Showing results 33 to 52 of 68
< previous
next >
Date | Title | Author(s) |
6-Feb-2023 | Fast keyword search over encrypted data with short ciphertext in clouds | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I;Liu, Zi-Cheng |
27-Oct-2020 | Flexible Authentication Protocol with Key Reconstruction in WBAN Environments | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Wang, Jian-Sheng; Huang, Jheng-Jia; Juang, Wen-Shenq; Kikuchi, Hiroaki |
27-Oct-2020 | Homomorphic Encryption Supporting Logical Operation | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Kung, Ting-Chuan; Huang, Jheng-Jia; Kuo, Hsin-Nan |
6-Feb-2023 | ID-Based Multireceiver Homomorphic Proxy Re-Encryption in Federated Learning | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I;Hsu, Ya-Wen;Shie, Cheng-Han |
23-Dec-2021 | Identity-based Blind Multisignature from Lattices | 曾一凡; Tseng, Yi-Fan; Tso, Raylin; Liu, Zi-Yuan |
17-Feb-2023 | Identity-Based Signature from Quadratic Residues and Its Extension to ID-Based Multi-Signature | 曾一凡; Tseng, Yi-Fan; Huang, Jheng-Jia |
9-Dec-2021 | Identity-Based Signature Scheme over Conic Curve Cyclic Groups | 曾一凡; Tseng, Yi-Fan |
6-Feb-2023 | Identity-Certifying Authority-Aided Identity-Based Searchable Encryption Framework in Cloud Systems | 曾一凡; Tseng, Yi-Fan; Liu, Zi-Yuan;Tso, Raylin;Chen, Yu-Chi;Mambo, Masahiro |
17-Feb-2023 | Improved Proxy Re-encryption Scheme with Equality Test | 曾一凡; Tseng, Yi-Fan; Yang, Chih-Chen;Tso, Raylin;Liu, Zi-Yuan;Hsu, Jen-Chieh |
9-Dec-2021 | Key-Aggregate Proxy Re-Encryption with Dynamic Condition Generation Using Multilinear Map | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I |
17-Feb-2023 | Lightweight and Efficient Source Authentication Scheme Based on Blockchain Approach in Open Data Environment | 曾一凡; Tseng, Yi-Fan; Huang, Jheng-Jia;Lo, Nai-Wei;Tung, Shao-Wei;Dai, Wen-Yan |
27-Oct-2020 | Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments | 曾一凡; Tseng, Yi-Fan; Huang*, Jheng-Jia; Juang, Wen-Shenq; Fan, Chun-I; Kikuchi, Hiroaki |
27-Oct-2020 | Malware Detection System Based on API Log Data Mining | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Hsiao, Han-Wei; Chou, Chun-Han |
2-Sep-2020 | Multireceiver Predicate Encryption for Online Social Networks | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Huang, Jheng-Jia; Chen, Shih-Fen; Kikuchi, Hiroaki |
27-Oct-2020 | Mutually Anonymous Fair Exchange Protocol with Offline Third Party | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Huang, Jheng-Jia; Chu, Huang-Kai |
2-Sep-2020 | On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki-Okamoto Transformation | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Sung, Cheng-Wei |
27-Oct-2021 | Practical Inner Product Encryption with Constant Private Key | 曾一凡; Tseng, Yi-Fan; Liu, Zi-Yuan; Tso, Raylin |
2-Sep-2020 | Probably Secure Efficient Anonymous Credential Scheme | 曾一凡; Tseng, Yi-Fan; Wu, Chien-Nan; Fan, Chun-I; Huang, Jheng-Jia; Kikuchi, Hiroaki |
2-Sep-2020 | Provably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I |
2-Sep-2020 | Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Lin, Chih-Wen |