Tung-Tso Tsai

Orcid: 0000-0002-7833-7688

According to our database1, Tung-Tso Tsai authored at least 44 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Leakage-Resilient Anonymous Heterogeneous Multi-Receiver Hybrid Encryption in Heterogeneous Public-Key System Settings.
IEEE Access, 2024

A Secure Certificateless Multi-signature Scheme for Wireless Sensor Networks.
Proceedings of the 8th International Conference on Machine Learning and Soft Computing, 2024

2023
CBEET: Constructing Certificate-based Encryption with Equality Test in the CB-PKS.
Inf. Technol. Control., December, 2023

Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation.
Sensors, March, 2023

Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications.
Informatica, 2023

Leakage-Resilient Certificateless Signcryption Scheme Under a Continual Leakage Model.
IEEE Access, 2023

Leakage-Resilient Anonymous Multi-Receiver Certificate-Based Key Encapsulation Scheme.
IEEE Access, 2023

CL-SML: Secure Certificateless Signature with Message Linkages for IoT-Based Fog Computing Environments.
Proceedings of the 5th International Conference on Big-data Service and Intelligent Computation, 2023

2022
An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments.
Sensors, 2022

Leakage-Resilient Certificate-Based Authenticated Key Exchange Protocol.
IEEE Open J. Comput. Soc., 2022

An Efficient Revocable Identity-Based Encryption with Equality Test Scheme for the Wireless Body Area Network.
J. Sensors, 2022

Revocable Certificateless Public Key Encryption with Equality Test.
Inf. Technol. Control., 2022

Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority.
Informatica, 2022

Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage Model.
IEEE Access, 2022

Practical Leakage-resilient Signcryption Scheme Suitable for Mobile Environments.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022

Equality Test of Ciphertexts in Certificateless Public Key Systems with an Outsourced Revocation Authority.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022

2021
A Leakage-Resilient ID-Based Authenticated Key Exchange Protocol With a Revocation Mechanism.
IEEE Access, 2021

2020
Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage.
IEEE Open J. Comput. Soc., 2020

Leakage-Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server.
Inf. Technol. Control., 2020

Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation Authority.
Informatica, 2020

2019
Efficient Certificate-Based Signature with Short Key and Signature Sizes from Lattices.
Informatica, 2019

Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks.
IEEE Access, 2019

2018
Identity-Based Encryption with Cloud Revocation Authority and Its Applications.
IEEE Trans. Cloud Comput., 2018

2017
Efficient Anonymous Multireceiver Certificateless Encryption.
IEEE Syst. J., 2017

SIBSC: Separable Identity-Based Signcryption for Resource-Constrained Devices.
Informatica, 2017

2016
List-Free ID-Based Mutual Authentication and Key Agreement Protocol for Multiserver Architectures.
IEEE Trans. Emerg. Top. Comput., 2016

Cryptanalysis and Improvement of a Provable Data Possession Scheme in Public Cloud Storage.
Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016

2015
Revocable Certificateless Public Key Encryption.
IEEE Syst. J., 2015

Enhancement on strongly secure group key agreement.
Secur. Commun. Networks, 2015

Efficient revocable certificateless public key encryption with a delegated revocation authority.
Secur. Commun. Networks, 2015

Certificateless Signature with Strong Unforgeability in the Standard Model.
Informatica, 2015

A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile Devices.
Int. J. Distributed Sens. Networks, 2015

Leakage-Free ID-Based Signature.
Comput. J., 2015

2014
Strongly Secure Revocable ID-based Signature without Random Oracles.
Inf. Technol. Control., 2014

RHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBE.
Informatica, 2014

Efficient Strongly Unforgeable ID-Based Signature Without Random Oracles.
Informatica, 2014

Efficient searchable ID-based encryption with a designated server.
Ann. des Télécommunications, 2014

2013
Provably secure revocable ID-based signature in the standard model.
Secur. Commun. Networks, 2013

Efficient Revocable Multi-Receiver ID-Based Encryption.
Inf. Technol. Control., 2013

2012
A Revocable ID-based Signcryption Scheme.
J. Inf. Hiding Multim. Signal Process., 2012

A Fully Secure Revocable ID-Based Encryption in the Standard Model.
Informatica, 2012

A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants.
Comput. Networks, 2012

Efficient Revocable ID-Based Encryption with a Public Channel.
Comput. J., 2012

Revocable ID-based Signature Scheme with Batch Verifications.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012


  Loading...