Information Security and Privacy
17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings
Chapter and Conference Paper
In FOCS’07, Boneh, Gentry and Hamburg presented an identity-based encryption (IBE) system (BasicIBE) based on the quadratic residuosity (QR) assumption. A BasicIBE encryption of an l-bit message has a short ciphe...
Chapter and Conference Paper
Attribute-based signature and proxy signature are both very useful in many real-world applications. In this paper, we combine the special features of both signatures and propose an attribute-based proxy signat...
Chapter and Conference Paper
With mobile cloud storage, mobile users can enjoy the advantages of both mobile networks and cloud storage. However, a major concern of mobile users is how to guarantee the integrity of the remote data. Taking...
Chapter and Conference Paper
We propose a new encryption primitive called Membership Encryption. Let \(\mathcal{P}(\mathbf{G})\) be a privacy-preser...
Book and Conference Proceedings
17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings
Book and Conference Proceedings
6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings
Chapter and Conference Paper
Identity-based traitor tracing (IBTT) scheme can be utilized to identify a private (decryption) key of any identity that is illegally used in an identity-based broadcast encryption scheme. In PKC’07, Abdalla et a...
Chapter and Conference Paper
In Asiacrypt 2007, Vaudenay proposed a formal model addressing privacy in RFID, which separated privacy into eight classes. One important conclusion in the paper is the impossibility of achieving strong privac...