| 2025-09 |
Attribute-Based Encryption Supporting Multi-Keyword Search with Effective User Revocation in Public Cloud Storage |
article |
說明頁(91) |
| 2025-04 |
Post-quantum secure ID-based encryption with equality test against insider attacks from isogeny |
article |
說明頁(393) |
| 2025-03 |
Blacklisting access control via negated subset predicate encryption: Constant-size ciphertexts/keys constructions with adaptive security or attribute hiding |
article |
說明頁(397) |
| 2024-04 |
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems |
article |
說明頁(542) |
| 2024-03 |
Attribute hiding subset predicate encryption: Quantum-resistant construction with efficient decryption |
article |
說明頁(489) |
| 2024-01 |
Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives |
article |
說明頁(535) |
| 2023-08 |
Cryptanalysis of a round optimal lattice-based multisignature scheme |
article |
說明頁(619) |
| 2023-08 |
An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for MQTT |
article |
說明頁(554) |
| 2022-11 |
ID-Based Multireceiver Homomorphic Proxy Re-Encryption in Federated Learning |
article |
說明頁(651) |
| 2022-11 |
Fast keyword search over encrypted data with short ciphertext in clouds |
article |
說明頁(836) |
| 2022-10 |
Public-key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-resistant Instantiation |
article |
說明頁(600) |
| 2022-09 |
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT |
article |
說明頁(529) |
| 2022-09 |
Identity-Certifying Authority-Aided Identity-Based Searchable Encryption Framework in Cloud Systems |
article |
說明頁(551) |
| 2022-06 |
Extension of elliptic curve Qu–Vanstone certificates and their applications |
article |
說明頁(548) |
| 2022-05 |
A Novel Undeniable (t, n)-Threshold Signature with Cheater Identification |
article |
說明頁(494) |
| 2022-03 |
Quantum-resistant anonymous identity-based encryption with trable identities |
article |
說明頁(628) |
| 2022-01 |
Decentralized Inner-Product Encryption with Constant-Size Ciphertext |
article |
說明頁(509) |
| 2021-09 |
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism |
article |
說明頁(665) |
| 2021-06 |
Anonymous Multireceiver Identity-Based Encryption against Chosen-Ciphertext Attacks with Tight Reduction in the Standard Model |
article |
pdf(637) |
| 2021-05 |
Designated-ciphertext searchable encryption |
article |
pdf(616) |
| 2021-02 |
Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function |
article |
pdf(646) |
| 2020-12 |
Practical Inner Product Encryption with Constant Private Key |
article |
pdf(772) |
| 2019-12 |
Identity-based Blind Multisignature from Lattices |
article |
pdf(763) |
| 2019-11 |
Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks |
article |
pdf(531) |
| 2019-10 |
Cryptanalysis and Improvement on Wang et al.`s Attribute-Based Searchable Encryption Scheme |
article |
pdf(569) |