Zobrazeno 1 - 10
of 80
pro vyhledávání: '"Yi‐Fan Tseng"'
Publikováno v:
IET Information Security, Vol 16, Iss 2, Pp 111-126 (2022)
Abstract Identity‐based encryption (IBE), introduced by Shamir, eliminates the need for public‐key infrastructure. The sender can simply encrypt a message by using the recipient's identity (such as email or IP address) without needing to look up
Externí odkaz:
https://doaj.org/article/49368aa61f5642158db101d2d487d6da
Publikováno v:
Journal of Universal Computer Science, Vol 25, Iss 3, Pp 182-202 (2019)
Ciphertext-policy attribute-based encryption (CP-ABE) is an access control mechanism where a data provider encrypts a secret message and then sends the ciphertext to the receivers according to the access policy which she/he decides. If the attributes
Externí odkaz:
https://doaj.org/article/445dd6d3bf604503bdc091650845c2b2
Publikováno v:
IEEE Access, Vol 7, Pp 182916-182923 (2019)
Blind multisignature (BMS), first introduced by Horster et al, constitutes a crucial primitive that allows a user to generate a signature of a message from multiple signers, while the signers cannot obtain any information about the message. With thes
Externí odkaz:
https://doaj.org/article/a22e2136fa3145bead0a1efc81aea2de
Autor:
Yi-Fan Tseng, Yan-Bin Lin
Publikováno v:
Symmetry, Vol 14, Iss 6, p 1118 (2022)
A digital signature is one of the most widely used cryptographic primitives in asymmetry cryptography. According to the security requirements in different symmetry or asymmetry network models, various digital signatures have been developed in the lit
Externí odkaz:
https://doaj.org/article/007dd46d26a34120a3f240922e91b0f2
Autor:
Yi-Fan Tseng, Shih-Jie Gao
Publikováno v:
Applied Sciences, Vol 12, Iss 2, p 636 (2022)
With the rise of technology in recent years, more people are studying distributed system architecture, such as the e-government system. The advantage of this architecture is that when a single point of failure occurs, it does not cause the system to
Externí odkaz:
https://doaj.org/article/bf88538d695d420798bd224cf07c302c
Publikováno v:
IEEE Access, Vol 6, Pp 61478-61487 (2018)
Lattice is widely used in cryptography since it has potential for defending quantum attacks. One of the significant problems in such cryptography is the shortest vector problem (SVP). This problem is to find the non-zero shortest vector in lattice. T
Externí odkaz:
https://doaj.org/article/6df2a67a3dd54e4081afa5caa0503fa6
Publikováno v:
Applied Sciences, Vol 10, Iss 23, p 8669 (2020)
Inner product encryption, first introduced by Katz et al., is a type of predicate encryption in which a ciphertext and a private key correspond to an attribute vector and a predicate vector, respectively. Only if the attribute and predicate vectors s
Externí odkaz:
https://doaj.org/article/9a9934258a7943f2a0ce14ebf1888d33
Autor:
Chun-I Fan, Yi-Fan Tseng
Publikováno v:
Symmetry, Vol 7, Iss 4, Pp 1856-1881 (2015)
In a multi-receiver encryption system, a sender chooses a set of authorized receivers and sends them a message securely and efficiently, as the message is well encrypted and only one ciphertext corresponding to the message is generated no matter how
Externí odkaz:
https://doaj.org/article/38be29e8244a49ba89768d8be9cd2e4b
Publikováno v:
Applied Sciences, Vol 8, Iss 6, p 987 (2018)
Authentication has been adopted in many areas, but most of these authentication schemes are built using traditional cryptographic primitives. It is widely believed that such primitives are not resistant to quantum algorithms. To deal with those quant
Externí odkaz:
https://doaj.org/article/889ed849bdc548c8be09d5116584bcb3
Autor:
Yi-Fan Tseng, 曾一凡
107
Multi-receiver identity-based encryption is a cryptographic primitive, which allows a sender to encrypt a message for multiple receivers efficiently and securely. In some applications, the receivers may not want their identities to be reveal
Multi-receiver identity-based encryption is a cryptographic primitive, which allows a sender to encrypt a message for multiple receivers efficiently and securely. In some applications, the receivers may not want their identities to be reveal
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/3f4ay2