Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks
Wu, Tsu-Yang, Lee, Zhiyuan, Yang, Lei, Luo, Jia-Ning, Tso, Raylin
Published in The Journal of supercomputing (01.07.2021)
Published in The Journal of supercomputing (01.07.2021)
Get full text
Journal Article
Public key encryption with filtered equality test revisited
Chen, Yu-Chi, Xie, Xin, Tsao, Hung-Yu, Tso, Raylin
Published in Designs, codes, and cryptography (01.10.2021)
Published in Designs, codes, and cryptography (01.10.2021)
Get full text
Journal Article
Efficient quantum multi-proxy signature
Qin, Huawang, Tang, Wallace K. S., Tso, Raylin
Published in Quantum information processing (01.02.2019)
Published in Quantum information processing (01.02.2019)
Get full text
Journal Article
Quantum‐resistant anonymous identity‐based encryption with trable identities
Liu, Zi‐Yuan, Tseng, Yi‐Fan, Tso, Raylin, Mambo, Masahiro, Chen, Yu‐Chi
Published in IET information security (01.03.2022)
Published in IET information security (01.03.2022)
Get full text
Journal Article
Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function
Tseng, Yi-Fan, Liu, Zi-Yuan, Hsu, Jen-Chieh, Tso, Raylin
Published in Security and communication networks (12.02.2021)
Published in Security and communication networks (12.02.2021)
Get full text
Journal Article
Generic Construction of Dual-Server Public Key Encryption with Keyword Search on Cloud Computing
Tso, Raylin, Huang, Kaibin, Chen, Yu-Chi, Rahman, Sk Md Mizanur, Wu, Tsu-Yang
Published in IEEE access (01.01.2020)
Published in IEEE access (01.01.2020)
Get full text
Journal Article
Strongly secure certificateless short signatures
Tso, Raylin, Huang, Xinyi, Susilo, Willy
Published in The Journal of systems and software (01.06.2012)
Published in The Journal of systems and software (01.06.2012)
Get full text
Journal Article
Provable secure dual-server public key encryption with keyword search
Kaibin Huang, Raylin Tso
Published in 2017 IEEE 2nd International Verification and Security Workshop (IVSW) (01.07.2017)
Published in 2017 IEEE 2nd International Verification and Security Workshop (IVSW) (01.07.2017)
Get full text
Conference Proceeding