default search action
Raylin Tso
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j45]Zi-Yuan Liu, Masahiro Mambo, Raylin Tso, Yi-Fan Tseng:
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems. Comput. Stand. Interfaces 89: 103817 (2024) - [j44]Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso:
Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives. Des. Codes Cryptogr. 92(6): 1477-1500 (2024) - [c74]Hao-Yi Hsu, Hsin-Yi Lin, Raylin Tso, Tao-Hsiang Chang, Jen-Chieh Hsu:
Cryptanalysis of PiLike: An Impersonation Attack on the Lightweight Identity-Based Authenticated Key Exchange Protocol Using Bi-ISIS. AsiaJCIS 2024: 9-16 - [c73]Yi-Fan Tseng, Raylin Tso, Shi-Sheng Sun, Zi-Yuan Liu, You-Qian Chen:
ID-Based Traitor Tracing with Relaxed Black-Box Setting for Group-Based Applications. AsiaJCIS 2024: 33-39 - 2023
- [j43]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso:
Cryptanalysis of a round optimal lattice-based multisignature scheme. Inf. Process. Lett. 182: 106364 (2023) - [i18]Zi-Yuan Liu, Raylin Tso:
Comments on "Dynamic Consensus Committee-Based for Secure Data Sharing With Authorized Multi-Receiver Searchable Encryption". CoRR abs/2311.08813 (2023) - 2022
- [j42]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Public-Key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-Resistant Instantiation. Comput. J. 65(10): 2828-2844 (2022) - [j41]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Quantum-resistant anonymous identity-based encryption with trable identities. IET Inf. Secur. 16(2): 111-126 (2022) - [j40]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Peter Shaojui Wang, Qin-Wen Su:
Extension of elliptic curve Qu-Vanstone certificates and their applications. J. Inf. Secur. Appl. 67: 103176 (2022) - [j39]Cheng-Yi Lee, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng:
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT. J. Syst. Archit. 130: 102642 (2022) - [j38]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Yu-Chi Chen, Masahiro Mambo:
Identity-Certifying Authority-Aided Identity-Based Searchable Encryption Framework in Cloud Systems. IEEE Syst. J. 16(3): 4629-4640 (2022) - [c72]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation. AsiaCCS 2022: 423-436 - [c71]Yi-Fan Tseng, Hao-Yu Yang, Chieh-Han Wu, Tsung-Yu Chien, Raylin Tso, Zi-Yuan Liu, Jen-Chieh Hsu:
Cryptanalysis to Ming et al.'s Revocable Multi-Authority Attribute-Based Encryption. AsiaJCIS 2022: 29-32 - [c70]Yong Ding, Ryoichi Isawa, Raylin Tso, Jun Lee:
Message from the Program Co-Chairs: AsiaJCIS 2022. AsiaJCIS 2022: viii - [c69]Zi-Yuan Liu, Chu-Chieh Chien, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo:
Public Key Encryption with Hierarchical Authorized Keyword Search. ICISC 2022: 147-170 - [c68]Yi-Hsiu Lee, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng:
Blockchain-Based Self-Sovereign Identity System with Attribute-Based Issuance. ISPEC 2022: 21-38 - [c67]Yu-Chen Liao, Raylin Tso, Zi-Yuan Liu, Yi-Fan Tseng:
Blockchain-Based Confidential Payment System with Controllable Regulation. ISPEC 2022: 39-56 - [c66]Jing-Shiuan You, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng, Masahiro Mambo:
Quantum-Resistant 1-out-of-N Oblivious Signatures from Lattices. IWSEC 2022: 166-186 - 2021
- [j37]Yu-Chi Chen, Xin Xie, Hung-Yu Tsao, Raylin Tso:
Public key encryption with filtered equality test revisited. Des. Codes Cryptogr. 89(10): 2357-2372 (2021) - [j36]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo:
Designated-ciphertext searchable encryption. J. Inf. Secur. Appl. 58: 102709 (2021) - [j35]Yi-Fan Tseng, Zi-Yuan Liu, Jen-Chieh Hsu, Raylin Tso:
Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function. Secur. Commun. Networks 2021: 6678194:1-6678194:12 (2021) - [j34]Tsu-Yang Wu, Zhiyuan Lee, Lei Yang, Jia-Ning Luo, Raylin Tso:
Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks. J. Supercomput. 77(7): 6992-7020 (2021) - [c65]Chih-Chen Yang, Raylin Tso, Zi-Yuan Liu, Jen-Chieh Hsu, Yi-Fan Tseng:
Improved Proxy Re-encryption Scheme with Equality Test. AsiaJCIS 2021: 37-44 - [c64]Hongxun Huang, Zi-Yuan Liu, Raylin Tso:
Partially Blind ECDSA Scheme and Its Application to Bitcoin. DSC 2021: 1-8 - [c63]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso:
Cryptanalysis on 'An efficient identity-based proxy signcryption using lattice'. ISPACS 2021: 1-2 - [i17]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Cheng-Yi Lee:
Notes on a lattice-based proxy-oriented identity-based encryption with keyword search. IACR Cryptol. ePrint Arch. 2021: 7 (2021) - [i16]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Quantum-resistant Anonymous IBE with Traceable Identities. IACR Cryptol. ePrint Arch. 2021: 33 (2021) - [i15]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Yu-Chi Chen, Masahiro Mambo:
Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud System. IACR Cryptol. ePrint Arch. 2021: 337 (2021) - [i14]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso:
Cryptanalysis on 'An efficient identity-based proxy signcryption using lattice'. IACR Cryptol. ePrint Arch. 2021: 359 (2021) - [i13]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation. IACR Cryptol. ePrint Arch. 2021: 1008 (2021) - 2020
- [j33]Raylin Tso, Kaibin Huang, Yu-Chi Chen, Sk. Md. Mizanur Rahman, Tsu-Yang Wu:
Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing. IEEE Access 8: 152551-152564 (2020) - [j32]Da-Yu Kao, Shou-Ching Hsiao, Raylin Tso:
Intelligence-led response: turning theory into law enforcement practice in cyber security incidents. Int. J. Electron. Bus. 15(4): 325-350 (2020) - [j31]Shou-Ching Hsiao, Zi-Yuan Liu, Raylin Tso, Da-Yu Kao, Chien-Ming Chen:
PrivGRU: Privacy-preserving GRU inference using additive secret sharing. J. Intell. Fuzzy Syst. 38(5): 5627-5638 (2020) - [j30]Huawang Qin, Wallace K. S. Tang, Raylin Tso:
Quantum (t, n) threshold group signature based on Bell state. Quantum Inf. Process. 19(2): 71 (2020) - [c62]Zi-Yuan Liu, Peter Shaojui Wang, Shou-Ching Hsiao, Raylin Tso:
Defense against N-pixel Attacks based on Image Reconstruction. SBC@AsiaCCS 2020: 3-7 - [c61]Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso:
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism. AsiaJCIS 2020: 1-8 - [c60]Hsiang-Chen Hsu, Zi-Yuan Liu, Raylin Tso, Kung Chen:
Multi-value Private Information Retrieval using Homomorphic Encryption. AsiaJCIS 2020: 82-88 - [c59]Peter Shaojui Wang, Pin-Yen Huang, Yu-An Tsai, Raylin Tso:
An Enhanced Mondrian Anonymization Model based on Self-Organizing Map. AsiaJCIS 2020: 97-100 - [c58]Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso:
Practical Predicate Encryption for Inner Product. ICETE (2) 2020: 553-558 - [i12]Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso:
Practical Predicate Encryption for Inner Product. IACR Cryptol. ePrint Arch. 2020: 270 (2020) - [i11]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso:
Cryptanalysis of "FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things". IACR Cryptol. ePrint Arch. 2020: 651 (2020) - [i10]Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso:
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism. IACR Cryptol. ePrint Arch. 2020: 713 (2020) - [i9]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo:
Quantum-resistant Public-key Authenticated Encryption with Keyword Search for Industrial Internet of Things. IACR Cryptol. ePrint Arch. 2020: 955 (2020) - [i8]Shou-Ching Hsiao, Zi-Yuan Liu, Raylin Tso:
A Study on Privacy-Preserving GRU Inference Framework. IACR Cryptol. ePrint Arch. 2020: 1013 (2020) - [i7]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso:
Cryptanalysis of a round optimal lattice-based multisignature scheme. IACR Cryptol. ePrint Arch. 2020: 1172 (2020)
2010 – 2019
- 2019
- [j29]Raylin Tso, Zi-Yuan Liu, Yi-Fan Tseng:
Identity-Based Blind Multisignature From Lattices. IEEE Access 7: 182916-182923 (2019) - [j28]Yu-Chi Chen, Xin Xie, Peter Shaojui Wang, Raylin Tso:
Witness-based searchable encryption with optimal overhead for cloud-edge computing. Future Gener. Comput. Syst. 100: 715-723 (2019) - [j27]Raylin Tso:
Two-in-one oblivious signatures. Future Gener. Comput. Syst. 101: 467-475 (2019) - [j26]Huawang Qin, Raylin Tso, Yuewei Dai:
Quantum secret sharing by using Fourier transform on orbital angular momentum. IET Inf. Secur. 13(2): 104-108 (2019) - [j25]Huawang Qin, Wallace K. S. Tang, Raylin Tso:
Efficient quantum multi-proxy signature. Quantum Inf. Process. 18(2): 53 (2019) - [c57]Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng, Masahiro Mambo:
Signcryption from NTRU Lattices Without Random Oracles. AsiaJCIS 2019: 134-141 - [c56]Ya Che Tsai, Raylin Tso, Zi-Yuan Liu, Kung Chen:
An Improved Non-Interactive Zero-Knowledge Range Proof for Decentralized Applications. DAPPCON 2019: 129-134 - [c55]Yunmin He, Yu-Chi Chen, Zhong-Yi Guo, Raylin Tso, Shaozhen Ye:
SCDP: Smart Contract-based Decentralized Privacy System for Securing Data Ownership Management. GCCE 2019: 881-882 - [c54]Da-Yu Kao, Shou-Ching Hsiao, Raylin Tso:
Analyzing WannaCry Ransomware Considering the Weapons and Exploits. ICACT 2019: 1098-1107 - [c53]Shou-Ching Hsiao, Da-Yu Kao, Zi-Yuan Liu, Raylin Tso:
Malware Image Classification Using One-Shot Learning with Siamese Networks. KES 2019: 1863-1871 - [i6]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso:
Quantum-resistant Designated-ciphertext Searchable Encryption. IACR Cryptol. ePrint Arch. 2019: 1418 (2019) - 2018
- [j24]Dan Yang, Yu-Chi Chen, Shaozhen Ye, Raylin Tso:
Privacy-Preserving Outsourced Similarity Test for Access Over Encrypted Data in the Cloud. IEEE Access 6: 63624-63634 (2018) - [j23]Huawang Qin, Raylin Tso:
High-capacity quantum secret sharing based on orbital angular momentum. Quantum Inf. Comput. 18(7&8): 579-591 (2018) - [j22]Huawang Qin, Raylin Tso, Yuewei Dai:
Multi-dimensional quantum state sharing based on quantum Fourier transform. Quantum Inf. Process. 17(3): 48 (2018) - [j21]Huawang Qin, Raylin Tso:
Threshold quantum state sharing based on entanglement swapping. Quantum Inf. Process. 17(6): 142 (2018) - [j20]Huawang Qin, Wallace K. S. Tang, Raylin Tso:
Establishing rational networking using the DL04 quantum secure direct communication protocol. Quantum Inf. Process. 17(6): 152 (2018) - [j19]Raylin Tso:
Untraceable and Anonymous Mobile Payment Scheme Based on Near Field Communication. Symmetry 10(12): 685 (2018) - [j18]Li Xu, Chi-Yao Weng, Lun-Pin Yuan, Mu-En Wu, Raylin Tso, Hung-Min Sun:
A shareable keyword search over encrypted data in cloud computing. J. Supercomput. 74(3): 1001-1023 (2018) - [c52]Jen-Chieh Hsu, Raylin Tso, Yu-Chi Chen, Mu-En Wu:
Oblivious Transfer Protocols Based on Commutative Encryption. NTMS 2018: 1-5 - [c51]Zi-Yuan Liu, Jen-Chieh Hsu, Raylin Tso, Tzong-Chen Wu:
Policy-Controlled Signature from NTRU Lattice. NTMS 2018: 1-5 - [i5]Takeshi Okamoto, Raylin Tso, Michitomo Yamaguchi, Eiji Okamoto:
A k-out-of-n Ring Signature with Flexible Participation for Signers. IACR Cryptol. ePrint Arch. 2018: 728 (2018) - 2017
- [j17]Kaibin Huang, Raylin Tso, Yu-Chi Chen:
Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption. J. Comput. Syst. Sci. 89: 400-409 (2017) - [j16]Raylin Tso, Abdulhameed Alelaiwi, Sk. Md. Mizanur Rahman, Mu-En Wu, M. Shamim Hossain:
Privacy-Preserving Data Communication Through Secure Multi-Party Computation in Healthcare Sensor Cloud. J. Signal Process. Syst. 89(1): 51-59 (2017) - [c50]Raylin Tso, Chen-Yi Lin:
An Off-Line Mobile Payment Protocol Providing Double-Spending Detection. AINA Workshops 2017: 570-575 - [c49]Jen-Ho Hsiao, Raylin Tso, Chien-Ming Chen, Mu-En Wu:
Decentralized E-Voting Systems Based on the Blockchain Technology. CSA/CUTE 2017: 305-309 - [c48]Kun-Tai Chan, Raylin Tso, Chien-Ming Chen, Mu-En Wu:
Reputation-Based Trust Evaluation Mechanism for Decentralized Environments and Its Applications Based on Smart Contracts. CSA/CUTE 2017: 310-314 - [c47]Yi-Siou Jheng, Raylin Tso, Chien-Ming Chen, Mu-En Wu:
Password-Based Authenticated Key Exchange from Lattices for Client/Server Model. CSA/CUTE 2017: 315-319 - [c46]Raylin Tso, Ying Miao:
A Survey of Secret Sharing Schemes Based on Latin Squares. IIH-MSP (2) 2017: 267-272 - [c45]Kai-Chi Chang, Raylin Tso, Min-Chun Tsai:
IoT sandbox: to analysis IoT malware Zollard. ICC 2017: 4:1-4:8 - [c44]Kaibin Huang, Raylin Tso:
Provable secure dual-server public key encryption with keyword search. IVSW 2017: 39-44 - 2016
- [c43]Raylin Tso, Yi-Shio Jheng:
Security analysis of a NTRU-based mutual authentication scheme. APNOMS 2016: 1-3 - [c42]Shang-Wen Chen, Raylin Tso:
NFC-based Mobile Payment Protocol with User Anonymity. AsiaJCIS 2016: 24-30 - [c41]Raylin Tso:
Two-in-One Oblivious Signatures Secure in the Random Oracle Model. NSS 2016: 143-155 - 2015
- [j15]Kaibin Huang, Raylin Tso, Yu-Chi Chen, Sk. Md. Mizanur Rahman, Ahmad Almogren, Atif Alamri:
PKE-AET: Public Key Encryption with Authorized Equality Test. Comput. J. 58(10): 2686-2697 (2015) - [j14]Yu-Chi Chen, Raylin Tso, Gwoboa Horng, Chun-I Fan, Ruei-Hau Hsu:
Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of two Schemes. J. Inf. Sci. Eng. 31(1): 297-314 (2015) - [j13]Chien-Ming Chen, Tsu-Yang Wu, Raylin Tso, Masahiro Mambo, Mu-En Wu:
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks. J. Univers. Comput. Sci. 21(3): 406-418 (2015) - [j12]Yu-Chi Chen, Raylin Tso, Masahiro Mambo, Kaibin Huang, Gwoboa Horng:
Certificateless aggregate signature with efficient verification. Secur. Commun. Networks 8(13): 2232-2243 (2015) - [c40]Mu-En Wu, Hui-Huang Tsai, Raylin Tso, Chi-Yao Weng:
An Adaptive Kelly Betting Strategy for Finite Repeated Games. ICGEC (2) 2015: 39-46 - [c39]Jeng-Shyang Pan, Raylin Tso, Mu-En Wu, Chien-Ming Chen:
Security Analysis of an Anonymous Authentication Scheme Based on Smart Cards and Biometrics for Multi-server Environments. ICGEC (2) 2015: 59-69 - [c38]Kaibin Huang, Yu-Chi Chen, Raylin Tso:
Semantic Secure Public Key Encryption with Filtered Equality Test - PKE-FET. SECRYPT 2015: 327-334 - [c37]Mu-En Wu, Chia-Hung Wang, Wei-Ho Chung, Raylin Tso, I-Hsuan Yang:
An Empirical Comparison between Kelly Criterion and Vince's Optimal F. SmartCity 2015: 806-810 - 2014
- [j11]Mu-En Wu, Raylin Tso, Hung-Min Sun:
On the improvement of Fermat factorization using a continued fraction technique. Future Gener. Comput. Syst. 30: 162-168 (2014) - [j10]Cheonshik Kim, Dongkyoo Shin, Dongil Shin, Raylin Tso, Ching-Nung Yang:
A secret sharing scheme for EBTC using steganography. J. Intell. Manuf. 25(2): 241-249 (2014) - [c36]Chun-Wei Lin, Wensheng Gan, Tzung-Pei Hong, Raylin Tso:
An Incremental Algorithm for Maintaining the Built FUSP Trees Based on the Pre-large Concepts. ECC (1) 2014: 135-144 - [c35]Bing-Zhe He, Kuan-Ling Huang, Hung-Min Sun, Raylin Tso:
A Virtual Network Guard System Based on Cloud Computing Environments. ICGEC 2014: 361-370 - [c34]Chien-Ming Chen, Jeng-Shyang Pan, Raylin Tso, Szu-Wei Huang, Mu-En Wu:
Pitfalls in an Ultra-Lightweight Authentication Protocol for Low-Cost RFID. IIH-MSP 2014: 634-637 - [c33]Kuo-Chang Chen, Yu-Chi Chen, Gwoboa Horng, Raylin Tso:
Efficient public key encryption with user-friendly keywords search for searchable cloud storage. ICS 2014: 724-733 - [c32]Yu-Chi Chen, Kunhan Lu, Raylin Tso, Mu-En Wu:
An Improved Visual Cryptography with Cheating Prevention. IWDW 2014: 444-454 - [c31]Chien-Ming Chen, Tsu-Yang Wu, Raylin Tso, Mu-En Wu:
Security Analysis and Improvement of Femtocell Access Control. NSS 2014: 223-232 - [c30]Kaibin Huang, Raylin Tso, Yu-Chi Chen, Wangyu Li, Hung-Min Sun:
A New Public Key Encryption with Equality Test. NSS 2014: 550-557 - [c29]Raylin Tso, Chien-Ming Chen, Xinying Zheng, Mu-En Wu:
A New Ultra-Lightweight RFID Authentication Protocol Based on Physical Unclonable Functions. RFIDSec Asia 2014: 17-28 - 2013
- [j9]Raylin Tso:
A new way to generate a ring: Universal ring signature. Comput. Math. Appl. 65(9): 1350-1359 (2013) - [j8]Yu-Chi Chen, Raylin Tso, Gwoboa Horng:
Security Analysis of Choi et al.'s Certificateless Short Signature Scheme. J. Inf. Hiding Multim. Signal Process. 4(3): 147-154 (2013) - [j7]Raylin Tso:
Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol. J. Supercomput. 66(2): 863-874 (2013) - [c28]Chung-Nan Chen, Raylin Tso, Chung-Huang Yang:
Design and Implementation of Digital Forensic Software for iPhone. AsiaJCIS 2013: 90-95 - [i4]Yu-Chi Chen, Raylin Tso, Willy Susilo, Xinyi Huang, Gwoboa Horng:
Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes. IACR Cryptol. ePrint Arch. 2013: 193 (2013) - 2012
- [j6]Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto:
A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adverssaries. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(1/2): 30-54 (2012) - [j5]Raylin Tso, Xinyi Huang, Willy Susilo:
Strongly secure certificateless short signatures. J. Syst. Softw. 85(6): 1409-1417 (2012) - [j4]Raylin Tso:
Convertible ring signatures with gradual revelation of non-signers. Secur. Commun. Networks 5(3): 279-286 (2012) - [c27]Kaibin Huang, Raylin Tso:
Security Analysis Concerning the Random Numbers of Threshold Ring Signatures. ITNG 2012: 386-391 - [c26]Mu-En Wu, Raylin Tso, Hung-Min Sun:
Cryptanalysis of Exhaustive Search on Attacking RSA. NSS 2012: 373-379 - [c25]Mu-En Wu, Raylin Tso, Hung-Min Sun:
On the Improvement of Fermat Factorization. NSS 2012: 380-391 - [c24]Xun Yi, Raylin Tso, Eiji Okamoto:
Identity-based Password-Authenticated Key Exchange for Client/Server Model. SECRYPT 2012: 45-54 - 2011
- [j3]Raylin Tso, Xun Yi, Xinyi Huang:
Efficient and short certificateless signatures secure against realistic adversaries. J. Supercomput. 55(2): 173-191 (2011) - [c23]Shih-Fong Ciou, Raylin Tso:
A Privacy Preserved Two-Party Equality Testing Protocol. ICGEC 2011: 220-223 - [c22]Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto:
Certificateless Ordered Sequential Aggregate Signature Scheme. INCoS 2011: 662-667 - [c21]Xun Yi, Raylin Tso, Eiji Okamoto:
Three-party Password-authenticated Key Exchange without Random Oracles. SECRYPT 2011: 15-24 - 2010
- [c20]Raylin Tso, Xun Yi, Tadahiko Ito, Takeshi Okamoto, Eiji Okamoto:
Design and Analysis of "Flexible" k-out-of-n Signatures. ATC 2010: 255-267 - [c19]Raylin Tso, Xun Yi:
Certificateless Proxy Signature and Its Extension to Blind Signature. NSS 2010: 542-547
2000 – 2009
- 2009
- [c18]Raylin Tso, Takeshi Okamoto, Eiji Okamoto:
Efficient Short Signatures from Pairing. ITNG 2009: 417-422 - [c17]Xun Yi, Raylin Tso, Eiji Okamoto:
ID-Based Group Password-Authenticated Key Exchange. IWSEC 2009: 192-211 - 2008
- [c16]Raylin Tso:
Signcryption Scheme with Standardized Verification Algorithm. APSCC 2008: 1369-1374 - [c15]Atsushi Koide, Raylin Tso, Takeshi Okamoto, Eiji Okamoto:
A Restricted Undeniable Designated Verifier Signature. APSCC 2008: 1375-1380 - [c14]Raylin Tso, Xun Yi, Xinyi Huang:
Efficient and Short Certificateless Signature. CANS 2008: 64-79 - [c13]Atsushi Koide, Raylin Tso, Eiji Okamoto:
A Sanitizing Signature Scheme with Indexing. EUC (2) 2008: 16-21 - [c12]Atsushi Koide, Raylin Tso, Eiji Okamoto:
Convertible Undeniable Partially Blind Signature from Bilinear Pairings. EUC (2) 2008: 77-82 - [c11]Raylin Tso, Xun Yi, Takeshi Okamoto, Eiji Okamoto:
Efficient convertible Limited Verifier Signatures. ISIT 2008: 230-234 - [c10]Raylin Tso, Takeshi Okamoto, Eiji Okamoto:
1-out-of-. ISPEC 2008: 45-55 - 2007
- [c9]Raylin Tso, Xun Yi, Eiji Okamoto:
ID-Based Key Agreement for Dynamic Peer Groups in Mobile Computing Environments. APSCC 2007: 103-110 - [c8]Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto:
Efficient ID-Based Digital Signatures with Message Recovery. CANS 2007: 47-59 - [c7]Raylin Tso, Takeshi Okamoto, Eiji Okamoto:
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message. Inscrypt 2007: 11-24 - [c6]Raylin Tso, Juan Manuel González Nieto, Takeshi Okamoto, Colin Boyd, Eiji Okamoto:
Verifier-Key-Flexible Universal Designated-Verifier Signatures. IMACC 2007: 403-421 - [c5]Raylin Tso, Takeshi Okamoto, Eiji Okamoto:
An Improved Signcryption Scheme and Its Variation. ITNG 2007: 772-778 - [i3]Xun Yi, Raylin Tso, Eiji Okamoto:
ID-Based Group Password-Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2007: 469 (2007) - 2006
- [j2]Raylin Tso, Ying Miao, Takeshi Okamoto, Eiji Okamoto:
How to Verify the Threshold t of Shamir's (t, n)-Threshold Scheme. Inf. Media Technol. 1(1): 102-111 (2006) - [j1]Raylin Tso, Ying Miao, Takeshi Okamoto, Eiji Okamoto:
A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment. Inf. Media Technol. 1(1): 606-614 (2006) - [i2]Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto:
An Efficient ID-based Digital Signature with Message Recovery Based on Pairing. IACR Cryptol. ePrint Arch. 2006: 195 (2006) - 2005
- [c4]Raylin Tso, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto:
An id-based non-interactive tripartite key agreement protocol with K-resilience. Communications and Computer Networks 2005: 38-42 - [c3]Raylin Tso, Takeshi Okamoto, Eiji Okamoto:
Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. CISC 2005: 113-127 - [c2]Takeshi Okamoto, Raylin Tso, Eiji Okamoto:
One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing. MDAI 2005: 122-133 - [i1]Raylin Tso, Ying Miao, Takeshi Okamoto, Eiji Okamoto:
A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment. IACR Cryptol. ePrint Arch. 2005: 239 (2005) - 2003
- [c1]Raylin Tso, Ying Miao, Eiji Okamoto:
A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with Cheaters. ICISC 2003: 377-385
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint