Xiaofeng Chen

According to our database1, Xiaofeng Chen authored at least 218 papers between 2002 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Privacy-Preserving Collaborative Model Learning: The Case of Word Vector Training.
IEEE Trans. Knowl. Data Eng., 2018

Anonymous and Traceable Group Data Sharing in Cloud Computing.
IEEE Trans. Information Forensics and Security, 2018

Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing.
Soft Comput., 2018

Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures.
Peer-to-Peer Networking and Applications, 2018

Blockchain-based publicly verifiable data deletion scheme for cloud storage.
J. Network and Computer Applications, 2018

Multi-authority fine-grained access control with accountability and its application in cloud.
J. Network and Computer Applications, 2018

A matrix-based cross-layer key establishment protocol for smart homes.
Inf. Sci., 2018

DedupDUM: Secure and scalable data deduplication with dynamic user management.
Inf. Sci., 2018

Secure data uploading scheme for a smart home system.
Inf. Sci., 2018

Privacy preserving multi-party computation delegation for deep learning in cloud computing.
Inf. Sci., 2018

Comparable encryption scheme supporting multiple users in cloud computing.
IJHPCN, 2018

Privacy-preserving machine learning with multiple data providers.
Future Generation Comp. Syst., 2018

Bitcoin-based fair payments for outsourcing computations of fog devices.
Future Generation Comp. Syst., 2018

Secure attribute-based data sharing for resource-limited users in cloud computing.
Computers & Security, 2018

An Almost Non-interactive Order Preserving Encryption Scheme.
Proceedings of the Information Security Practice and Experience, 2018

Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Updatable Block-Level Deduplication with Dynamic Ownership Management on Encrypted Data.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database.
Proceedings of the Computer Security, 2018

Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data.
IEEE Trans. Information Forensics and Security, 2017

Secure and Efficient Cloud Data Deduplication With Randomized Tag.
IEEE Trans. Information Forensics and Security, 2017

Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design.
ACM Trans. Embedded Comput. Syst., 2017

Efficient and secure encrypted image search in mobile cloud computing.
Soft Comput., 2017

WhirlingFuzzwork: a taint-analysis-based API in-memory fuzzing framework.
Soft Comput., 2017

Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks.
IEEE Systems Journal, 2017

Towards privacy protection and malicious behavior traceability in smart health.
Personal and Ubiquitous Computing, 2017

Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing.
Inf. Sci., 2017

TrDup: enhancing secure data deduplication with user traceability in cloud computing.
IJWGS, 2017

Towards achieving flexible and verifiable search for outsourced database in cloud computing.
Future Generation Comp. Syst., 2017

Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
Proceedings of the Provable Security, 2017

TTP-free Fair Exchange of Digital Signatures with Bitcoin.
Proceedings of the Information Security Practice and Experience, 2017

A Hierarchical VDB Scheme with Scalable Verification and Tampered Record Localization.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply Chain.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

A client-based secure deduplication of multimedia data.
Proceedings of the IEEE International Conference on Communications, 2017

New Publicly Verifiable Computation for Batch Matrix Multiplication.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

A Fair Three-Party Contract Singing Protocol Based on Blockchain.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
Introduction to Secure Outsourcing Computation
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, 2016

Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation.
IEEE Trans. Computers, 2016

Verifiable Computation over Large Database with Incremental Updates.
IEEE Trans. Computers, 2016

Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing.
Soft Comput., 2016

Efficient request-based comparable encryption scheme based on sliding window method.
Soft Comput., 2016

Anonymous attribute-based proxy re-encryption for access control in cloud computing.
Security and Communication Networks, 2016

Efficient attribute-based data sharing in mobile clouds.
Pervasive and Mobile Computing, 2016

New order preserving encryption model for outsourced databases in cloud environments.
J. Network and Computer Applications, 2016

Secure searchable encryption: a survey.
J. Comm. Inform. Networks, 2016

Secure three-party computational protocols for triangle area.
Int. J. Inf. Sec., 2016

N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks.
Int. J. Comput. Math., 2016

Improved algorithm for secure outsourcing of modular exponentiations with high checkability.
IJAHUC, 2016

Efficient and Secure Storage for Outsourced Data: A Survey.
Data Science and Engineering, 2016

Design and analysis of secure mechanisms based on tripartite credibility for RFID systems.
Computer Standards & Interfaces, 2016

Multi-device Anonymous Authentication.
Proceedings of the Network and System Security - 10th International Conference, 2016

Protecting Electronic Signatures in Case of Key Leakage.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Location-Sensitive Data Sharing in Mobile Cloud Computing.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Towards Efficient Fully Randomized Message-Locked Encryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
A Hybrid Cloud Approach for Secure Authorized Deduplication.
IEEE Trans. Parallel Distrib. Syst., 2015

Privacy-aware attribute-based PHR sharing with user accountability in cloud computing.
The Journal of Supercomputing, 2015

New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations.
IEEE Trans. Information Forensics and Security, 2015

New Publicly Verifiable Databases with Efficient Updates.
IEEE Trans. Dependable Sec. Comput., 2015

Efficient algorithms for secure outsourcing of bilinear pairings.
Theor. Comput. Sci., 2015

OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices.
IEEE Trans. Cloud Computing, 2015

Verifiable Auditing for Outsourced Database in Cloud Computing.
IEEE Trans. Computers, 2015

Identity-Based Encryption with Outsourced Revocation in Cloud Computing.
IEEE Trans. Computers, 2015

Secure Distributed Deduplication Systems with Improved Reliability.
IEEE Trans. Computers, 2015

Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information.
Security and Communication Networks, 2015

Secure multi-server-aided data deduplication in cloud computing.
Pervasive and Mobile Computing, 2015

Designing cloud-based electronic health record system with attribute-based encryption.
Multimedia Tools Appl., 2015

V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service.
Mobile Information Systems, 2015

L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing.
Knowl.-Based Syst., 2015

Secure deduplication storage systems supporting keyword search.
J. Comput. Syst. Sci., 2015

New access control systems based on outsourced attribute-based encryption.
Journal of Computer Security, 2015

Editorial preface for the special issue "Advances in security, privacy and trust technologies".
J. Ambient Intelligence and Humanized Computing, 2015

New attribute-based authentication and its application in anonymous cloud access service.
IJWGS, 2015

Efficient and Verifiable Outsourcing Scheme of Sequence Comparisons.
Intelligent Automation & Soft Computing, 2015

Efficient hardware implementation of PMI+ for low-resource devices in mobile cloud computing.
Future Generation Comp. Syst., 2015

Towards secure and reliable cloud storage against data re-outsourcing.
Future Generation Comp. Syst., 2015

Advances on cloud services and cloud computing.
Concurrency and Computation: Practice and Experience, 2015

Extend the Concept of Public Key Encryption with Delegated Search.
Comput. J., 2015

Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach.
Proceedings of the Provable Security, 2015

A Stable Matching-Based Selection and Memory Enhanced MOEA/D for Evolutionary Dynamic Multiobjective Optimization.
Proceedings of the 27th IEEE International Conference on Tools with Artificial Intelligence, 2015

Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key.
Proceedings of the Computer Security - ESORICS 2015, 2015

Group-oriented Proofs of Storage.
Proceedings of the 10th ACM Symposium on Information, 2015

Secure Encrypted Image Search in Mobile Cloud Computing.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Efficient First-Price Sealed-Bid Auction Protocols from Modified Comparable Encryption.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Request-Based Comparable Encryption Scheme with Multiple Users.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Verifiable Search for Dynamic Outsourced Database in Cloud Computing.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

A New Secure Data Deduplication Approach Supporting User Traceability.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

An Improved Algorithm for Secure Outsourcing of Modular Exponentiations.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

Design and Analysis of an Enhanced Secure Mechanism of LLRP in RFID Systems.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

A New Efficient Request-Based Comparable Encryption Scheme.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

2014
Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks.
IEEE Trans. Parallel Distrib. Syst., 2014

Securely Outsourcing Attribute-Based Encryption with Checkability.
IEEE Trans. Parallel Distrib. Syst., 2014

Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems.
IEEE Trans. Parallel Distrib. Syst., 2014

Secure Outsourced Attribute-Based Signatures.
IEEE Trans. Parallel Distrib. Syst., 2014

Secure Deduplication with Efficient and Reliable Convergent Key Management.
IEEE Trans. Parallel Distrib. Syst., 2014

New Algorithms for Secure Outsourcing of Modular Exponentiations.
IEEE Trans. Parallel Distrib. Syst., 2014

Deniability and forward secrecy of one-round authenticated key exchange.
The Journal of Supercomputing, 2014

An efficient PHR service system supporting fuzzy keyword search and fine-grained access control.
Soft Comput., 2014

{MobiShare}+: Security Improved System for Location Sharing in Mobile Online Social Networks.
J. Internet Serv. Inf. Secur., 2014

Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing.
TIIS, 2014

Identity-based chameleon hashing and signatures without key exposure.
Inf. Sci., 2014

More DCCA-secure public-key encryptions from KEM + DEM style hybrid paradigms and some observations on the 'inner-outer' structure.
IJGUC, 2014

Privacy-preserving data utilization in hybrid clouds.
Future Generation Comp. Syst., 2014

Digital provenance: Enabling secure data forensics in cloud computing.
Future Generation Comp. Syst., 2014

New and efficient conditional e-payment systems with transferability.
Future Generation Comp. Syst., 2014

Advances in secure and intelligent data processing.
Concurrency and Computation: Practice and Experience, 2014

Efficient and robust identity-based handoff authentication for EAP-based wireless networks.
Concurrency and Computation: Practice and Experience, 2014

Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks.
Computer Networks, 2014

Ticket-based handoff authentication for wireless mesh networks.
Computer Networks, 2014

Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts.
Proceedings of the Provable Security - 8th International Conference, 2014

TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing.
Proceedings of the Information Security Practice and Experience, 2014

An Effective Cloud-Based Active Defense System against Malicious Codes.
Proceedings of the Information and Communication Technology, 2014

M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet.
Proceedings of the Information and Communication Technology, 2014

Verifiable Computation over Large Database with Incremental Updates.
Proceedings of the Computer Security - ESORICS 2014, 2014

Verifiable Algorithm for Secure Outsourcing of Systems of Linear Equations in the Case of No Solution.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Secure Approximate Nearest Neighbor Search over Encrypted Data.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Efficient and Verifiable Algorithm for Secure Outsourcing of Large-scale Linear Programming.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

Secure Deduplication Storage Systems with Keyword Search.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

A Secure Three-Party Computational Protocol for Triangle Area.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
A non-delegatable strong designated verifier signature in ID-based setting for mobile environment.
Mathematical and Computer Modelling, 2013

An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing.
J. UCS, 2013

Constructing Verifiable Random Number in Finite Field.
J. Internet Serv. Inf. Secur., 2013

Security Analysis of a Suite of Deniable Authentication Protocols.
I. J. Network Security, 2013

Efficient online/offline signcryption without key exposure.
IJGUC, 2013

Efficient verifiable fuzzy keyword search over encrypted data in cloud computing.
Comput. Sci. Inf. Syst., 2013

Key-Evolving Hierarchical ID-Based Signcryption.
Comput. J., 2013

Selectively unforgeable but existentially forgeable signature schemes and applications.
SCIENCE CHINA Information Sciences, 2013

Efficient Multi-User Keyword Search over Encrypted Data in Cloud Computing.
Computing and Informatics, 2013

V-MLR: A Multilevel Security Model for Virtualization.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

RangeTree: A Feature Selection Algorithm for C4.5 Decision Tree.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

An Efficient Proof of Retrievability with Public Auditing in Cloud Computing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Secure and Verifiable Outsourcing of Sequence Comparisons.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2013, 2013

Server-Aided Hierarchical Identity-Based Encryption.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Anonymous attribute-based encryption supporting efficient decryption test.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Towards asymmetric searchable encryption with message recovery and flexible search authorization.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

New Privacy-Preserving Location Sharing System for Mobile Online Social Networks.
Proceedings of the Eighth International Conference on P2P, 2013

2012
Efficient Fair Conditional Payments for Outsourcing Computations.
IEEE Trans. Information Forensics and Security, 2012

A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search.
JoWUA, 2012

A New Efficient Verifiable Fuzzy Keyword Search Scheme.
JoWUA, 2012

A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data.
J. Internet Serv. Inf. Secur., 2012

Generic security-amplifying methods of ordinary digital signatures.
Inf. Sci., 2012

Refine the Concept of Public Key Encryption with Delegated Search.
IACR Cryptology ePrint Archive, 2012

Secure Outsourced Attribute-Based Signatures.
IACR Cryptology ePrint Archive, 2012

Efficient ID-based non-malleable trapdoor commitment.
Computers & Electrical Engineering, 2012

Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud.
Proceedings of the Network and System Security - 6th International Conference, 2012

Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks.
Proceedings of the Network and System Security - 6th International Conference, 2012

DCCA-Secure Public-Key Encryptions from Hybrid Paradigms.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Outsourcing Encryption of Attribute-Based Encryption with MapReduce.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

New Algorithms for Secure Outsourcing of Modular Exponentiations.
Proceedings of the Computer Security - ESORICS 2012, 2012

A Short Non-delegatable Strong Designated Verifier Signature.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Identity-based trapdoor mercurial commitments and applications.
Theor. Comput. Sci., 2011

Provable Security.
J. Internet Serv. Inf. Secur., 2011

New receipt-free voting scheme using double-trapdoor commitment.
Inf. Sci., 2011

Discrete logarithm based chameleon hashing and signatures without key exposure.
Computers & Electrical Engineering, 2011

Non-delegatable Strong Designated Verifier Signature on Elliptic Curves.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

Non-interactive Deniable Authentication Protocols.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

Multi-authority ciphertext-policy attribute-based encryption with accountability.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Efficient Online/Offline Signcryption Scheme.
Intelligent Automation & Soft Computing, 2010

Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing.
Proceedings of the Cloud Computing, Second International Conference, 2010

Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Identity-Based Chameleon Hash Scheme without Key Exposure.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
The ring authenticated encryption scheme - How to provide a clue wisely.
Inf. Sci., 2009

Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05.
Inf. Process. Lett., 2009

Analysis of Two Types Deniable Authentication Protocols.
I. J. Network Security, 2009

Identity-based Universal Designated Verifier Signature Proof System.
I. J. Network Security, 2009

Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems.
IACR Cryptology ePrint Archive, 2009

Identity-Based Chameleon Hash Scheme Without Key Exposure.
IACR Cryptology ePrint Archive, 2009

Comments and Improvements on Chameleon Hashing Without Key Exposure Based on Factoring.
IACR Cryptology ePrint Archive, 2009

ID-Based Adaptive Oblivious Transfer.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Basic Properties of Calcium Phosphate Cement Containing Chitosan in its Liquid Phase.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

2008
Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme.
J. Comput. Sci. Technol., 2008

Efficient generic on-line/off-line (threshold) signatures without key exposure.
Inf. Sci., 2008

A New and Efficient Signature on Commitment Values.
I. J. Network Security, 2008

A New Type of Designated Confirmer Signatures for a Group of Individuals.
I. J. Network Security, 2008

A Tamper-Evident Voting Machine Resistant to Covert Channels.
Proceedings of the Provable Security, Second International Conference, 2008

Efficient designated confirmer signature from bilinear pairings.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
ID-based restrictive partially blind signatures and applications.
Journal of Systems and Software, 2007

On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature.
IACR Cryptology ePrint Archive, 2007

Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature.
Proceedings of the Provable Security, 2007

ID-based Ring Proxy Signatures.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Society-oriented Designated Confirmer Signatures.
Proceedings of the Third International Conference on Natural Computation, 2007

Efficient Generic On-Line/Off-Line Signatures Without Key Exposure.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security.
IACR Cryptology ePrint Archive, 2006

A New Signature Scheme Without Random Oracles from Bilinear Pairings.
Proceedings of the Progressin Cryptology, 2006

Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings.
Proceedings of the Financial Cryptography and Data Security, 2006

Generalization of the Selective-ID Security Model for HIBS Protocols.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
Cryptanalysis of Huang-Chang partially blind signature scheme.
Journal of Systems and Software, 2005

Comment on the Public Key Substitution Attacks.
I. J. Network Security, 2005

A New Short Signature Scheme Without Random Oracles from Bilinear Pairings.
IACR Cryptology ePrint Archive, 2005

Attack on Okamoto et al.'s New Short Signature Schemes.
IACR Cryptology ePrint Archive, 2005

Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05.
IACR Cryptology ePrint Archive, 2005

ID-based Restrictive Partially Blind Signatures and Applications.
IACR Cryptology ePrint Archive, 2005

t-Out-of-n String/Bit Oblivious Transfers Revisited.
Proceedings of the Information Security Practice and Experience, 2005

Identity-Based Universal Designated Verifier Signatures.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

ID-Based Restrictive Partially Blind Signatures.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Attack on an ID-based authenticated group key agreement scheme from PKC 2004.
Inf. Process. Lett., 2004

Chameleon Hashing without Key Exposure.
IACR Cryptology ePrint Archive, 2004

Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group.
Proceedings of the Information Security, 7th International Conference, 2004

Chameleon Hashing Without Key Exposure.
Proceedings of the Information Security, 7th International Conference, 2004

New ID-Based Threshold Signature Scheme from Bilinear Pairings.
Proceedings of the Progress in Cryptology, 2004

Publicly Verifiable Auctions with Minimal Leakage.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

Limited Verifier Signature from Bilinear Pairings.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Attack on Two ID-based Authenticated Group Key Agreement Schemes.
IACR Cryptology ePrint Archive, 2003

A New Approach to Prevent Blackmailing in E-Cash.
IACR Cryptology ePrint Archive, 2003

A New ID-based Group Signature Scheme from Bilinear Pairings.
IACR Cryptology ePrint Archive, 2003

Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption.
Proceedings of the Information Security and Cryptology, 2003

ID-Based Distributed "Magic Ink" Signature from Pairings.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

An Agent-Based Multi Rounds Online Auction Protocol with Sealed Bids.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

New Key Improvements and Its Application to XTR System.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

2002
Fair Electronic Cash Based on Double Signatur.
J. Comput. Sci. Technol., 2002


  Loading...