Raylin Tso
YOU?
Author Swipe
View article: Preventing Witness Leakage in Adaptor Signatures
Preventing Witness Leakage in Adaptor Signatures Open
Adaptor signature schemes allow two parties to trade fairly. When a valid signature is revealed, the secret witness can also be extracted. This is useful in blockchain settings such as atomic swaps and fair exchange. However, if an adversa…
View article: Privacy‐Enhanced Data Sharing Systems from Hierarchical ID‐Based Puncturable Functional Encryption with Inner Product Predicates
Privacy‐Enhanced Data Sharing Systems from Hierarchical ID‐Based Puncturable Functional Encryption with Inner Product Predicates Open
The emergence of cloud computing enables users to upload data to remote clouds and compute them. This drastically reduces computing and storage costs for users. Considering secure computing for multilevel users in enterprises, the notion o…
View article: Comments on "Dynamic Consensus Committee-Based for Secure Data Sharing With Authorized Multi-Receiver Searchable Encryption"
Comments on "Dynamic Consensus Committee-Based for Secure Data Sharing With Authorized Multi-Receiver Searchable Encryption" Open
Recently, Yang et al. introduced an efficient searchable encryption scheme titled "Dynamic Consensus Committee-Based for Secure Data Sharing With Authorized Multi-Receiver Searchable Encryption (DCC-SE)," published in IEEE Transactions on …
View article: Message from the Program Co-Chairs: AsiaJCIS 2022
Message from the Program Co-Chairs: AsiaJCIS 2022 Open
The papers in this volume were presented at the 17th Asia Joint Conference on Information Security (abbreviated as AsiaJCIS 2022), hosted by Hebei University in Heibei, China (and in virtual) on August 15-16, 2022. The mission of the AsiaJ…
View article: Extension of elliptic curve Qu–Vanstone certificates and their applications
Extension of elliptic curve Qu–Vanstone certificates and their applications Open
In public key infrastructure, a certificate, issued by a certificate authority (CA), is used to guarantee the connection between a user and her/his public key. In order to improve the efficiency, the concept of implicit certificate protoco…
View article: Quantum‐resistant anonymous identity‐based encryption with trable identities
Quantum‐resistant anonymous identity‐based encryption with trable identities Open
Identity‐based encryption (IBE), introduced by Shamir, eliminates the need for public‐key infrastructure. The sender can simply encrypt a message by using the recipient's identity (such as email or IP address) without needing to look up th…
View article: Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function
Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function Open
Predicate encryption (PE), formalized by Katz et al., is a new paradigm of public-key encryption that conceptually captures the public-key encryption that supports fine-grained access control policy. Because of the nature of PE, it is used…
View article: Practical Inner Product Encryption with Constant Private Key
Practical Inner Product Encryption with Constant Private Key Open
Inner product encryption, first introduced by Katz et al., is a type of predicate encryption in which a ciphertext and a private key correspond to an attribute vector and a predicate vector, respectively. Only if the attribute and predicat…
View article: On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks Open
Mobile data traffic has been growing at an increasing rate with the popularity of smartphones, tablets, and other wireless devices. To reduce the load on the network, mobile network operators deploy femtocells to increase their coverage an…
View article: Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing
Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing Open
Chen et al. indicated the inner keyword guessing attack coming from the low entropy of keywords, which eliminates the semantic security of most keyword search schemes. Then, they accordingly propose the first dual-server PEKS scheme (abbre…
View article: Distributed E-Voting and E-Bidding Systems Based on Smart Contract
Distributed E-Voting and E-Bidding Systems Based on Smart Contract Open
Traditional voting and bidding systems largely rely on paperwork and human resources throughout the voting process, which can incur high costs in terms of both time and money. Electronic voting and electronic bidding systems can be used to…
View article: Identity-Based Blind Multisignature From Lattices
Identity-Based Blind Multisignature From Lattices Open
Blind multisignature (BMS), first introduced by Horster et al, constitutes a crucial primitive that allows a user to generate a signature of a message from multiple signers, while the signers cannot obtain any information about the message…
View article: Untraceable and Anonymous Mobile Payment Scheme Based on Near Field Communication
Untraceable and Anonymous Mobile Payment Scheme Based on Near Field Communication Open
With the developments of mobile communications, M-commerce has become increasingly popular in recent years. However, most M-commerce schemes ignore user anonymity during online transactions. As a result, user transactions may easily be tra…
View article: Privacy-Preserving Outsourced Similarity Test for Access Over Encrypted Data in the Cloud
Privacy-Preserving Outsourced Similarity Test for Access Over Encrypted Data in the Cloud Open
In the era of cloud computing, the cloud server always plays a significant role to carry the heavy tasks of computation. As for storage services, it provides an efficient manner for accessing data. For data privacy, encryption is usually r…
View article: On the Security of a Three-Party-Authenticated Key Agreement Scheme based on Chaotic Maps
On the Security of a Three-Party-Authenticated Key Agreement Scheme based on Chaotic Maps Open
Recently, Lee et al. proposed a new three-party-authenticated key agreement scheme based on chaotic maps without password table. Compared with previous works, their scheme can completely resistant to password guessing attacks because of us…