default search action
Fuchun Guo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j83]Jia-Chng Loh, Fuchun Guo, Willy Susilo:
Improving efficiency and security of Camenisch-Lysyanskaya signatures for anonymous credential systems. Comput. Stand. Interfaces 91: 103886 (2025) - [j82]Yanhua Zhang, Willy Susilo, Fuchun Guo:
Lattice-based strong designated verifier signature with non-delegatability. Comput. Stand. Interfaces 92: 103904 (2025) - 2024
- [j81]Guohua Tian, Jianghong Wei, Meixia Miao, Fuchun Guo, Willy Susilo, Xiaofeng Chen:
Blockchain-Based Compact Verifiable Data Streaming With Self-Auditing. IEEE Trans. Dependable Secur. Comput. 21(4): 3917-3930 (2024) - [j80]Jianchang Lai, Willy Susilo, Robert H. Deng, Fuchun Guo:
SDSS: Sequential Data Sharing System in IoT. IEEE Trans. Inf. Forensics Secur. 19: 2288-2299 (2024) - [j79]Zhuo Chen, Liehuang Zhu, Peng Jiang, Can Zhang, Feng Gao, Fuchun Guo:
Exploring Unobservable Blockchain-Based Covert Channel for Censorship-Resistant Systems. IEEE Trans. Inf. Forensics Secur. 19: 3380-3394 (2024) - [c61]Yong Lin, Peng Jiang, Fuchun Guo, Liehuang Zhu:
CrossAAD: Cross-Chain Abnormal Account Detection. ACISP (3) 2024: 84-104 - [c60]Luqi Huang, Willy Susilo, Guomin Yang, Fuchun Guo:
Key Cooperative Attribute-Based Encryption. ACISP (1) 2024: 241-260 - [c59]Tuong Ngoc Nguyen, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
A Fault-Tolerant Content Moderation Mechanism for Secure Messaging Systems. ACISP (2) 2024: 269-289 - [c58]Jia-Chng Loh, Fuchun Guo, Willy Susilo:
Pairing-Free ID-Based Signatures as Secure as Discrete Logarithm in AGM. ACISP (1) 2024: 347-367 - [c57]Thanh Xuan Khuc, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Threshold Ring Signatures with Accountability. ACISP (1) 2024: 368-388 - [c56]Yumei Li, Willy Susilo, Fuchun Guo:
Public Auditing with Aggregated Tags for Multiple Users. DSPP (2) 2024: 122-139 - [c55]Yanhua Zhang, Willy Susilo, Yan Chen, Fuchun Guo, Jiaming Wen:
Lattice-Based Universal Designated Multi-verifiers Signature Scheme. ISPEC 2024: 33-54 - [c54]Tuong Ngoc Nguyen, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Shrinkable Ring Signatures: It Wasn't Them! ISPEC 2024: 75-93 - [c53]Jianghong Wei, Guohua Tian, Ding Wang, Fuchun Guo, Willy Susilo, Xiaofeng Chen:
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus. USENIX Security Symposium 2024 - [i15]Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai, Fuchun Guo:
Oblivious Pseudo Random Function base on Ideal Lattice, Application in PSI and PIR. IACR Cryptol. ePrint Arch. 2024: 1349 (2024) - 2023
- [j78]Zhen Zhao, Willy Susilo, Fuchun Guo, Jianchang Lai, Baocang Wang:
Full black-box retrievable and accountable identity-based encryption. Comput. Stand. Interfaces 86: 103741 (2023) - [j77]Fagen Li, Emmanuel Ahene, Mingwu Zhang, Fuchun Guo:
Guest editorial: Special issue on frontiers in cyber security. J. Syst. Archit. 145: 103027 (2023) - [j76]Xiaoguo Li, Tao Xiang, Yi Mu, Fuchun Guo, Zhongyuan Yao:
C-Wall: Conflict-Resistance in Privacy-Preserving Cloud Storage. IEEE Trans. Cloud Comput. 11(2): 1911-1926 (2023) - [j75]Yudi Zhang, Fuchun Guo, Willy Susilo, Guomin Yang:
Balancing Privacy and Flexibility of Cloud-Based Personal Health Records Sharing System. IEEE Trans. Cloud Comput. 11(3): 2420-2430 (2023) - [j74]Jun Shen, Xiaofeng Chen, Jianghong Wei, Fuchun Guo, Willy Susilo:
Blockchain-Based Accountable Auditing With Multi-Ownership Transfer. IEEE Trans. Cloud Comput. 11(3): 2711-2724 (2023) - [j73]Peng Jiang, Fuchun Guo, Willy Susilo, Chao Lin, Jiaxi Hu, Zhen Zhao, Liehuang Zhu, Debiao He:
EthereumX: Improving Signature Security With Randomness Preprocessing Module. IEEE Trans. Serv. Comput. 16(5): 3318-3331 (2023) - [j72]Willy Susilo, Fuchun Guo, Zhen Zhao, Yinhao Jiang, Chunpeng Ge:
Secure Replication-Based Outsourced Computation Using Smart Contracts. IEEE Trans. Serv. Comput. 16(5): 3711-3722 (2023) - [j71]Yudi Zhang, Willy Susilo, Fuchun Guo, Guomin Yang:
PPDF: A Privacy-Preserving Cloud-Based Data Distribution System With Filtering. IEEE Trans. Serv. Comput. 16(6): 3920-3930 (2023) - [c52]Jia-Chng Loh, Fuchun Guo, Willy Susilo, Guomin Yang:
A Tightly Secure ID-Based Signature Scheme Under DL Assumption in AGM. ACISP 2023: 199-219 - [c51]Yamin Li, Jianghong Wei, Fuchun Guo, Willy Susilo, Xiaofeng Chen:
Robust Decentralized Multi-client Functional Encryption: Motivation, Definition, and Inner-Product Constructions. ASIACRYPT (5) 2023: 134-165 - [c50]Thanh Xuan Khuc, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Compact Accountable Ring Signatures in the Plain Model. Inscrypt (1) 2023: 23-43 - [c49]Tuong Ngoc Nguyen, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Compact Ring Signatures with Post-Quantum Security in Standard Model. Inscrypt (1) 2023: 65-84 - [c48]Thanh Xuan Khuc, Anh The Ta, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Logarithmic-Size (Linkable) Ring Signatures from Lattice Isomorphism Problems. SPACE 2023: 214-241 - [i14]Fuchun Guo, Willy Susilo, Xiaofeng Chen, Peng Jiang, Jianchang Lai, Zhen Zhao:
Research Philosophy of Modern Cryptography. IACR Cryptol. ePrint Arch. 2023: 715 (2023) - 2022
- [j70]Zhen Zhao, Fuchun Guo, Ge Wu, Willy Susilo, Baocang Wang:
Secure Infectious Diseases Detection System With IoT-Based e-Health Platforms. IEEE Internet Things J. 9(22): 22595-22607 (2022) - [j69]Jianchang Lai, Fuchun Guo, Willy Susilo, Peng Jiang, Guomin Yang, Xinyi Huang:
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts. Inf. Sci. 613: 966-981 (2022) - [j68]Willy Susilo, Fuchun Guo, Zhen Zhao, Ge Wu:
PKE-MET: Public-Key Encryption With Multi-Ciphertext Equality Test in Cloud Computing. IEEE Trans. Cloud Comput. 10(2): 1476-1488 (2022) - [j67]Jianye Huang, Willy Susilo, Fuchun Guo, Ge Wu, Zhen Zhao, Qiong Huang:
An Anonymous Authentication System for Pay-As-You-Go Cloud Computing$^*$*. IEEE Trans. Dependable Secur. Comput. 19(2): 1280-1291 (2022) - [j66]Willy Susilo, Peng Jiang, Jianchang Lai, Fuchun Guo, Guomin Yang, Robert H. Deng:
Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers. IEEE Trans. Dependable Secur. Comput. 19(3): 2138-2148 (2022) - [j65]Jianchang Lai, Fuchun Guo, Willy Susilo, Xinyi Huang, Peng Jiang, Futai Zhang:
Data Access Control in Cloud Computing: Flexible and Receiver Extendable. IEEE Trans. Serv. Comput. 15(5): 2658-2670 (2022) - [c47]Khoa Nguyen, Fuchun Guo, Willy Susilo, Guomin Yang:
Multimodal Private Signatures. CRYPTO (2) 2022: 792-822 - [c46]Willy Susilo, Yannan Li, Fuchun Guo, Jianchang Lai, Ge Wu:
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost. ESORICS (2) 2022: 65-85 - [c45]Tuong Ngoc Nguyen, Anh The Ta, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Efficient Unique Ring Signatures from Lattices. ESORICS (2) 2022: 447-466 - [c44]Fuchun Guo, Willy Susilo:
Optimal Tightness for Chain-Based Unique Signatures. EUROCRYPT (2) 2022: 553-583 - [e6]Khoa Nguyen, Guomin Yang, Fuchun Guo, Willy Susilo:
Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings. Lecture Notes in Computer Science 13494, Springer 2022, ISBN 978-3-031-22300-6 [contents] - [e5]Willy Susilo, Xiaofeng Chen, Fuchun Guo, Yudi Zhang, Rolly Intan:
Information Security - 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings. Lecture Notes in Computer Science 13640, Springer 2022, ISBN 978-3-031-22389-1 [contents] - [e4]Chunpeng Ge, Fuchun Guo:
Provable and Practical Security - 16th International Conference, ProvSec 2022, Nanjing, China, November 11-12, 2022, Proceedings. Lecture Notes in Computer Science 13600, Springer 2022, ISBN 978-3-031-20916-1 [contents] - [i13]Fuchun Guo, Willy Susilo:
Optimal Tightness for Chain-Based Unique Signatures. IACR Cryptol. ePrint Arch. 2022: 526 (2022) - [i12]Khoa Nguyen, Fuchun Guo, Willy Susilo, Guomin Yang:
Multimodal Private Signatures. IACR Cryptol. ePrint Arch. 2022: 1008 (2022) - [i11]Tuong Ngoc Nguyen, Anh The Ta, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Efficient Unique Ring Signatures From Lattices. IACR Cryptol. ePrint Arch. 2022: 1070 (2022) - 2021
- [j64]Hua Shen, Mingwu Zhang, Hao Wang, Fuchun Guo, Willy Susilo:
Efficient and Privacy-Preserving Massive Data Processing for Smart Grids. IEEE Access 9: 70616-70627 (2021) - [j63]Hao Lin, Zhen Zhao, Fei Gao, Willy Susilo, Qiaoyan Wen, Fuchun Guo, Yijie Shi:
Lightweight Public Key Encryption With Equality Test Supporting Partial Authorization in Cloud Storage. Comput. J. 64(8): 1226-1238 (2021) - [j62]Hua Shen, Mingwu Zhang, Hao Wang, Fuchun Guo, Willy Susilo:
A cloud-aided privacy-preserving multi-dimensional data comparison protocol. Inf. Sci. 545: 739-752 (2021) - [j61]Jianchang Lai, Ge Wu, Peng Jiang, Zhen Zhao, Willy Susilo, Fuchun Guo:
Generic construction for tightly-secure signatures from discrete log. Theor. Comput. Sci. 888: 13-21 (2021) - [j60]Tong Wu, Guomin Yang, Yi Mu, Fuchun Guo, Robert H. Deng:
Privacy-Preserving Proof of Storage for the Pay-As-You-Go Business Model. IEEE Trans. Dependable Secur. Comput. 18(2): 563-575 (2021) - [j59]Peng Jiang, Fuchun Guo, Willy Susilo, Man Ho Au, Xinyi Huang, Joseph K. Liu:
Efficient and Adaptive Procurement Protocol with Purchasing Privacy. IEEE Trans. Serv. Comput. 14(3): 683-694 (2021) - [j58]Peng Jiang, Fuchun Guo, Willy Susilo, Man Ho Au, Jianchang Lai, Wenmin Li:
PPFilter: Provider Privacy-Aware Encrypted Filtering System. IEEE Trans. Serv. Comput. 14(5): 1519-1530 (2021) - 2020
- [j57]Leyou Zhang, Xiaoxu Gao, Fuchun Guo, Gongcheng Hu:
Improving the Leakage Rate of Ciphertext-Policy Attribute-Based Encryption for Cloud Computing. IEEE Access 8: 94033-94042 (2020) - [j56]Zhen Zhao, Ge Wu, Fuchun Guo, Willy Susilo, Yi Mu, Baocang Wang, Yupu Hu:
Black-Box Accountable Authority Identity-Based Revocation System. Comput. J. 63(4): 525-535 (2020) - [j55]Ge Wu, Zhen Zhao, Fuchun Guo, Willy Susilo, Futai Zhang:
On the General Construction of Tightly Secure Identity-Based Signature Schemes. Comput. J. 63(12): 1835-1848 (2020) - [j54]Peng Jiang, Fuchun Guo, Kaitai Liang, Jianchang Lai, Qiaoyan Wen:
Searchain: Blockchain-based private keyword search in decentralized storage. Future Gener. Comput. Syst. 107: 781-792 (2020) - [j53]Hua Shen, Mingwu Zhang, Hao Wang, Fuchun Guo, Willy Susilo:
A Lightweight Privacy-Preserving Fair Meeting Location Determination Scheme. IEEE Internet Things J. 7(4): 3083-3093 (2020) - [j52]Ge Wu, Futai Zhang, Limin Shen, Fuchun Guo, Willy Susilo:
Certificateless aggregate signature scheme secure against fully chosen-key attacks. Inf. Sci. 514: 288-301 (2020) - [j51]Zhen Zhao, Fuchun Guo, Jianchang Lai, Willy Susilo, Baocang Wang, Yupu Hu:
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts. Theor. Comput. Sci. 809: 73-87 (2020) - [c43]Jun Shen, Fuchun Guo, Xiaofeng Chen, Willy Susilo:
Secure Cloud Auditing with Efficient Ownership Transfer. ESORICS (1) 2020: 611-631 - [c42]Giang Linh Duc Nguyen, Willy Susilo, Dung Hoang Duong, Huy Quoc Le, Fuchun Guo:
Lattice-Based IBE with Equality Test Supporting Flexible Authorization in the Standard Model. INDOCRYPT 2020: 624-643 - [e3]Willy Susilo, Robert H. Deng, Fuchun Guo, Yannan Li, Rolly Intan:
Information Security - 23rd International Conference, ISC 2020, Bali, Indonesia, December 16-18, 2020, Proceedings. Lecture Notes in Computer Science 12472, Springer 2020, ISBN 978-3-030-62973-1 [contents] - [i10]Giang L. D. Nguyen, Willy Susilo, Dung Hoang Duong, Huy Quoc Le, Fuchun Guo:
Lattice-based IBE with Equality Test Supporting Flexible Authorization in the Standard Model. CoRR abs/2010.14077 (2020) - [i9]Jun Shen, Fuchun Guo, Xiaofeng Chen, Willy Susilo:
Secure Cloud Auditing with Efficient Ownership Transfer (Full Version). IACR Cryptol. ePrint Arch. 2020: 1468 (2020)
2010 – 2019
- 2019
- [j50]Zhen Zhao, Jianchang Lai, Willy Susilo, Baocang Wang, Yupu Hu, Fuchun Guo:
Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption. IEEE Access 7: 25936-25947 (2019) - [j49]Jinguang Han, Maoxuan Bei, Liqun Chen, Yang Xiang, Jie Cao, Fuchun Guo, Weizhi Meng:
Attribute-Based Information Flow Control. Comput. J. 62(8): 1214-1231 (2019) - [j48]Guomin Yang, Rongmao Chen, Yi Mu, Willy Susilo, Fuchun Guo, Jie Li:
Strongly leakage resilient authenticated key exchange, revisited. Des. Codes Cryptogr. 87(12): 2885-2911 (2019) - [j47]Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo, Futai Zhang:
Threshold privacy-preserving cloud auditing with multiple uploaders. Int. J. Inf. Sec. 18(3): 321-331 (2019) - [j46]Peng Jiang, Jianchang Lai, Fuchun Guo, Willy Susilo, Man Ho Au, Guomin Yang, Yi Mu, Rongmao Chen:
Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters. Inf. Sci. 472: 35-52 (2019) - [j45]Ge Wu, Fuchun Guo, Willy Susilo:
Generalized public-key cryptography with tight security. Inf. Sci. 504: 561-577 (2019) - [j44]Zhen Zhao, Ge Wu, Willy Susilo, Fuchun Guo, Baocang Wang, Yupu Hu:
Accountable identity-based encryption with distributed private key generators. Inf. Sci. 505: 352-366 (2019) - [j43]Ge Wu, Jianchang Lai, Fuchun Guo, Willy Susilo, Futai Zhang:
Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions. J. Comput. Sci. Technol. 34(6): 1366-1379 (2019) - [j42]Binrui Zhu, Willy Susilo, Jing Qin, Fuchun Guo, Zhen Zhao, Jixin Ma:
A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks. Sensors 19(11): 2583 (2019) - [j41]Peng Jiang, Fuchun Guo, Yi Mu:
Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems. Theor. Comput. Sci. 767: 51-72 (2019) - [j40]Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo, Futai Zhang:
Privacy-Preserving Certificateless Cloud Auditing with Multiple Users. Wirel. Pers. Commun. 106(3): 1161-1182 (2019) - [c41]Jongkil Kim, Willy Susilo, Fuchun Guo, Joonsang Baek, Nan Li:
A New Encoding Framework for Predicate Encryption with Non-linear Structures in Prime Order Groups. ACNS 2019: 406-425 - [e2]Julian Jang-Jaccard, Fuchun Guo:
Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings. Lecture Notes in Computer Science 11547, Springer 2019, ISBN 978-3-030-21547-7 [contents] - [e1]Fuchun Guo, Xinyi Huang, Moti Yung:
Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11449, Springer 2019, ISBN 978-3-030-14233-9 [contents] - [r1]Peng Jiang, Fuchun Guo, Willy Susilo, Jinguang Han:
Keyword Attacks and Privacy Preserving in Public-Key-Based Searchable Encryption. Encyclopedia of Big Data Technologies 2019 - [i8]Jongkil Kim, Willy Susilo, Fuchun Guo, Joonsang Baek, Nan Li:
A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups. IACR Cryptol. ePrint Arch. 2019: 1479 (2019) - 2018
- [b1]Fuchun Guo, Willy Susilo, Yi Mu:
Introduction to Security Reduction. Springer 2018, ISBN 978-3-319-93048-0, pp. 1-253 - [j39]Jianchang Lai, Yi Mu, Fuchun Guo, Peng Jiang, Sha Ma:
Identity-Based Broadcast Encryption for Inner Products. Comput. J. 61(8): 1240-1251 (2018) - [j38]Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au:
Functional encryption for computational hiding in prime order groups via pair encodings. Des. Codes Cryptogr. 86(1): 97-120 (2018) - [j37]Yinhao Jiang, Willy Susilo, Yi Mu, Fuchun Guo:
Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Gener. Comput. Syst. 78: 720-729 (2018) - [j36]Yinhao Jiang, Willy Susilo, Yi Mu, Fuchun Guo:
Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts. Int. J. Inf. Sec. 17(4): 463-475 (2018) - [j35]Yinhao Jiang, Willy Susilo, Yi Mu, Fuchun Guo:
Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes. Int. J. Inf. Sec. 17(5): 533-548 (2018) - [j34]Willy Susilo, Guomin Yang, Fuchun Guo, Qiong Huang:
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes. Inf. Sci. 429: 349-360 (2018) - [j33]Jianchang Lai, Yi Mu, Fuchun Guo, Peng Jiang, Willy Susilo:
Privacy-enhanced attribute-based private information retrieval. Inf. Sci. 454-455: 275-291 (2018) - [j32]Jianchang Lai, Yi Mu, Fuchun Guo, Rongmao Chen, Sha Ma:
Efficient k-out-of-n oblivious transfer scheme with the ideal communication cost. Theor. Comput. Sci. 714: 15-26 (2018) - 2017
- [j31]Jianchang Lai, Yi Mu, Fuchun Guo, Rongmao Chen:
Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization. Comput. J. 60(12): 1809-1821 (2017) - [j30]Peng Jiang, Yi Mu, Fuchun Guo, Qiaoyan Wen:
Secure-channel free keyword search with authorization in manager-centric databases. Comput. Secur. 69: 50-64 (2017) - [j29]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo:
Strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptogr. 85(1): 145-173 (2017) - [j28]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Zheng Yang:
A note on the strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptogr. 85(1): 175-178 (2017) - [j27]Jianchang Lai, Yi Mu, Fuchun Guo:
Efficient identity-based online/offline encryption and signcryption with short ciphertext. Int. J. Inf. Sec. 16(3): 299-311 (2017) - [j26]Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Fuchun Guo, Qiong Huang:
Sequence aware functional encryption and its application in searchable encryption. J. Inf. Secur. Appl. 35: 106-118 (2017) - [j25]Peng Jiang, Yi Mu, Fuchun Guo, Qiao-Yan Wen:
Private Keyword-Search for Database Systems Against Insider Attacks. J. Comput. Sci. Technol. 32(3): 599-617 (2017) - [j24]Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo, Rongmao Chen:
Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city. Pers. Ubiquitous Comput. 21(5): 855-868 (2017) - [j23]Fuchun Guo, Yi Mu, Willy Susilo, Homer Hsing, Duncan S. Wong, Vijay Varadharajan:
Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices. IEEE Trans. Dependable Secur. Comput. 14(2): 211-220 (2017) - [j22]Willy Susilo, Peng Jiang, Fuchun Guo, Guomin Yang, Yong Yu, Yi Mu:
EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud. IEEE Trans. Inf. Forensics Secur. 12(12): 3110-3122 (2017) - [j21]Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan:
Privacy-Preserving Mutual Authentication in RFID with Designated Readers. Wirel. Pers. Commun. 96(3): 4819-4845 (2017) - [c40]Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au, Surya Nepal:
An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption. AsiaCCS 2017: 823-834 - [c39]Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu:
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample. CRYPTO (2) 2017: 517-547 - [c38]Nan Li, Fuchun Guo, Yi Mu, Willy Susilo, Surya Nepal:
Fuzzy Extractors for Biometric Identification. ICDCS 2017: 667-677 - [i7]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo:
Strong Authenticated Key Exchange with Auxiliary Inputs. IACR Cryptol. ePrint Arch. 2017: 418 (2017) - [i6]Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu:
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample. IACR Cryptol. ePrint Arch. 2017: 499 (2017) - 2016
- [j20]Peng Jiang, Yi Mu, Fuchun Guo, Xiaofen Wang, Qiaoyan Wen:
Online/Offline Ciphertext Retrieval on Resource Constrained Devices. Comput. J. 59(7): 955-969 (2016) - [j19]Fuchun Guo, Willy Susilo, Yi Mu:
Generalized closest substring encryption. Des. Codes Cryptogr. 80(1): 103-124 (2016) - [j18]Peng Jiang, Yi Mu, Fuchun Guo, Xiaofen Wang, Jianchang Lai:
Centralized keyword search on encrypted data for cloud applications. Secur. Commun. Networks 9(18): 5064-5084 (2016) - [j17]Yimin Wang, Hong Zhong, Yan Xu, Jie Cui, Fuchun Guo:
Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs. Secur. Commun. Networks 9(18): 5460-5471 (2016) - [j16]Willy Susilo, Fuchun Guo, Yi Mu:
Efficient dynamic threshold identity-based encryption with constant-size ciphertext. Theor. Comput. Sci. 609: 49-59 (2016) - [j15]Fuchun Guo, Willy Susilo, Yi Mu:
Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption. IEEE Trans. Inf. Forensics Secur. 11(2): 247-257 (2016) - [j14]Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xiaofen Wang:
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage. IEEE Trans. Inf. Forensics Secur. 11(4): 789-798 (2016) - [j13]Kaitai Liang, Xinyi Huang, Fuchun Guo, Joseph K. Liu:
Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data. IEEE Trans. Inf. Forensics Secur. 11(10): 2365-2376 (2016) - [j12]Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xinyi Huang, Xiaofen Wang, Yongjun Wang:
Server-Aided Public Key Encryption With Keyword Search. IEEE Trans. Inf. Forensics Secur. 11(12): 2833-2842 (2016) - [c37]Rongmao Chen, Yi Mu, Willy Susilo, Guomin Yang, Fuchun Guo, Mingwu Zhang:
One-Round Strong Oblivious Signature-Based Envelope. ACISP (2) 2016: 3-20 - [c36]Peng Jiang, Yi Mu, Fuchun Guo, Qiaoyan Wen:
Public Key Encryption with Authorized Keyword Search. ACISP (2) 2016: 170-186 - [c35]Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo, Rongmao Chen:
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing. ACISP (2) 2016: 223-239 - [c34]Yinhao Jiang, Willy Susilo, Yi Mu, Fuchun Guo:
Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance. ACISP (1) 2016: 477-494 - [c33]Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang:
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction. ASIACRYPT (2) 2016: 745-776 - [c32]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang:
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. ASIACRYPT (1) 2016: 844-876 - [c31]Willy Susilo, Rongmao Chen, Fuchun Guo, Guomin Yang, Yi Mu, Yang-Wai Chow:
Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext. AsiaCCS 2016: 201-210 - [c30]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo:
Strongly Leakage-Resilient Authenticated Key Exchange. CT-RSA 2016: 19-36 - [c29]Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo:
Privacy-Preserving Cloud Auditing with Multiple Uploaders. ISPEC 2016: 224-237 - [c28]Yinhao Jiang, Willy Susilo, Yi Mu, Fuchun Guo:
Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update. ProvSec 2016: 39-60 - [c27]Peng Jiang, Xiaofen Wang, Jianchang Lai, Fuchun Guo, Rongmao Chen:
Oblivious Keyword Search with Authorization. ProvSec 2016: 173-190 - [c26]Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au:
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups. SCN 2016: 3-22 - [i5]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo:
Strongly Leakage-Resilient Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2016: 308 (2016) - [i4]Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au:
A Tag Based Encoding: An Efficient Encoding for Predicate Encoding in Prime Order Groups. IACR Cryptol. ePrint Arch. 2016: 655 (2016) - [i3]Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang:
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction. IACR Cryptol. ePrint Arch. 2016: 872 (2016) - [i2]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang:
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. IACR Cryptol. ePrint Arch. 2016: 873 (2016) - [i1]Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au:
Functional Encryption for Computational Hiding in Prime Order Groups via Pair Encodings. IACR Cryptol. ePrint Arch. 2016: 949 (2016) - 2015
- [j11]Nan Li, Yi Mu, Willy Susilo, Fuchun Guo, Vijay Varadharajan:
Vulnerabilities of an ECC-based RFID authentication scheme. Secur. Commun. Networks 8(17): 3262-3270 (2015) - [j10]Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo:
BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication. IEEE Trans. Inf. Forensics Secur. 10(12): 2643-2652 (2015) - [c25]Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xiaofen Wang:
A New General Framework for Secure Public Key Encryption with Keyword Search. ACISP 2015: 59-76 - [c24]Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo:
Improved Identity-Based Online/Offline Encryption. ACISP 2015: 160-173 - 2014
- [j9]Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan:
Server-Aided Signature Verification for Lightweight Devices. Comput. J. 57(4): 481-493 (2014) - [j8]Jennifer Seberry, Yi Mu, Fuchun Guo, Tim Wellsmore:
Efficient authentication and integrity protection for the border gateway protocol. Int. J. Secur. Networks 9(4): 234-243 (2014) - [j7]Fuchun Guo, Yi Mu, Willy Susilo, Duncan S. Wong, Vijay Varadharajan:
CP-ABE With Constant-Size Keys for Lightweight Devices. IEEE Trans. Inf. Forensics Secur. 9(5): 763-771 (2014) - [j6]Fuchun Guo, Yi Mu, Willy Susilo:
Subset Membership Encryption and Its Applications to Oblivious Transfer. IEEE Trans. Inf. Forensics Secur. 9(7): 1098-1107 (2014) - [c23]Fuchun Guo, Willy Susilo, Yi Mu:
POSTER: Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption. CCS 2014: 1430-1432 - [c22]Kefeng Wang, Yi Mu, Willy Susilo, Fuchun Guo:
Attribute-Based Signature with Message Recovery. ISPEC 2014: 433-447 - [c21]Nan Li, Yi Mu, Willy Susilo, Fuchun Guo, Vijay Varadharajan:
Privacy-Preserving Authorized RFID Authentication Protocols. RFIDSec 2014: 108-122 - 2013
- [j5]Hui Cui, Yi Mu, Fuchun Guo:
Server-aided identity-based anonymous broadcast encryption. Int. J. Secur. Networks 8(1): 29-39 (2013) - [j4]Jorge Munilla, Fuchun Guo, Willy Susilo:
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme. Wirel. Pers. Commun. 72(1): 245-258 (2013) - [c20]Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan:
Membership Encryption and Its Applications. ACISP 2013: 219-234 - [c19]Nan Li, Yi Mu, Willy Susilo, Fuchun Guo, Vijay Varadharajan:
On RFID Authentication Protocols with Wide-Strong Privacy. RFIDSec Asia 2013: 3-16 - 2012
- [j3]Fuchun Guo, Yi Mu, Willy Susilo:
Efficient and secure stored-value cards with leakage resilience. Comput. Electr. Eng. 38(2): 370-380 (2012) - [c18]Fuchun Guo, Yi Mu, Willy Susilo:
Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext. ESORICS 2012: 609-626 - [c17]Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan:
A Pre-computable Signature Scheme with Efficient Verification for RFID. ISPEC 2012: 1-16 - 2011
- [j2]Fuchun Guo, Yi Mu, Willy Susilo:
Short Signatures with a Tighter Security Reduction Without Random Oracles. Comput. J. 54(4): 513-524 (2011) - [j1]Fuchun Guo, Yi Mu, Willy Susilo:
Improving security of q-SDH based digital signatures. J. Syst. Softw. 84(10): 1783-1790 (2011) - [c16]Nan Li, Yi Mu, Willy Susilo, Fuchun Guo:
Self-certified ring signatures. AsiaCCS 2011: 396-400 - 2010
- [c15]Yilian Zhang, Zhide Chen, Fuchun Guo:
Online/Offline Verification of Short Signatures. Inscrypt 2010: 350-358 - [c14]Fuchun Guo, Yi Mu, Willy Susilo:
Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase. Inscrypt 2010: 455-470
2000 – 2009
- 2009
- [c13]Fuchun Guo, Yi Mu, Willy Susilo:
How to Prove Security of a Signature with a Tighter Security Reduction. ProvSec 2009: 90-103 - 2008
- [c12]Fuchun Guo, Yi Mu, Zhide Chen:
Identity-Based Online/Offline Encryption. Financial Cryptography 2008: 247-261 - [c11]Zhongren Liu, Li Xu, Zhide Chen, Yi Mu, Fuchun Guo:
Hierarchical Identity-Based Online/Offline Encryption. ICYCS 2008: 2115-2119 - [c10]Zhao-Hui Tang, Li Xu, Zhide Chen, Fuchun Guo:
On the Security of WAI Protocol in the Third Version of WAPI. IIH-MSP 2008: 516-519 - [c9]Fuchun Guo, Yi Mu, Zhide Chen:
Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles. IWSEC 2008: 49-63 - [c8]Fuchun Guo, Yi Mu:
Optimal Online/Offline Signature: How to Sign a Message without Online Computation. ProvSec 2008: 98-111 - 2007
- [c7]Fuchun Guo, Yi Mu, Zhide Chen:
Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles. CANS 2007: 1-14 - [c6]Fuchun Guo, Yi Mu, Zhide Chen, Li Xu:
Multi-Identity Single-Key Decryption without Random Oracles. Inscrypt 2007: 384-398 - [c5]Zhongsheng Wu, Zhide Chen, Li Xu, Fuchun Guo:
Routing Protocols Based on Double Auction for Ad Hoc Networks. IEEE NAS 2007: 55-61 - [c4]Fuchun Guo, Yi Mu, Zhide Chen:
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. Pairing 2007: 392-406 - [c3]Zhongsheng Wu, Zhide Chen, Fuchun Guo, Li Xu:
Identity Based Private Matching. SECPerU 2007: 85-90 - [c2]Zhongren Liu, Li Xu, Zhide Chen, Fuchun Guo:
Private Key Management in Hierarchical Identity-Based Encryption. SITIS 2007: 206-212 - 2006
- [c1]Fuchun Guo, Zhide Chen, Yi Mu, Li Xu, Shengyuan Zhang:
Secure and Efficient Trust Negotiation. CIS 2006: 374-384
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint