Huang, Qiong; Wong, Duncan S.; Susilo, Willy How to protect privacy in optimistic fair exchange of digital signatures. (English) Zbl 1391.94762 Inf. Sci. 325, 300-315 (2015). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Liu, Zhen; Wong, Duncan S. Practical ciphertext-policy attribute-based encryption: traitor tracing, revocation, and large universe. (English) Zbl 1459.94127 Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9092, 127-146 (2015). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Liu, Zhen; Cao, Zhenfu; Wong, Duncan S. Fully collusion-resistant traceable key-policy attribute-based encryption with sub-linear size ciphertexts. (English) Zbl 1403.94070 Lin, Dongdai (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). Lecture Notes in Computer Science 8957, 403-423 (2015). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Wang, Yujue; Wong, Duncan S.; Wu, Qianhong; Chow, Sherman S. M.; Qin, Bo; Liu, Jianwei; Ding, Yong Practical (fully) distributed signatures provably secure in the standard model. (English) Zbl 1339.94082 Theor. Comput. Sci. 595, 143-158 (2015). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Tan, Xiao; Huang, Qiong; Wong, Duncan S. Concurrent signature without random oracles. (English) Zbl 1303.94112 Theor. Comput. Sci. 562, 194-212 (2015). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Huang, Qiong; Yang, Guomin; Wong, Duncan S.; Susilo, Willy Ambiguous optimistic fair exchange: definition and constructions. (English) Zbl 1353.94053 Theor. Comput. Sci. 562, 177-193 (2015). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI Link
Chen, Xiaofeng; Susilo, Willy; Li, Jin; Wong, Duncan S.; Ma, Jianfeng; Tang, Shaohua; Tang, Qiang Efficient algorithms for secure outsourcing of bilinear pairings. (English) Zbl 1303.68050 Theor. Comput. Sci. 562, 112-121 (2015). MSC: 68P25 68M12 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI Link
Liu, Zhe; Großschädl, Johann; Wong, Duncan S. Low-weight primes for lightweight elliptic curve cryptography on 8-bit AVR processors. (English) Zbl 1347.94050 Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 217-235 (2014). MSC: 94A60 14G50 × Cite Format Result Cite Review PDF Full Text: DOI Link
Liu, Dennis Y. W.; Wong, Duncan S.; Huang, Qiong Ambiguous one-move nominative signature without random oracles. (English) Zbl 1352.94050 Lee, Hyang-Sook (ed.) et al., Information security and cryptology – ICISC 2013. 16th international conference, Seoul, Korea, November 27–29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 325-341 (2014). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Tan, Xiao; Huang, Qiong; Wong, Duncan S. Extending concurrent signature to multiple parties. (English) Zbl 1360.94334 Theor. Comput. Sci. 548, 54-67 (2014). MSC: 94A60 68M12 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Liang, Kaitai; Chu, Cheng-Kang; Tan, Xiao; Wong, Duncan S.; Tang, Chunming; Zhou, Jianying Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts. (English) Zbl 1358.94069 Theor. Comput. Sci. 539, 87-105 (2014). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Huang, Qiong; Wong, Duncan S.; Susilo, Willy P\(^2\)OFE: privacy-preserving optimistic fair exchange of digital signatures. (English) Zbl 1337.94097 Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 367-384 (2014). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Wang, Yujue; Wong, Duncan S.; Wu, Qianhong; Chow, Sherman S. M.; Qin, Bo; Liu, Jianwei Practical distributed signatures in the standard model. (English) Zbl 1337.94103 Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 307-326 (2014). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Yang, Guomin; Tan, Chik How; Mu, Yi; Susilo, Willy; Wong, Duncan S. Identity based identification from algebraic coding theory. (English) Zbl 1352.94073 Theor. Comput. Sci. 520, 51-61 (2014). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Huang, Qiong; Wong, Duncan S.; Susilo, Willy The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles. (English) Zbl 1293.94102 Inf. Sci. 228, 222-238 (2013). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Susilo, Willy; Au, Man Ho; Wang, Yang; Wong, Duncan S. Fairness in concurrent signatures revisited. (English) Zbl 1316.94104 Boyd, Colin (ed.) et al., Information security and privacy. 18th Australasian conference, ACISP 2013, Brisbane, Australia, July 1–3, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39058-6/pbk). Lecture Notes in Computer Science 7959, 318-329 (2013). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI Link
Liang, Kaitai; Liu, Zhen; Tan, Xiao; Wong, Duncan S.; Tang, Chunming A CCA-secure identity-based conditional proxy re-encryption without random oracles. (English) Zbl 1342.68124 Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 231-246 (2013). MSC: 68P25 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Meng, Yuxin; Wong, Duncan S.; Schlegel, Roman; Kwok, Lam-for Touch gestures based biometric authentication scheme for touchscreen mobile phones. (English) Zbl 1311.94108 Kutyłowski, Mirosław (ed.) et al., Information security and cryptology. 8th international conference, Inscrypt 2012, Beijing, China, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-38518-6/pbk). Lecture Notes in Computer Science 7763, 331-350 (2013). MSC: 94A62 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Huang, Qiong; Wong, Duncan S. Short and efficient convertible undeniable signature schemes without random oracles. (English) Zbl 1260.94066 Theor. Comput. Sci. 476, 67-83 (2013). MSC: 94A62 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Liu, Dennis Y. W.; Wong, Duncan S. One-move convertible nominative signature in the standard model. (English) Zbl 1303.94110 Takagi, Tsuyoshi (ed.) et al., Provable security. 6th international conference, ProvSec 2012, Chengdu, China, September 26–28, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33271-5/pbk). Lecture Notes in Computer Science 7496, 2-20 (2012). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Li, Jin; Zhang, Fangguo; Chen, Xiaofeng; Kim, Kwangjo; Wong, Duncan S. Generic security-amplifying methods of ordinary digital signatures. (English) Zbl 1248.94107 Inf. Sci. 201, 128-139 (2012). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Tan, Xiao; Wong, Duncan S. Generalized first pre-image tractable random oracle model and signature schemes. (English) Zbl 1308.94093 Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 247-260 (2012). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Huang, Qiong; Wong, Duncan S.; Susilo, Willy The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles. (English) Zbl 1290.94089 Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 120-137 (2012). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Huang, Qiong; Wong, Duncan S.; Susilo, Willy Group-oriented fair exchange of signatures. (English) Zbl 1242.94037 Inf. Sci. 181, No. 16, 3267-3283 (2011). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Liu, Zhen; Cao, Zhenfu; Huang, Qiong; Wong, Duncan S.; Yuen, Tsz Hon Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles. (English) Zbl 1477.68061 Atluri, Vijay (ed.) et al., Computer security – ESORICS 2011. 16th European symposium on research in computer security, Leuven, Belgium, September 12–14, 2011. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 6879, 278-297 (2011). MSC: 68M25 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Yuen, Tsz Hon; Wong, Duncan S.; Susilo, Willy; Huang, Qiong Concurrent signatures with fully negotiable binding control. (English) Zbl 1298.94126 Boyen, Xavier (ed.) et al., Provable security. 5th international conference, ProvSec 2011, Xi’an, China, October 16–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-24315-8/pbk). Lecture Notes in Computer Science 6980, 170-187 (2011). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Huang, Qiong; Wong, Duncan S. Short convertible undeniable signature in the standard model. (English) Zbl 1292.94171 Bao, Feng (ed.) et al., Information security practice and experience. 7th international conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21030-3/pbk). Lecture Notes in Computer Science 6672, 257-272 (2011). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Zhang, Ye; Au, Man Ho; Wong, Duncan S.; Huang, Qiong; Mamoulis, Nikos; Cheung, David W.; Yiu, Siu-Ming Oblivious transfer with access control: realizing disjunction without duplication. (English) Zbl 1287.94107 Joye, Marc (ed.) et al., Pairing-based cryptography – Pairing 2010. 4th international conference, Yamanaka Hot Spring, Japan, December 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17454-4/pbk). Lecture Notes in Computer Science 6487, 96-115 (2010). MSC: 94A60 68N17 × Cite Format Result Cite Review PDF Full Text: DOI
Huang, Qiong; Wong, Duncan S.; Susilo, Willy A new construction of designated confirmer signature and its application to optimistic fair exchange (extended abstract). (English) Zbl 1287.94112 Joye, Marc (ed.) et al., Pairing-based cryptography – Pairing 2010. 4th international conference, Yamanaka Hot Spring, Japan, December 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17454-4/pbk). Lecture Notes in Computer Science 6487, 41-61 (2010). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Tsang, Patrick P.; Au, Man Ho; Liu, Joseph K.; Susilo, Willy; Wong, Duncan S. A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity (extended abstract). (English) Zbl 1286.94099 Heng, Swee-Huay (ed.) et al., Provable security. 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-16279-4/pbk). Lecture Notes in Computer Science 6402, 166-183 (2010). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Yang, Guomin; Tan, Chik How; Huang, Qiong; Wong, Duncan S. Probabilistic public key encryption with equality test. (English) Zbl 1271.94028 Pieprzyk, Josef (ed.), Topics in cryptology – CT-RSA 2010. The cryptographers’ track at the RSA conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11924-8/pbk). Lecture Notes in Computer Science 5985, 119-131 (2010). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI Link
Li, Chung Ki; Wong, Duncan S. Signcryption from randomness recoverable public key encryption. (English) Zbl 1191.94093 Inf. Sci. 180, No. 4, 549-559 (2010). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Chang, Shuang; Wong, Duncan S.; Mu, Yi; Zhang, Zhenfeng Certificateless threshold ring signature. (English) Zbl 1170.94327 Inf. Sci. 179, No. 20, 3685-3696 (2009). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Yuen, Tsz Hon; Huang, Qiong; Mu, Yi; Susilo, Willy; Wong, Duncan S.; Yang, Guomin Efficient non-interactive range proof. (English) Zbl 1248.94098 Ngo, Hung Q. (ed.), Computing and combinatorics. 15th annual international conference, COCOON 2009, Niagara Falls, NY, USA, July 13–15, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02881-6/pbk). Lecture Notes in Computer Science 5609, 138-147 (2009). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI Link
Huang, Qiong; Wong, Duncan S. On the relation among various security models for certificateless cryptography. (English) Zbl 1156.94350 Li, Yongqing (ed.) et al., Coding and cryptology. Proceedings of the first international workshop, Wuyi Mountain, Fujian, China, June 11–15, 2007. Hackensack, NJ: World Scientific (ISBN 978-981-283-223-8/hbk). Series on Coding Theory and Cryptology 4, 154-170 (2008). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Wang, Huaxiong; Wong, Duncan S. On secret reconstruction in secret sharing schemes. (English) Zbl 1237.94118 IEEE Trans. Inf. Theory 54, No. 1, 473-480 (2008). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Huang, Qiong; Liu, Dennis Y. W.; Wong, Duncan S. An efficient one-move nominative signature scheme. (English) Zbl 1154.94458 Int. J. Appl. Cryptogr. 1, No. 2, 133-143 (2008). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Huang, Qiong; Wong, Duncan S. On the relation among various security models for certificateless cryptography. (English) Zbl 1154.94399 Int. J. Appl. Cryptogr. 1, No. 2, 108-119 (2008). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Huang, Qiong; Yang, Guomin; Wong, Duncan S.; Susilo, Willy Ambiguous optimistic fair exchange. (English) Zbl 1206.94075 Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 74-89 (2008). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Franklin, Matthew K. (ed.); Hui, Lucas Chi Kwong (ed.); Wong, Duncan S. (ed.) Cryptology and network security. 7th international conference, CANS 2008, Hong-Kong, China, December 2–4, 2008. Proceedings. (English) Zbl 1153.94302 Lecture Notes in Computer Science 5339. Berlin: Springer (ISBN 978-3-540-89640-1/pbk). xiii, 395 p. (2008). MSC: 94-06 94A60 68P25 00B25 × Cite Format Result Cite Review PDF Full Text: DOI
Yang, Guomin; Wong, Duncan S.; Wang, Huaxiong; Deng, Xiaotie Two-factor mutual authentication based on smart cards and passwords. (English) Zbl 1152.68017 J. Comput. Syst. Sci. 74, No. 7, 1160-1172 (2008). MSC: 68P25 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Yang, Guomin; Chen, Jing; Wong, Duncan S.; Deng, Xiaotie; Wang, Dongsheng A new framework for the design and analysis of identity-based identification schemes. (English) Zbl 1152.68016 Theor. Comput. Sci. 407, No. 1-3, 370-388 (2008). MSC: 68P25 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Yang, Guomin; Wong, Duncan S.; Deng, Xiaotie Formal security definition and efficient construction for roaming with a privacy-preserving extension. (English) Zbl 1217.94129 J. UCS 14, No. 3, 441-462 (2008). MSC: 94A62 68M12 × Cite Format Result Cite Review PDF Full Text: Link
Li, Jin; Kim, Kwangjo; Zhang, Fangguo; Wong, Duncan S. Generic security-amplifying methods of ordinary digital signatures. (English) Zbl 1319.94092 Bellovin, Steven M. (ed.) et al., Applied cryptography and network security. 6th international conference, ACNS 2008, New York, NY, USA, June 3–6, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68913-3/pbk). Lecture Notes in Computer Science 5037, 224-241 (2008). MSC: 94A62 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Au, Man Ho; Huang, Qiong; Liu, Joseph K.; Susilo, Willy; Wong, Duncan S.; Yang, Guomin Traceable and retrievable identity-based encryption. (English) Zbl 1319.94051 Bellovin, Steven M. (ed.) et al., Applied cryptography and network security. 6th international conference, ACNS 2008, New York, NY, USA, June 3–6, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68913-3/pbk). Lecture Notes in Computer Science 5037, 94-110 (2008). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI Link
Huang, Qiong; Yang, Guomin; Wong, Duncan S.; Susilo, Willy Efficient optimistic fair exchange secure in the multi-user setting and chosen-key model without random oracles. (English) Zbl 1153.94394 Malkin, Tal (ed.), Topics in cryptology – CT-RSA 2008. The cryptographers’ track at the RSA conference 2008, San Francisco, CA, USA, April 8–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-79262-8/pbk). Lecture Notes in Computer Science 4964, 106-120 (2008). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI Link
Liu, Dennis Y. W.; Wong, Duncan S.; Huang, Xinyi; Wang, Guilin; Huang, Qiong; Mu, Yi; Susilo, Willy Formal definition and construction of nominative signature. (English) Zbl 1285.94108 Qing, Sihan (ed.) et al., Information and communications security. 9th international conference, ICICS 2007, Zhengzhou, China, December 12–15, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77047-3/pbk). Lecture Notes in Computer Science 4861, 57-68 (2008). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Jin, Haimin; Wong, Duncan S.; Xu, Yinlong An efficient password-only two-server authenticated key exchange system. (English) Zbl 1285.94106 Qing, Sihan (ed.) et al., Information and communications security. 9th international conference, ICICS 2007, Zhengzhou, China, December 12–15, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77047-3/pbk). Lecture Notes in Computer Science 4861, 44-56 (2008). MSC: 94A62 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Dawson, Ed (ed.); Wong, Duncan S. (ed.) Information security practice and experience. Third international conference, ISPEC 2007, Hong Kong, China, May 7–9, 2007. Proceedings. (English) Zbl 1158.68304 Lecture Notes in Computer Science 4464. Berlin: Springer (ISBN 978-3-540-72159-8/pbk). xiii, 361 p. (2007). MSC: 68-06 68P25 94A60 94A62 00B25 × Cite Format Result Cite Review PDF Full Text: DOI
Yang, Guomin; Chen, Jing; Wong, Duncan S.; Deng, Xiaotie; Wang, Dongsheng A more natural way to construct identity-based identification schemes. (English) Zbl 1214.94057 Katz, Jonathan (ed.) et al., Applied cryptography and network security. 5th international conference, ACNS 2007, Zhuhai, China, June 5–8, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72737-8/pbk). Lecture Notes in Computer Science 4521, 307-322 (2007). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI Link
Huang, Qiong; Wong, Duncan S.; Zhao, Yiming Generic transformation to strongly unforgeable signatures. (English) Zbl 1214.94066 Katz, Jonathan (ed.) et al., Applied cryptography and network security. 5th international conference, ACNS 2007, Zhuhai, China, June 5–8, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72737-8/pbk). Lecture Notes in Computer Science 4521, 1-17 (2007). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Huang, Xinyi; Mu, Yi; Susilo, Willy; Wong, Duncan S.; Wu, Wei Certificateless signature revisited. (English) Zbl 1213.94158 Pieprzyk, Josef (ed.) et al., Information security and privacy. 12th Australasian conference, ACISP 2007. Townsville, Australia, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73457-4/pbk). Lecture Notes in Computer Science 4586, 308-322 (2007). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Huang, Qiong; Wong, Duncan S. Generic certificateless key encapsulation mechanism. (English) Zbl 1213.94109 Pieprzyk, Josef (ed.) et al., Information security and privacy. 12th Australasian conference, ACISP 2007. Townsville, Australia, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73457-4/pbk). Lecture Notes in Computer Science 4586, 215-229 (2007). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Hu, Bessie C.; Wong, Duncan S.; Zhang, Zhenfeng; Deng, Xiaotie Certificateless signature: a new security model and an improved generic construction. (English) Zbl 1148.94009 Des. Codes Cryptography 42, No. 2, 109-126 (2007). Reviewer: Aniket Mahanti (Saint John) MSC: 94A62 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Wang, Guilin; Baek, Joonsang; Wong, Duncan S.; Bao, Feng On the generic and efficient constructions of secure designated confirmer signatures. (English) Zbl 1127.94028 Okamoto, Tatsuaki (ed.) et al., Public key cryptography – PKC 2007. 10th international conference on practice and theory in public-key cryptography, Beijing, China, April 16–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-71676-1/pbk). Lecture Notes in Computer Science 4450, 43-60 (2007). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Zhu, Robert W.; Yang, Guomin; Wong, Duncan S. An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices. (English) Zbl 1120.68031 Theor. Comput. Sci. 378, No. 2, 198-207 (2007). MSC: 68M12 68P25 94A62 × Cite Format Result Cite Review PDF Full Text: DOI Link
Hu, Bessie C.; Wong, Duncan S.; Zhang, Zhenfeng; Deng, Xiaotie Key replacement attack against a generic construction of certificateless signature. (English) Zbl 1176.94044 Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 235-246 (2006). MSC: 94A60 94A62 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Liu, Joseph K.; Tsang, Patrick P.; Wong, Duncan S.; Zhu, Robert W. Universal custodian-hiding verifiable encryption for discrete logarithms. (English) Zbl 1185.94057 Won, Dongho (ed.) et al., Information security and cryptology – ICISC 2005. 8th international conference, Seoul, Korea, December 1–2, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-33354-1/pbk). Lecture Notes in Computer Science 3935, 389-409 (2006). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Zhang, Zhenfeng; Wong, Duncan S.; Xu, Jing; Feng, Dengguo Certificateless public-key signature: Security model and efficient construction. (English) Zbl 1151.94638 Zhou, Jianying (ed.) et al., Applied cryptography and network security. 4th international conference, ACNS 2006, Singapore, June 6–9, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34703-8/pbk). Lecture Notes in Computer Science 3989, 293-308 (2006). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Yang, Guomin; Wong, Duncan S.; Deng, Xiaotie; Wang, Huaxiong Anonymous signature schemes. (English) Zbl 1151.94587 Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 347-363 (2006). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Tian, Xiaojian; Wong, Duncan S. Session corruption attack and improvements on encryption based MT-authenticators. (English) Zbl 1125.94337 Pointcheval, David (ed.), Topics in cryptology – CT-RSA 2006. The cryptographers’ track at the RSA conference 2006, San Jose, CA, USA, February 13–17, 2006. Proceedings. Berlin: Springer (ISBN 3-540-31033-9/pbk). Lecture Notes in Computer Science 3860, 34-51 (2006). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Long, Shoulun; Pieprzyk, Josef; Wang, Huaxiong; Wong, Duncan S. Generalised cumulative arrays in secret sharing. (English) Zbl 1261.94032 Des. Codes Cryptography 40, No. 2, 191-209 (2006). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Liu, Joseph K.; Wong, Duncan S. On the security models of (threshold) ring signature schemes. (English) Zbl 1133.94327 Park, Choonsik (ed.) et al., Information security and cryptology – ICISC 2004. 7th international conference, Seoul, Korea, December 2–3, 2004. Revised Selected Papers. Berlin: Springer (ISBN 978-3-540-26226-8/pbk). Lecture Notes in Computer Science 3506, 204-217 (2005). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Yang, Guomin; Wong, Duncan S.; Deng, Xiaotie Efficient anonymous roaming and its security analysis. (English) Zbl 1126.68418 Ioannidis, John (ed.) et al., Applied cryptography and network security. Third international conference, ACNS 2005, New York, NY, USA, June 7–10, 2005. Proceedings. Berlin: Springer (ISBN 3-540-26223-7/pbk). Lecture Notes in Computer Science 3531, 334-349 (2005). MSC: 68P25 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Yang, Guomin; Wong, Duncan S.; Deng, Xiaotie Analysis and improvement of a signcryption scheme with key privacy. (English) Zbl 1127.94379 Zhou, Jianying (ed.) et al., Information security. 8th international conference, ISC 2005, Singapore, September 20–23, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29001-X/pbk). Lecture Notes in Computer Science 3650, 218-232 (2005). MSC: 94A62 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Yang, Guomin; Wong, Duncan S.; Deng, Xiaotie Deposit-case attack against secure roaming. (English) Zbl 1127.94378 Boyd, Colin (ed.) et al., Information security and privacy. 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4–6, 2005. Proceedings. Berlin: Springer (ISBN 3-540-26547-3/pbk). Lecture Notes in Computer Science 3574, 417-428 (2005). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Liu, Joseph K.; Wong, Duncan S. A restricted multi-show credential system and its application on e-voting. (English) Zbl 1118.68482 Deng, Robert H. (ed.) et al., Information security practice and experience. First international conference, ISPEC 2005, Singapore, April 11–14, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25584-2/pbk). Lecture Notes in Computer Science 3439, 268-279 (2005). MSC: 68P25 94A50 × Cite Format Result Cite Review PDF Full Text: DOI
Liu, Joseph K.; Wei, Victor K.; Wong, Duncan S. A separable threshold ring signature scheme. (English) Zbl 1092.68602 Lim, Jong In (ed.) et al., Information security and cryptology – ICISC 2003. 6th international conference, Seoul, Korea, November 27–28, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21376-7/pbk). Lecture Notes in Computer Science 2971, 12-26 (2004). MSC: 68P25 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Tsang, Patrick P.; Wei, Victor K.; Chan, Tony K.; Au, Man Ho; Liu, Joseph K.; Wong, Duncan S. Separable linkable threshold ring signatures. (English) Zbl 1113.94326 Canteaut, Anne (ed.) et al., Progress in cryptology – INDOCRYPT 2004. 5th international conference on cryptology in India, Chennai, India, December 20-22, 2004. Berlin: Springer (ISBN 3-540-24130-2/pbk). Lecture Notes in Computer Science 3348, 384-398 (2004). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Liu, Joseph K.; Wei, Victor K.; Wong, Duncan S. Linkable spontaneous anonymous group signature for ad hoc groups (extended abstract). (English) Zbl 1098.94624 Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 325-335 (2004). MSC: 94A60 94A62 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Wong, Duncan S.; Chan, Agnes H.; Zhu, Feng More efficient password authenticated key exchange based on RSA. (English) Zbl 1123.94365 Johansson, Thomas (ed.) et al., Progress in cryptology – INDOCRYPT 2003. 4th international conference on cryptology in India, New Delhi, India, December 8–10, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20609-4/pbk). Lect. Notes Comput. Sci. 2904, 375-387 (2003). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Zhu, Feng; Wong, Duncan S.; Chan, Agnes H.; Ye, Robbie Password authenticated key exchange based on RSA for imbalanced wireless networks. (English) Zbl 1019.68588 Chan, Agnes Hui (ed.) et al., Information security. 5th international conference, ISC 2002, Sao Paulo, Brazil, September 30 - October 2, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2433, 150-161 (2002). MSC: 68P25 94A62 × Cite Format Result Cite Review PDF Full Text: Link
Wong, Duncan S.; Chan, Agnes H. Efficient and mutually authenticated key exchange for low power computing devices. (English) Zbl 1067.94567 Boyd, Colin (ed.), Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9–13, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42987-5). Lect. Notes Comput. Sci. 2248, 272-289 (2001). MSC: 94A60 94A62 68P25 × Cite Format Result Cite Review PDF Full Text: Link