National Chengchi University, Social Science Center,Research & Development (Social network graph considers only
internal connections of NCCU
)
YI-FAN TSENG (94)
2025-04
Post-quantum secure ID-based encryption with equality test against insider attacks from isogeny
2025-03
Blacklisting access control via negated subset predicate encryption: Constant-size ciphertexts/keys constructions with adaptive security or attribute hiding
2024-11
Efficient and Secure Multi-Point Communication Framework Supporting Resource Constraints Environment
2024-08
ID-Based Traitor Tracing with Relaxed Black-Box Setting for Group-Based Applications
2024-08
Pairing-Free Identity-Based Encryption with Security Against the KGC
2024-08
後量子安全一次性簽章與 Full-Rank 編碼函數實作
2024-08
基於 Falcon 之安全身份簽章機制
2024-04
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems
2024-03
Attribute hiding subset predicate encryption: Quantum-resistant construction with efficient decryption
2024-01
Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives
2023-12
Cryptanaylsis to Ciphertext-Policy Attribute-Based Encryption of Liu et al and Amirthavalli et al
2023-12
Securing NLP Systems: A Comprehensive AI-Based Approach
2023-11
A Novel Secure File Transfer Protocol for Digital Content Platform
2023-11
對WN23密鑰策略屬性加密機制之密碼分析
2023-08
An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for MQTT
2023-08
Cryptanalysis of a round optimal lattice-based multisignature scheme
2023-08
A Novel Ciphertext-Policy Attribute-Based Encryption Supporting Dual Membership
2023-08
Anonymous and Unlinkable Identity Scheme in Open Data Environment
2023-07
Cryptanalysis and Improvement to Two Key-Policy Attribute-Based Encryption Schemes for Weighted Threshold Gates
2023-06
Identity-Based Broadcast Encryption Schemes Supporting Traitor Tracing from Quadratic Residues
2022-11
Fast keyword search over encrypted data with short ciphertext in clouds
2022-11
ID-Based Multireceiver Homomorphic Proxy Re-Encryption in Federated Learning
2022-11
智慧製造
2022-11
Blockchain-based Confidential Payment System with Controllable Regulation
2022-11
Blockchain-based Self-sovereign Identity System with Attribute-based Issuance
2022-11
Public Key Encryption with Hierarchical Authorized Keyword Search
2022-10
Public-key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-resistant Instantiation
2022-09
Identity-Certifying Authority-Aided Identity-Based Searchable Encryption Framework in Cloud Systems
2022-09
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT
2022-08
Cryptanalysis and Discussion on Two Attribute-Based Encryption Schemes
2022-08
Cryptanalysis to Ming et al.’s Revocable Multi-Authority Attribute-Based Encryption
2022-08
Quantum-resistant 1-out-of-N Oblivious Signatures from Lattices
2022-06
Extension of elliptic curve Qu–Vanstone certificates and their applications
2022-06
A Novel Anonymous Identity-Based Encryption
2022-05
A Novel Undeniable (t, n)-Threshold Signature with Cheater Identification
2022-05
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation
2022-03
Quantum-resistant anonymous identity-based encryption with trable identities
2022-01
Decentralized Inner-Product Encryption with Constant-Size Ciphertext
2021-11
Cryptanalysis on Lin and Wu’s Undeniable (t, n)-Threshold Signature Scheme with Cheater Identification
2021-11
Cryptanalysis to Sowjanya et al.’s Attribute-Based Encryptions from Elliptic Curve Cryptography
2021-11
Lightweight and Efficient Source Authentication Scheme Based on Blockchain Approach in Open Data Environment
2021-09
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism
2021-08
Identity-Based Signature Scheme over Conic Curve Cyclic Groups
2021-08
Identity-Based Signature from Quadratic Residues and Its Extension to ID-Based Multi-Signature
2021-08
Improved Proxy Re-encryption Scheme with Equality Test
2021-06
Anonymous Multireceiver Identity-Based Encryption against Chosen-Ciphertext Attacks with Tight Reduction in the Standard Model
2021-05
Designated-ciphertext searchable encryption
2021-02
CCA-Secure Attribute-Based Encryption Supporting Dynamic Membership in the Standard Model
2021-02
Efficient Subset Predicate Encryption for Internet of Things
2021-02
Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function
2020-12
Practical Inner Product Encryption with Constant Private Key
2020-12
Cryptanalysis on Two Pairing-Free Ciphertext-Policy Attribute-Based Encryption Schemes
2020-08
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism
2020-08
Key-Aggregate Proxy Re-Encryption with Dynamic Condition Generation Using Multilinear Map
2020-07
Practical Predicate Encryption for Inner Product
2019-12
Dynamic Blockchain Storage Scheme Based on Sidechains
2019-12
Identity-based Blind Multisignature from Lattices
2019-11
Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks
2019-10
Cryptanalysis and Improvement on Wang et al.`s Attribute-Based Searchable Encryption Scheme
2019-09
Top-Level Secure Certificateless Signature Scheme in the Standard Model
2019-08
Signcryption from NTRU Lattices Without Random Oracles
2019-07
On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki-Okamoto Transformation
2019-07
Anonymous Fair P2P-Lending Scheme
2019-05
Storage-Saving Bi- Dimensional Privacy-Preserving Data Aggregation in Smart Grids
2019-04
Anonymous Authentication and Key Agreement Protocol for LTE Networks
2019-03
FGAC-NDN: Fine-Grained Access Control for Named Data Networks
2019-03
Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption
2018-11
Provably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption
2018-08
An authenticated re‐encryption scheme for secure file transfer in named data networks
2018-07
Probably Secure Efficient Anonymous Credential Scheme
2018-04
A Lattice-Based Group Authentication Scheme
2018
A Lattice-Based Group Authentication Scheme
2018
An Efficient Algorithm for Shortest Vector Problem
2018
Efficient Key-Aggregate Proxy Reencryption for Secure Data Sharing in Clouds
2018
Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks
2018
Transformation Between Attribute-Based Encryption and Key-Aggregate Cryptosystem
2018
Verifiable Privacy- Preserving Payment Mechanism for Smart Grids
2017-07
Multireceiver Predicate Encryption for Online Social Networks
2017
An Efficient Signature Scheme for Anonymous Credentials
2017
Cryptanalysis on the Anonymity of Li et al.’s Ciphertext-Policy Attribute-Based Encryption Scheme
2017
Homomorphic Encryption Supporting Logical Operation
2017
Storage-Saving Bi-Dimensional Privacy- Preserving Data Aggregation in Smart Grids
2016
Enabled/Disabled Predicate Encryption in Clouds
2016
Flexible Authentication Protocol with Key Reconstruction in WBAN Environments
2016
Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments
2015-08
Attribute and Relation Based Encryption for Social Networks
2015-07
Efficient Platform for Traceable Collaborative Workflow Based on Bi-Trapdoor Hash Function
2015-01
Anonymous Credential Scheme Supporting Active Revocation
2015
Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security
2015
Attribute-Based Proxy Re-Encryption with Dynamic Membership
2015
Malware Detection System Based on API Log Data Mining
2015
Mutually Anonymous Fair Exchange Protocol with Offline Third Party
2014
Strongly Secure Certificateless Signature Scheme Supporting Batch Verification
2013
Secure Certificateless Signature Scheme Supporting Batch Verification
ANNE WU
MING-SHIOW LO
TSAI-YEN LI
RUA-HUAN TSAIH
CHUEN-LUNG CHEN
RAY-LIN TSO
KWEI TANG
YI-LING LIN
CHUNG MING LO
YI-FAN TSENG
CHENG-JEN HUANG
SHI-SHENG SUN
Nation Chengchi University Library All Rights Reserved.
Menu
close
Node
Scale:
1
Change Color!!
hide
0