| 2025-10 |
Poster: Public Key Encryption with Exclusionary Subset Keyword Search from Lattices |
conference |
web page(71) |
| 2025-09 |
Attribute-Based Encryption Supporting Multi-Keyword Search with Effective User Revocation in Public Cloud Storage |
article |
web page(92) |
| 2025-04 |
Post-quantum secure ID-based encryption with equality test against insider attacks from isogeny |
article |
web page(396) |
| 2025-03 |
Blacklisting access control via negated subset predicate encryption: Constant-size ciphertexts/keys constructions with adaptive security or attribute hiding |
article |
web page(398) |
| 2024-11 |
Efficient and Secure Multi-Point Communication Framework Supporting Resource Constraints Environment |
conference |
web page(316) |
| 2024-08 |
基於 Falcon 之安全身份簽章機制 |
conference |
web page(477) |
| 2024-08 |
後量子安全一次性簽章與 Full-Rank 編碼函數實作 |
conference |
web page(422) |
| 2024-08 |
ID-Based Traitor Tracing with Relaxed Black-Box Setting for Group-Based Applications |
conference |
web page(408) |
| 2024-08 |
Pairing-Free Identity-Based Encryption with Security Against the KGC |
conference |
web page(386) |
| 2024-04 |
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems |
article |
web page(542) |
| 2024-03 |
Attribute hiding subset predicate encryption: Quantum-resistant construction with efficient decryption |
article |
web page(490) |
| 2024-01 |
Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives |
article |
web page(535) |
| 2023-12 |
Securing NLP Systems: A Comprehensive AI-Based Approach |
conference |
pdf(460) |
| 2023-12 |
Cryptanaylsis to Ciphertext-Policy Attribute-Based Encryption of Liu et al and Amirthavalli et al |
conference |
pdf(479) |
| 2023-11 |
對WN23密鑰策略屬性加密機制之密碼分析 |
conference |
pdf(3) |
| 2023-11 |
A Novel Secure File Transfer Protocol for Digital Content Platform |
conference |
pdf(5) |
| 2023-08 |
Anonymous and Unlinkable Identity Scheme in Open Data Environment |
conference |
web page(515) |
| 2023-08 |
Cryptanalysis of a round optimal lattice-based multisignature scheme |
article |
web page(620) |
| 2023-08 |
An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for MQTT |
article |
web page(555) |
| 2023-08 |
A Novel Ciphertext-Policy Attribute-Based Encryption Supporting Dual Membership |
conference |
web page(442) |
| 2023-07 |
Cryptanalysis and Improvement to Two Key-Policy Attribute-Based Encryption Schemes for Weighted Threshold Gates |
conference |
web page(423) |
| 2023-06 |
Identity-Based Broadcast Encryption Schemes Supporting Traitor Tracing from Quadratic Residues |
conference |
|
| 2022-11 |
Public Key Encryption with Hierarchical Authorized Keyword Search |
conference |
web page(567) |
| 2022-11 |
Blockchain-based Self-sovereign Identity System with Attribute-based Issuance |
conference |
web page(529) |
| 2022-11 |
智慧製造 |
book |
web page(769) |