2024-04 |
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems |
article |
說明頁(16) |
|
|
|
2024-03 |
Attribute hiding subset predicate encryption: Quantum-resistant construction with efficient decryption |
article |
說明頁(48) |
|
|
|
2024-01 |
Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives |
article |
說明頁(6) |
|
|
|
2023-08 |
An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for MQTT |
article |
說明頁(100) |
|
|
|
2023-08 |
Cryptanalysis of a round optimal lattice-based multisignature scheme |
article |
說明頁(113) |
|
|
|
2022-11 |
Fast keyword search over encrypted data with short ciphertext in clouds |
article |
說明頁(224) |
|
|
|
2022-11 |
ID-Based Multireceiver Homomorphic Proxy Re-Encryption in Federated Learning |
article |
說明頁(114) |
|
|
|
2022-10 |
Public-key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-resistant Instantiation |
article |
說明頁(129) |
|
|
|
2022-09 |
Identity-Certifying Authority-Aided Identity-Based Searchable Encryption Framework in Cloud Systems |
article |
說明頁(146) |
|
|
|
2022-09 |
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT |
article |
說明頁(102) |
|
|
|
2022-06 |
Extension of elliptic curve Qu–Vanstone certificates and their applications |
article |
說明頁(102) |
|
|
|
2022-05 |
A Novel Undeniable (t, n)-Threshold Signature with Cheater Identification |
article |
說明頁(109) |
|
|
|
2022-03 |
Quantum-resistant anonymous identity-based encryption with trable identities |
article |
說明頁(114) |
|
|
|
2022-01 |
Decentralized Inner-Product Encryption with Constant-Size Ciphertext |
article |
說明頁(118) |
|
|
|
2021-09 |
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism |
article |
說明頁(105) |
|
|
|
2021-06 |
Anonymous Multireceiver Identity-Based Encryption against Chosen-Ciphertext Attacks with Tight Reduction in the Standard Model |
article |
pdf(243) |
|
|
|
2021-05 |
Designated-ciphertext searchable encryption |
article |
pdf(203) |
|
|
|
2021-02 |
Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function |
article |
pdf(203) |
|
|
|
2020-12 |
Practical Inner Product Encryption with Constant Private Key |
article |
pdf(268) |
|
|
|
2019-12 |
Identity-based Blind Multisignature from Lattices |
article |
pdf(204) |
|
|
|
2019-11 |
Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks |
article |
pdf(171) |
|
|
|
2019-10 |
Cryptanalysis and Improvement on Wang et al.`s Attribute-Based Searchable Encryption Scheme |
article |
pdf(171) |
|
|
|
2019-09 |
Top-Level Secure Certificateless Signature Scheme in the Standard Model |
article |
pdf(186) |
|
|
|
2019-07 |
On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki-Okamoto Transformation |
article |
說明頁(349) |
|
|
|
2019-05 |
Storage-Saving Bi- Dimensional Privacy-Preserving Data Aggregation in Smart Grids |
article |
pdf(258) |
|
|
|