Zhenfu Cao

Orcid: 0000-0002-5250-5030

Affiliations:
  • East China Normal University, Shanghai, China


According to our database1, Zhenfu Cao authored at least 381 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
OpenSE: Efficient Verifiable Searchable Encryption With Access and Search Pattern Hidden for Cloud-IoT.
IEEE Internet Things J., April, 2024

Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture.
ACM Comput. Surv., March, 2024

EMPSI: Efficient multiparty private set intersection (with cardinality).
Frontiers Comput. Sci., February, 2024

DMPSI: Efficient Scalable Delegated Multiparty PSI and PSI-CA With Oblivious PRF.
IEEE Trans. Serv. Comput., 2024

LSE: Efficient Symmetric Searchable Encryption Based on Labeled PSI.
IEEE Trans. Serv. Comput., 2024

The Systemic Errors of Banded Quantum Fourier Transformation.
IACR Cryptol. ePrint Arch., 2024

IPO-PEKS: Effective Inner Product Outsourcing Public Key Searchable Encryption From Lattice in the IoT.
IEEE Access, 2024

2023
dMCLAEKS: Pairing-free designated-tester multi-recipient certificateless authenticated encryption with keyword search for concealing search patterns.
J. Syst. Archit., November, 2023

LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search.
Inf. Sci., November, 2023

Dynamic identity-based broadcast proxy re-encryption for data sharing in autonomous vehicles.
Trans. Emerg. Telecommun. Technol., November, 2023

IXT: Improved searchable encryption for multi-word queries based on PSI.
Frontiers Comput. Sci., October, 2023

Criteria for entanglement and separability of discrete quantum states.
Quantum Inf. Comput., May, 2023

EPNS: Efficient Privacy-Preserving Intelligent Traffic Navigation From Multiparty Delegated Computation in Cloud-Assisted VANETs.
IEEE Trans. Mob. Comput., March, 2023

Generalized Autonomous Path Proxy Re-Encryption Scheme to Support Branch Functionality.
IEEE Trans. Inf. Forensics Secur., 2023

A Differentially Private Federated Learning Model Against Poisoning Attacks in Edge Computing.
IEEE Trans. Dependable Secur. Comput., 2023

Lightweight Privacy-Preserving Distributed Recommender System Using Tag-Based Multikey Fully Homomorphic Data Encapsulation.
IEEE Trans. Dependable Secur. Comput., 2023

BLDSS: A Blockchain-Based Lightweight Searchable Data Sharing Scheme in Vehicular Social Networks.
IEEE Internet Things J., 2023

Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations.
IACR Cryptol. ePrint Arch., 2023

The Planck Constant and Quantum Fourier Transformation.
IACR Cryptol. ePrint Arch., 2023

SVFL: Secure Vertical Federated Learning on Linear Models.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

MCVDSSE: Secure Multi-client Verifiable Dynamic Symmetric Searchable Encryption.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI Cardinality.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning.
Proceedings of the Information Security Practice and Experience, 2023

2022
SAVE: Efficient Privacy-Preserving Location-Based Service Bundle Authentication in Self-Organizing Vehicular Social Networks.
IEEE Trans. Intell. Transp. Syst., 2022

Efficient Privacy-Preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain.
IEEE Trans. Cloud Comput., 2022

Generalized Goldwasser and Micali's Type Cryptosystem.
J. Comput. Sci. Technol., 2022

The Secure Lattice-Based Data Aggregation Scheme in Residential Networks for Smart Grid.
IEEE Internet Things J., 2022

EPMDA-FED: Efficient and Privacy-Preserving Multidimensional Data Aggregation Scheme With Fast Error Detection in Smart Grid.
IEEE Internet Things J., 2022

A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid.
Frontiers Comput. Sci., 2022

A survey on cryptographic techniques for protecting big data security: present and forthcoming.
Sci. China Inf. Sci., 2022

Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds.
IEEE Access, 2022

Multi-interest Sequence Modeling for Recommendation with Causal Embedding.
Proceedings of the 2022 SIAM International Conference on Data Mining, 2022

Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Two Secure and Efficient Lightweight Data Aggregation Schemes for Smart Grid.
IEEE Trans. Smart Grid, 2021

CryptCloud$^+$+: Secure and Expressive Data Access Control for Cloud Storage.
IEEE Trans. Serv. Comput., 2021

Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format.
IEEE Trans. Serv. Comput., 2021

PVOPM: Verifiable Privacy-Preserving Pattern Matching with Efficient Outsourcing in the Malicious Setting.
IEEE Trans. Dependable Secur. Comput., 2021

SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts.
Secur. Commun. Networks, 2021

PADP: Efficient Privacy-Preserving Data Aggregation and Dynamic Pricing for Vehicle-to-Grid Networks.
IEEE Internet Things J., 2021

Improved RSA lossy trapdoor function and applications.
Int. J. Inf. Comput. Secur., 2021

Designated server-aided revocable identity-based keyword search on lattice.
EURASIP J. Wirel. Commun. Netw., 2021

Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity.
Des. Codes Cryptogr., 2021

Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory.
Comput. J., 2021

DPFDT: Decentralized Privacy-preserving Fair Data Trading System.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

RTPoW: A Proof-of-Work Consensus Scheme with Real-Time Difficulty Adjustment Algorithm.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

PSSBP: A Privacy-preserving Scope-query Searchable Encryption Scheme Based on Blockchain for Parking Lots Sharing in Vehicular Networks.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

PKMark: A Robust Zero-distortion Blind Reversible Scheme for Watermarking Relational Databases.
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021

2020
Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search.
IEEE Trans. Serv. Comput., 2020

LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs.
IEEE Trans. Inf. Forensics Secur., 2020

Blockchain-Based Lightweight Certificate Authority for Efficient Privacy-Preserving Location-Based Service in Vehicular Social Networks.
IEEE Internet Things J., 2020

Lightweight Privacy-Preserving Training and Evaluation for Discretized Neural Networks.
IEEE Internet Things J., 2020

Practical and Secure Circular Range Search on Private Spatial Data.
IACR Cryptol. ePrint Arch., 2020

Anonymous IBE From Quadratic Residue With Fast Encryption.
IACR Cryptol. ePrint Arch., 2020

New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol.
IACR Cryptol. ePrint Arch., 2020

Tight Security Analysis of 3-Round Key-Alternating Cipher with A Single Permutation.
IACR Cryptol. ePrint Arch., 2020

A Generalization of Paillier's Public-Key System With Fast Decryption.
IACR Cryptol. ePrint Arch., 2020

VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage.
IACR Cryptol. ePrint Arch., 2020

PVIDM: Privacy-preserving verifiable shape context based image denoising and matching with efficient outsourcing in the malicious setting.
Comput. Secur., 2020

Unbounded Key-Policy Attribute-based Encryption with Black-Box Traceability.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Anonymous IBE from Quadratic Residuosity with Fast Encryption.
Proceedings of the Information Security - 23rd International Conference, 2020

Forward Secure Dynamic Searchable Symmetric Encryption with Lighter Storage.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020

Blockchain Based Digital Evidence Chain of Custody.
Proceedings of the ICBCT'20: The 2nd International Conference on Blockchain Technology, 2020

A Blockchain-Based Privacy-Preserving Scheme for Smart Grids.
Proceedings of the ICBCT'20: The 2nd International Conference on Blockchain Technology, 2020

2019
Detecting Vehicle Anomaly in the Edge via Sensor Consistency and Frequency Characteristic.
IEEE Trans. Veh. Technol., 2019

AP-PRE: Autonomous Path Proxy Re-Encryption and Its Applications.
IEEE Trans. Dependable Secur. Comput., 2019

Smart contract for secure billing in ride-hailing service via blockchain.
Peer-to-Peer Netw. Appl., 2019

Secure and efficient encrypted keyword search for multi-user setting in cloud computing.
Peer-to-Peer Netw. Appl., 2019

Privacy-preserving outsourced image feature extraction.
J. Inf. Secur. Appl., 2019

Pri-RTB: Privacy-preserving real-time bidding for securing mobile advertisement in ubiquitous computing.
Inf. Sci., 2019

Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service.
Int. J. Distributed Sens. Networks, 2019

Identity-Based Encryption from e-th Power Residue Symbols.
IACR Cryptol. ePrint Arch., 2019

New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160.
IACR Cryptol. ePrint Arch., 2019

GTSIM-POP: Game theory based secure incentive mechanism and patient-optimized privacy-preserving packet forwarding scheme in m-healthcare social networks.
Future Gener. Comput. Syst., 2019

Improved Fault-Tolerant Aggregate Signatures.
Comput. J., 2019

All-But-Many Lossy Trapdoor Functions under Decisional RSA Subgroup Assumption and Application.
Comput. J., 2019

Secure key-aggregation authorized searchable encryption.
Sci. China Inf. Sci., 2019

DMU-ABSE: Dynamic Multi-user Attribute-Based Searchable Encryption with File Deletion and User Revocation.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm.
Proceedings of the Advances in Information and Computer Security, 2019

SDKSE-KGA: A Secure Dynamic Keyword Searchable Encryption Scheme Against Keyword Guessing Attacks.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019

A Verifiable Dynamic Multi-user Searchable Encryption Scheme without Trusted Third Parties.
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019

An Effective Verifiable Symmetric Searchable Encryption Scheme in Cloud Computing.
Proceedings of the ICIT 2019, 2019

PPSAS: Lightweight Privacy-preserving Spectrum Aggregation and Auction in Cognitive Radio Networks.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Efficient Collision Attack Frameworks for RIPEMD-160.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2018

White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively.
IEEE Trans. Dependable Secur. Comput., 2018

Proof of Multicopy via Proof of File Position in Cloud.
Fundam. Informaticae, 2018

Preface.
Fundam. Informaticae, 2018

Securing Named Data Networking: Attribute-Based Encryption and Beyond.
IEEE Commun. Mag., 2018

Secure and Efficient Attribute-Based Encryption with Keyword Search.
Comput. J., 2018

Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation.
Sci. China Inf. Sci., 2018

VEPP: A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix Multiplication.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

SDKSE: A Secure Dynamic Keyword Searchable Encryption Scheme for Email Systems.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

PPOIM: Privacy-Preserving Shape Context Based Image Denoising and Matching with Efficient Outsourcing.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product Functional Encryption.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Detecting Vehicle Anomaly by Sensor Consistency: An Edge Computing Based Mechanism.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Fault Activity Aware Service Delivery in Wireless Sensor Networks for Smart Cities.
Wirel. Commun. Mob. Comput., 2017

Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking.
Secur. Commun. Networks, 2017

Attribute-based signcryption with hybrid access policy.
Peer-to-Peer Netw. Appl., 2017

Serial number based encryption and its application for mobile social networks.
Peer-to-Peer Netw. Appl., 2017

Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud.
Int. J. Found. Comput. Sci., 2017

Efficient Attribute-Based Secure Keyword Search on the Cloud Storage.
IACR Cryptol. ePrint Arch., 2017

Security and Privacy for Cloud-Based IoT: Challenges.
IEEE Commun. Mag., 2017

Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Accountable Multi-authority Ciphertext-Policy Attribute-Based Encryption Without Key Escrow and Key Abuse.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
Multi-proxy multi-signature binding positioning protocol.
Secur. Commun. Networks, 2016

Secure and privacy-preserving pattern matching in outsourced computing.
Secur. Commun. Networks, 2016

Cloud-based privacy-preserving aggregation architecture in multi-domain wireless networks.
Secur. Commun. Networks, 2016

Generalized (identity-based) hash proof system and its applications.
Secur. Commun. Networks, 2016

Secure and efficient fine-grained multiple file sharing in cloud-assisted crowd sensing networks.
Peer-to-Peer Netw. Appl., 2016

Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting.
IACR Cryptol. ePrint Arch., 2016

Extended dual system group and shorter unbounded hierarchical identity based encryption.
Des. Codes Cryptogr., 2016

Efficient privacy-preserving temporal and spacial data aggregation for smart grid communications.
Concurr. Comput. Pract. Exp., 2016

Traceable and revocable CP-ABE with shorter ciphertexts.
Sci. China Inf. Sci., 2016

New trends of information security - how to change people's life style?
Sci. China Inf. Sci., 2016

Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation.
Proceedings of the Provable Security, 2016

Efficient Asymmetric Index Encapsulation Scheme for Named Data.
Proceedings of the Provable Security, 2016

PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching.
Proceedings of the Computer Security - ESORICS 2016, 2016

Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently.
Proceedings of the Computer Security - ESORICS 2016, 2016

Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions.
IEEE Wirel. Commun., 2015

PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributedm-Healthcare Cloud Computing System.
IEEE Trans. Parallel Distributed Syst., 2015

Secure and privacy preserving protocol for cloud-based vehicular DTNs.
IEEE Trans. Inf. Forensics Secur., 2015

White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes.
IEEE Trans. Inf. Forensics Secur., 2015

Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild.
IEEE Trans. Inf. Forensics Secur., 2015

Post-challenge leakage in public-key encryption.
Theor. Comput. Sci., 2015

Practical identity-based encryption in multiple private key generator (PKG) environments.
Secur. Commun. Networks, 2015

ReDD: recommendation-based data dissemination in privacy-preserving mobile social networks.
Secur. Commun. Networks, 2015

MuDA: Multifunctional data aggregation in privacy-preserving smart grid communications.
Peer-to-Peer Netw. Appl., 2015

PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications.
Peer-to-Peer Netw. Appl., 2015

PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems.
IEEE J. Sel. Top. Signal Process., 2015

4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks.
Inf. Sci., 2015

Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud.
IACR Cryptol. ePrint Arch., 2015

Almost-tight Identity Based Encryption against Selective Opening Attack.
IACR Cryptol. ePrint Arch., 2015

Extended Nested Dual System Groups, Revisited.
IACR Cryptol. ePrint Arch., 2015

Comment on Demonstrations of Shor's Algorithm in the Past Decades.
IACR Cryptol. ePrint Arch., 2015

Comment on Quantum Cryptography - Which is More Important, Signal Security, Information Security or Communication Reliability.
IACR Cryptol. ePrint Arch., 2015

Serial Number Based Encryption and Its Application for Mobile Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Multi-proxy Multi-signature Binding Positioning Protocol.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model.
Proceedings of the Provable Security, 2015

TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Position-based proxy signcryption.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

EVOC: More efficient verifiable outsourced computation from any one-way trapdoor function.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2014

Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid.
IEEE Syst. J., 2014

A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption.
Secur. Commun. Networks, 2014

Constant-round adaptive zero-knowledge proofs for NP.
Inf. Sci., 2014

Security and privacy for storage and computation in cloud computing.
Inf. Sci., 2014

Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts.
IACR Cryptol. ePrint Arch., 2014

Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm.
IACR Cryptol. ePrint Arch., 2014

On Shor's Factoring Algorithm with More Registers and the Problem to Certify Quantum Computers.
IACR Cryptol. ePrint Arch., 2014

CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof System.
Comput. J., 2014

Positioning-Protocol-Based Digital Signature.
Proceedings of the Wireless Internet - 8th International Conference, 2014

4P_VES: A Collusion-Resistant Accountable Virtual Economy System.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

User self-controllable profile matching for privacy-preserving mobile social networks.
Proceedings of the IEEE International Conference on Communication Systems, 2014

Proxy multi-signature binding positioning protocol.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

Sybil-aware least cost rumor blocking in social networks.
Proceedings of the IEEE Global Communications Conference, 2014

An ElGamal-based efficient and privacy-preserving data aggregation scheme for smart grid.
Proceedings of the IEEE Global Communications Conference, 2014

Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability.
Proceedings of the Computer Security - ESORICS 2014, 2014

All-but-One Dual Projective Hashing and Its Applications.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Securing m-healthcare social networks: challenges, countermeasures and future directions.
IEEE Wirel. Commun., 2013

White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures.
IEEE Trans. Inf. Forensics Secur., 2013

Secure identity-based multisignature schemes under quadratic residue assumptions.
Secur. Commun. Networks, 2013

More efficient CCA-secure unidirectional proxy re-encryption schemes without random oracles.
Secur. Commun. Networks, 2013

New public key cryptosystems based on non-Abelian factorization problems.
Secur. Commun. Networks, 2013

On the security and improvement of a two-factor user authentication scheme in wireless sensor networks.
Pers. Ubiquitous Comput., 2013

Group-Proxy Signature Scheme: A Novel Solution to Electronic Cash.
J. Intell. Syst., 2013

Certificate-based proxy decryption systems with revocability in the standard model.
Inf. Sci., 2013

A comment on "An efficient common-multiplicand-multiplication method to the Montgomery algorithm for speeding up exponentiation".
Inf. Sci., 2013

New Efficient Identity-Based Encryption From Factorization.
IACR Cryptol. ePrint Arch., 2013

CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof Systems.
IACR Cryptol. ePrint Arch., 2013

More Efficient Cryptosystems From k-th Power Residues.
IACR Cryptol. ePrint Arch., 2013

On the Privacy of Khan et al.'s Dynamic ID-Based Remote Authentication Scheme with User Anonymity.
Cryptologia, 2013

SUCCESS: A Secure User-centric and Social-aware Reputation Based Incentive Scheme for DTNs.
Ad Hoc Sens. Wirel. Networks, 2013

Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

BDK: Secure and Efficient Biometric based Deterministic Key Agreement in Wireless Body Area Networks.
Proceedings of the 8th International Conference on Body Area Networks, 2013

2012
Chosen-ciphertext attack secure public key encryption with auxiliary inputs.
Secur. Commun. Networks, 2012

Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption.
Inf. Sci., 2012

Concurrent non-malleable statistically hiding commitment.
Inf. Process. Lett., 2012

PSCPA: Patient Self-controllable Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Systems.
IACR Cryptol. ePrint Arch., 2012

Expressive Black-box Traceable Ciphertext-Policy Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2012

Leveraging Cloud Computing for Privacy Preserving Aggregation in Multi-domain Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

Anonymous Identity-Based Hash Proof System and Its Applications.
Proceedings of the Provable Security - 6th International Conference, 2012

TIS: A threshold incentive scheme for secure and reliable data forwarding in vehicular Delay Tolerant Networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Location privacy leaking from spectrum utilization information in database-driven cognitive radio network.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Identity-Based Extractable Hash Proofs and Their Applications.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2011

SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption.
Secur. Commun. Networks, 2011

IDOAKE: strongly secure ID-based one-pass authenticated key exchange protocol.
Secur. Commun. Networks, 2011

Authenticated key exchange protocol with enhanced freshness properties.
Secur. Commun. Networks, 2011

Threshold proxy re-signature.
J. Syst. Sci. Complex., 2011

On constant-round concurrent non-malleable proof systems.
Inf. Process. Lett., 2011

An Efficient Privacy Preserving Data Aggregation Scheme with Constant Communication Overheads for Wireless Sensor Networks.
IEEE Commun. Lett., 2011

Position-Verification in Multi-Channel Models.
IACR Cryptol. ePrint Arch., 2011

Adaptive Security of Concurrent Non-Malleable Zero-Knowledge.
IACR Cryptol. ePrint Arch., 2011

Identity based signature scheme based on cubic residues.
Sci. China Inf. Sci., 2011

Blake-Wilson, Johnson & Menezes protocol revisited.
Sci. China Inf. Sci., 2011

An ID-based digital watermarking protocol for copyright protection.
Comput. Electr. Eng., 2011

Fuzzy identity based signature with applications to biometric authentication.
Comput. Electr. Eng., 2011

Efficient trust based information sharing schemes over distributed collaborative networks.
Proceedings of the MILCOM 2011, 2011

Multi-Use Unidirectional Proxy Re-Encryption.
Proceedings of IEEE International Conference on Communications, 2011

MobiGame: A User-Centric Reputation Based Incentive Protocol for Delay/Disruption Tolerant Networks.
Proceedings of the Global Communications Conference, 2011

EPF: An Event-Aided Packet Forwarding Protocol for Privacy-Preserving Mobile Healthcare Social Networks.
Proceedings of the Global Communications Conference, 2011

Novel conic-based group signature scheme with revocation.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

Efficient and secure electronic resume using smart cards.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles.
Proceedings of the Computer Security - ESORICS 2011, 2011

How to design space efficient revocable IBE from non-monotonic ABE.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

MobiID: A User-Centric and Social-Aware Reputation Based Incentive Scheme for Delay/Disruption Tolerant Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 10th International Conference, 2011

2010
Efficient certificateless threshold signatures without random oracles.
J. Syst. Sci. Complex., 2010

Multi-use and unidirectional identity-based proxy re-encryption schemes.
Inf. Sci., 2010

Proxy re-encryption with keyword search.
Inf. Sci., 2010

Secure threshold multi authority attribute based encryption without a central authority.
Inf. Sci., 2010

CCA-Secure PRE Scheme without Random Oracles.
IACR Cryptol. ePrint Arch., 2010

On Efficiently Transferring the Linear Secret-Sharing Scheme Matrix in Ciphertext-Policy Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2010

On the security of metering scheme.
Comput. Math. Appl., 2010

Conjugate adjoining problem in braid groups and new design of braid-based signatures.
Sci. China Inf. Sci., 2010

An efficient anonymous authentication mechanism for delay tolerant networks.
Comput. Electr. Eng., 2010

Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments.
Proceedings of the Public Key Cryptography, 2010

An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

SecCloud: Bridging Secure Storage and Computation in Cloud.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

An Identity Based Proxy Signature Scheme Secure in the Standard Model.
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010

Some basic principles for proxy signature schemes based on ECDLP.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

How to Construct Interval Encryption from Binary Tree Encryption.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
Provably secure RSA-type signature based on conic curve.
Wirel. Commun. Mob. Comput., 2009

An identity based universal designated verifier signature scheme secure in the standard model.
J. Syst. Softw., 2009

An improved identity-based key agreement protocol and its security proof.
Inf. Sci., 2009

A secure identity-based proxy multi-signature scheme.
Inf. Sci., 2009

Universal Encrypted Deniable Authentication Protocol.
Int. J. Netw. Secur., 2009

Security weakness in a dynamic program update protocol for wireless sensor networks.
IEEE Commun. Lett., 2009

On the anonymity of some authentication schemes for wireless communications.
IEEE Commun. Lett., 2009

A novel and efficient unlinkable secret handshakes scheme.
IEEE Commun. Lett., 2009

New Cryptosystems From CSP-Based Self-Distributive Systems.
IACR Cryptol. ePrint Arch., 2009

CCA-Secure Proxy Re-Encryption without Pairings.
IACR Cryptol. ePrint Arch., 2009

Blake-Wilson, Johnson and Menezes Protocol Revisited.
IACR Cryptol. ePrint Arch., 2009

Authenticated Key Exchange Protocols with Enhanced Freshness Properties.
IACR Cryptol. ePrint Arch., 2009

Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode.
Sci. China Ser. F Inf. Sci., 2009

A secure identity-based multi-proxy signature scheme.
Comput. Electr. Eng., 2009

An Observation on Non-Malleable Witness-Indistinguishability and Non-Malleable Zero-Knowledge.
Proceedings of the Theory and Applications of Models of Computation, 6th Annual Conference, 2009

Spatial Encryption under Simpler Assumption.
Proceedings of the Provable Security, Third International Conference, 2009

Certificateless Threshold Signature for Data Report Authentication in Mobile Ad Hoc Network.
Proceedings of the Third International Conference on Network and System Security, 2009

An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

Extended Attribute Based Encryption for Private Information Retrieval.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

An Insider-Resistant Group Key Exchange Protocol without Signatures.
Proceedings of IEEE International Conference on Communications, 2009

Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme.
Proceedings of the 2009 International Conference on Security & Management, 2009

Provably secure and efficient bounded ciphertext policy attribute based encryption.
Proceedings of the 2009 ACM Symposium on Information, 2009

Attribute based proxy re-encryption with delegating capabilities.
Proceedings of the 2009 ACM Symposium on Information, 2009

Non-malleable Statistically Hiding Commitment from Any One-Way Function.
Proceedings of the Advances in Cryptology, 2009

2008
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks.
IEEE Trans. Wirel. Commun., 2008

Biased Bit Commitment and Applications.
J. Inf. Sci. Eng., 2008

New (t, n) threshold directed signature scheme with provable security.
Inf. Sci., 2008

Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy.
Int. J. Netw. Secur., 2008

Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing.
Int. J. Netw. Secur., 2008

New Cryptanalysis Paradigm on a Nonce-based Mutual Authentication Scheme.
Int. J. Netw. Secur., 2008

A Simple User Authentication Scheme for Grid Computing.
Int. J. Netw. Secur., 2008

A simple deniable authentication protocol based on the Diffie-Hellman algorithm.
Int. J. Comput. Math., 2008

Fuzzy Identity Based Signature.
IACR Cryptol. ePrint Arch., 2008

Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2008

Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem.
IACR Cryptol. ePrint Arch., 2008

An ID-based Authenticated Key Exchange Protocol Based on Bilinear Diffie-Hellman Problem.
IACR Cryptol. ePrint Arch., 2008

Efficient and secure protocol in fair document exchange.
Comput. Stand. Interfaces, 2008

Designing efficient proxy signature schemes for mobile communication.
Sci. China Ser. F Inf. Sci., 2008

New designing of cryptosystems based on quadratic fields.
Sci. China Ser. F Inf. Sci., 2008

A New Dynamic Group Key Management Scheme with Low Rekeying Cost.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Multi-Receiver Identity-Based Encryption in Multiple PKG Environment.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

HTM: A Topic Model for Hypertexts.
Proceedings of the 2008 Conference on Empirical Methods in Natural Language Processing, 2008

A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme.
Proceedings of the Collaborative Computing: Networking, 2008

Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
An Efficient Modular Exponentiation Algorithm against Simple Power Analysis Attacks.
IEEE Trans. Consumer Electron., 2007

Identity based proxy multi-signature.
J. Syst. Softw., 2007

Improvement of Yang et al.'s threshold proxy signature scheme.
J. Syst. Softw., 2007

Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts.
J. Comput. Sci. Technol., 2007

How to construct secure proxy cryptosystem.
Inf. Sci., 2007

Simulatability and security of certificateless threshold signatures.
Inf. Sci., 2007

A New ID-Based Deniable Authentication Protocol.
Informatica, 2007

On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification.
Int. J. Netw. Secur., 2007

Group Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings.
Int. J. Netw. Secur., 2007

Efficient ID-Based Multi-Receiver Threshold Decryption.
Int. J. Found. Comput. Sci., 2007

Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2007

Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications.
IACR Cryptol. ePrint Arch., 2007

Proxy Re-Signature Schemes without Random Oracles.
IACR Cryptol. ePrint Arch., 2007

Efficient Password-based Authenticated Key Exchange without Public Information.
IACR Cryptol. ePrint Arch., 2007

Short Group Signature without Random Oracles.
IACR Cryptol. ePrint Arch., 2007

New Public Key Cryptosystems Using Polynomials over Non-commutative Rings.
IACR Cryptol. ePrint Arch., 2007

A New Practical Limited Identity-Based Encryption Scheme.
Fundam. Informaticae, 2007

An enhanced authenticated key agreement protocol for wireless mobile communication.
Comput. Stand. Interfaces, 2007

A secure anonymous routing protocol with authenticated key exchange for ad hoc networks.
Comput. Stand. Interfaces, 2007

Erratum to "Non-interactive deniable authentication protocol based on factoring"[Computer Standards & Interfaces 27 (2005) 401-405].
Comput. Stand. Interfaces, 2007

Simple three-party key exchange protocol.
Comput. Secur., 2007

Survey of information security.
Sci. China Ser. F Inf. Sci., 2007

Identity-based signature scheme based on quadratic residues.
Sci. China Ser. F Inf. Sci., 2007

Threshold password authentication against guessing attacks in Ad hoc networks.
Ad Hoc Networks, 2007

A Novel Compromise-Resilient Authentication System for Wireless Mesh Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Crypanalysis of Kuo and Chen's Threshold Proxy Signature Scheme Based on the RSA.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

An Efficient Certified Email Protocol.
Proceedings of the Information Security, 10th International Conference, 2007

A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power.
Proceedings of the Progress in Cryptology, 2007

Transitive Signatures from Braid Groups.
Proceedings of the Progress in Cryptology, 2007

ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2007

2006
Wireless network security.
Wirel. Commun. Mob. Comput., 2006

Authenticated encryption protocol with perfect forward secrecy for mobile communication.
Wirel. Commun. Mob. Comput., 2006

An improved deniable authentication protocol.
Networks, 2006

A Directed Signature Scheme Based on RSA Assumption.
Int. J. Netw. Secur., 2006

Off-line Password Guessing Attack on an Efficient Key Agreement Protocol for Secure Authentication.
Int. J. Netw. Secur., 2006

Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles).
IACR Cryptol. ePrint Arch., 2006

Efficient ID-based Threshold Signature Schemes without Pairings.
IACR Cryptol. ePrint Arch., 2006

New Public Key Authentication Frameworks with Lite Certification Authority.
IACR Cryptol. ePrint Arch., 2006

Combinatorial characterizations of one-coincidence frequency-hopping sequences.
Des. Codes Cryptogr., 2006

A traceable threshold signature scheme with multiple signing policies.
Comput. Secur., 2006

Provably secure robust threshold partial blind signature.
Sci. China Ser. F Inf. Sci., 2006

How to compute modular exponentiation with large operators based on the right-to-left binary algorithm.
Appl. Math. Comput., 2006

Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy.
Proceedings of the Wireless Algorithms, 2006

Identity-Based Threshold Proxy Signature Scheme with Known Signers.
Proceedings of the Theory and Applications of Models of Computation, 2006

Identity Based Key Insulated Signature.
Proceedings of the Information Security Practice and Experience, 2006

Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Two-Pass ID-Based Authenticated Key Agreement Protocol with Key Confirmation Using Pairings.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Cryptanalysis of Chang-Lin-Lam's ID-based Multisignature Scheme.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Group Oriented Deniable Authentication Protocol.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Designated Verifier Proxy Signature Scheme from Bilinear Pairings.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

An Efficient ID-Based Multi-proxy Multi-Signature Scheme.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

An Improvement of an Identity-Based Key Issuing Protocol.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Cryptanalysis on a Proxy Multi-Signature Scheme.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

A Proxy-Protected Signature Scheme Based on Finite Automaton.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

Security Model of Proxy-Multi Signature Schemes.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

Remote Authentication with Forward Security.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

Efficient and Provably Secure Multi-receiver Identity-Based Signcryption.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
Remarks on Wu-Hsu's threshold signature scheme using self-certified public keys.
J. Syst. Softw., 2005

Efficient Pairing-Based Threshold Proxy Signature Scheme with Known Signers.
Informatica, 2005

Pairing-Based Two-Party Authenticated Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2005

ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks.
IACR Cryptol. ePrint Arch., 2005

Non-interactive deniable authentication protocol based on factoring.
Comput. Stand. Interfaces, 2005

Efficient remote user authentication scheme using smart card.
Comput. Networks, 2005

Provably secure proxy-protected signature schemes based on factoring.
Appl. Math. Comput., 2005

Remarks on a new key authentication scheme based on discrete logarithms.
Appl. Math. Comput., 2005

Comment: cryptanalysis of Lee-Hwang-Li's key authentication scheme.
Appl. Math. Comput., 2005

Improved public key authentication scheme for non-repudiation.
Appl. Math. Comput., 2005

A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme.
Appl. Math. Comput., 2005

Security of Pon-Lu-Jeng's Meta-He digital signature schemes.
Appl. Math. Comput., 2005

Cryptanalysis of Li-Tzeng-Hwang's improved signature schemes based on factoring and discrete logarithms.
Appl. Math. Comput., 2005

A robust (k, n) + 1 threshold proxy signature scheme based on factoring.
Appl. Math. Comput., 2005

Proxy blind multi-signature scheme without a secure channel.
Appl. Math. Comput., 2005

Threshold undeniable signature scheme based on conic.
Appl. Math. Comput., 2005

Designated verifier proxy signature scheme with message recovery.
Appl. Math. Comput., 2005

A new deniable authentication protocol from bilinear pairings.
Appl. Math. Comput., 2005

A dynamic threshold commercial key escrow scheme based on conic.
Appl. Math. Comput., 2005

Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification.
Appl. Math. Comput., 2005

Proxy signature scheme using self-certified public keys.
Appl. Math. Comput., 2005

An Efficient Proxy-Protected Signature Scheme Based on Factoring.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Encryption Based on Reversible Second-Order Cellular Automata.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Improvement of Lee-Kim-Yoo's Remote User Authentication Scheme Using Smart Cards.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

Constructing Secure Proxy Cryptosystem.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

Certificateless Threshold Signature Schemes.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Constructing Secure Warrant-Based Proxy Signcryption Schemes.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

Two Proxy Signcryption Schemes from Bilinear Pairings.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

Formalized Security Model of Multi-Proxy Signature Schemes.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

Efficient Non-interactive Deniable Authentication Protocols.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
Security Arguments for Partial Delegation with Warrant Proxy Signature Schemes.
IACR Cryptol. ePrint Arch., 2004

Existence of APAV(q, k) with q a prime power =5(mod 8) and k=1(mod 4).
Discret. Math., 2004

A new threshold proxy signature scheme from bilinear pairings.
Sci. China Ser. F Inf. Sci., 2004

An Improved Threshold Proxy Signature Scheme Based on the RSA Cryptosystem.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004

A Generalized Proxy Signature Scheme Based on the RSA Cryptosystem.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

A Threshold Proxy Signature Scheme Using Self-Certified Public Keys.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

An efficient digital signature using self-certified public keys.
Proceedings of the 3rd International Conference on Information Security, 2004

A proxy-protected signature scheme based on conic.
Proceedings of the 3rd International Conference on Information Security, 2004

Robust ID-based threshold signcryption scheme from pairings.
Proceedings of the 3rd International Conference on Information Security, 2004

ID-based threshold decryption without random oracles and its application in key escrow.
Proceedings of the 3rd International Conference on Information Security, 2004

Cryptanalysis of group signature scheme from ID-based signature scheme.
Proceedings of the 3rd International Conference on Information Security, 2004

Transformation-free proxy cryptosystems and their applications to electronic commerce.
Proceedings of the 3rd International Conference on Information Security, 2004

Factoring-Based Proxy Signature Schemes with Forward-Security.
Proceedings of the Computational and Information Science, First International Symposium, 2004

Improvement of Multi-Proxy Signature Scheme.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004

2003
Nonrepudiable Proxy Multi-Signature Scheme.
J. Comput. Sci. Technol., 2003


  Loading...