Viet Cuong Trinh

Orcid: 0000-0003-2076-019X

According to our database1, Viet Cuong Trinh authored at least 24 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Secure Proxy Re-Signature Scheme for IoT.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2023

2020
Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption.
Theor. Comput. Sci., 2020

Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption.
Symmetry, 2020

Wildcarded Identity-Based Encryption with Constant-size Ciphertext and Secret Key.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

A New Approach to Keep the Privacy Information of the Signer in a Digital Signature Scheme.
Inf., 2020

Lattice Blind Signatures with Forward Security.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
A Short Server-Aided Certificateless Aggregate Multisignature Scheme in the Standard Model.
Secur. Commun. Networks, 2019

Decentralized ciphertext-policy attribute-based encryption schemes for lightweight devices.
Comput. Commun., 2019

One-Verifier Signature Scheme and Its Applications.
Proceedings of the Tenth International Symposium on Information and Communication Technology, 2019

2018
A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption.
Theor. Comput. Sci., 2018

Attribute-based broadcast encryption scheme for lightweight devices.
IET Inf. Secur., 2018

Certificateless Public Key Cryptography in the Standard Model.
Fundam. Informaticae, 2018

2017
A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
An efficient instance hiding scheme.
Proceedings of the Seventh Symposium on Information and Communication Technology, 2016

Constant-Size Ciphertext Attribute-Based Encryption from Multi-channel Broadcast Encryption.
Proceedings of the Information Systems Security - 12th International Conference, 2016

An Efficient Certificateless Signature Scheme in the Standard Model.
Proceedings of the Information Systems Security - 12th International Conference, 2016

A New Technique for Compacting Secret Key in Attribute-Based Broadcast Encryption.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Private Ciphertext-Policy Attribute-based Encryption Schemes With Constant-Size Ciphertext Supporting CNF Access Policy.
IACR Cryptol. ePrint Arch., 2015

2013
Discovering Contexts from Observed Human Performance.
IEEE Trans. Hum. Mach. Syst., 2013

Key-Leakage Resilient Revoke Scheme Resisting Pirates 2.0 in Bounded Leakage Model.
Proceedings of the Progress in Cryptology, 2013

Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model.
Proceedings of the Progress in Cryptology, 2013

2012
Resistance to Pirates 2.0: A Method from Leakage Resilient Cryptography.
IACR Cryptol. ePrint Arch., 2012

Multi-Channel Broadcast Encryption.
IACR Cryptol. ePrint Arch., 2012

2011
Identity-Based Trace and Revoke Schemes.
Proceedings of the Provable Security - 5th International Conference, 2011


  Loading...