Keywords in Publications
keywordsNo. of Authors
ring signature 6
anonymity 4
artificial intelligence 4
bilinear pairings 4
generic construction 4
linkable 4
privacy 4
ring signatures 4
threshold ring signatures 4
anonymous authentication 3
auxiliary inputs 3
cloud computing 3
computation efficiency 3
efficiency improvement 3
hierarchical identity-based cryptosystem 3
identity-based encryption 3
key escrow 3
public key encryption 3
related-key attack 3
reputation systems 3
security of data 3
service provider 3
side channel attack 3
signcryption 3
signing key 3
third parties 3
access control 2
anonymous access 2
attribute-based 2
attributes 2
authentication 2
blockchain 2
certificate based 2
certificateless public key encryption 2
computer programming languages 2
convertible undeniable signature 2
digital signatures 2
dual system encryption 2
dynamic threshold public key encryption 2
ecdsa 2
electric vehicles 2
ibe 2
id-based cryptography 2
information analysis 2
k-times 2
key-exposure 2
leakage-resilience 2
leakage-resilient 2
learning systems 2
linkability 2
location privacy-preserving 2
m-lwe/sis 2
management information systems 2
mathematical models 2
mobile social networks 2
pairing 2
pairings 2
personal health record 2
points of interests 2
random oracle model 2
random oracles 2
randomness 2
related-randomness attack 2
reservation 2
revocable 2
schnorr signature 2
sharing 2
signatures 2
sum argument 2
threshold 2
threshold signature 2
vehicular sensor networks 2
accountability 1
address 1
anonymous ciphertext indistinguishability 1
argument of knowledge 1
attack 1
attribute based encryption 1
attribute-based encryption 1
attribute-based keyword search 1
attribute‐based encryption 1
authorship binding 1
bilinear groups 1
blind signature 1
cdh problem 1
certificate-based signatures 1
certificateless cryptography 1
certificateless signatures 1
chosen-ciphertext attack 1
ciphertext-policy 1
cloud storage 1
complete non-malleability 1
concurrent signature 1
cryptographic security model 1
databases 1
encryption 1
fair exchange 1
forward security 1
forward-secure 1
gost 1
guillou-quisquater signature 1
identity-based 1
identity-based cryptography 1
identity-based signatures 1
identity-based system 1
iot systems 1
leakage 1
lightweight cryptography 1
mobile e-commerce 1
monero 1
multi-authority 1
multi-client 1
multi-signature 1
nizk 1
non-interaction 1
non-malleable key derivation 1
one-more unforgeability 1
one-time lossy filter 1
outsourced computation 1
plaintext-checkable encryption 1
protocols 1
publish/subscribe 1
random oracle 1
related-key attacks 1
remove trusted setup 1
revocation 1
ring signature schemes 1
rsa function 1
sanitizable signatures 1
searchable encryption 1
security 1
security proofs 1
self-certificated signatures 1
servers 1
signature 1
sm2 1
standard model 1
strong known related key attack 1
sun 1
traceability 1
universal composability 1
verifiable random function 1
vrf 1
zero-knowledge proof 1
View More
Co-Investigators
InvestigatorsNo. of Grants
yiu, siu ming 1
View More