Fuchun Guo
Orcid: 0000-0001-6939-7710
According to our database1,
Fuchun Guo
authored at least 150 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Comput. Stand. Interfaces, 2025
Improving efficiency and security of Camenisch-Lysyanskaya signatures for anonymous credential systems.
Comput. Stand. Interfaces, 2025
2024
Exploring Unobservable Blockchain-Based Covert Channel for Censorship-Resistant Systems.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IACR Cryptol. ePrint Arch., 2024
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Information Security Practice and Experience, 2024
Proceedings of the Information Security Practice and Experience, 2024
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
J. Syst. Archit., December, 2023
Comput. Stand. Interfaces, August, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
Balancing Privacy and Flexibility of Cloud-Based Personal Health Records Sharing System.
IEEE Trans. Cloud Comput., 2023
IEEE Trans. Cloud Comput., 2023
IEEE Trans. Cloud Comput., 2023
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
Robust Decentralized Multi-client Functional Encryption: Motivation, Definition, and Inner-Product Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
2022
IEEE Trans. Serv. Comput., 2022
Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
PKE-MET: Public-Key Encryption With Multi-Ciphertext Equality Test in Cloud Computing.
IEEE Trans. Cloud Comput., 2022
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts.
Inf. Sci., 2022
IEEE Internet Things J., 2022
IACR Cryptol. ePrint Arch., 2022
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost.
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Theor. Comput. Sci., 2021
Inf. Sci., 2021
Lightweight Public Key Encryption With Equality Test Supporting Partial Authorization in Cloud Storage.
Comput. J., 2021
IEEE Access, 2021
2020
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts.
Theor. Comput. Sci., 2020
Inf. Sci., 2020
IEEE Internet Things J., 2020
IACR Cryptol. ePrint Arch., 2020
Future Gener. Comput. Syst., 2020
Comput. J., 2020
Improving the Leakage Rate of Ciphertext-Policy Attribute-Based Encryption for Cloud Computing.
IEEE Access, 2020
Lattice-Based IBE with Equality Test Supporting Flexible Authorization in the Standard Model.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
Proceedings of the Encyclopedia of Big Data Technologies., 2019
Wirel. Pers. Commun., 2019
Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems.
Theor. Comput. Sci., 2019
A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks.
Sensors, 2019
J. Comput. Sci. Technol., 2019
Inf. Sci., 2019
Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters.
Inf. Sci., 2019
Int. J. Inf. Sec., 2019
A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups.
IACR Cryptol. ePrint Arch., 2019
Des. Codes Cryptogr., 2019
Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption.
IEEE Access, 2019
2018
Efficient <i>k</i>-out-of-<i>n</i> oblivious transfer scheme with the ideal communication cost.
Theor. Comput. Sci., 2018
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes.
Inf. Sci., 2018
Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes.
Int. J. Inf. Sec., 2018
Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts.
Int. J. Inf. Sec., 2018
Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing.
Future Gener. Comput. Syst., 2018
Functional encryption for computational hiding in prime order groups via pair encodings.
Des. Codes Cryptogr., 2018
2017
Wirel. Pers. Commun., 2017
EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Dependable Secur. Comput., 2017
Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city.
Pers. Ubiquitous Comput., 2017
J. Comput. Sci. Technol., 2017
J. Inf. Secur. Appl., 2017
Efficient identity-based online/offline encryption and signcryption with short ciphertext.
Int. J. Inf. Sec., 2017
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample.
IACR Cryptol. ePrint Arch., 2017
Des. Codes Cryptogr., 2017
Comput. Secur., 2017
Comput. J., 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
Theor. Comput. Sci., 2016
Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
A Tag Based Encoding: An Efficient Encoding for Predicate Encoding in Prime Order Groups.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Comput. J., 2016
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the Provable Security, 2016
Proceedings of the Provable Security, 2016
Proceedings of the Information Security Practice and Experience, 2016
Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Secur. Commun. Networks, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
IEEE Trans. Inf. Forensics Secur., 2014
Int. J. Secur. Networks, 2014
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014
Proceedings of the Information Security Practice and Experience, 2014
POSTER: Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Wirel. Pers. Commun., 2013
Int. J. Secur. Networks, 2013
Proceedings of the Radio Frequency Identification System Security, 2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
Comput. Electr. Eng., 2012
Proceedings of the Information Security Practice and Experience, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
Comput. J., 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
2009
Proceedings of the Provable Security, Third International Conference, 2009
2008
Proceedings of the Provable Security, Second International Conference, 2008
Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles.
Proceedings of the Advances in Information and Computer Security, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
2007
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
Proceedings of the Third International Workshop on Security, 2007
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key.
Proceedings of the Pairing-Based Cryptography, 2007
Proceedings of the International Conference on Networking, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006