| 2025-10 |
Preventing Witness Leakage in Adaptor Signatures |
article |
說明頁(18) |
| 2024-09 |
Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates |
article |
說明頁(371) |
| 2024-04 |
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems |
article |
說明頁(539) |
| 2024-01 |
Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives |
article |
說明頁(534) |
| 2023-08 |
Cryptanalysis of a round optimal lattice-based multisignature scheme |
article |
說明頁(615) |
| 2022-09 |
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT |
article |
說明頁(523) |
| 2022-06 |
Extension of elliptic curve Qu–Vanstone certificates and their applications |
article |
說明頁(545) |
| 2022-03 |
Quantum-resistant anonymous identity-based encryption with trable identities |
article |
說明頁(626) |
| 2021-09 |
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism |
article |
說明頁(663) |
| 2021-05 |
Designated-ciphertext searchable encryption |
article |
pdf(555) |
| 2021-02 |
Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function |
article |
pdf(646) |
| 2021-01 |
Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks |
article |
pdf(655) |
| 2020-11 |
Intelligence-led response: turning theory into law enforcement practice in cyber security incidents |
article |
說明頁(600) |
| 2020-08 |
Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing |
article |
pdf(622) |
| 2020-05 |
PrivGRU: Privacy-preserving GRU inference using additive secret sharing |
article |
說明頁(664) |
| 2018-06 |
High-capacity quantum secret sharing based on orbital angular momentum |
article |
說明頁(1188) |
| 2018-06 |
Establishing rational networking using the DL04 quantum secure direct communication protocol |
article |
pdf(915) |
| 2018-06 |
Threshold quantum state sharing based on entanglement swapping |
article |
pdf(830) |
| 2018-04 |
Efficient quantum secret sharing based on special multi-dimensional GHZ state |
article |
pdf(756) |
| 2018-03 |
A shareable keyword search over encrypted data in cloud computing |
article |
pdf(827) |
| 2018-03 |
Multi-dimensional quantum state sharing based on quantum Fourier transform |
article |
pdf(843) |
| 2018-01 |
Establishing rational networking using the DL04 quantum secure direct communication protocol. |
article |
說明頁(910) |
| 2018 |
Rational quantum secret sharing |
article |
pdf(649) |
| 2018 |
Three-party quantum secret sharing based on phase shift operation |
article |
說明頁(786) |
| 2017-11 |
Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption |
article |
pdf(827) |