Guo, Fuchun
39  results:
Search for persons X
?
1

Compact Ring Signatures with Post-Quantum Security in Stand..:

, In: Information Security and Cryptology; Lecture Notes in Computer Science,
 
?
2

Compact Accountable Ring Signatures in the Plain Model:

, In: Information Security and Cryptology; Lecture Notes in Computer Science,
 
?
3

Logarithmic-Size (Linkable) Ring Signatures from Lattice Is..:

, In: Security, Privacy, and Applied Cryptography Engineering; Lecture Notes in Computer Science,
Khuc, Xuan Thanh ; Ta, Anh The ; Susilo, Willy... - p. 214-241 , 2024
 
?
4

Robust Decentralized Multi-client Functional Encryption: Mo..:

, In: Advances in Cryptology – ASIACRYPT 2023; Lecture Notes in Computer Science,
Li, Yamin ; Wei, Jianghong ; Guo, Fuchun.. - p. 134-165 , 2023
 
?
5

A Tightly Secure ID-Based Signature Scheme Under DL Assumpt..:

, In: Information Security and Privacy; Lecture Notes in Computer Science,
Loh, Jia-Chng ; Guo, Fuchun ; Susilo, Willy. - p. 199-219 , 2023
 
?
6

Multimodal Private Signatures:

, In: Advances in Cryptology – CRYPTO 2022; Lecture Notes in Computer Science,
Nguyen, Khoa ; Guo, Fuchun ; Susilo, Willy. - p. 792-822 , 2022
 
?
7

Optimal Tightness for Chain-Based Unique Signatures:

, In: Advances in Cryptology – EUROCRYPT 2022; Lecture Notes in Computer Science,
Guo, Fuchun ; Susilo, Willy - p. 553-583 , 2022
 
?
8

Efficient Unique Ring Signatures from Lattices:

, In: Computer Security – ESORICS 2022; Lecture Notes in Computer Science,
Nguyen, Tuong Ngoc ; Ta, Anh The ; Le, Huy Quoc... - p. 447-466 , 2022
 
?
9

Public Cloud Data Auditing Revisited: Removing the Tradeoff..:

, In: Computer Security – ESORICS 2022; Lecture Notes in Computer Science,
Susilo, Willy ; Li, Yannan ; Guo, Fuchun.. - p. 65-85 , 2022
 
?
10

Secure Cloud Auditing with Efficient Ownership Transfer:

, In: Computer Security – ESORICS 2020; Lecture Notes in Computer Science,
Shen, Jun ; Guo, Fuchun ; Chen, Xiaofeng. - p. 611-631 , 2020
 
?
11

Lattice-Based IBE with Equality Test Supporting Flexible Au..:

, In: Progress in Cryptology – INDOCRYPT 2020; Lecture Notes in Computer Science,
 
?
12

A New Encoding Framework for Predicate Encryption with Non-..:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
Kim, Jongkil ; Susilo, Willy ; Guo, Fuchun.. - p. 406-425 , 2019
 
?
13

An Efficient KP-ABE with Short Ciphertexts in Prime OrderGr..:

, In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security,
Kim, Jongkil ; Susilo, Willy ; Guo, Fuchun.. - p. 823-834 , 2017
 
?
14

Recipient Revocable Identity-Based Broadcast Encryption ..:

, In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security,
Susilo, Willy ; Chen, Rongmao ; Guo, Fuchun... - p. 201-210 , 2016
 
?
15

POSTER : Euclidean Distance Based Encryption: How to Emb..:

, In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security,
Guo, Fuchun ; Susilo, Willy ; Mu, Yi - p. 1430-1432 , 2014
 
1-15