Showing results 21 to 40 of 71
< previous
next >
Date | Title | Author(s) |
2-Sep-2020 | Cryptanalysis and Improvement on Wang et al.`s Attribute-Based Searchable Encryption Scheme | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Wu, Si-Jing; Kuo, Hsin-Nan; Huang, Jheng-Jia |
17-Feb-2023 | Cryptanalysis on Lin and Wu’s Undeniable (t, n)-Threshold Signature Scheme with Cheater Identification | 曾一凡; Tseng, Yi-Fan |
27-Oct-2020 | Cryptanalysis on the Anonymity of Li et al.’s Ciphertext-Policy Attribute-Based Encryption Scheme | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I |
9-Dec-2021 | Cryptanalysis on Two Pairing-Free Ciphertext-Policy Attribute-Based Encryption Schemes | 曾一凡; Tseng, Yi-Fan; Huang, Jheng-Jia |
17-Feb-2023 | Cryptanalysis to Ming et al.’s Revocable Multi-Authority Attribute-Based Encryption | 曾一凡; Tseng, Yi-Fan |
17-Feb-2023 | Cryptanalysis to Sowjanya et al.’s Attribute-Based Encryptions from Elliptic Curve Cryptography | 曾一凡; Tseng, Yi-Fan |
6-Feb-2023 | Decentralized Inner-Product Encryption with Constant-Size Ciphertext | 曾一凡; Tseng, Yi-Fan; Gao, Shih-Jie |
23-Dec-2021 | Designated-ciphertext searchable encryption | 曾一凡; Tseng, Yi-Fan; Liu, Zi-Yuan; Tso, Raylin; Mambo, Masahiro |
9-Dec-2021 | Dynamic Blockchain Storage Scheme Based on Sidechains | 曾一凡; Tseng, Yi-Fan |
27-Oct-2020 | Efficient Key-Aggregate Proxy Reencryption for Secure Data Sharing in Clouds | 曾一凡; Tseng, Yi-Fan; Chen, Wei-Hao; Fan, Chun-I |
9-Dec-2021 | Efficient Platform for Traceable Collaborative Workflow Based on Bi-Trapdoor Hash Function | 曾一凡; Tseng, Yi-Fan |
9-Dec-2021 | Efficient Subset Predicate Encryption for Internet of Things | 曾一凡; Tseng, Yi-Fan |
2-Sep-2020 | Enabled/Disabled Predicate Encryption in Clouds | 曾一凡; Tseng, Yi-Fan; Huang, Shi-Yuan; Fan, Chun-I |
6-Feb-2023 | Fast keyword search over encrypted data with short ciphertext in clouds | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I;Liu, Zi-Cheng |
5-Mar-2020 | FGAC-NDN: Fine-Grained Access Control for Named Data Networks | 曾一凡; Tseng , Yi-Fan; Fan , Chun-I; Wu, Chin-Yu |
27-Oct-2020 | Flexible Authentication Protocol with Key Reconstruction in WBAN Environments | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Wang, Jian-Sheng; Huang, Jheng-Jia; Juang, Wen-Shenq; Kikuchi, Hiroaki |
27-Oct-2020 | Homomorphic Encryption Supporting Logical Operation | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Kung, Ting-Chuan; Huang, Jheng-Jia; Kuo, Hsin-Nan |
6-Feb-2023 | ID-Based Multireceiver Homomorphic Proxy Re-Encryption in Federated Learning | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I;Hsu, Ya-Wen;Shie, Cheng-Han |
23-Dec-2021 | Identity-based Blind Multisignature from Lattices | 曾一凡; Tseng, Yi-Fan; Tso, Raylin; Liu, Zi-Yuan |
17-Feb-2023 | Identity-Based Signature from Quadratic Residues and Its Extension to ID-Based Multi-Signature | 曾一凡; Tseng, Yi-Fan; Huang, Jheng-Jia |