Rongmao Chen

Orcid: 0000-0002-5113-387X

According to our database1, Rongmao Chen authored at least 69 papers between 2015 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Practical two-party SM2 signing using multiplicative-to-additive functionality.
Comput. Stand. Interfaces, 2025

2024
A lattice-based forward secure IBE scheme for Internet of things.
Inf. Sci., March, 2024

REEDS: An Efficient Revocable End-to-End Encrypted Message Distribution System for IoT.
IEEE Trans. Dependable Secur. Comput., 2024

Post-quantum identity-based traitor tracing.
J. Inf. Secur. Appl., 2024

Parameter-Hiding Order-Revealing Encryption without Pairings.
IACR Cryptol. ePrint Arch., 2024

Subverting Cryptographic Protocols from A Fine-Grained Perspective - A Case Study on 2-Party ECDSA.
IACR Cryptol. ePrint Arch., 2024

Tighter Proofs for PKE-to-KEM Transformation in the Quantum Random Oracle Model.
IACR Cryptol. ePrint Arch., 2024

Speedy Privacy-Preserving Skyline Queries on Outsourced Data.
Proceedings of the Computer Security - ESORICS 2024, 2024

Honest-Majority Maliciously Secure Skyline Queries on Outsourced Data.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024

An Efficient Hardware Implementation of Crystal-Dilithium on FPGA.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

Subverting Cryptographic Protocols from a Fine-Grained Perspective- A Case Study on 2-Party ECDSA.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
Towards Strong Privacy Protection for Association Rule Mining and Query in the Cloud.
IEEE Trans. Cloud Comput., 2023

Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions.
IACR Cryptol. ePrint Arch., 2023

Subversion-Resilient Signatures without Random Oracles.
IACR Cryptol. ePrint Arch., 2023

Secure Approximate Nearest Neighbor Search with Locality-Sensitive Hashing.
Proceedings of the Computer Security - ESORICS 2023, 2023

Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-Kyber.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
Message-Locked Searchable Encryption: A New Versatile Tool for Secure Cloud Storage.
IEEE Trans. Serv. Comput., 2022

Secure Anonymous Communication on Corrupted Machines With Reverse Firewalls.
IEEE Trans. Dependable Secur. Comput., 2022

SecRec: A Privacy-Preserving Method for the Context-Aware Recommendation System.
IEEE Trans. Dependable Secur. Comput., 2022

Asymmetric subversion attacks on signature and identification schemes.
Pers. Ubiquitous Comput., 2022

Substitution Attacks Against Sigma Protocols.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

2021
APGS: An Efficient Source-Accountable and Metadata-Private Protocol in the Network Layer.
IEEE Trans. Inf. Forensics Secur., 2021

Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved.
IACR Cryptol. ePrint Arch., 2021

Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE.
IACR Cryptol. ePrint Arch., 2021

Subversion-Resilient Public Key Encryption with Practical Watchdogs.
IACR Cryptol. ePrint Arch., 2021

Balancing anonymity and resilience in anonymous communication networks.
Comput. Secur., 2021

2020
Towards Practical Privacy-Preserving Decision Tree Training and Evaluation in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2020

Privacy-enhanced remote data integrity checking with updatable timestamp.
Inf. Sci., 2020

ME-TLS: Middlebox-Enhanced TLS for Internet-of-Things Devices.
IEEE Internet Things J., 2020

Security of Auditing Protocols Against Subversion Attacks.
Int. J. Found. Comput. Sci., 2020

Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2020

Hierarchical Identity-Based Signature in Polynomial Rings.
Comput. J., 2020

On the Security of LWE Cryptosystem against Subversion Attacks.
Comput. J., 2020

Hybrid Routing: Towards Resilient Routing in Anonymous Communication Networks.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

SHOSVD: Secure Outsourcing of High-Order Singular Value Decomposition.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
A Practical Authentication Framework for VANETs.
Secur. Commun. Networks, 2019

Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters.
Inf. Sci., 2019

Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data.
IEEE Internet Things J., 2019

Strongly leakage resilient authenticated key exchange, revisited.
Des. Codes Cryptogr., 2019

Practical privacy-preserving deep packet inspection outsourcing.
Concurr. Comput. Pract. Exp., 2019

Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

2018
Efficient <i>k</i>-out-of-<i>n</i> oblivious transfer scheme with the ideal communication cost.
Theor. Comput. Sci., 2018

Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience.
Proceedings of the Security and Privacy in Communication Networks, 2018

A Real-Time Aware Routing Strategy in Smart City Environments.
Proceedings of the 2018 IEEE International Conference on Sensing, 2018

Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

Asymmetric Subversion Attacks on Signature Schemes.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Privacy-Preserving Data Packet Filtering Protocol with Source IP Authentication.
Wirel. Pers. Commun., 2017

Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city.
Pers. Ubiquitous Comput., 2017

Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample.
IACR Cryptol. ePrint Arch., 2017

A note on the strong authenticated key exchange with auxiliary inputs.
Des. Codes Cryptogr., 2017

Strong authenticated key exchange with auxiliary inputs.
Des. Codes Cryptogr., 2017

Privacy-preserving data search and sharing protocol for social networks through wireless applications.
Concurr. Comput. Pract. Exp., 2017

Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization.
Comput. J., 2017

Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy.
Proceedings of the Information Security Practice and Experience, 2017

PriMal: Cloud-Based Privacy-Preserving Malware Detection.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications.
IEEE Trans. Inf. Forensics Secur., 2016

Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2016

Server-Aided Public Key Encryption With Keyword Search.
IEEE Trans. Inf. Forensics Secur., 2016

An efficient privacy-preserving aggregation and billing protocol for smart grid.
Secur. Commun. Networks, 2016

Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group.
J. Comput. Sci. Technol., 2016

Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction.
IACR Cryptol. ePrint Arch., 2016

Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
IACR Cryptol. ePrint Arch., 2016

Strongly Leakage-Resilient Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2016

Oblivious Keyword Search with Authorization.
Proceedings of the Provable Security, 2016

Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

One-Round Strong Oblivious Signature-Based Envelope.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication.
IEEE Trans. Inf. Forensics Secur., 2015

A New General Framework for Secure Public Key Encryption with Keyword Search.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015


  Loading...