Anonymous attribute-based broadcast encryption with hidden multiple access structures.
Des. Codes Cryptogr., July, 2024
Secure Lightweight Data Communication Between the IoT Devices and Cloud Service.
Proceedings of the Advanced Information Networking and Applications, 2024
ZAC: Efficient Zero-Knowledge Dynamic Universal Accumulator and Application to Zero-Knowledge Elementary Database.
Proceedings of the 4th IEEE International Conference on Trust, 2022
An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-Things.
IEEE Trans. Ind. Informatics, 2021
SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments.
Proceedings of the Computer Security - ESORICS 2021, 2021
Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Concise Mercurial Subvector Commitments: Definitions and Constructions.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
Privacy Preserving Jaccard Similarity by Cloud-Assisted for Classification.
Wirel. Pers. Commun., 2020
Puncturable Proxy Re-Encryption supporting to Group Messaging Service.
IACR Cryptol. ePrint Arch., 2019
Location Based Encryption.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
Criteria-Based Encryption.
Comput. J., 2018
Puncturable Attribute-Based Encryption for Secure Data Delivery in Internet of Things.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Sequence aware functional encryption and its application in searchable encryption.
J. Inf. Secur. Appl., 2017
Efficient Secure Text Retrieval on Multi-Keyword Search.
Proceedings of the Eighth International Symposium on Information and Communication Technology, 2017
Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions.
IEEE Trans. Inf. Forensics Secur., 2016
Edit Distance Based Encryption and Its Application.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key.
Proceedings of the Computer Security - ESORICS 2015, 2015
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
IEEE Trans. Inf. Forensics Secur., 2014
Efficient Hidden Vector Encryption with Constant-Size Ciphertext.
IACR Cryptol. ePrint Arch., 2014
POSTER: Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear Assumption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014