Yi-Fan Tseng
Orcid: 0000-0001-6948-2405
According to our database1,
Yi-Fan Tseng
authored at least 72 papers
between 2013 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Blacklisting access control via negated subset predicate encryption: Constant-size ciphertexts/keys constructions with adaptive security or attribute hiding.
J. Inf. Secur. Appl., 2025
2024
Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives.
Des. Codes Cryptogr., June, 2024
Attribute hiding subset predicate encryption: Quantum-resistant construction with efficient decryption.
Comput. Stand. Interfaces, March, 2024
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems.
Comput. Stand. Interfaces, 2024
Efficient and Secure Multi-Point Communication Framework Supporting Resource Constraints Environment.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024
ID-Based Traitor Tracing with Relaxed Black-Box Setting for Group-Based Applications.
Proceedings of the 19th Asia Joint Conference on Information Security, 2024
Proceedings of the 19th Asia Joint Conference on Information Security, 2024
2023
An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for MQTT.
ACM Trans. Sens. Networks, August, 2023
Inf. Process. Lett., August, 2023
Proceedings of the 18th Asia Joint Conference on Information Security, 2023
Proceedings of the 18th Asia Joint Conference on Information Security, 2023
2022
ACM Trans. Sens. Networks, November, 2022
Symmetry, 2022
Identity-Certifying Authority-Aided Identity-Based Searchable Encryption Framework in Cloud Systems.
IEEE Syst. J., 2022
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT.
J. Syst. Archit., 2022
J. Inf. Secur. Appl., 2022
J. Inf. Secur. Appl., 2022
IET Inf. Secur., 2022
Public-Key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-Resistant Instantiation.
Comput. J., 2022
Proceedings of the Advances in Information and Computer Security, 2022
Proceedings of the Information Security Practice and Experience, 2022
Proceedings of the Information Security Practice and Experience, 2022
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022
Proceedings of the 17th Asia Joint Conference on Information Security, 2022
Proceedings of the 17th Asia Joint Conference on Information Security, 2022
2021
Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function.
Secur. Commun. Networks, 2021
Anonymous Multireceiver Identity-Based Encryption against Chosen-Ciphertext Attacks with Tight Reduction in the Standard Model.
Secur. Commun. Networks, 2021
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Notes on a lattice-based proxy-oriented identity-based encryption with keyword search.
IACR Cryptol. ePrint Arch., 2021
Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud System.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for Message Queueing Telemetry Transport.
IACR Cryptol. ePrint Arch., 2021
Cryptanalysis on Lin and Wu's Undeniable (t, n)-Threshold Signature Scheme with Cheater Identification.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2021
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
CCA-Secure Attribute-Based Encryption Supporting Dynamic Membership in the Standard Model.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Proceedings of the 16th Asia Joint Conference on Information Security, 2021
Identity-Based Signature from Quadratic Residues and Its Extension to ID-Based Multi-Signature.
Proceedings of the 16th Asia Joint Conference on Information Security, 2021
2020
Int. J. Inf. Sec., 2020
IACR Cryptol. ePrint Arch., 2020
Quantum-resistant Public-key Authenticated Encryption with Keyword Search for Industrial Internet of Things.
IACR Cryptol. ePrint Arch., 2020
Cryptanalysis of "FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things".
IACR Cryptol. ePrint Arch., 2020
Cryptanalysis on Two Pairing-Free Ciphertext-Policy Attribute-Based Encryption Schemes.
Proceedings of the International Computer Symposium, 2020
Key-Aggregate Proxy Re-Encryption with Dynamic Condition Generation Using Multilinear Map.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
2019
IEEE Trans. Netw. Serv. Manag., 2019
IEEE Syst. J., 2019
Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption.
J. Univers. Comput. Sci., 2019
On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki-Okamoto Transformation.
Int. J. Found. Comput. Sci., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
2018
Provably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption.
J. Inf. Sci. Eng., 2018
An authenticated re-encryption scheme for secure file transfer in named data networks.
Int. J. Commun. Syst., 2018
Proceedings of the Internet and Distributed Computing Systems, 2018
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
Proceedings of the 13th Asia Joint Conference on Information Security, 2018
2017
IEEE Trans. Signal Inf. Process. over Networks, 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering, 2017
2016
Proceedings of the Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services, 2016
Proceedings of the 6th International Conference on IT Convergence and Security, 2016
2015
Symmetry, 2015
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
Proceedings of the 10th Asia Joint Conference on Information Security, 2015
2014
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014
2013
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013