Huaxiong Wang

Orcid: 0000-0002-7669-8922

According to our database1, Huaxiong Wang authored at least 291 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Efficient Key-Aggregate Cryptosystem With User Revocation for Selective Group Data Sharing in Cloud Storage.
IEEE Trans. Knowl. Data Eng., November, 2024

Explicit Low-Bandwidth Evaluation Schemes for Weighted Sums of Reed-Solomon-Coded Symbols.
IEEE Trans. Inf. Theory, August, 2024

Universal Gaussian elimination hardware for cryptographic purposes.
J. Cryptogr. Eng., June, 2024

An Efficient FHE-Enabled Secure Cloud-Edge Computing Architecture for IoMT Data Protection With its Application to Pandemic Modeling.
IEEE Internet Things J., May, 2024

Key-aggregate based access control encryption for flexible cloud data sharing.
Comput. Stand. Interfaces, March, 2024

DeepDIST: A Black-Box Anti-Collusion Framework for Secure Distribution of Deep Models.
IEEE Trans. Circuits Syst. Video Technol., January, 2024

Querying Twice to Achieve Information-Theoretic Verifiability in Private Information Retrieval.
IEEE Trans. Inf. Forensics Secur., 2024

Enabling Threshold Functionality for Private Set Intersection Protocols in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2024

REKS: Role-Based Encrypted Keyword Search With Enhanced Access Control for Outsourced Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2024

Efficient FHE-Based Privacy-Enhanced Neural Network for Trustworthy AI-as-a-Service.
IEEE Trans. Dependable Secur. Comput., 2024

Group encryption: Full dynamicity, message filtering and code-based instantiation.
Theor. Comput. Sci., 2024

Constant-Size Unbounded Multi-Hop Fully Homomorphic Proxy Re-Encryption from Lattices.
IACR Cryptol. ePrint Arch., 2024

Succinct Non-Subsequence Arguments.
IACR Cryptol. ePrint Arch., 2024

Fully Dynamic Attribute-Based Signatures for Circuits from Codes.
IACR Cryptol. ePrint Arch., 2024

Verifiable Information-Theoretic Function Secret Sharing.
IACR Cryptol. ePrint Arch., 2024

PSA: Private Set Alignment for Secure and Collaborative Analytics on Large-Scale Data.
CoRR, 2024

Large-Plaintext Functional Bootstrapping with Small Parameters for BGV Encoding.
Proceedings of the Information Security - 27th International Conference, 2024

UPDATE: Mining User-News Engagement Patterns for Dual-Target Cross-Domain Fake News Detection.
Proceedings of the 11th IEEE International Conference on Data Science and Advanced Analytics, 2024

Two-Server Verifiable Federated Learning: Unconditional Security and Practical Efficiency.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
Threshold Homomorphic Encryption From Provably Secure NTRU.
Comput. J., December, 2023

Privacy-preserving outsourcing decision tree evaluation from homomorphic encryption.
J. Inf. Secur. Appl., September, 2023

Revisiting Modular Inversion Hidden Number Problem and Its Applications.
IEEE Trans. Inf. Theory, August, 2023

Multi-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrapping.
Theor. Comput. Sci., August, 2023

Engineering Practical Rank-Code-Based Cryptographic Schemes on Embedded Hardware. A Case Study on ROLLO.
IEEE Trans. Computers, July, 2023

Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors.
J. Cryptol., July, 2023

Ramp Scheme Based on CRT for Polynomial Ring over Finite Field.
J. Syst. Sci. Complex., February, 2023

BIB-MKS: Post-Quantum Secure Biometric Identity-Based Multi-Keyword Search Over Encrypted Data in Cloud Storage Systems.
IEEE Trans. Serv. Comput., 2023

An Accessional Signature Scheme With Unmalleable Transaction Implementation to Securely Redeem Cryptocurrencies.
IEEE Trans. Inf. Forensics Secur., 2023

Space-Efficient Storage Structure of Blockchain Transactions Supporting Secure Verification.
IEEE Trans. Cloud Comput., 2023

KA: Keyword-based auditing with frequency hiding and retrieval reliability for smart government.
J. Syst. Archit., 2023

Non-Interactive Zero-Knowledge Functional Proofs.
IACR Cryptol. ePrint Arch., 2023

Efficient FHE-based Privacy-Enhanced Neural Network for AI-as-a-Service.
IACR Cryptol. ePrint Arch., 2023

Fully Homomorphic Encryption-Based Protocols for Enhanced Private Set Intersection Functionalities.
IACR Cryptol. ePrint Arch., 2023

Full threshold change range of threshold changeable secret sharing.
Des. Codes Cryptogr., 2023

Repair of Reed-Solomon Codes in the Presence of Erroneous Nodes.
Proceedings of the IEEE International Symposium on Information Theory, 2023

k-server Byzantine-Resistant PIR Scheme with Optimal Download Rate and Optimal File Size.
Proceedings of the IEEE International Symposium on Information Theory, 2023

Two-Server Private Information Retrieval with Optimized Download Rate and Result Verification.
Proceedings of the IEEE International Symposium on Information Theory, 2023

2022
DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage.
IEEE Trans. Serv. Comput., 2022

Communication Efficient Secret Sharing With Small Share Size.
IEEE Trans. Inf. Theory, 2022

Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database.
IEEE Trans. Dependable Secur. Comput., 2022

Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2022

Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key.
IEEE Trans. Dependable Secur. Comput., 2022

SecureAD: A Secure Video Anomaly Detection Framework on Convolutional Neural Network in Edge Computing Environment.
IEEE Trans. Cloud Comput., 2022

Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems.
J. Syst. Archit., 2022

Traceable policy-based signatures and instantiation from lattices.
Inf. Sci., 2022

Bivariate polynomial-based secret sharing schemes with secure secret reconstruction.
Inf. Sci., 2022

ZkRep: A Privacy-Preserving Scheme for Reputation-Based Blockchain System.
IEEE Internet Things J., 2022

A new framework for deniable secure key exchange.
Inf. Comput., 2022

Field Instruction Multiple Data.
IACR Cryptol. ePrint Arch., 2022

Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange.
IACR Cryptol. ePrint Arch., 2022

Multi-Server Verifiable Computation of Low-Degree Polynomials.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Byzantine-Robust Private Information Retrieval with Low Communication and Efficient Decoding.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2021

Efficient Private Comparison Queries Over Encrypted Databases Using Fully Homomorphic Encryption With Finite Fields.
IEEE Trans. Dependable Secur. Comput., 2021

Person Re-Identification over Encrypted Outsourced Surveillance Videos.
IEEE Trans. Dependable Secur. Comput., 2021

Adaptive oblivious transfer with access control from lattice assumptions.
Theor. Comput. Sci., 2021

CIPPPA: Conditional Identity Privacy-Preserving Public Auditing for Cloud-Based WBANs Against Malicious Auditors.
IEEE Trans. Cloud Comput., 2021

Binary de Bruijn Sequences via Zech's Logarithms.
SN Comput. Sci., 2021

Key-Leakage Resilient Encrypted Data Aggregation With Lightweight Verification in Fog-Assisted Smart Grids.
IEEE Internet Things J., 2021

Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy.
IACR Cryptol. ePrint Arch., 2021

Volume-Hiding Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy.
IACR Cryptol. ePrint Arch., 2021

Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation.
CoRR, 2021

Zero-Knowledge Proofs for Committed Symmetric Boolean Functions.
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021

2020
Provably Secure Group Signature Schemes From Code-Based Assumptions.
IEEE Trans. Inf. Theory, 2020

A code-based signature scheme from the Lyubashevsky framework.
Theor. Comput. Sci., 2020

Compact Code-Based Signature for Reconfigurable Devices With Side Channel Resilience.
IEEE Trans. Circuits Syst. I Regul. Pap., 2020

Lightweight Key Encapsulation Using LDPC Codes on FPGAs.
IEEE Trans. Computers, 2020

Verifiable inner product computation on outsourced database for authenticated multi-user data sharing.
Inf. Sci., 2020

A new secret handshake scheme with multi-symptom intersection for mobile healthcare social networks.
Inf. Sci., 2020

Public key encryption with equality test in the standard model.
Inf. Sci., 2020

Insecurity of the Public Key Encryption with Filtered Equality Test Proposed by Huang et al.
IACR Cryptol. ePrint Arch., 2020

PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model.
IACR Cryptol. ePrint Arch., 2020

Intersection-policy private mutual authentication from authorized private set intersection.
Sci. China Inf. Sci., 2020

Advances in security research in the Asiacrypt region.
Commun. ACM, 2020

A Blockchain-Based Application System for Product Anti-Counterfeiting.
IEEE Access, 2020

An Efficient Public Batch Auditing Scheme for Data Integrity in Standard Model.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Leakage-Resilient Secret Sharing in Non-Compartmentalized Models.
Proceedings of the 1st Conference on Information-Theoretic Cryptography, 2020

An Analysis of Blockchain Consistency in Asynchronous Networks: Deriving a Neat Bound.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

2019
Private Compound Wildcard Queries Using Fully Homomorphic Encryption.
IEEE Trans. Dependable Secur. Comput., 2019

Efficient public key encryption with equality test in the standard model.
Theor. Comput. Sci., 2019

Lattice-based group signatures: Achieving full dynamicity (and deniability) with ease.
Theor. Comput. Sci., 2019

Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption.
Theor. Comput. Sci., 2019

Fully homomorphic encryption over the integers for non-binary plaintexts without the sparse subset sum problem.
Theor. Comput. Sci., 2019

Identity-based key-exposure resilient cloud storage public auditing scheme from lattices.
Inf. Sci., 2019

Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage.
Inf. Sci., 2019

Public key encryption with equality test from generic assumptions in the random oracle model.
Inf. Sci., 2019

Preface: Special Issue Cryptography and Provable Security.
Int. J. Found. Comput. Sci., 2019

New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.
IACR Cryptol. ePrint Arch., 2019

Simplified Revocable Hierarchical Identity-Based Encryption from Lattices.
IACR Cryptol. ePrint Arch., 2019

New Code-Based Privacy-Preserving Cryptographic Constructions.
IACR Cryptol. ePrint Arch., 2019

Double verification protocol via secret sharing for low-cost RFID tags.
Future Gener. Comput. Syst., 2019

On binary de Bruijn sequences from LFSRs with arbitrary characteristic polynomials.
Des. Codes Cryptogr., 2019

Non-Malleable Secret Sharing against Affine Tampering.
CoRR, 2019

Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation.
Comput. J., 2019

Further improvement of factoring N = p<sup>r</sup> q<sup>s</sup> with partial known bits.
Adv. Math. Commun., 2019

Search Condition-Hiding Query Evaluation on Encrypted Databases.
IEEE Access, 2019

Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

Forward-Secure Group Signatures from Lattices.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019

Zero-Knowledge Elementary Databases with More Expressive Queries.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Non-malleable Coding for Arbitrary Varying Channels.
Proceedings of the 2019 IEEE Information Theory Workshop, 2019

Non-Malleable Codes against Active Physical Layer Adversary.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Optimized Polynomial Multiplier Over Commutative Rings on FPGAs: A Case Study on BIKE.
Proceedings of the International Conference on Field-Programmable Technology, 2019

A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses.
Proceedings of the Computer Security - ESORICS 2019, 2019

Threshold Changeable Ramp Secret Sharing.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
On the Efficiency of FHE-Based Private Queries.
IEEE Trans. Dependable Secur. Comput., 2018

A lattice-based group signature scheme with verifier-local revocation.
Theor. Comput. Sci., 2018

Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.
IACR Cryptol. ePrint Arch., 2018

Accountable Tracing Signatures from Lattices.
IACR Cryptol. ePrint Arch., 2018

Constant-size Group Signatures from Lattices.
IACR Cryptol. ePrint Arch., 2018

Secret Sharing with Binary Shares.
IACR Cryptol. ePrint Arch., 2018

Lattice-Based Zero-Knowledge Arguments for Integer Relations.
IACR Cryptol. ePrint Arch., 2018

Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017.
IACR Cryptol. ePrint Arch., 2018

The cycle structure of LFSR with arbitrary characteristic polynomial over finite fields.
Cryptogr. Commun., 2018

Construction of de Bruijn sequences from product of two irreducible polynomials.
Cryptogr. Commun., 2018

2017
PAVS: A New Privacy-Preserving Data Aggregation Scheme for Vehicle Sensing Systems.
Sensors, 2017

Zero-Knowledge Password Policy Check from Lattices.
IACR Cryptol. ePrint Arch., 2017

Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease.
IACR Cryptol. ePrint Arch., 2017

Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash.
IACR Cryptol. ePrint Arch., 2017

Non-Malleable Codes with Leakage and Applications to Secure Communication.
CoRR, 2017

Large Order Binary de Bruijn Sequences via Zech's Logarithms.
CoRR, 2017

TJET: Ternary Join-Exit-Tree Based Dynamic Key Management for Vehicle Platooning.
IEEE Access, 2017

Revocable Predicate Encryption from Lattices.
Proceedings of the Provable Security, 2017

2016
Analysis of Gong et al.'s CCA2-secure homomorphic encryption.
Theor. Comput. Sci., 2016

Semi-generic construction of public key encryption and identity-based encryption with equality test.
Inf. Sci., 2016

Server-Aided Revocable Identity-Based Encryption from Lattices.
IACR Cryptol. ePrint Arch., 2016

Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions.
IACR Cryptol. ePrint Arch., 2016

Better Security for Queries on Encrypted Databases.
IACR Cryptol. ePrint Arch., 2016

Policy-based signature scheme from lattices.
Des. Codes Cryptogr., 2016

CCA2 Attack and Modification of Huang <i>et al</i>.'s Public Key Encryption with Authorized Equality Test.
Comput. J., 2016

On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

2015
A provable authenticated group key agreement protocol for mobile environment.
Inf. Sci., 2015

Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based.
IACR Cryptol. ePrint Arch., 2015

A Provably Secure Group Signature Scheme from Code-Based Assumptions.
IACR Cryptol. ePrint Arch., 2015

Special issue on trust and security in wireless sensor networks.
Concurr. Comput. Pract. Exp., 2015

A Provable Data Possession Scheme with Data Hierarchy in Cloud.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
On the Multidimensional Distribution of the Naor-Reingold Pseudo-Random Function.
Math. Comput., 2014

Pitfalls in an ECC-based Lightweight Authentication Protocol for Low-Cost RFID.
J. Inf. Hiding Multim. Signal Process., 2014

Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128.
IACR Cryptol. ePrint Arch., 2014

Shorter identity-based encryption via asymmetric pairings.
Des. Codes Cryptogr., 2014

The relation and transformation between hierarchical inner product encryption and spatial encryption.
Des. Codes Cryptogr., 2014

Spatial encryption supporting non-monotone access structure.
Des. Codes Cryptogr., 2014

The resistance of PRESENT-80 against related-key differential attacks.
Cryptogr. Commun., 2014

Distributed Searchable Symmetric Encryption.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

2013
Efficient Two-Server Password-Only Authenticated Key Exchange.
IEEE Trans. Parallel Distributed Syst., 2013

Upper Bounds on Matching Families in BBZ<sub>pq</sub><sup>n</sup>.
IEEE Trans. Inf. Theory, 2013

Revocable IBE Systems with Almost Constant-size Key Update.
IACR Cryptol. ePrint Arch., 2013

Upper Bounds on Matching Families in $\mathbb{Z}_{pq}^n$
CoRR, 2013

Cheating-immune secret sharing schemes from codes and cumulative arrays.
Cryptogr. Commun., 2013

Query-Efficient Locally Decodable Codes of Subexponential Length.
Comput. Complex., 2013

Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

2012
Workflow Signatures for Business Process Compliance.
IEEE Trans. Dependable Secur. Comput., 2012

Threshold changeable secret sharing schemes revisited.
Theor. Comput. Sci., 2012

On the modular inversion hidden number problem.
J. Symb. Comput., 2012

Graph Coloring Applied to Secure Computation in Non-Abelian Groups.
J. Cryptol., 2012

On the Bringer-Chabanne EPIR protocol for polynomial evaluation.
J. Math. Cryptol., 2012

Communication-efficient distributed oblivious transfer.
J. Comput. Syst. Sci., 2012

On the (In)Security of IDEA in Various Hashing Modes.
IACR Cryptol. ePrint Arch., 2012

Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications.
IACR Cryptol. ePrint Arch., 2012

On 3-share Threshold Implementations for 4-bit S-boxes.
IACR Cryptol. ePrint Arch., 2012

On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable Zero-Knowledge Proofs.
IACR Cryptol. ePrint Arch., 2012

Shorter IBE and Signatures via Asymmetric Pairings.
IACR Cryptol. ePrint Arch., 2012

Anonymous and Adaptively Secure Revocable IBE with Constant Size Public Parameters
CoRR, 2012

Revisiting a Secret Sharing Approach to Network Codes.
Proceedings of the Provable Security - 6th International Conference, 2012

NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Improved Differential Cache Attacks on SMS4.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

Differential Attacks against Stream Cipher ZUC.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Authentication of Digital Streams.
IEEE Trans. Inf. Theory, 2011

Side-Channel Resistant Crypto for Less than 2, 300 GE.
J. Cryptol., 2011

An Efficient and Information Theoretically Secure Rational Secret Sharing Scheme Based on Symmetric bivariate polynomials.
Int. J. Found. Comput. Sci., 2011

Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions.
Int. J. Comput. Math., 2011

An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem (Revised Version).
IACR Cryptol. ePrint Arch., 2011

Authenticated Key Exchange under Bad Randomness.
IACR Cryptol. ePrint Arch., 2011

Improved Meet-in-the-Middle Cryptanalysis of KTANTAN.
IACR Cryptol. ePrint Arch., 2011

Revocable Identity-Based Encryption from Lattices.
IACR Cryptol. ePrint Arch., 2011

Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts.
IACR Cryptol. ePrint Arch., 2011

On the Hardness of the Sum of <i>k</i> Mins Problem.
Comput. J., 2011

On Related-Key Attacks and KASUMI: The Case of A5/3.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

Pushing the Limits: A Very Compact and a Threshold Implementation of AES.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

Oblivious Transfer and n-Variate Linear Function Evaluation.
Proceedings of the Computing and Combinatorics - 17th Annual International Conference, 2011

An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster).
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time.
SIAM J. Discret. Math., 2010

A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm.
IACR Cryptol. ePrint Arch., 2010

Cryptanalysis of the Convex Hull Click Human Identification Protocol.
IACR Cryptol. ePrint Arch., 2010

Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2.
IACR Cryptol. ePrint Arch., 2010

Query-Efficient Locally Decodable Codes.
Electron. Colloquium Comput. Complex., 2010

Plaintext-Awareness of Hybrid Encryption.
Proceedings of the Topics in Cryptology, 2010

256 Bit Standardized Crypto for 650 GE - GOST Revisited.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

Secure Coprocessor-based Private Information Retrieval without Periodical Preprocessing.
Proceedings of the 8th Australasian Information Security Conference 2010, 2010

On Multidimensional Linear Cryptanalysis.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
Unconditionally secure disjointness tests for private datasets.
Int. J. Appl. Cryptogr., 2009

On the Security of PAS (Predicate-based Authentication Service).
IACR Cryptol. ePrint Arch., 2009

Practical pseudo-collisions for hash functions ARIRANG-224/384.
IACR Cryptol. ePrint Arch., 2009

Bounds and constructions for key distribution schemes.
Adv. Math. Commun., 2009

Certified Pseudonyms Colligated with Master Secret Key.
Proceedings of the SECRYPT 2009, 2009

Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes.
Proceedings of the Cryptography and Coding, 2009

Efficient Fuzzy Matching and Intersection on Private Datasets.
Proceedings of the Information, Security and Cryptology, 2009

Privacy Enhancements for Hardware-Based Security Modules.
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009

Cryptanalysis of the LAKE Hash Family.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

2008
On Secret Reconstruction in Secret Sharing Schemes.
IEEE Trans. Inf. Theory, 2008

Employ a mobile agent for making a payment.
Mob. Inf. Syst., 2008

Cryptography in Computer System Security.
J. Univers. Comput. Sci., 2008

Two-factor mutual authentication based on smart cards and passwords.
J. Comput. Syst. Sci., 2008

A coding approach to the multicast stream authentication problem.
Int. J. Inf. Sec., 2008

Analysis of bilinear pairing-based accumulator for identity escrowing.
IET Inf. Secur., 2008

Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits.
IACR Cryptol. ePrint Arch., 2008

Permutation polynomials of the form (x<sup>p</sup>-x+delta)<sup>s</sup>+L(x).
Finite Fields Their Appl., 2008

Security Analysis of Australian and E.U. E-passport Implementation.
J. Res. Pract. Inf. Technol., 2008

An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Threshold Privacy Preserving Keyword Searches.
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008

A Fair e-Tendering Protocol.
Proceedings of the SECRYPT 2008, 2008

Cryptanalysis of Rabbit.
Proceedings of the Information Security, 11th International Conference, 2008

Secure Computation of the Vector Dominance Problem.
Proceedings of the Information Security Practice and Experience, 2008

Distributed Private Matching and Set Operations.
Proceedings of the Information Security Practice and Experience, 2008

An On-Line Secure E-Passport Protocol.
Proceedings of the Information Security Practice and Experience, 2008

Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

Formal Security Analysis of Australian E-passport Implementation.
Proceedings of the Sixth Australasian Information Security Conference, 2008

Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes.
Proceedings of the Advances in Cryptology, 2008

Improvement of a Dynamic Accumulator at ICICS 07 and Its Application in Multi-user Keyword-Based Retrieval on Encrypted Data.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

Efficient Disjointness Tests for Private Datasets.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

On the Improvement of the BDF Attack on LSBS-RSA.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes.
IEEE Trans. Inf. Theory, 2007

Efficient multicast stream authentication for the fully adversarial network model.
Int. J. Secur. Networks, 2007

Privacy-Preserving Distributed Set Intersection.
IACR Cryptol. ePrint Arch., 2007

Cryptanalysis of LASH.
IACR Cryptol. ePrint Arch., 2007

New constructions of anonymous membership broadcasting schemes.
Adv. Math. Commun., 2007

Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels.
Proceedings of the Provable Security, 2007

A New Dynamic Accumulator for Batch Updates.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature.
Proceedings of the Topics in Cryptology, 2007

On Secure Multi-party Computation in Black-Box Groups.
Proceedings of the Advances in Cryptology, 2007

Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Resilient Lkh: Secure Multicast Key Distribution Schemes.
Int. J. Found. Comput. Sci., 2006

Formal Analysis and Systematic Construction of Two-factor Authentication Scheme.
IACR Cryptol. ePrint Arch., 2006

On the Provable Security of an Efficient RSA-Based Pseudorandom Generator.
IACR Cryptol. ePrint Arch., 2006

Lattice-based threshold-changeability for standard CRT secret-sharing schemes.
Finite Fields Their Appl., 2006

Secret sharing schemes with partial broadcast channels.
Des. Codes Cryptogr., 2006

Generalised Cumulative Arrays in Secret Sharing.
Des. Codes Cryptogr., 2006

Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption.
Proceedings of the Public Key Cryptography, 2006

Rateless Codes for the Multicast Stream Authentication Problem.
Proceedings of the Advances in Information and Computer Security, 2006

A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders.
Proceedings of the Information Security, 9th International Conference, 2006

Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

An attack-localizing watermarking scheme for natural language documents.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Achieving Multicast Stream Authentication Using MDS Codes.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

Formal analysis of card-based payment systems in mobile devices.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006

2005
Anonymous Signature Schemes.
IACR Cryptol. ePrint Arch., 2005

Distributing the Encryption and Decryption of a Block Cipher.
Des. Codes Cryptogr., 2005

Secure Construction of Virtual Organizations in Grid Computing Systems.
Proceedings of the Internet and Network Economics, First International Workshop, 2005

Privacy Enhanced Electronic Cheque System.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005

Converse Results to the Wiener Attack on RSA.
Proceedings of the Public Key Cryptography, 2005

Radio Networks with Reliable Communication.
Proceedings of the Computing and Combinatorics, 11th Annual International Conference, 2005

2004
Shared generation of pseudo-random functions.
J. Complex., 2004

Securing Multicast Groups in Ad Hoc Networks.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

2003
Linear authentication codes: bounds and constructions.
IEEE Trans. Inf. Theory, 2003

Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures.
IACR Cryptol. ePrint Arch., 2003

Universal Designated-Verifier Signatures.
IACR Cryptol. ePrint Arch., 2003

Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

Shared Generation of Pseudo-Random Functions with Cumulative Maps.
Proceedings of the Topics in Cryptology, 2003

Efficient One-Time Proxy Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

2002
Bounds and Constructions for Threshold Shared Generation of Authenticators.
Int. J. Comput. Math., 2002

A Group Key Distribution Scheme with Decentralised User Join.
Proceedings of the Security in Communication Networks, Third International Conference, 2002

Threshold MACs.
Proceedings of the Information Security and Cryptology, 2002

A Dynamic Group Key Distribution Scheme with Flexible User Join.
Proceedings of the Information Security and Cryptology, 2002

Redistribution of Mechanical Secret Shares.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

A Combinatorial Approach to Anonymous Membership Broadcast.
Proceedings of the Computing and Combinatorics, 8th Annual International Conference, 2002

A Secure Re-keying Scheme with Key Recovery Property.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Broadcast authentication for group communication.
Theor. Comput. Sci., 2001

An Efficient Construction for Fail-Stop Signature for Long Messages.
J. Inf. Sci. Eng., 2001

Explicit Constructions of Perfect Hash Families from Algebraic Curves over Finite Fields.
J. Comb. Theory A, 2001

Broadcast anti-jamming systems.
Comput. Networks, 2001

A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances.
Proceedings of the Information Security and Cryptology, 2001

Efficient Revocation Schemes for Secure Multicast.
Proceedings of the Information Security and Cryptology, 2001

How to Construct Fail-Stop Confirmer Signature Schemes.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
Constructions of authentication codes from algebraic curves over finite fields.
IEEE Trans. Inf. Theory, 2000

Fail-Stop Signature for Long Messages.
Proceedings of the Progress in Cryptology, 2000

New constructions for multicast re-keying schemes using perfect hash families.
Proceedings of the CCS 2000, 2000

On Multiplicative Secret Sharing Schemes.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

Key Management for Secure Multicast with Dynamic Controller.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions.
Inf. Comput., 1999

Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures.
Comput. J., 1999

Changing Thresholds in the Absence of Secure Channels.
Aust. Comput. J., 1999

Broadcast anti-jamming systems.
Proceedings of the IEEE International Conference on Networks 1999, 1999

A New Approach to Robust Threshold RSA Signature Schemes.
Proceedings of the Information Security and Cryptology, 1999

1998
On Rational Series and Rational Languages.
Theor. Comput. Sci., 1998

On Syntactic Nuclei of Rational Languages.
Inf. Process. Lett., 1998

New Results on Multi-Receiver Authentication Codes.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

Bounds and Constructions for Multireceiver Authentication Codes.
Proceedings of the Advances in Cryptology, 1998

On Construction of Cumulative Secret Sharing Schemes.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998


  Loading...