user-friendly keywords search for searchable cloud storage.
Proceedings of the Intelligent Systems and Applications, 2014

Pitfalls in an Ultra-Lightweight Authentication Protocol for Low-Cost RFID.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Virtual Network Guard System Based on Cloud Computing Environments.
Proceedings of the Genetic and Evolutionary Computing, 2014

An Incremental Algorithm for Maintaining the Built FUSP Trees Based on the Pre-large Concepts.
Proceedings of the Intelligent Data analysis and its Applications, Volume I, 2014

2013
Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol.
J. Supercomput., 2013

Security Analysis of Choi et al.'s Certificateless Short Signature Scheme.
J. Inf. Hiding Multim. Signal Process., 2013

Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes.
IACR Cryptol. ePrint Arch., 2013

A new way to generate a ring: Universal ring signature.
Comput. Math. Appl., 2013

Design and Implementation of Digital Forensic Software for iPhone.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Convertible ring signatures with gradual revelation of non-signers.
Secur. Commun. Networks, 2012

Strongly secure certificateless short signatures.
J. Syst. Softw., 2012

A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adverssaries.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

Identity-based Password-Authenticated Key Exchange for Client/Server Model.
Proceedings of the SECRYPT 2012, 2012

On the Improvement of Fermat Factorization.
Proceedings of the Network and System Security - 6th International Conference, 2012

Cryptanalysis of Exhaustive Search on Attacking RSA.
Proceedings of the Network and System Security - 6th International Conference, 2012

Security Analysis Concerning the Random Numbers of Threshold Ring Signatures.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

2011
Efficient and short certificateless signatures secure against realistic adversaries.
J. Supercomput., 2011

Three-party Password-authenticated Key Exchange without Random Oracles.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Certificateless Ordered Sequential Aggregate Signature Scheme.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

A Privacy Preserved Two-Party Equality Testing Protocol.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

2010
Certificateless Proxy Signature and Its Extension to Blind Signature.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Design and Analysis of "Flexible" <i>k</i>-out-of-<i>n</i> Signatures.
Proceedings of the Autonomic and Trusted Computing - 7th International Conference, 2010

2009
Efficient Short Signatures from Pairing.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

2008
1-out-of-.
Proceedings of the Information Security Practice and Experience, 2008

Efficient convertible Limited Verifier Signatures.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Convertible Undeniable Partially Blind Signature from Bilinear Pairings.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

A Sanitizing Signature Scheme with Indexing.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Efficient and Short Certificateless Signature.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

Signcryption Scheme with Standardized Verification Algorithm.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

A Restricted Undeniable Designated Verifier Signature.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
ID-Based Group Password-Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2007

An Improved Signcryption Scheme and Its Variation.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

Verifier-Key-Flexible Universal Designated-Verifier Signatures.
Proceedings of the Cryptography and Coding, 2007

ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Efficient ID-Based Digital Signatures with Message Recovery.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

ID-Based Key Agreement for Dynamic Peer Groups in Mobile Computing Environments.
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007

2006
An Efficient ID-based Digital Signature with Message Recovery Based on Pairing.
IACR Cryptol. ePrint Arch., 2006

2005
A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment.
IACR Cryptol. ePrint Arch., 2005

One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2005

Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

An id-based non-interactive tripartite key agreement protocol with K-resilience.
Proceedings of the Third IASTED International Conference on Communications and Computer Networks, 2005

2003
A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with Cheaters.
Proceedings of the Information Security and Cryptology, 2003


  Loading...