| 2025-10 |
Poster: Public Key Encryption with Exclusionary Subset Keyword Search from Lattices |
conference |
web page(38) |
| 2025-09 |
Attribute-Based Encryption Supporting Multi-Keyword Search with Effective User Revocation in Public Cloud Storage |
article |
web page(54) |
| 2025-04 |
Post-quantum secure ID-based encryption with equality test against insider attacks from isogeny |
article |
web page(364) |
| 2025-03 |
Blacklisting access control via negated subset predicate encryption: Constant-size ciphertexts/keys constructions with adaptive security or attribute hiding |
article |
web page(368) |
| 2024-11 |
Efficient and Secure Multi-Point Communication Framework Supporting Resource Constraints Environment |
conference |
web page(287) |
| 2024-08 |
基於 Falcon 之安全身份簽章機制 |
conference |
web page(399) |
| 2024-08 |
後量子安全一次性簽章與 Full-Rank 編碼函數實作 |
conference |
web page(378) |
| 2024-08 |
ID-Based Traitor Tracing with Relaxed Black-Box Setting for Group-Based Applications |
conference |
web page(383) |
| 2024-08 |
Pairing-Free Identity-Based Encryption with Security Against the KGC |
conference |
web page(348) |
| 2024-04 |
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems |
article |
web page(510) |
| 2024-03 |
Attribute hiding subset predicate encryption: Quantum-resistant construction with efficient decryption |
article |
web page(467) |
| 2024-01 |
Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives |
article |
web page(512) |
| 2023-12 |
Securing NLP Systems: A Comprehensive AI-Based Approach |
conference |
pdf(454) |
| 2023-12 |
Cryptanaylsis to Ciphertext-Policy Attribute-Based Encryption of Liu et al and Amirthavalli et al |
conference |
pdf(472) |
| 2023-11 |
對WN23密鑰策略屬性加密機制之密碼分析 |
conference |
pdf(3) |
| 2023-11 |
A Novel Secure File Transfer Protocol for Digital Content Platform |
conference |
pdf(5) |
| 2023-08 |
Anonymous and Unlinkable Identity Scheme in Open Data Environment |
conference |
web page(484) |
| 2023-08 |
Cryptanalysis of a round optimal lattice-based multisignature scheme |
article |
web page(598) |
| 2023-08 |
An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for MQTT |
article |
web page(527) |
| 2023-08 |
A Novel Ciphertext-Policy Attribute-Based Encryption Supporting Dual Membership |
conference |
web page(413) |
| 2023-07 |
Cryptanalysis and Improvement to Two Key-Policy Attribute-Based Encryption Schemes for Weighted Threshold Gates |
conference |
web page(404) |
| 2023-06 |
Identity-Based Broadcast Encryption Schemes Supporting Traitor Tracing from Quadratic Residues |
conference |
|
| 2022-11 |
Public Key Encryption with Hierarchical Authorized Keyword Search |
conference |
web page(536) |
| 2022-11 |
Blockchain-based Self-sovereign Identity System with Attribute-based Issuance |
conference |
web page(505) |
| 2022-11 |
智慧製造 |
book |
web page(734) |