Yi-Fan Tseng

Orcid: 0000-0001-6948-2405

According to our database1, Yi-Fan Tseng authored at least 65 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Attribute hiding subset predicate encryption: Quantum-resistant construction with efficient decryption.
Comput. Stand. Interfaces, March, 2024

2023
An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for MQTT.
ACM Trans. Sens. Networks, August, 2023

Cryptanalysis of a round optimal lattice-based multisignature scheme.
Inf. Process. Lett., August, 2023

A Novel Ciphertext-Policy Attribute-Based Encryption Supporting Dual Membership.
Proceedings of the 18th Asia Joint Conference on Information Security, 2023

Anonymous and Unlinkable Identity Scheme in Open Data Environment.
Proceedings of the 18th Asia Joint Conference on Information Security, 2023

2022
ID-Based Multireceiver Homomorphic Proxy Re-Encryption in Federated Learning.
ACM Trans. Sens. Networks, November, 2022

A Novel Undeniable (t, n)-Threshold Signature with Cheater Identification.
Symmetry, 2022

Identity-Certifying Authority-Aided Identity-Based Searchable Encryption Framework in Cloud Systems.
IEEE Syst. J., 2022

Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT.
J. Syst. Archit., 2022

Fast keyword search over encrypted data with short ciphertext in clouds.
J. Inf. Secur. Appl., 2022

Extension of elliptic curve Qu-Vanstone certificates and their applications.
J. Inf. Secur. Appl., 2022

Quantum-resistant anonymous identity-based encryption with trable identities.
IET Inf. Secur., 2022

Public-Key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-Resistant Instantiation.
Comput. J., 2022

Quantum-Resistant 1-out-of-N Oblivious Signatures from Lattices.
Proceedings of the Advances in Information and Computer Security, 2022

Blockchain-Based Confidential Payment System with Controllable Regulation.
Proceedings of the Information Security Practice and Experience, 2022

Blockchain-Based Self-Sovereign Identity System with Attribute-Based Issuance.
Proceedings of the Information Security Practice and Experience, 2022

Public Key Encryption with Hierarchical Authorized Keyword Search.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022

Cryptanalysis to Ming et al.'s Revocable Multi-Authority Attribute-Based Encryption.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

Cryptanalysis and Discussion on Two Attribute-Based Encryption Schemes.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

2021
Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function.
Secur. Commun. Networks, 2021

Anonymous Multireceiver Identity-Based Encryption against Chosen-Ciphertext Attacks with Tight Reduction in the Standard Model.
Secur. Commun. Networks, 2021

Designated-ciphertext searchable encryption.
J. Inf. Secur. Appl., 2021

Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation.
IACR Cryptol. ePrint Arch., 2021

Quantum-resistant Anonymous IBE with Traceable Identities.
IACR Cryptol. ePrint Arch., 2021

Notes on a lattice-based proxy-oriented identity-based encryption with keyword search.
IACR Cryptol. ePrint Arch., 2021

Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud System.
IACR Cryptol. ePrint Arch., 2021

Cryptanalysis on 'An efficient identity-based proxy signcryption using lattice'.
IACR Cryptol. ePrint Arch., 2021

An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for Message Queueing Telemetry Transport.
IACR Cryptol. ePrint Arch., 2021

Cryptanalysis on Lin and Wu's Undeniable (t, n)-Threshold Signature Scheme with Cheater Identification.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2021

Efficient Subset Predicate Encryption for Internet of Things.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

CCA-Secure Attribute-Based Encryption Supporting Dynamic Membership in the Standard Model.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

Improved Proxy Re-encryption Scheme with Equality Test.
Proceedings of the 16th Asia Joint Conference on Information Security, 2021

Identity-Based Signature from Quadratic Residues and Its Extension to ID-Based Multi-Signature.
Proceedings of the 16th Asia Joint Conference on Information Security, 2021

2020
Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks.
Int. J. Inf. Sec., 2020

A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism.
IACR Cryptol. ePrint Arch., 2020

Practical Predicate Encryption for Inner Product.
IACR Cryptol. ePrint Arch., 2020

Quantum-resistant Public-key Authenticated Encryption with Keyword Search for Industrial Internet of Things.
IACR Cryptol. ePrint Arch., 2020

Cryptanalysis of "FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things".
IACR Cryptol. ePrint Arch., 2020

Cryptanalysis on Two Pairing-Free Ciphertext-Policy Attribute-Based Encryption Schemes.
Proceedings of the International Computer Symposium, 2020

Key-Aggregate Proxy Re-Encryption with Dynamic Condition Generation Using Multilinear Map.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

2019
FGAC-NDN: Fine-Grained Access Control for Named Data Networks.
IEEE Trans. Netw. Serv. Manag., 2019

Top-Level Secure Certificateless Signature Scheme in the Standard Model.
IEEE Syst. J., 2019

Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption.
J. Univers. Comput. Sci., 2019

On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki-Okamoto Transformation.
Int. J. Found. Comput. Sci., 2019

Quantum-resistant Designated-ciphertext Searchable Encryption.
IACR Cryptol. ePrint Arch., 2019

Identity-Based Blind Multisignature From Lattices.
IEEE Access, 2019

Signcryption from NTRU Lattices Without Random Oracles.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2018
Provably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption.
J. Inf. Sci. Eng., 2018

Probably Secure Efficient Anonymous Credential Scheme.
Int. J. Softw. Innov., 2018

An authenticated re-encryption scheme for secure file transfer in named data networks.
Int. J. Commun. Syst., 2018

An Efficient Algorithm for the Shortest Vector Problem.
IEEE Access, 2018

Verifiable Privacy-Preserving Payment Mechanism for Smart Grids.
Proceedings of the Internet and Distributed Computing Systems, 2018

Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Transformation between Attribute-Based Encryption and Key-Aggregate Cryptosystem.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

2017
Multireceiver Predicate Encryption for Online Social Networks.
IEEE Trans. Signal Inf. Process. over Networks, 2017

Attribute-Based Encryption from Identity-Based Encryption.
IACR Cryptol. ePrint Arch., 2017

Homomorphic encryption supporting logical operations.
Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering, 2017

2016
Enabled/disabled predicate encryption in clouds.
Future Gener. Comput. Syst., 2016

Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments.
Proceedings of the Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services, 2016

Flexible Authentication Protocol with Key Reconstruction in WBAN Environments.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

2015
Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security.
Symmetry, 2015

Malware Detection Systems Based on API Log Data Mining.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Attribute-Based Proxy Re-encryption with Dynamic Membership.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
Anonymous Credential Scheme Supporting Active Revocation.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2013
Secure Certificateless Signature Scheme Supporting Batch Verification.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013


  Loading...