2025
Lattice-based strong designated verifier signature with non-delegatability.
Comput. Stand. Interfaces, 2025
Improving efficiency and security of Camenisch-Lysyanskaya signatures for anonymous credential systems.
Comput. Stand. Interfaces, 2025
2024
SDSS: Sequential Data Sharing System in IoT.
IEEE Trans. Inf. Forensics Secur., 2024
Exploring Unobservable Blockchain-Based Covert Channel for Censorship-Resistant Systems.
IEEE Trans. Inf. Forensics Secur., 2024
Blockchain-Based Compact Verifiable Data Streaming With Self-Auditing.
IEEE Trans. Dependable Secur. Comput., 2024
Secure Data Integrity Check Based on Verified Public Key Encryption With Equality Test for Multi-Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2024
Oblivious Pseudo Random Function base on Ideal Lattice, Application in PSI and PIR.
IACR Cryptol. ePrint Arch., 2024
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus.
Proceedings of the 33rd USENIX Security Symposium, 2024
Tightly Secure Identity-Based Signature from Cryptographic Group Actions.
Proceedings of the Provable and Practical Security, 2024
Traceable Ring Signatures: Logarithmic-Size, Without Any Setup, from Standard Assumptions.
Proceedings of the Provable and Practical Security, 2024
Lattice-Based Universal Designated Multi-verifiers Signature Scheme.
Proceedings of the Information Security Practice and Experience, 2024
Shrinkable Ring Signatures: It Wasn't Them!
Proceedings of the Information Security Practice and Experience, 2024
Public Auditing with Aggregated Tags for Multiple Users.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024
A Fault-Tolerant Content Moderation Mechanism for Secure Messaging Systems.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
Pairing-Free ID-Based Signatures as Secure as Discrete Logarithm in AGM.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
CrossAAD: Cross-Chain Abnormal Account Detection.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
Threshold Ring Signatures with Accountability.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
Key Cooperative Attribute-Based Encryption.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
Guest editorial: Special issue on frontiers in cyber security.
J. Syst. Archit., December, 2023
Full black-box retrievable and accountable identity-based encryption.
Comput. Stand. Interfaces, August, 2023
PPDF: A Privacy-Preserving Cloud-Based Data Distribution System With Filtering.
IEEE Trans. Serv. Comput., 2023
Secure Replication-Based Outsourced Computation Using Smart Contracts.
IEEE Trans. Serv. Comput., 2023
EthereumX: Improving Signature Security With Randomness Preprocessing Module.
IEEE Trans. Serv. Comput., 2023
Balancing Privacy and Flexibility of Cloud-Based Personal Health Records Sharing System.
IEEE Trans. Cloud Comput., 2023
Blockchain-Based Accountable Auditing With Multi-Ownership Transfer.
IEEE Trans. Cloud Comput., 2023
C-Wall: Conflict-Resistance in Privacy-Preserving Cloud Storage.
IEEE Trans. Cloud Comput., 2023
Research Philosophy of Modern Cryptography.
IACR Cryptol. ePrint Arch., 2023
Logarithmic-Size (Linkable) Ring Signatures from Lattice Isomorphism Problems.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2023
Compact Ring Signatures with Post-Quantum Security in Standard Model.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
Compact Accountable Ring Signatures in the Plain Model.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
Robust Decentralized Multi-client Functional Encryption: Motivation, Definition, and Inner-Product Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
A Tightly Secure ID-Based Signature Scheme Under DL Assumption in AGM.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
2022
Data Access Control in Cloud Computing: Flexible and Receiver Extendable.
IEEE Trans. Serv. Comput., 2022
Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers.
IEEE Trans. Dependable Secur. Comput., 2022
An Anonymous Authentication System for Pay-As-You-Go Cloud Computing$^*$*.
IEEE Trans. Dependable Secur. Comput., 2022
PKE-MET: Public-Key Encryption With Multi-Ciphertext Equality Test in Cloud Computing.
IEEE Trans. Cloud Comput., 2022
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts.
Inf. Sci., 2022
Secure Infectious Diseases Detection System With IoT-Based e-Health Platforms.
IEEE Internet Things J., 2022
Efficient Unique Ring Signatures From Lattices.
IACR Cryptol. ePrint Arch., 2022
Multimodal Private Signatures.
IACR Cryptol. ePrint Arch., 2022
Optimal Tightness for Chain-Based Unique Signatures.
IACR Cryptol. ePrint Arch., 2022
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost.
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
PPFilter: Provider Privacy-Aware Encrypted Filtering System.
IEEE Trans. Serv. Comput., 2021
Efficient and Adaptive Procurement Protocol with Purchasing Privacy.
IEEE Trans. Serv. Comput., 2021
Privacy-Preserving Proof of Storage for the Pay-As-You-Go Business Model.
IEEE Trans. Dependable Secur. Comput., 2021
Generic construction for tightly-secure signatures from discrete log.
Theor. Comput. Sci., 2021
A cloud-aided privacy-preserving multi-dimensional data comparison protocol.
Inf. Sci., 2021
Lightweight Public Key Encryption With Equality Test Supporting Partial Authorization in Cloud Storage.
Comput. J., 2021
Efficient and Privacy-Preserving Massive Data Processing for Smart Grids.
IEEE Access, 2021
2020
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts.
Theor. Comput. Sci., 2020
Certificateless aggregate signature scheme secure against fully chosen-key attacks.
Inf. Sci., 2020
A Lightweight Privacy-Preserving Fair Meeting Location Determination Scheme.
IEEE Internet Things J., 2020
Secure Cloud Auditing with Efficient Ownership Transfer (Full Version).
IACR Cryptol. ePrint Arch., 2020
Searchain: Blockchain-based private keyword search in decentralized storage.
Future Gener. Comput. Syst., 2020
Black-Box Accountable Authority Identity-Based Revocation System.
Comput. J., 2020
On the General Construction of Tightly Secure Identity-Based Signature Schemes.
Comput. J., 2020
Improving the Leakage Rate of Ciphertext-Policy Attribute-Based Encryption for Cloud Computing.
IEEE Access, 2020
Lattice-Based IBE with Equality Test Supporting Flexible Authorization in the Standard Model.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020
Secure Cloud Auditing with Efficient Ownership Transfer.
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
Keyword Attacks and Privacy Preserving in Public-Key-Based Searchable Encryption.
Proceedings of the Encyclopedia of Big Data Technologies., 2019
Privacy-Preserving Certificateless Cloud Auditing with Multiple Users.
Wirel. Pers. Commun., 2019
Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems.
Theor. Comput. Sci., 2019
A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks.
Sensors, 2019
Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions.
J. Comput. Sci. Technol., 2019
Accountable identity-based encryption with distributed private key generators.
Inf. Sci., 2019
Generalized public-key cryptography with tight security.
Inf. Sci., 2019
Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters.
Inf. Sci., 2019
Threshold privacy-preserving cloud auditing with multiple uploaders.
Int. J. Inf. Sec., 2019
A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups.
IACR Cryptol. ePrint Arch., 2019
Strongly leakage resilient authenticated key exchange, revisited.
Des. Codes Cryptogr., 2019
Attribute-Based Information Flow Control.
Comput. J., 2019
Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption.
IEEE Access, 2019
2018
Efficient <i>k</i>-out-of-<i>n</i> oblivious transfer scheme with the ideal communication cost.
Theor. Comput. Sci., 2018
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes.
Inf. Sci., 2018
Privacy-enhanced attribute-based private information retrieval.
Inf. Sci., 2018
Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes.
Int. J. Inf. Sec., 2018
Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts.
Int. J. Inf. Sec., 2018
Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing.
Future Gener. Comput. Syst., 2018
Functional encryption for computational hiding in prime order groups via pair encodings.
Des. Codes Cryptogr., 2018
Identity-Based Broadcast Encryption for Inner Products.
Comput. J., 2018
Introduction to Security Reduction
Springer, ISBN: 978-3-319-93048-0, 2018
2017
Privacy-Preserving Mutual Authentication in RFID with Designated Readers.
Wirel. Pers. Commun., 2017
EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2017
Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices.
IEEE Trans. Dependable Secur. Comput., 2017
Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city.
Pers. Ubiquitous Comput., 2017
Private Keyword-Search for Database Systems Against Insider Attacks.
J. Comput. Sci. Technol., 2017
Sequence aware functional encryption and its application in searchable encryption.
J. Inf. Secur. Appl., 2017
Efficient identity-based online/offline encryption and signcryption with short ciphertext.
Int. J. Inf. Sec., 2017
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample.
IACR Cryptol. ePrint Arch., 2017
A note on the strong authenticated key exchange with auxiliary inputs.
Des. Codes Cryptogr., 2017
Strong authenticated key exchange with auxiliary inputs.
Des. Codes Cryptogr., 2017
Secure-channel free keyword search with authorization in manager-centric databases.
Comput. Secur., 2017
Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization.
Comput. J., 2017
Fuzzy Extractors for Biometric Identification.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data.
IEEE Trans. Inf. Forensics Secur., 2016
Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption.
IEEE Trans. Inf. Forensics Secur., 2016
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2016
Server-Aided Public Key Encryption With Keyword Search.
IEEE Trans. Inf. Forensics Secur., 2016
Efficient dynamic threshold identity-based encryption with constant-size ciphertext.
Theor. Comput. Sci., 2016
Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs.
Secur. Commun. Networks, 2016
Centralized keyword search on encrypted data for cloud applications.
Secur. Commun. Networks, 2016
A Tag Based Encoding: An Efficient Encoding for Predicate Encoding in Prime Order Groups.
IACR Cryptol. ePrint Arch., 2016
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction.
IACR Cryptol. ePrint Arch., 2016
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
IACR Cryptol. ePrint Arch., 2016
Strongly Leakage-Resilient Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2016
Generalized closest substring encryption.
Des. Codes Cryptogr., 2016
Online/Offline Ciphertext Retrieval on Resource Constrained Devices.
Comput. J., 2016
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Oblivious Keyword Search with Authorization.
Proceedings of the Provable Security, 2016
Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update.
Proceedings of the Provable Security, 2016
Privacy-Preserving Cloud Auditing with Multiple Uploaders.
Proceedings of the Information Security Practice and Experience, 2016
Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Public Key Encryption with Authorized Keyword Search.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
One-Round Strong Oblivious Signature-Based Envelope.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication.
IEEE Trans. Inf. Forensics Secur., 2015
Vulnerabilities of an ECC-based RFID authentication scheme.
Secur. Commun. Networks, 2015
Improved Identity-Based Online/Offline Encryption.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
A New General Framework for Secure Public Key Encryption with Keyword Search.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
CP-ABE With Constant-Size Keys for Lightweight Devices.
IEEE Trans. Inf. Forensics Secur., 2014
Subset Membership Encryption and Its Applications to Oblivious Transfer.
IEEE Trans. Inf. Forensics Secur., 2014
Efficient authentication and integrity protection for the border gateway protocol.
Int. J. Secur. Networks, 2014
Server-Aided Signature Verification for Lightweight Devices.
Comput. J., 2014
Privacy-Preserving Authorized RFID Authentication Protocols.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014
Attribute-Based Signature with Message Recovery.
Proceedings of the Information Security Practice and Experience, 2014
POSTER: Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme.
Wirel. Pers. Commun., 2013
Server-aided identity-based anonymous broadcast encryption.
Int. J. Secur. Networks, 2013
On RFID Authentication Protocols with Wide-Strong Privacy.
Proceedings of the Radio Frequency Identification System Security, 2013
Membership Encryption and Its Applications.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
Efficient and secure stored-value cards with leakage resilience.
Comput. Electr. Eng., 2012
A Pre-computable Signature Scheme with Efficient Verification for RFID.
Proceedings of the Information Security Practice and Experience, 2012
Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext.
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
Improving security of q-SDH based digital signatures.
J. Syst. Softw., 2011
Short Signatures with a Tighter Security Reduction Without Random Oracles.
Comput. J., 2011
Self-certified ring signatures.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Online/Offline Verification of Short Signatures.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
2009
How to Prove Security of a Signature with a Tighter Security Reduction.
Proceedings of the Provable Security, Third International Conference, 2009
2008
Optimal Online/Offline Signature: How to Sign a Message without Online Computation.
Proceedings of the Provable Security, Second International Conference, 2008
Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles.
Proceedings of the Advances in Information and Computer Security, 2008
On the Security of WAI Protocol in the Third Version of WAPI.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Hierarchical Identity-Based Online/Offline Encryption.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Identity-Based Online/Offline Encryption.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
2007
Private Key Management in Hierarchical Identity-Based Encryption.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
Identity Based Private Matching.
Proceedings of the Third International Workshop on Security, 2007
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key.
Proceedings of the Pairing-Based Cryptography, 2007
Routing Protocols Based on Double Auction for Ad Hoc Networks.
Proceedings of the International Conference on Networking, 2007
Multi-Identity Single-Key Decryption without Random Oracles.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
2006
Secure and Efficient Trust Negotiation.
Proceedings of the Computational Intelligence and Security, International Conference, 2006