Yi Mu

Orcid: 0000-0002-1637-845X

Affiliations:
  • City University of Macau, Macau
  • Fujian Normal University, Fuzhou, China (former)
  • University of Wollongong, NSW, Australia (former)
  • Macquarie University, Sydney, NSW, Australia (former)
  • University of Western Sydney, NSW, Australia (former)
  • Australian National University, Canberra, ACT, Australia (PhD 1994)


According to our database1, Yi Mu authored at least 531 papers between 1996 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Pruned Pendant Vertex Based Index for Shortest Distance Query Under Structured Encrypted Graph.
IEEE Trans. Inf. Forensics Secur., 2024

Monero With Multi-Grained Redaction.
IEEE Trans. Dependable Secur. Comput., 2024

Practical and malicious private set intersection with improved efficiency.
Theor. Comput. Sci., 2024

Volume Hiding Conjunctive Searchable Symmetric Encryption over Cloud.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2024

2023
Global Combination and Clustering Based Differential Privacy Mixed Data Publishing.
IEEE Trans. Knowl. Data Eng., November, 2023

BE-TRDSS: Blockchain-Enabled Secure and Efficient Traceable-Revocable Data-Sharing Scheme in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, November, 2023

Leakage-resilient identity-based cryptography from minimal assumptions.
Des. Codes Cryptogr., November, 2023

Redactable Blockchain-Enabled Hierarchical Access Control Framework for Data Sharing in Electronic Medical Records.
IEEE Syst. J., June, 2023

Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption.
Comput. J., April, 2023

Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT.
IEEE Trans. Serv. Comput., 2023

CASE-SSE: Context-Aware Semantically Extensible Searchable Symmetric Encryption for Encrypted Cloud Data.
IEEE Trans. Serv. Comput., 2023

Authenticable Data Analytics Over Encrypted Data in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2023

Toward Secure Data Computation and Outsource for Multi-User Cloud-Based IoT.
IEEE Trans. Cloud Comput., 2023

C-Wall: Conflict-Resistance in Privacy-Preserving Cloud Storage.
IEEE Trans. Cloud Comput., 2023

2022
Blockchain-enabled efficient distributed attribute-based access control framework with privacy-preserving in IoV.
J. King Saud Univ. Comput. Inf. Sci., November, 2022

Secure Outsourced Attribute-Based Sharing Framework for Lightweight Devices in Smart Health Systems.
IEEE Trans. Serv. Comput., 2022

Privacy-Preserving Reverse Nearest Neighbor Query Over Encrypted Spatial Data.
IEEE Trans. Serv. Comput., 2022

Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization.
IEEE Trans. Serv. Comput., 2022

Authenticated Data Redaction With Accountability and Transparency.
IEEE Trans. Dependable Secur. Comput., 2022

Bidirectional and Malleable Proof-of-Ownership for Large File in Cloud Storage.
IEEE Trans. Cloud Comput., 2022

Distributed Ciphertext-Policy Attribute-Based Encryption With Enhanced Collusion Resilience and Privacy Preservation.
IEEE Syst. J., 2022

Secure and Efficient General Circuits Attribute-Based Access Control in Cloud Computing.
IEEE Syst. J., 2022

Publicly verifiable secure communication with user and data privacy.
Pers. Ubiquitous Comput., 2022

A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth.
J. Syst. Archit., 2022

Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud.
J. Syst. Archit., 2022

Controllable software licensing system for sub-licensing.
J. Inf. Secur. Appl., 2022

Structured encryption for knowledge graphs.
Inf. Sci., 2022

A Secure and Efficient Decentralized Access Control Scheme Based on Blockchain for Vehicular Social Networks.
IEEE Internet Things J., 2022

Secure Decentralized Attribute-Based Sharing of Personal Health Records With Blockchain.
IEEE Internet Things J., 2022

Blockchain-based deduplication with arbitration and incentives.
IET Inf. Secur., 2022

BA-RMKABSE: Blockchain-aided Ranked Multi-keyword Attribute-based Searchable Encryption with Hiding Policy for Smart Health System.
Future Gener. Comput. Syst., 2022

Blockchain-based random auditor committee for integrity verification.
Future Gener. Comput. Syst., 2022

2021
Privacy-Preserving Proof of Storage for the Pay-As-You-Go Business Model.
IEEE Trans. Dependable Secur. Comput., 2021

An Expressive "Test-Decrypt-Verify" Attribute-Based Encryption Scheme With Hidden Policy for Smart Medical Cloud.
IEEE Syst. J., 2021

Building Blockchains with Secure and Practical Public-Key Cryptographic Algorithms: Background, Motivations and Example.
IEEE Netw., 2021

Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system.
Inf. Sci., 2021

Scalable and redactable blockchain with update and anonymity.
Inf. Sci., 2021

Multiauthority Access Control With Anonymous Authentication for Personal Health Record.
IEEE Internet Things J., 2021

Privacy-Preserving Flexible Access Control for Encrypted Data in Internet of Things.
IEEE Internet Things J., 2021

An Enhanced Certificateless Aggregate Signature Without Pairings for E-Healthcare System.
IEEE Internet Things J., 2021

Secure and Privacy-Preserved Data Collection for IoT Wireless Sensors.
IEEE Internet Things J., 2021

Secure and Efficient Data Aggregation for IoT Monitoring Systems.
IEEE Internet Things J., 2021

Enhanced bitcoin with two-factor authentication.
Int. J. Inf. Comput. Secur., 2021

Securing the Internet-of-Things: Advances, challenges, future trends.
Trans. Emerg. Telecommun. Technol., 2021

Novel generic construction of leakage-resilient PKE scheme with CCA security.
Des. Codes Cryptogr., 2021

Unlinkable and Revocable Secret Handshake.
Comput. J., 2021

Privacy-Aware Image Authentication from Cryptographic Primitives.
Comput. J., 2021

2020
Policy-Driven Blockchain and Its Applications for Transport Systems.
IEEE Trans. Serv. Comput., 2020

Achieving Intelligent Trust-Layer for Internet-of-Things via Self-Redactable Blockchain.
IEEE Trans. Ind. Informatics, 2020

Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2020

Identity-based encryption with leakage-amplified chosen-ciphertext attacks security.
Theor. Comput. Sci., 2020

Novel updatable identity-based hash proof system and its applications.
Theor. Comput. Sci., 2020

Revocable identity-based encryption with server-aided ciphertext evolution.
Theor. Comput. Sci., 2020

A code-based signature scheme from the Lyubashevsky framework.
Theor. Comput. Sci., 2020

HUCDO: A Hybrid User-centric Data Outsourcing Scheme.
ACM Trans. Cyber Phys. Syst., 2020

Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing.
IEEE Syst. J., 2020

A practical and communication-efficient deniable authentication with source-hiding and its application on Wi-Fi privacy.
Inf. Sci., 2020

Privacy-enhanced remote data integrity checking with updatable timestamp.
Inf. Sci., 2020

EVA: Efficient Versatile Auditing Scheme for IoT-Based Datamarket in Jointcloud.
IEEE Internet Things J., 2020

Secure Decentralized Access Control Policy for Data Sharing in Smart Grid.
IACR Cryptol. ePrint Arch., 2020

Black-Box Accountable Authority Identity-Based Revocation System.
Comput. J., 2020

An improved Durandal signature scheme.
Sci. China Inf. Sci., 2020

Efficient and secure image authentication with robustness and versatility.
Sci. China Inf. Sci., 2020

Secure and Privacy-Preserving Attribute-Based Sharing Framework in Vehicles Ad Hoc Networks.
IEEE Access, 2020

Outsourcing Attributed-Based Ranked Searchable Encryption With Revocation for Cloud Storage.
IEEE Access, 2020

Privacy-Preserving Multi-Authority Attribute-Based Data Sharing Framework for Smart Grid.
IEEE Access, 2020

Secure Data Sharing With Lightweight Computation in E-Health.
IEEE Access, 2020

On the Security of Symmetric Encryption Against Mass Surveillance.
IEEE Access, 2020

Improvement of Attribute-Based Encryption Using Blakley Secret Sharing.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
Privacy-Preserving Certificateless Cloud Auditing with Multiple Users.
Wirel. Pers. Commun., 2019

Building Redactable Consortium Blockchain for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2019

The generic construction of continuous leakage-resilient identity-based cryptosystems.
Theor. Comput. Sci., 2019

Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems.
Theor. Comput. Sci., 2019

Anonymous and Updatable Identity-Based Hash Proof System.
IEEE Syst. J., 2019

Advances of Provable Security Techniques.
J. Univers. Comput. Sci., 2019

DABKE: Secure deniable attribute-based key exchange framework.
J. Comput. Secur., 2019

Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation.
Inf. Sci., 2019

Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters.
Inf. Sci., 2019

Threshold privacy-preserving cloud auditing with multiple uploaders.
Int. J. Inf. Sec., 2019

ACE with Compact Ciphertext Size and Decentralized Sanitizers.
Int. J. Found. Comput. Sci., 2019

Provably Secure (Broadcast) Homomorphic Signcryption.
Int. J. Found. Comput. Sci., 2019

Identity-based encryption resilient to continuous key leakage.
IET Inf. Secur., 2019

A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance.
Future Gener. Comput. Syst., 2019

Continuous leakage-resilient identity-based encryption with leakage amplification.
Des. Codes Cryptogr., 2019

Strongly leakage resilient authenticated key exchange, revisited.
Des. Codes Cryptogr., 2019

Efficient Micropayment of Cryptocurrency from Blockchains.
Comput. J., 2019

Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System.
IEEE Access, 2019

Top-Level Secure Certificateless Signature Against Malicious-But-Passive KGC.
IEEE Access, 2019

On the Security of an Efficient and Robust Certificateless Signature Scheme for IIoT Environments.
IEEE Access, 2019

Fully Secure Lightweight Certificateless Signature Scheme for IIoT.
IEEE Access, 2019

A Typo-Tolerant Password Authentication Scheme with Targeted Error Correction.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Provably Secure Proactive Secret Sharing Without the Adjacent Assumption.
Proceedings of the Provable Security, 2019

Provably Secure Group Authentication in the Asynchronous Communication Model.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

EAPA: Efficient Attestation Resilient to Physical Attacks for IoT Devices.
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019

2018
New Approach for Privacy-Aware Location-Based Service Communications.
Wirel. Pers. Commun., 2018

Strong Identity-Based Proxy Signature Schemes, Revisited.
Wirel. Commun. Mob. Comput., 2018

Security of Grouping-Proof Authentication Protocol for Distributed RFID Systems.
IEEE Wirel. Commun. Lett., 2018

Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2018

Policy controlled system with anonymity.
Theor. Comput. Sci., 2018

Efficient <i>k</i>-out-of-<i>n</i> oblivious transfer scheme with the ideal communication cost.
Theor. Comput. Sci., 2018

Correction to: Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure.
Pers. Ubiquitous Comput., 2018

Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure.
Pers. Ubiquitous Comput., 2018

A New Revocable and Re-Delegable Proxy Signature and Its Application.
J. Comput. Sci. Technol., 2018

Practical and secure telemedicine systems for user mobility.
J. Biomed. Informatics, 2018

Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks.
J. Inf. Secur. Appl., 2018

Witness-based searchable encryption.
Inf. Sci., 2018

A Generic Scheme of plaintext-checkable database encryption.
Inf. Sci., 2018

Privacy-enhanced attribute-based private information retrieval.
Inf. Sci., 2018

Certificate-based Smooth Projective Hashing and Its Applications.
Int. J. Netw. Secur., 2018

Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes.
Int. J. Inf. Sec., 2018

Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts.
Int. J. Inf. Sec., 2018

Fully secure hierarchical inner product encryption for privacy preserving keyword searching in cloud.
Int. J. High Perform. Comput. Netw., 2018

CCN framework with privacy support.
IET Inf. Secur., 2018

Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing.
Future Gener. Comput. Syst., 2018

Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles.
Comput. J., 2018

Identity-Based Broadcast Encryption for Inner Products.
Comput. J., 2018

Continuous leakage-resilient access control for wireless sensor networks.
Ad Hoc Networks, 2018

Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption.
IEEE Access, 2018

A Privacy-Preserving Fog Computing Framework for Vehicular Crowdsensing Networks.
IEEE Access, 2018

Efficient Attribute-Based Encryption with Blackbox Traceability.
Proceedings of the Provable Security, 2018

An Efficient and Provably Secure Private Polynomial Evaluation Scheme.
Proceedings of the Information Security Practice and Experience, 2018

Efficient Traceable Oblivious Transfer and Its Applications.
Proceedings of the Information Security Practice and Experience, 2018

Improving Privacy-Preserving CP-ABE with Hidden Access Policy.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Novel Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Anonymous Key Generation.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Introduction to Security Reduction
Springer, ISBN: 978-3-319-93048-0, 2018

2017
Designated Verifier Proxy Re-signature for Deniable and Anonymous Wireless Communications.
Wirel. Pers. Commun., 2017

Privacy-Preserving Data Packet Filtering Protocol with Source IP Authentication.
Wirel. Pers. Commun., 2017

Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting.
Wirel. Pers. Commun., 2017

Privacy-Preserving Mutual Authentication in RFID with Designated Readers.
Wirel. Pers. Commun., 2017

Computation-efficient key establishment in wireless group communications.
Wirel. Networks, 2017

Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation.
IEEE Trans. Inf. Forensics Secur., 2017

EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2017

Efficient E-coupon systems with strong user privacy.
Telecommun. Syst., 2017

Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices.
IEEE Trans. Dependable Secur. Comput., 2017

A Generic Table Recomputation-Based Higher-Order Masking.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2017

Attribute-Based Hash Proof System Under Learning-With-Errors Assumption in Obfuscator-Free and Leakage-Resilient Environments.
IEEE Syst. J., 2017

Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query.
Quantum Inf. Process., 2017

Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city.
Pers. Ubiquitous Comput., 2017

Private Keyword-Search for Database Systems Against Insider Attacks.
J. Comput. Sci. Technol., 2017

Communication security and privacy support in 6LoWPAN.
J. Inf. Secur. Appl., 2017

Continuous Leakage Resilient Lossy Trapdoor Functions.
Inf., 2017

Efficient identity-based online/offline encryption and signcryption with short ciphertext.
Int. J. Inf. Sec., 2017

One-Round Attribute-Based Key Exchange in the Multi-Party Setting.
Int. J. Found. Comput. Sci., 2017

Revocable hierarchical identity-based encryption over lattice for pay-TV systems.
Int. J. Embed. Syst., 2017

A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange.
Int. J. Comput. Math., 2017

Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample.
IACR Cryptol. ePrint Arch., 2017

A note on the strong authenticated key exchange with auxiliary inputs.
Des. Codes Cryptogr., 2017

Strong authenticated key exchange with auxiliary inputs.
Des. Codes Cryptogr., 2017

Policy-controlled signatures and their applications.
Comput. Stand. Interfaces, 2017

Identity-based provable data possession revisited: Security analysis and generic construction.
Comput. Stand. Interfaces, 2017

Privacy-preserving data search and sharing protocol for social networks through wireless applications.
Concurr. Comput. Pract. Exp., 2017

Secure-channel free keyword search with authorization in manager-centric databases.
Comput. Secur., 2017

Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof System.
Comput. J., 2017

Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization.
Comput. J., 2017

Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server.
IEEE Access, 2017

Access Control Policy Combination from Similarity Analysis for Secure Privacy-Preserved EHR Systems.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Deniable Ring Authentication Based on Projective Hash Functions.
Proceedings of the Provable Security, 2017

Provably Secure Homomorphic Signcryption.
Proceedings of the Provable Security, 2017

Group-Based Source-Destination Verifiable Encryption with Blacklist Checking.
Proceedings of the Information Security Practice and Experience, 2017

Fuzzy Extractors for Biometric Identification.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

An efficient and provably secure RFID grouping proof protocol.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

Hierarchical Functional Encryption for Linear Transformations.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

Mergeable and Revocable Identity-Based Encryption.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

ID-Based Encryption with Equality Test Against Insider Attack.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

Privacy-Preserving k-time Authenticated Secret Handshakes.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Trust-based group services selection in web-based service-oriented environments.
World Wide Web, 2016

Comments on "Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks".
IEEE Trans. Wirel. Commun., 2016

Comments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification".
IEEE Trans. Inf. Forensics Secur., 2016

One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications.
IEEE Trans. Inf. Forensics Secur., 2016

Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption.
IEEE Trans. Inf. Forensics Secur., 2016

Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2016

Server-Aided Public Key Encryption With Keyword Search.
IEEE Trans. Inf. Forensics Secur., 2016

Efficient dynamic threshold identity-based encryption with constant-size ciphertext.
Theor. Comput. Sci., 2016

Relations between robustness and RKA security under public-key encryption.
Theor. Comput. Sci., 2016

CCA2 secure public-key encryption scheme tolerating continual leakage attacks.
Secur. Commun. Networks, 2016

Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity.
Secur. Commun. Networks, 2016

An efficient privacy-preserving aggregation and billing protocol for smart grid.
Secur. Commun. Networks, 2016

Privacy-preserving grouping proof with key exchange in the multiple-party setting.
Secur. Commun. Networks, 2016

Centralized keyword search on encrypted data for cloud applications.
Secur. Commun. Networks, 2016

An efficient quantum scheme for Private Set Intersection.
Quantum Inf. Process., 2016

Privacy-Preserving and Secure Sharing of PHR in the Cloud.
J. Medical Syst., 2016

Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group.
J. Comput. Sci. Technol., 2016

Quantum private set intersection cardinality and its application to anonymous authentication.
Inf. Sci., 2016

Distributed clinical data sharing via dynamic access-control policy transformation.
Int. J. Medical Informatics, 2016

Multi-authority security framework for scalable EHR systems.
Int. J. Medical Eng. Informatics, 2016

Message from the Guest Editors.
Int. J. Inf. Sec., 2016

Privacy-enhanced distance computation with applications.
Int. J. Electron. Secur. Digit. Forensics, 2016

Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction.
IACR Cryptol. ePrint Arch., 2016

Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
IACR Cryptol. ePrint Arch., 2016

Strongly Leakage-Resilient Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2016

Generalized closest substring encryption.
Des. Codes Cryptogr., 2016

Recent advances in security and privacy in large-scale networks.
Concurr. Comput. Pract. Exp., 2016

Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys.
Comput. J., 2016

Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations.
Comput. J., 2016

Anonymous Proxy Signature with Hierarchical Traceability.
Comput. J., 2016

Online/Offline Ciphertext Retrieval on Resource Constrained Devices.
Comput. J., 2016

One-Round Attribute-Based Key Exchange in the Multi-party Setting.
Proceedings of the Provable Security, 2016

Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage.
Proceedings of the Provable Security, 2016

Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update.
Proceedings of the Provable Security, 2016

A Privacy Preserving Source Verifiable Encryption Scheme.
Proceedings of the Information Security Practice and Experience, 2016

Privacy-Preserving Cloud Auditing with Multiple Uploaders.
Proceedings of the Information Security Practice and Experience, 2016

Preserving User Location Privacy for Location-Based Service.
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016

Achieving IND-CCA Security for Functional Encryption for Inner Products.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

Bilateral-secure Signature by Key Evolving.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Linear Encryption with Keyword Search.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Proxy Signature with Revocation.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Content-Based Encryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Public Key Encryption with Authorized Keyword Search.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

One-Round Strong Oblivious Signature-Based Envelope.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Comments on a Public Auditing Mechanism for Shared Cloud Data Service.
IEEE Trans. Serv. Comput., 2015

Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption.
IEEE Trans. Inf. Forensics Secur., 2015

AAC-OT: Accountable Oblivious Transfer With Access Control.
IEEE Trans. Inf. Forensics Secur., 2015

BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication.
IEEE Trans. Inf. Forensics Secur., 2015

Loss-Tolerant Bundle Fragment Authentication for Space-Based DTNs.
IEEE Trans. Dependable Secur. Comput., 2015

Mediated Encryption: Analysis and Design.
EAI Endorsed Trans. Security Safety, 2015

Vulnerabilities of an ECC-based RFID authentication scheme.
Secur. Commun. Networks, 2015

A resilient identity-based authenticated key exchange protocol.
Secur. Commun. Networks, 2015

Recent Advances in Security and Privacy in Big Data.
J. Univers. Comput. Sci., 2015

Identity-based quotable ring signature.
Inf. Sci., 2015

An IPv6-based mobility framework for urban vehicular networks.
Int. J. Netw. Manag., 2015

Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage.
Int. J. Inf. Sec., 2015

Key management for Smart Grid based on asymmetric key-wrapping.
Int. J. Comput. Math., 2015

Proof of retrievability with public verifiability resilient against related-key attacks.
IET Inf. Secur., 2015

A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing.
Future Gener. Comput. Syst., 2015

Shared RFID ownership transfer protocols.
Comput. Stand. Interfaces, 2015

Functional Encryption Resilient to Hard-to-Invert Leakage.
Comput. J., 2015

Secure Delegation of Signing Power from Factorization.
Comput. J., 2015

On Indistinguishability in Remote Data Integrity Checking.
Comput. J., 2015

Further ideal multipartite access structures from integer polymatroids.
Sci. China Inf. Sci., 2015

Hierarchical ID-Based Searchable Encryption with Constant Size Ciphertext in Cloud.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Provably Secure Identity Based Provable Data Possession.
Proceedings of the Provable Security, 2015

Threshold Broadcast Encryption with Keyword Search.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

Anonymous Yoking-Group Proofs.
Proceedings of the 10th ACM Symposium on Information, 2015

Improved Identity-Based Online/Offline Encryption.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

A New Public Remote Integrity Checking Scheme with User Privacy.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

A New General Framework for Secure Public Key Encryption with Keyword Search.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

Business Rule Driven Composite Service Optimisation and Selection.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

2014
A Secure IPv6 Address Configuration Protocol for Vehicular Networks.
Wirel. Pers. Commun., 2014

On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage.
IEEE Trans. Parallel Distributed Syst., 2014

An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation.
IEEE Trans. Inf. Forensics Secur., 2014

Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs.
IEEE Trans. Inf. Forensics Secur., 2014

CP-ABE With Constant-Size Keys for Lightweight Devices.
IEEE Trans. Inf. Forensics Secur., 2014

Subset Membership Encryption and Its Applications to Oblivious Transfer.
IEEE Trans. Inf. Forensics Secur., 2014

Identity based identification from algebraic coding theory.
Theor. Comput. Sci., 2014

Identity-Based Secure DistributedData Storage Schemes.
IEEE Trans. Computers, 2014

Efficient public key encryption with revocable keyword search.
Secur. Commun. Networks, 2014

A secure mobility support scheme for 6LoWPAN wireless sensor networks.
Secur. Commun. Networks, 2014

Loss-tolerant authentication with digital signatures.
Secur. Commun. Networks, 2014

Towards a cryptographic treatment of publish/subscribe systems.
J. Comput. Secur., 2014

Security pitfalls of an efficient threshold proxy signature scheme for mobile agents.
Inf. Process. Lett., 2014

Efficient authentication and integrity protection for the border gateway protocol.
Int. J. Secur. Networks, 2014

Anonymous broadcast encryption with an untrusted gateway.
Int. J. Secur. Networks, 2014

A Secure Home Healthcare System Based on 6LoWPAN WSN.
Int. J. Interdiscip. Telecommun. Netw., 2014

PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2014

On the security of auditing mechanisms for secure cloud storage.
Future Gener. Comput. Syst., 2014

SA<sup>3</sup>: Self-adaptive anonymous authentication for dynamic authentication policies.
Future Gener. Comput. Syst., 2014

Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks.
Frontiers Comput. Sci., 2014

Security of new generation computing systems.
Concurr. Comput. Pract. Exp., 2014

Trust-oriented QoS-aware composite service selection based on genetic algorithms.
Concurr. Comput. Pract. Exp., 2014

Affiliation-Hiding Authenticated Asymmetric Group Key Agreement Based on Short Signature.
Comput. J., 2014

Attribute-Based Data Transfer with Filtering Scheme in Cloud Computing.
Comput. J., 2014

Server-Aided Signature Verification for Lightweight Devices.
Comput. J., 2014

Signcryption Secure Against Linear Related-Key Attacks.
Comput. J., 2014

Toward reverse engineering on secret S-boxes in block ciphers.
Sci. China Inf. Sci., 2014

Fair Multi-signature.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

An Efficient Variant of Boneh-Gentry-Hamburg's Identity-Based Encryption Without Pairing.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

Anonymous Proxy Signature with Restricted Traceability.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Public-Key Encryption Resilient against Linear Related-Key Attacks Revisited.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Attribute Based Service Customization and Selection.
Proceedings of the 7th IEEE International Conference on Service-Oriented Computing and Applications, 2014

Privacy-Preserving Authorized RFID Authentication Protocols.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014

Complete Robustness in Identity-Based Encryption.
Proceedings of the Provable Security - 8th International Conference, 2014

Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage.
Proceedings of the Network and System Security - 8th International Conference, 2014

Attribute-Based Signing Right Delegation.
Proceedings of the Network and System Security - 8th International Conference, 2014

Jhanwar-Barua's Identity-Based Encryption Revisited.
Proceedings of the Network and System Security - 8th International Conference, 2014

Attribute-Based Signature with Message Recovery.
Proceedings of the Information Security Practice and Experience, 2014

PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2014, 2014

An Efficient Privacy-Preserving E-coupon System.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

POSTER: Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Constant-Size Dynamic $k$ -Times Anonymous Authentication.
IEEE Syst. J., 2013

New construction of affiliation-hiding authenticated group key agreement.
Secur. Commun. Networks, 2013

A secure IPv6 address configuration scheme for a MANET.
Secur. Commun. Networks, 2013

Securing DSR against wormhole attacks in multirate ad hoc networks.
J. Netw. Comput. Appl., 2013

A robust trust model for service-oriented systems.
J. Comput. Syst. Sci., 2013

Key distribution for heterogeneous public-key cryptosystems.
J. Commun. Networks, 2013

On security of a certificateless signcryption scheme.
Inf. Sci., 2013

Efficient and dynamic key management for multiple identities in identity-based systems.
Inf. Sci., 2013

Server-aided identity-based anonymous broadcast encryption.
Int. J. Secur. Networks, 2013

Advanced computer mathematics based cryptography and security technologies.
Int. J. Comput. Math., 2013

Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction.
IACR Cryptol. ePrint Arch., 2013

Identity-based data storage in cloud computing.
Future Gener. Comput. Syst., 2013

Privacy-Enhanced Keyword Search in Clouds.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Identity-Based Mediated RSA Revisited.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Verifiable and Anonymous Encryption in Asymmetric Bilinear Maps.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Generic Mediated Encryption.
Proceedings of the Security and Privacy in Communication Networks, 2013

Public-Key Encryption Resilient to Linear Related-Key Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2013

On RFID Authentication Protocols with Wide-Strong Privacy.
Proceedings of the Radio Frequency Identification System Security, 2013

A Secure Elliptic Curve based RFID Ownership Transfer Scheme with Controlled Delegation.
Proceedings of the Radio Frequency Identification System Security, 2013

k-time Proxy Signature: Formal Definition and Efficient Construction.
Proceedings of the Provable Security - 7th International Conference, 2013

Anonymous Signcryption against Linear Related-Key Attacks.
Proceedings of the Provable Security - 7th International Conference, 2013

Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions.
Proceedings of the Information Security Practice and Experience, 2013

Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model.
Proceedings of the Information Security Practice and Experience, 2013

Identity-Based Multisignature with Message Recovery.
Proceedings of the Information Security Practice and Experience, 2013

Secure RFID Ownership Transfer Protocols.
Proceedings of the Information Security Practice and Experience, 2013

Anonymous Identity-Based Broadcast Encryption with Adaptive Security.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Membership Encryption and Its Applications.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption.
IEEE Trans. Parallel Distributed Syst., 2012

Privacy preserving protocol for service aggregation in cloud computing.
Softw. Pract. Exp., 2012

Provably secure proxy signature scheme from factorization.
Math. Comput. Model., 2012

Privacy enhanced data outsourcing in the cloud.
J. Netw. Comput. Appl., 2012

New constructions of OSBE schemes and their applications in oblivious access control.
Int. J. Inf. Sec., 2012

Improved certificateless signature scheme provably secure in the standard model.
IET Inf. Secur., 2012

Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme.
IEICE Trans. Inf. Syst., 2012

Efficient oblivious transfers with access control.
Comput. Math. Appl., 2012

Affiliation-Hiding Authenticated Asymmetric Group Key Agreement.
Comput. J., 2012

A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption.
Comput. J., 2012

Certificateless Signatures: New Schemes and Security Models.
Comput. J., 2012

Attribute-Based Oblivious Access Control.
Comput. J., 2012

Polar differential power attacks and evaluation.
Sci. China Inf. Sci., 2012

A provably secure authenticated key agreement protocol for wireless communications.
Comput. Electr. Eng., 2012

Efficient and secure stored-value cards with leakage resilience.
Comput. Electr. Eng., 2012

Multi-Level Controlled Signature.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Pre-computable Signature Scheme with Efficient Verification for RFID.
Proceedings of the Information Security Practice and Experience, 2012

Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Authenticated key exchange protocol with selectable identities.
Wirel. Commun. Mob. Comput., 2011

Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures.
IEEE Trans. Inf. Forensics Secur., 2011

Strongly unforgeable proxy signature scheme secure in the standard model.
J. Syst. Softw., 2011

Improving security of q-SDH based digital signatures.
J. Syst. Softw., 2011

Optimistic Fair Exchange with Strong Resolution-Ambiguity.
IEEE J. Sel. Areas Commun., 2011

Practical RFID ownership transfer scheme.
J. Comput. Secur., 2011

Provably secure identity-based authenticated key agreement protocols with malicious private key generators.
Inf. Sci., 2011

Secure mobile agents with controlled resources.
Concurr. Comput. Pract. Exp., 2011

An efficient and non-interactive hierarchical key agreement protocol.
Comput. Secur., 2011

Attribute-based authentication for multi-agent systems with dynamic groups.
Comput. Commun., 2011

Provably secure server-aided verification signatures.
Comput. Math. Appl., 2011

An efficient dynamic authenticated key exchange protocol with selectable identities.
Comput. Math. Appl., 2011

Secure Image Retrieval Based on Visual Content and Watermarking Protocol.
Comput. J., 2011

Cryptanalysis of an Off-Line Electronic Cash Scheme Based on Proxy Blind Signature.
Comput. J., 2011

Short Signatures with a Tighter Security Reduction Without Random Oracles.
Comput. J., 2011

GTrust: An Innovated Trust Model for Group Services Selection in Web-Based Service-Oriented Environments.
Proceedings of the Web Information System Engineering - WISE 2011, 2011

Privacy-Preserved Access Control for Cloud Computing.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Case-Based Trust Evaluation from Provenance Information.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Optimistic Fair Exchange of Ring Signatures.
Proceedings of the Security and Privacy in Communication Networks, 2011

Policy-Based Authentication for Mobile Agents.
Proceedings of the Information Security Practice and Experience, 2011

Efficient Self-certified Signatures with Batch Verification.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

Self-certified ring signatures.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Electronic Cash with Anonymous User Suspension.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

Web Service Selection Based on Similarity Evaluation.
Proceedings of the IEEE International Conference on Services Computing, 2011

2010
Constructions of certificate-based signature secure against key replacement attacks.
J. Comput. Secur., 2010

Certificateless threshold signature scheme from bilinear maps.
Inf. Sci., 2010

Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks.
Int. J. Secur. Networks, 2010

Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security.
Int. J. Secur. Networks, 2010

Cryptanalysis on Two Certificateless Signature Schemes.
Int. J. Comput. Commun. Control, 2010

Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships.
IACR Cryptol. ePrint Arch., 2010

Special issue of computers and mathematics with applications on "Advances in cryptography, security and applications for future computer science".
Comput. Math. Appl., 2010

A Generic Construction of Dynamic Single Sign-on with Strong Security.
Proceedings of the Security and Privacy in Communication Networks, 2010

Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting.
Proceedings of the Public Key Cryptography, 2010

Dynamic Trust Model for Federated Identity Management.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

PBTrust: A Priority-Based Trust Model for Service Selection in General Service-Oriented Environments.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Efficient RFID Authentication Scheme for Supply Chain Applications.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

A framework for privacy policy management in service aggregation.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Proof-of-Knowledge of Representation of Committed Value and Its Applications.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

Constructing an Authentication Token to Access External Services in Service Aggregation.
Proceedings of the 2010 IEEE International Conference on Services Computing, 2010

2009
Certificate-based Signatures Revisited.
J. Univers. Comput. Sci., 2009

Certificateless Threshold Ring Signature.
Inf. Sci., 2009

Identity-based Universal Designated Verifier Signature Proof System.
Int. J. Netw. Secur., 2009

How to Construct Identity-Based Signatures without the Key Escrow Problem.
IACR Cryptol. ePrint Arch., 2009

An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions.
IACR Cryptol. ePrint Arch., 2009

Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders.
IACR Cryptol. ePrint Arch., 2009

Enhanced Target Collision Resistant Hash Functions Revisited.
IACR Cryptol. ePrint Arch., 2009

An efficient anonymous proxy signature scheme with provable security.
Comput. Stand. Interfaces, 2009

Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings.
Proceedings of the Ubiquitous Intelligence and Computing, 6th International Conference, 2009

Server-Controlled Identity-Based Authenticated Key Exchange.
Proceedings of the Provable Security, Third International Conference, 2009

How to Prove Security of a Signature with a Tighter Security Reduction.
Proceedings of the Provable Security, Third International Conference, 2009

Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?
Proceedings of the Provable Security, Third International Conference, 2009

Secure Mobile Agents with Designated Hosts.
Proceedings of the Third International Conference on Network and System Security, 2009

An Efficient Certificateless Encryption Scheme in the Standard Model.
Proceedings of the Third International Conference on Network and System Security, 2009

Universal Designated Verifier Signatures with Threshold-Signers.
Proceedings of the Advances in Information and Computer Security, 2009

Policy-Controlled Signatures.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Escrowed Deniable Identification Schemes.
Proceedings of the Security Technology, 2009

Asymmetric Group Key Agreement.
Proceedings of the Advances in Cryptology, 2009

New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing.
Proceedings of the Computer Security, 2009

Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems.
Proceedings of the Topics in Cryptology, 2009

Efficient Non-interactive Range Proof.
Proceedings of the Computing and Combinatorics, 15th Annual International Conference, 2009

2008
Cryptography in Computer System Security.
J. Univers. Comput. Sci., 2008

Cryptanalysis and improvement of an efficient certificateless signature scheme.
J. Commun. Networks, 2008

Efficient generic on-line/off-line (threshold) signatures without key exposure.
Inf. Sci., 2008

A New and Efficient Signature on Commitment Values.
Int. J. Netw. Secur., 2008

Short Designated Verifier Signature Scheme and Its Identity-based Variant.
Int. J. Netw. Secur., 2008

Secure universal designated verifier signature without random oracles.
Int. J. Inf. Sec., 2008

Constant-Size Dynamic k-TAA.
IACR Cryptol. ePrint Arch., 2008

Cryptanalysis of simple three-party key exchange protocol.
Comput. Secur., 2008

Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Server-Aided Verification Signatures: Definitions and New Constructions.
Proceedings of the Provable Security, Second International Conference, 2008

Optimal Online/Offline Signature: How to Sign a Message without Online Computation.
Proceedings of the Provable Security, Second International Conference, 2008

Identity-Based On-Line/Off-Line Signcryption.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles.
Proceedings of the Advances in Information and Computer Security, 2008

A Generic Construction of Identity-Based Online/Offline Signcryption.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

Hierarchical Identity-Based Online/Offline Encryption.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

How to Balance Privacy with Authenticity.
Proceedings of the Information Security and Cryptology, 2008

Identity-Based Online/Offline Encryption.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

RFID Privacy Models Revisited.
Proceedings of the Computer Security, 2008

Privacy for Private Key in Signatures.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Publicly Verifiable Privacy-Preserving Group Decryption.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Sanitizable Signatures Revisited.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

Mitigating Phishing with ID-based Online/Offline Authentication.
Proceedings of the Sixth Australasian Information Security Conference, 2008

2007
Short Group Signatures Without Random Oracles.
J. Comput. Sci. Technol., 2007

Revocable Ring Signature.
J. Comput. Sci. Technol., 2007

Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004.
J. Comput. Sci. Technol., 2007

How to Find the Sufficient Collision Conditions for Haval-128 Pass 3 by Backward Analysis.
Int. J. Netw. Secur., 2007

Group Decryption.
IACR Cryptol. ePrint Arch., 2007

Nominative Signature: Application, Security Model and Construction.
IACR Cryptol. ePrint Arch., 2007

Practical Anonymous Divisible E-Cash From Bounded Accumulators.
IACR Cryptol. ePrint Arch., 2007

Practical Compact E-Cash.
IACR Cryptol. ePrint Arch., 2007

Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Designated Verifier Signature: Definition, Framework and New Constructions.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Compact sequential aggregate signatures.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures.
Proceedings of the Public Key Cryptography, 2007

Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length.
Proceedings of the Pairing-Based Cryptography, 2007

Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key.
Proceedings of the Pairing-Based Cryptography, 2007

Nominative Signature from Ring Signature.
Proceedings of the Advances in Information and Computer Security, 2007

First price sealed bid auction without auctioneers.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007

A new group rekeying scheme based on t-packing designs for ad hoc networks.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

New Construction of Group Secret Handshakes Based on Pairings.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Formal Definition and Construction of Nominative Signature.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Efficient Partially Blind Signatures with Provable Security.
Proceedings of the Computational Science and Its Applications, 2007

Certificate-Based Signature: Security Model and Efficient Construction.
Proceedings of the Public Key Infrastructure, 2007

Compact E-Cash from Bounded Accumulator.
Proceedings of the Topics in Cryptology, 2007

Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Multi-Identity Single-Key Decryption without Random Oracles.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

A Generic Construction for Universally-Convertible Undeniable Signatures.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Identity-Based Proxy Signature from Pairings.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Efficient Generic On-Line/Off-Line Signatures Without Key Exposure.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

Certificateless Signature Revisited.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

SEFAP: An Email System for Anti-Phishing.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes.
J. Networks, 2006

Personal Health Record Systems and Their Security Protection.
J. Medical Syst., 2006

Convertible identity-based anonymous designated ring signatures.
Int. J. Secur. Networks, 2006

Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security.
IACR Cryptol. ePrint Arch., 2006

Malicious KGC Attacks in Certificateless Cryptography.
IACR Cryptol. ePrint Arch., 2006

ID-based Secure PIM-SM Schemes.
Proceedings of the Sixth IASTED International Multi-Conference on Wireless and Optical Communications: Conference on Communication Systems and Applications, 2006

A New Signature Scheme Without Random Oracles from Bilinear Pairings.
Proceedings of the Progressin Cryptology, 2006

Restricted Universal Designated Verifier Signature.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Constant-Size Dynamic <i>k</i>-TAA.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Proxy Signature Without Random Oracles.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Ad Hoc Group Signatures.
Proceedings of the Advances in Information and Computer Security, 2006

Identity-based anonymous designated ring signatures.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

Three-Round Secret Handshakes Based on ElGamal and DSA.
Proceedings of the Information Security Practice and Experience, 2006

Privately Retrieve Data from Large Databases.
Proceedings of the Information Security Practice and Experience, 2006

Short (Identity-Based) Strong Designated Verifier Signature Schemes.
Proceedings of the Information Security Practice and Experience, 2006

Universal Designated Verifier Signature Without Delegatability.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings.
Proceedings of the Financial Cryptography and Data Security, 2006

Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing.
Proceedings of the Public Key Infrastructure, 2006

Secure and Efficient Trust Negotiation.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Designated group credentials.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Efficient Signcryption Without Random Oracles.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme).
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

Certificateless Designated Verifier Signature Schemes.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

A Scalable Multi-service Group Key Management Scheme.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
Provably secure fail-stop signature schemes based on RSA.
Int. J. Wirel. Mob. Comput., 2005

Secure distribution and access of XML documents.
Int. J. High Perform. Comput. Netw., 2005

A New Short Signature Scheme Without Random Oracles from Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2005

Breaking and Repairing Trapdoor-free Group Signature Schemes from Asiacrypt 2004.
IACR Cryptol. ePrint Arch., 2005

Tripartite Concurrent Signatures.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Secure AODV Routing Protocol Using One-Time Signature.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Efficient Broadcast from Trapdoor Functions.
Proceedings of the Applied Public Key Infrastructure, 2005

Delegatable Access Control for Fine-Grained XML.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Universal Designated Multi Verifier Signature Schemes.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

An Efficient Static Blind Ring Signature Scheme.
Proceedings of the Information Security and Cryptology, 2005

Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures).
Proceedings of the Financial Cryptography and Data Security, 2005

Identity-Based Universal Designated Verifier Signatures.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Access Policy Sheet for Access Control in Fine-Grained XML.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Short Designated Verifier Proxy Signature from Pairings.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

On the Security of Certificateless Signature Schemes from Asiacrypt 2003.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

Reducing Security Overhead for Mobile Networks.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Privacy-Enhanced Internet Storage.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

On the Security of Nominative Signatures.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
On the Design of a New Trust Model for Mobile Agent Security.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

A Secure PIM-SM Multicast Routing Protocol.
Proceedings of the Distributed Computing, 2004

Perfect Concurrent Signature Schemes.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Deniable Partial Proxy Signatures.
Proceedings of the Advances in Computer Science, 2004

Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption.
Proceedings of the Advances in Computer Science, 2004

Securing XML Document Sources and Their Distribution.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Deniable Ring Authentication Revisited.
Proceedings of the Applied Cryptography and Network Security, 2004

Identity-Based Strong Designated Verifier Signature Schemes.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
Robust non-interactive oblivious transfer.
IEEE Commun. Lett., 2003

Identity-Based Broadcasting.
Proceedings of the Progress in Cryptology, 2003

A novel dynamic key management scheme for secure multicasting.
Proceedings of the 11th IEEE International Conference on Networks, 2003

Non-interactive Deniable Ring Authentication.
Proceedings of the Information Security and Cryptology, 2003

On Fail-Stop Verifiable Secret Sharing Schemes.
Proceedings of the International Conference on Security and Management, 2003

A Secure Mental Poker Protocol Over The Internet.
Proceedings of the ACSW Frontiers 2003, 2003 ACSW Workshops, 2003

2002
Group Cryptography: Signature and Encryption.
Informatica (Slovenia), 2002

A Secure Object Sharing Scheme for Java Card.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

m out of n Oblivious Transfer.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
A Fair Electronic Cash Scheme.
Proceedings of the Topics in Electronic Commerce, Second International Symposium, 2001

Robust and Secure Broadcasting.
Proceedings of the Progress in Cryptology, 2001

2000
Distributed Signcryption.
Proceedings of the Progress in Cryptology, 2000

An Internet Anonymous Auction Scheme.
Proceedings of the Information Security and Cryptology, 2000

Towards a Protection Model for Supporting Multiple Access Control Policies.
Proceedings of the Australasian Database Conference, 2000

Fair On-line Gambling.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

Fail-Stop Confirmer Signatures.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
On the Design of Efficient RSA-based Off-line Electronic Cash Schemes.
Theor. Comput. Sci., 1999

Undeniable Confirmer Signature.
Proceedings of the Information Security, Second International Workshop, 1999

Delegated Decryption.
Proceedings of the Cryptography and Coding, 1999

Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications.
Proceedings of the Information and Communication Security, Second International Conference, 1999

Batching Proofs of Knowledge and Its Applications.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

1998
A New Scheme of Credit based Payment for Electronic Commerce.
Proceedings of the Proceedings 23rd Conference on Local Computer Networks, 1998

Anonymous Secure E-Voting Over a Network.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

1997
A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature.
Proceedings of the Information Security, First International Workshop, 1997

A New Efficient Off-line Anonymous Cash Scheme.
Proceedings of the Algorithms and Computation, 8th International Symposium, 1997

Secure and Efficient Digital Coins.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

Micro-Digital Money for Electronic Commerce.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

New Micropayment Schemes Based on PayWords.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
Design of Secure End-toEnd Protocols for Mobile Systems.
Proceedings of the Mobile Communications: Technology, 1996

On The Design Of Secure Electronic Payment Schemes For Internet.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996

An alternative model of quantum key agreement via photon coupling.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

On the design of security protocols for mobile communications.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996


  Loading...