Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Jhanwar-Barua’s Identity-Based Encryption Revisited

    In FOCS’07, Boneh, Gentry and Hamburg presented an identity-based encryption (IBE) system (BasicIBE) based on the quadratic residuosity (QR) assumption. A BasicIBE encryption of an l-bit message has a short ciphe...

    Ibrahim Elashry, Yi Mu, Willy Susilo in Network and System Security (2014)

  2. No Access

    Chapter and Conference Paper

    Attribute-Based Signing Right Delegation

    Attribute-based signature and proxy signature are both very useful in many real-world applications. In this paper, we combine the special features of both signatures and propose an attribute-based proxy signat...

    Weiwei Liu, Yi Mu, Guomin Yang in Network and System Security (2014)

  3. No Access

    Chapter and Conference Paper

    Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage

    With mobile cloud storage, mobile users can enjoy the advantages of both mobile networks and cloud storage. However, a major concern of mobile users is how to guarantee the integrity of the remote data. Taking...

    Yong Yu, Yi Mu, Jianbing Ni, Jiang Deng, Ke Huang in Network and System Security (2014)

  4. No Access

    Chapter and Conference Paper

    Membership Encryption and Its Applications

    We propose a new encryption primitive called Membership Encryption. Let \(\mathcal{P}(\mathbf{G})\) be a privacy-preser...

    Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan in Information Security and Privacy (2013)

  5. No Access

    Book and Conference Proceedings

    Information Security and Privacy

    17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings

    Willy Susilo, Yi Mu, Jennifer Seberry in Lecture Notes in Computer Science (2012)

  6. No Access

    Book and Conference Proceedings

    Network and System Security

    6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings

    Li Xu, Elisa Bertino, Yi Mu in Lecture Notes in Computer Science (2012)

  7. Chapter and Conference Paper

    Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext

    Identity-based traitor tracing (IBTT) scheme can be utilized to identify a private (decryption) key of any identity that is illegally used in an identity-based broadcast encryption scheme. In PKC’07, Abdalla et a...

    Fuchun Guo, Yi Mu, Willy Susilo in Computer Security – ESORICS 2012 (2012)

  8. Chapter and Conference Paper

    RFID Privacy Models Revisited

    In Asiacrypt 2007, Vaudenay proposed a formal model addressing privacy in RFID, which separated privacy into eight classes. One important conclusion in the paper is the impossibility of achieving strong privac...

    Ching Yu Ng, Willy Susilo, Yi Mu, Rei Safavi-Naini in Computer Security - ESORICS 2008 (2008)