default search action
Yi-Fan Tseng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Yi-Fan Tseng:
Attribute hiding subset predicate encryption: Quantum-resistant construction with efficient decryption. Comput. Stand. Interfaces 88: 103796 (2024) - [j28]Zi-Yuan Liu, Masahiro Mambo, Raylin Tso, Yi-Fan Tseng:
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems. Comput. Stand. Interfaces 89: 103817 (2024) - [j27]Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso:
Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives. Des. Codes Cryptogr. 92(6): 1477-1500 (2024) - [c33]Yi-Fan Tseng, Raylin Tso, Shi-Sheng Sun, Zi-Yuan Liu, You-Qian Chen:
ID-Based Traitor Tracing with Relaxed Black-Box Setting for Group-Based Applications. AsiaJCIS 2024: 33-39 - [c32]Yi-Fan Tseng, Jheng-Jia Huang, Guan-Yu Chen, Wei-Hsueh Wang, Yu-Hsuan Chang:
Pairing-Free Identity-Based Encryption with Security Against the KGC. AsiaJCIS 2024: 83-90 - 2023
- [j26]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso:
Cryptanalysis of a round optimal lattice-based multisignature scheme. Inf. Process. Lett. 182: 106364 (2023) - [j25]Chun-I Fan, Cheng-Han Shie, Yi-Fan Tseng, Hui-Chun Huang:
An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for MQTT. ACM Trans. Sens. Networks 19(3): 61:1-61:21 (2023) - [c31]Yi-Fan Tseng, Jheng-Jia Huang, Guan-Yu Chen, Wei-Hsueh Wang, Yi-Hsueh Lu, Wen-Yi Chen, Shih-Pei Kao:
A Novel Ciphertext-Policy Attribute-Based Encryption Supporting Dual Membership. AsiaJCIS 2023: 25-31 - [c30]Jheng-Jia Huang, Wei-Hsueh Wang, Yi-Fan Tseng, Guan-Yu Chen, Hao-Hsiang Chang Chien, Wen-Yan Dai, Nai-Wei Lo:
Anonymous and Unlinkable Identity Scheme in Open Data Environment. AsiaJCIS 2023: 73-80 - 2022
- [j24]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Public-Key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-Resistant Instantiation. Comput. J. 65(10): 2828-2844 (2022) - [j23]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Quantum-resistant anonymous identity-based encryption with trable identities. IET Inf. Secur. 16(2): 111-126 (2022) - [j22]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Peter Shaojui Wang, Qin-Wen Su:
Extension of elliptic curve Qu-Vanstone certificates and their applications. J. Inf. Secur. Appl. 67: 103176 (2022) - [j21]Yi-Fan Tseng, Chun-I Fan, Zi-Cheng Liu:
Fast keyword search over encrypted data with short ciphertext in clouds. J. Inf. Secur. Appl. 70: 103320 (2022) - [j20]Cheng-Yi Lee, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng:
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT. J. Syst. Archit. 130: 102642 (2022) - [j19]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Yu-Chi Chen, Masahiro Mambo:
Identity-Certifying Authority-Aided Identity-Based Searchable Encryption Framework in Cloud Systems. IEEE Syst. J. 16(3): 4629-4640 (2022) - [j18]Yi-Fan Tseng, Yan-Bin Lin:
A Novel Undeniable (t, n)-Threshold Signature with Cheater Identification. Symmetry 14(6): 1118 (2022) - [j17]Chun-I Fan, Ya-Wen Hsu, Cheng-Han Shie, Yi-Fan Tseng:
ID-Based Multireceiver Homomorphic Proxy Re-Encryption in Federated Learning. ACM Trans. Sens. Networks 18(4): 55:1-55:25 (2022) - [c29]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation. AsiaCCS 2022: 423-436 - [c28]Yi-Fan Tseng, Jheng-Jia Huang, Hao-Yu Yang, Tsung-Yu Chien, Chieh-Han Wu:
Cryptanalysis and Discussion on Two Attribute-Based Encryption Schemes. AsiaJCIS 2022: 24-28 - [c27]Yi-Fan Tseng, Hao-Yu Yang, Chieh-Han Wu, Tsung-Yu Chien, Raylin Tso, Zi-Yuan Liu, Jen-Chieh Hsu:
Cryptanalysis to Ming et al.'s Revocable Multi-Authority Attribute-Based Encryption. AsiaJCIS 2022: 29-32 - [c26]Zi-Yuan Liu, Chu-Chieh Chien, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo:
Public Key Encryption with Hierarchical Authorized Keyword Search. ICISC 2022: 147-170 - [c25]Yi-Hsiu Lee, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng:
Blockchain-Based Self-Sovereign Identity System with Attribute-Based Issuance. ISPEC 2022: 21-38 - [c24]Yu-Chen Liao, Raylin Tso, Zi-Yuan Liu, Yi-Fan Tseng:
Blockchain-Based Confidential Payment System with Controllable Regulation. ISPEC 2022: 39-56 - [c23]Jing-Shiuan You, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng, Masahiro Mambo:
Quantum-Resistant 1-out-of-N Oblivious Signatures from Lattices. IWSEC 2022: 166-186 - 2021
- [j16]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo:
Designated-ciphertext searchable encryption. J. Inf. Secur. Appl. 58: 102709 (2021) - [j15]Yi-Fan Tseng, Chun-I Fan:
Anonymous Multireceiver Identity-Based Encryption against Chosen-Ciphertext Attacks with Tight Reduction in the Standard Model. Secur. Commun. Networks 2021: 5519721:1-5519721:11 (2021) - [j14]Yi-Fan Tseng, Zi-Yuan Liu, Jen-Chieh Hsu, Raylin Tso:
Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function. Secur. Commun. Networks 2021: 6678194:1-6678194:12 (2021) - [c22]Yi-Fan Tseng, Jheng-Jia Huang:
Identity-Based Signature from Quadratic Residues and Its Extension to ID-Based Multi-Signature. AsiaJCIS 2021: 31-36 - [c21]Chih-Chen Yang, Raylin Tso, Zi-Yuan Liu, Jen-Chieh Hsu, Yi-Fan Tseng:
Improved Proxy Re-encryption Scheme with Equality Test. AsiaJCIS 2021: 37-44 - [c20]Chun-I Fan, Yi-Fan Tseng, Cheng-Chun Feng:
CCA-Secure Attribute-Based Encryption Supporting Dynamic Membership in the Standard Model. DSC 2021: 1-8 - [c19]Yi-Fan Tseng, Shih-Jie Gao:
Efficient Subset Predicate Encryption for Internet of Things. DSC 2021: 1-2 - [c18]Yan-Bin Lin, Yi-Fan Tseng:
Cryptanalysis on Lin and Wu's Undeniable (t, n)-Threshold Signature Scheme with Cheater Identification. ISPACS 2021: 1-2 - [c17]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso:
Cryptanalysis on 'An efficient identity-based proxy signcryption using lattice'. ISPACS 2021: 1-2 - [i14]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Cheng-Yi Lee:
Notes on a lattice-based proxy-oriented identity-based encryption with keyword search. IACR Cryptol. ePrint Arch. 2021: 7 (2021) - [i13]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Quantum-resistant Anonymous IBE with Traceable Identities. IACR Cryptol. ePrint Arch. 2021: 33 (2021) - [i12]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Yu-Chi Chen, Masahiro Mambo:
Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud System. IACR Cryptol. ePrint Arch. 2021: 337 (2021) - [i11]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso:
Cryptanalysis on 'An efficient identity-based proxy signcryption using lattice'. IACR Cryptol. ePrint Arch. 2021: 359 (2021) - [i10]Yi-Fan Tseng, Chun-I Fan, Zi-Cheng Liu:
Fast Keyword Search over Encrypted Data with Short Ciphertext in Clouds. IACR Cryptol. ePrint Arch. 2021: 974 (2021) - [i9]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation. IACR Cryptol. ePrint Arch. 2021: 1008 (2021) - [i8]Chun-I Fan, Cheng-Han Shie, Yi-Fan Tseng, Hui-Chun Huang:
An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for Message Queueing Telemetry Transport. IACR Cryptol. ePrint Arch. 2021: 1057 (2021) - 2020
- [j13]Chun-I Fan, Yi-Fan Tseng, Hui-Po Su, Ruei-Hau Hsu, Hiroaki Kikuchi:
Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks. Int. J. Inf. Sec. 19(3): 245-255 (2020) - [c16]Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso:
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism. AsiaJCIS 2020: 1-8 - [c15]Chun-I Fan, Yi-Fan Tseng, Yen-Lin Huang:
Key-Aggregate Proxy Re-Encryption with Dynamic Condition Generation Using Multilinear Map. AsiaJCIS 2020: 9-15 - [c14]Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso:
Practical Predicate Encryption for Inner Product. ICETE (2) 2020: 553-558 - [c13]Yi-Fan Tseng, Jheng-Jia Huang:
Cryptanalysis on Two Pairing-Free Ciphertext-Policy Attribute-Based Encryption Schemes. ICS 2020: 403-407 - [i7]Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso:
Practical Predicate Encryption for Inner Product. IACR Cryptol. ePrint Arch. 2020: 270 (2020) - [i6]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso:
Cryptanalysis of "FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things". IACR Cryptol. ePrint Arch. 2020: 651 (2020) - [i5]Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso:
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism. IACR Cryptol. ePrint Arch. 2020: 713 (2020) - [i4]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo:
Quantum-resistant Public-key Authenticated Encryption with Keyword Search for Industrial Internet of Things. IACR Cryptol. ePrint Arch. 2020: 955 (2020) - [i3]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso:
Cryptanalysis of a round optimal lattice-based multisignature scheme. IACR Cryptol. ePrint Arch. 2020: 1172 (2020)
2010 – 2019
- 2019
- [j12]Raylin Tso, Zi-Yuan Liu, Yi-Fan Tseng:
Identity-Based Blind Multisignature From Lattices. IEEE Access 7: 182916-182923 (2019) - [j11]Yi-Fan Tseng, Chun-I Fan, Cheng-Wei Sung:
On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki-Okamoto Transformation. Int. J. Found. Comput. Sci. 30(4): 493-509 (2019) - [j10]Yi-Fan Tseng, Chun-I Fan, Chih-Wen Lin:
Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption. J. Univers. Comput. Sci. 25(3): 182-202 (2019) - [j9]Yi-Fan Tseng, Chun-I Fan, Ching-Wen Chen:
Top-Level Secure Certificateless Signature Scheme in the Standard Model. IEEE Syst. J. 13(3): 2763-2774 (2019) - [j8]Yi-Fan Tseng, Chun-I Fan, Chin-Yu Wu:
FGAC-NDN: Fine-Grained Access Control for Named Data Networks. IEEE Trans. Netw. Serv. Manag. 16(1): 143-152 (2019) - [c12]Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng, Masahiro Mambo:
Signcryption from NTRU Lattices Without Random Oracles. AsiaJCIS 2019: 134-141 - [i2]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso:
Quantum-resistant Designated-ciphertext Searchable Encryption. IACR Cryptol. ePrint Arch. 2019: 1418 (2019) - 2018
- [j7]Yu-Lun Chuang, Chun-I Fan, Yi-Fan Tseng:
An Efficient Algorithm for the Shortest Vector Problem. IEEE Access 6: 61478-61487 (2018) - [j6]Yi-Fan Tseng, Chun-I Fan, Yan-Fu Cho:
An authenticated re-encryption scheme for secure file transfer in named data networks. Int. J. Commun. Syst. 31(11) (2018) - [j5]Chien-Nan Wu, Chun-I Fan, Jheng-Jia Huang, Yi-Fan Tseng, Hiroaki Kikuchi:
Probably Secure Efficient Anonymous Credential Scheme. Int. J. Softw. Innov. 6(3): 18-35 (2018) - [j4]Yi-Fan Tseng, Chun-I Fan:
Provably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption. J. Inf. Sci. Eng. 34(6): 1517-1541 (2018) - [c11]Chun-I Fan, Yi-Fan Tseng, Cheng-Yuan E, Jheng-Jia Huang:
Transformation between Attribute-Based Encryption and Key-Aggregate Cryptosystem. AsiaJCIS 2018: 35-41 - [c10]Wei-Hao Chen, Chun-I Fan, Yi-Fan Tseng:
Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds. DSC 2018: 1-4 - [c9]Chun-I Fan, Yi-Fan Tseng, Hui-Po Su, Ruei-Hau Hsu, Hiroaki Kikuchi:
Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks. DSC 2018: 1-8 - [c8]Chun-I Fan, Yi-Fan Tseng, Jheng-Jia Huang, Yen-Hao Chen, Hsin-Nan Kuo:
Verifiable Privacy-Preserving Payment Mechanism for Smart Grids. IDCS 2018: 52-63 - 2017
- [j3]Chun-I Fan, Yi-Fan Tseng, Jheng-Jia Huang, Shih-Fen Chen, Hiroaki Kikuchi:
Multireceiver Predicate Encryption for Online Social Networks. IEEE Trans. Signal Inf. Process. over Networks 3(2): 388-403 (2017) - [c7]Yi-Fan Tseng, Chun-I Fan, Ting-Chuan Kung, Jheng-Jia Huang, Hsin-Nan Kuo:
Homomorphic encryption supporting logical operations. ICTCE 2017: 66-69 - [i1]Chun-I Fan, Yi-Fan Tseng, Chih-Wen Lin:
Attribute-Based Encryption from Identity-Based Encryption. IACR Cryptol. ePrint Arch. 2017: 219 (2017) - 2016
- [j2]Shi-Yuan Huang, Chun-I Fan, Yi-Fan Tseng:
Enabled/disabled predicate encryption in clouds. Future Gener. Comput. Syst. 62: 148-160 (2016) - [c6]Chun-I Fan, Jian-Sheng Wang, Jheng-Jia Huang, Yi-Fan Tseng, Wen-Shenq Juang, Hiroaki Kikuchi:
Flexible Authentication Protocol with Key Reconstruction in WBAN Environments. ICITCS 2016: 1-5 - [c5]Jheng-Jia Huang, Wen-Shenq Juang, Chun-I Fan, Yi-Fan Tseng, Hiroaki Kikuchi:
Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments. MobiQuitous (Adjunct Proceedings) 2016: 88-93 - 2015
- [j1]Chun-I Fan, Yi-Fan Tseng:
Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security. Symmetry 7(4): 1856-1881 (2015) - [c4]Chun-I Fan, Chien-Nan Wu, Chun-Hung Chen, Yi-Fan Tseng, Cheng-Chun Feng:
Attribute-Based Proxy Re-encryption with Dynamic Membership. AsiaJCIS 2015: 26-32 - [c3]Chun-I Fan, Han-Wei Hsiao, Chun-Han Chou, Yi-Fan Tseng:
Malware Detection Systems Based on API Log Data Mining. COMPSAC Workshops 2015: 255-260 - 2014
- [c2]Chun-I Fan, Chien-Nan Wu, Jen-Chun Hsu, Yi-Fan Tseng, Wen-Tsuen Chen:
Anonymous Credential Scheme Supporting Active Revocation. AsiaJCIS 2014: 127-132 - 2013
- [c1]Chun-I Fan, Pei-Hsiu Ho, Jheng-Jia Huang, Yi-Fan Tseng:
Secure Certificateless Signature Scheme Supporting Batch Verification. AsiaJCIS 2013: 8-11
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint