Skip to main content

previous disabled Page of 7
and
  1. No Access

    Article

    Threshold privacy-preserving cloud auditing with multiple uploaders

    Data integrity is a critical security issue in cloud storage. The data integrity checking schemes by a third-party auditor (TPA) have attracted a lot of attention. Sharing data among multiple users (uploaders)...

    Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo in International Journal of Information Secur… (2019)

  2. No Access

    Article

    Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes

    Attribute-based encryption (ABE) allows one-to-many encryption with static access control. In many occasions, the access control policy must be updated, but the original encryptor might be unavailable to re-en...

    Yinhao Jiang, Willy Susilo, Yi Mu in International Journal of Information Secur… (2018)

  3. No Access

    Article

    Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts

    Ciphertext-policy attribute-based encryption (CP-ABE) is a very promising cryptographic primitive that allows a data owner to encrypt messages and manage access policies themselves. Most of the existing CP-ABE...

    Yinhao Jiang, Willy Susilo, Yi Mu in International Journal of Information Secur… (2018)

  4. No Access

    Article

    Efficient identity-based online/offline encryption and signcryption with short ciphertext

    The technique of online/offline is regarded as a promising approach to speed up the computation of encryption, because the most part of computation, such as pairing over points on elliptic curve and exponentia...

    Jianchang Lai, Yi Mu, Fuchun Guo in International Journal of Information Security (2017)

  5. No Access

    Chapter and Conference Paper

    ID-Based Encryption with Equality Test Against Insider Attack

    Testing if two ciphertexts contain the same plaintext is an interesting cryptographic primitive. It is usually referred to as equality test of encrypted data or equality test. One of attractive applications of...

    Tong Wu, Sha Ma, Yi Mu, Shengke Zeng in Information Security and Privacy (2017)

  6. No Access

    Chapter and Conference Paper

    Privacy-Preserving k-time Authenticated Secret Handshakes

    Secret handshake allows a group of authorized users to establish a shared secret key and at the same time authenticate each other anonymously. A straightforward approach to design an unlinkable secret handshak...

    Yangguang Tian, Shiwei Zhang, Guomin Yang, Yi Mu in Information Security and Privacy (2017)

  7. No Access

    Chapter and Conference Paper

    Provably Secure Homomorphic Signcryption

    Signcryption has shown many useful applications, in particular for the environment where the computation and communication resources are constrained, for instance, for applications on lightweight devices. Howe...

    Fatemeh Rezaeibagha, Yi Mu, Shiwei Zhang, **aofen Wang in Provable Security (2017)

  8. No Access

    Chapter and Conference Paper

    Hierarchical Functional Encryption for Linear Transformations

    In contrast to the conventional all-or-nothing encryption, functional encryption (FE) allows partial revelation of encrypted information based on the keys associated with different functionalities. Extending F...

    Shiwei Zhang, Yi Mu, Guomin Yang, **aofen Wang in Information Security and Privacy (2017)

  9. Chapter and Conference Paper

    Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample

    Optimal security reductions for unique signatures (Coron, Eurocrypt 2002) and their generalization, i.e., efficiently re-randomizable signatures (Hofheinz et al. PKC 2012 & Bader et al. Eurocrypt 2016) have been ...

    Fuchun Guo, Rongmao Chen, Willy Susilo in Advances in Cryptology – CRYPTO 2017 (2017)

  10. No Access

    Chapter and Conference Paper

    Mergeable and Revocable Identity-Based Encryption

    Identity-based encryption (IBE) has been extensively studied and widely used in various applications since Boneh and Franklin proposed the first practical scheme based on pairing. In that seminal work, it has ...

    Shengmin Xu, Guomin Yang, Yi Mu, Willy Susilo in Information Security and Privacy (2017)

  11. No Access

    Chapter and Conference Paper

    Deniable Ring Authentication Based on Projective Hash Functions

    Deniable authentication allows the participants to deny an authentication process as there is no any evidence that it ever took place. It is quite suitable for the privacy-preserving scenario. Combining with t...

    Shengke Zeng, Yi Mu, Guomin Yang, Mingxing He in Provable Security (2017)

  12. Article

    Message from the Guest Editors

    Guomin Yang, Willy Susilo, Yi Mu in International Journal of Information Security (2016)

  13. No Access

    Chapter and Conference Paper

    One-Round Strong Oblivious Signature-Based Envelope

    Oblivious Signature-Based Envelope (OSBE) has been widely employed for anonymity-orient and privacy-preserving applications. The conventional OSBE execution relies on a secure communication channel to protect ...

    Rongmao Chen, Yi Mu, Willy Susilo, Guomin Yang in Information Security and Privacy (2016)

  14. No Access

    Chapter and Conference Paper

    One-Round Attribute-Based Key Exchange in the Multi-party Setting

    Attribute-based authenticated key exchange (AB-AKE) is a useful primitive that allows a group of users to establish a shared secret key and at the same time enables fine-grained access control. A straightforwa...

    Yangguang Tian, Guomin Yang, Yi Mu, Kaitai Liang, Yong Yu in Provable Security (2016)

  15. Chapter and Conference Paper

    Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction

    The indistinguishability security of a public-key cryptosystem can be reduced to a computational hard assumption in the random oracle model, where the solution to a computational hard problem is hidden in one ...

    Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen in Advances in Cryptology – ASIACRYPT 2016 (2016)

  16. No Access

    Chapter and Conference Paper

    Public Key Encryption with Authorized Keyword Search

    Public key encryption with keyword search (PEKS) provides an elegant mechanism for a user to identify the specific encrypted data. PEKS protects data against disclosure while making it searchable. In this pape...

    Peng Jiang, Yi Mu, Fuchun Guo, Qiaoyan Wen in Information Security and Privacy (2016)

  17. No Access

    Chapter and Conference Paper

    A Privacy Preserving Source Verifiable Encryption Scheme

    It is critical to guarantee message confidentiality and user privacy in communication networks, especially for group communications. We find previous works seldom consider these aspects at the same time and so...

    Zhongyuan Yao, Yi Mu, Guomin Yang in Information Security Practice and Experience (2016)

  18. No Access

    Chapter and Conference Paper

    Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance

    Attribute-based encryption (ABE) is a promising cryptographic primitive that allows one-to-many encryption. In such a system, users’ private keys are linked to their access rights. We note that if a user can g...

    Yinhao Jiang, Willy Susilo, Yi Mu, Fuchun Guo in Information Security and Privacy (2016)

  19. Chapter and Conference Paper

    Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions

    Motivated by the revelations of Edward Snowden, post-Snowden cryptography has become a prominent research direction in recent years. In Eurocrypt 2015, Mironov and Stephens-Davidowitz proposed a novel concept ...

    Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo in Advances in Cryptology – ASIACRYPT 2016 (2016)

  20. No Access

    Chapter and Conference Paper

    Proxy Signature with Revocation

    Proxy signature is a useful cryptographic primitive that allows signing right delegation. In a proxy signature scheme, an original signer can delegate his/her signing right to a proxy signer (or a group of pro...

    Shengmin Xu, Guomin Yang, Yi Mu, Sha Ma in Information Security and Privacy (2016)

previous disabled Page of 7