2024-04 |
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems |
article |
web page(102) |
2023-11 |
基於ECDH和短簽名的群組密鑰機制之分析與改良 |
conference |
pdf(1) |
2023-08 |
Cryptanalysis of a round optimal lattice-based multisignature scheme |
article |
web page(211) |
2022-11 |
智慧製造 |
book |
web page(256) |
2022-09 |
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT |
article |
web page(169) |
2022-08 |
Quantum-resistant 1-out-of-N Oblivious Signatures from Lattices |
conference |
web page(182) |
2022-06 |
Extension of elliptic curve Qu–Vanstone certificates and their applications |
article |
web page(184) |
2022-05 |
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation |
conference |
web page(238) |
2022-03 |
Quantum-resistant anonymous identity-based encryption with trable identities |
article |
web page(201) |
2021-09 |
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism |
article |
web page(168) |
2021-05 |
Designated-ciphertext searchable encryption |
article |
pdf(184) |
2021-02 |
Partially Blind ECDSA Scheme and Its Application to Bitcoin |
conference |
pdf(331) |
2021-02 |
Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function |
article |
pdf(274) |
2021-01 |
Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks |
article |
pdf(316) |
2020-11 |
Intelligence-led response: turning theory into law enforcement practice in cyber security incidents |
article |
web page(259) |
2020-10 |
Defense against N-pixel Attacks based on Image Reconstruction |
conference |
pdf(277) |
2020-08 |
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism |
conference |
pdf(269) |
2020-08 |
Multi-value Private Information Retrieval using Homomorphic Encryption |
conference |
pdf(278) |
2020-08 |
An Enhanced Mondrian Anonymization Model based on Self-Organizing Map |
conference |
pdf(227) |
2020-08 |
Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing |
article |
pdf(242) |
2020-07 |
Practical Predicate Encryption for Inner Product |
conference |
pdf(213) |
2020-05 |
PrivGRU: Privacy-preserving GRU inference using additive secret sharing |
article |
web page(281) |
2019.04 |
An Improved Non-Interactive Zero-Knowledge Range Proof for Decentralized Applications |
conference |
web page(361) |
2019-04 |
An Improved Non-Interactive Zero-Knowledge Range Proof for Decentralized Applications |
conference |
pdf(281) |
2018-06 |
High-capacity quantum secret sharing based on orbital angular momentum |
article |
web page(822) |