Fuchun Guo

Orcid: 0000-0001-6939-7710

According to our database1, Fuchun Guo authored at least 150 papers between 2006 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Lattice-based strong designated verifier signature with non-delegatability.
Comput. Stand. Interfaces, 2025

Improving efficiency and security of Camenisch-Lysyanskaya signatures for anonymous credential systems.
Comput. Stand. Interfaces, 2025

2024
SDSS: Sequential Data Sharing System in IoT.
IEEE Trans. Inf. Forensics Secur., 2024

Exploring Unobservable Blockchain-Based Covert Channel for Censorship-Resistant Systems.
IEEE Trans. Inf. Forensics Secur., 2024

Blockchain-Based Compact Verifiable Data Streaming With Self-Auditing.
IEEE Trans. Dependable Secur. Comput., 2024

Oblivious Pseudo Random Function base on Ideal Lattice, Application in PSI and PIR.
IACR Cryptol. ePrint Arch., 2024

Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus.
Proceedings of the 33rd USENIX Security Symposium, 2024

Lattice-Based Universal Designated Multi-verifiers Signature Scheme.
Proceedings of the Information Security Practice and Experience, 2024

Shrinkable Ring Signatures: It Wasn't Them!
Proceedings of the Information Security Practice and Experience, 2024

Public Auditing with Aggregated Tags for Multiple Users.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024

A Fault-Tolerant Content Moderation Mechanism for Secure Messaging Systems.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

Pairing-Free ID-Based Signatures as Secure as Discrete Logarithm in AGM.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

CrossAAD: Cross-Chain Abnormal Account Detection.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

Threshold Ring Signatures with Accountability.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

Key Cooperative Attribute-Based Encryption.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
Guest editorial: Special issue on frontiers in cyber security.
J. Syst. Archit., December, 2023

Full black-box retrievable and accountable identity-based encryption.
Comput. Stand. Interfaces, August, 2023

PPDF: A Privacy-Preserving Cloud-Based Data Distribution System With Filtering.
IEEE Trans. Serv. Comput., 2023

Secure Replication-Based Outsourced Computation Using Smart Contracts.
IEEE Trans. Serv. Comput., 2023

EthereumX: Improving Signature Security With Randomness Preprocessing Module.
IEEE Trans. Serv. Comput., 2023

Balancing Privacy and Flexibility of Cloud-Based Personal Health Records Sharing System.
IEEE Trans. Cloud Comput., 2023

Blockchain-Based Accountable Auditing With Multi-Ownership Transfer.
IEEE Trans. Cloud Comput., 2023

C-Wall: Conflict-Resistance in Privacy-Preserving Cloud Storage.
IEEE Trans. Cloud Comput., 2023

Research Philosophy of Modern Cryptography.
IACR Cryptol. ePrint Arch., 2023

Logarithmic-Size (Linkable) Ring Signatures from Lattice Isomorphism Problems.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2023

Compact Ring Signatures with Post-Quantum Security in Standard Model.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

Compact Accountable Ring Signatures in the Plain Model.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

Robust Decentralized Multi-client Functional Encryption: Motivation, Definition, and Inner-Product Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

A Tightly Secure ID-Based Signature Scheme Under DL Assumption in AGM.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
Data Access Control in Cloud Computing: Flexible and Receiver Extendable.
IEEE Trans. Serv. Comput., 2022

Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers.
IEEE Trans. Dependable Secur. Comput., 2022

An Anonymous Authentication System for Pay-As-You-Go Cloud Computing$^*$*.
IEEE Trans. Dependable Secur. Comput., 2022

PKE-MET: Public-Key Encryption With Multi-Ciphertext Equality Test in Cloud Computing.
IEEE Trans. Cloud Comput., 2022

Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts.
Inf. Sci., 2022

Secure Infectious Diseases Detection System With IoT-Based e-Health Platforms.
IEEE Internet Things J., 2022

Efficient Unique Ring Signatures From Lattices.
IACR Cryptol. ePrint Arch., 2022

Multimodal Private Signatures.
IACR Cryptol. ePrint Arch., 2022

Optimal Tightness for Chain-Based Unique Signatures.
IACR Cryptol. ePrint Arch., 2022

Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
PPFilter: Provider Privacy-Aware Encrypted Filtering System.
IEEE Trans. Serv. Comput., 2021

Efficient and Adaptive Procurement Protocol with Purchasing Privacy.
IEEE Trans. Serv. Comput., 2021

Privacy-Preserving Proof of Storage for the Pay-As-You-Go Business Model.
IEEE Trans. Dependable Secur. Comput., 2021

Generic construction for tightly-secure signatures from discrete log.
Theor. Comput. Sci., 2021

A cloud-aided privacy-preserving multi-dimensional data comparison protocol.
Inf. Sci., 2021

Lightweight Public Key Encryption With Equality Test Supporting Partial Authorization in Cloud Storage.
Comput. J., 2021

Efficient and Privacy-Preserving Massive Data Processing for Smart Grids.
IEEE Access, 2021

2020
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts.
Theor. Comput. Sci., 2020

Certificateless aggregate signature scheme secure against fully chosen-key attacks.
Inf. Sci., 2020

A Lightweight Privacy-Preserving Fair Meeting Location Determination Scheme.
IEEE Internet Things J., 2020

Secure Cloud Auditing with Efficient Ownership Transfer (Full Version).
IACR Cryptol. ePrint Arch., 2020

Searchain: Blockchain-based private keyword search in decentralized storage.
Future Gener. Comput. Syst., 2020

Black-Box Accountable Authority Identity-Based Revocation System.
Comput. J., 2020

On the General Construction of Tightly Secure Identity-Based Signature Schemes.
Comput. J., 2020

Improving the Leakage Rate of Ciphertext-Policy Attribute-Based Encryption for Cloud Computing.
IEEE Access, 2020

Lattice-Based IBE with Equality Test Supporting Flexible Authorization in the Standard Model.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

Secure Cloud Auditing with Efficient Ownership Transfer.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Keyword Attacks and Privacy Preserving in Public-Key-Based Searchable Encryption.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

Privacy-Preserving Certificateless Cloud Auditing with Multiple Users.
Wirel. Pers. Commun., 2019

Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems.
Theor. Comput. Sci., 2019

A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks.
Sensors, 2019

Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions.
J. Comput. Sci. Technol., 2019

Accountable identity-based encryption with distributed private key generators.
Inf. Sci., 2019

Generalized public-key cryptography with tight security.
Inf. Sci., 2019

Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters.
Inf. Sci., 2019

Threshold privacy-preserving cloud auditing with multiple uploaders.
Int. J. Inf. Sec., 2019

A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups.
IACR Cryptol. ePrint Arch., 2019

Strongly leakage resilient authenticated key exchange, revisited.
Des. Codes Cryptogr., 2019

Attribute-Based Information Flow Control.
Comput. J., 2019

Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption.
IEEE Access, 2019

2018
Efficient <i>k</i>-out-of-<i>n</i> oblivious transfer scheme with the ideal communication cost.
Theor. Comput. Sci., 2018

Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes.
Inf. Sci., 2018

Privacy-enhanced attribute-based private information retrieval.
Inf. Sci., 2018

Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes.
Int. J. Inf. Sec., 2018

Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts.
Int. J. Inf. Sec., 2018

Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing.
Future Gener. Comput. Syst., 2018

Functional encryption for computational hiding in prime order groups via pair encodings.
Des. Codes Cryptogr., 2018

Identity-Based Broadcast Encryption for Inner Products.
Comput. J., 2018

Introduction to Security Reduction
Springer, ISBN: 978-3-319-93048-0, 2018

2017
Privacy-Preserving Mutual Authentication in RFID with Designated Readers.
Wirel. Pers. Commun., 2017

EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2017

Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices.
IEEE Trans. Dependable Secur. Comput., 2017

Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city.
Pers. Ubiquitous Comput., 2017

Private Keyword-Search for Database Systems Against Insider Attacks.
J. Comput. Sci. Technol., 2017

Sequence aware functional encryption and its application in searchable encryption.
J. Inf. Secur. Appl., 2017

Efficient identity-based online/offline encryption and signcryption with short ciphertext.
Int. J. Inf. Sec., 2017

Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample.
IACR Cryptol. ePrint Arch., 2017

A note on the strong authenticated key exchange with auxiliary inputs.
Des. Codes Cryptogr., 2017

Strong authenticated key exchange with auxiliary inputs.
Des. Codes Cryptogr., 2017

Secure-channel free keyword search with authorization in manager-centric databases.
Comput. Secur., 2017

Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization.
Comput. J., 2017

Fuzzy Extractors for Biometric Identification.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data.
IEEE Trans. Inf. Forensics Secur., 2016

Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption.
IEEE Trans. Inf. Forensics Secur., 2016

Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2016

Server-Aided Public Key Encryption With Keyword Search.
IEEE Trans. Inf. Forensics Secur., 2016

Efficient dynamic threshold identity-based encryption with constant-size ciphertext.
Theor. Comput. Sci., 2016

Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs.
Secur. Commun. Networks, 2016

Centralized keyword search on encrypted data for cloud applications.
Secur. Commun. Networks, 2016

A Tag Based Encoding: An Efficient Encoding for Predicate Encoding in Prime Order Groups.
IACR Cryptol. ePrint Arch., 2016

Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction.
IACR Cryptol. ePrint Arch., 2016

Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
IACR Cryptol. ePrint Arch., 2016

Strongly Leakage-Resilient Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2016

Generalized closest substring encryption.
Des. Codes Cryptogr., 2016

Online/Offline Ciphertext Retrieval on Resource Constrained Devices.
Comput. J., 2016

A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Oblivious Keyword Search with Authorization.
Proceedings of the Provable Security, 2016

Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update.
Proceedings of the Provable Security, 2016

Privacy-Preserving Cloud Auditing with Multiple Uploaders.
Proceedings of the Information Security Practice and Experience, 2016

Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Public Key Encryption with Authorized Keyword Search.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

One-Round Strong Oblivious Signature-Based Envelope.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication.
IEEE Trans. Inf. Forensics Secur., 2015

Vulnerabilities of an ECC-based RFID authentication scheme.
Secur. Commun. Networks, 2015

Improved Identity-Based Online/Offline Encryption.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

A New General Framework for Secure Public Key Encryption with Keyword Search.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
CP-ABE With Constant-Size Keys for Lightweight Devices.
IEEE Trans. Inf. Forensics Secur., 2014

Subset Membership Encryption and Its Applications to Oblivious Transfer.
IEEE Trans. Inf. Forensics Secur., 2014

Efficient authentication and integrity protection for the border gateway protocol.
Int. J. Secur. Networks, 2014

Server-Aided Signature Verification for Lightweight Devices.
Comput. J., 2014

Privacy-Preserving Authorized RFID Authentication Protocols.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014

Attribute-Based Signature with Message Recovery.
Proceedings of the Information Security Practice and Experience, 2014

POSTER: Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme.
Wirel. Pers. Commun., 2013

Server-aided identity-based anonymous broadcast encryption.
Int. J. Secur. Networks, 2013

On RFID Authentication Protocols with Wide-Strong Privacy.
Proceedings of the Radio Frequency Identification System Security, 2013

Membership Encryption and Its Applications.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Efficient and secure stored-value cards with leakage resilience.
Comput. Electr. Eng., 2012

A Pre-computable Signature Scheme with Efficient Verification for RFID.
Proceedings of the Information Security Practice and Experience, 2012

Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Improving security of q-SDH based digital signatures.
J. Syst. Softw., 2011

Short Signatures with a Tighter Security Reduction Without Random Oracles.
Comput. J., 2011

Self-certified ring signatures.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Online/Offline Verification of Short Signatures.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
How to Prove Security of a Signature with a Tighter Security Reduction.
Proceedings of the Provable Security, Third International Conference, 2009

2008
Optimal Online/Offline Signature: How to Sign a Message without Online Computation.
Proceedings of the Provable Security, Second International Conference, 2008

Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles.
Proceedings of the Advances in Information and Computer Security, 2008

On the Security of WAI Protocol in the Third Version of WAPI.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Hierarchical Identity-Based Online/Offline Encryption.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Identity-Based Online/Offline Encryption.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

2007
Private Key Management in Hierarchical Identity-Based Encryption.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

Identity Based Private Matching.
Proceedings of the Third International Workshop on Security, 2007

Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key.
Proceedings of the Pairing-Based Cryptography, 2007

Routing Protocols Based on Double Auction for Ad Hoc Networks.
Proceedings of the International Conference on Networking, 2007

Multi-Identity Single-Key Decryption without Random Oracles.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

2006
Secure and Efficient Trust Negotiation.
Proceedings of the Computational Intelligence and Security, International Conference, 2006


  Loading...