論文發表

Full Publication List (61 papers)

2026Journal

On the construction of a leakage-resilient certificate-based encryption with equality test scheme

T.T. Tsai, H.Y. Lin*, T.H. Yu, Y.C. Chen, Y.J. Ye

Journal of Information Security and Applicationsvol. 99, Article ID 104422
2026Journal

IoT-assisted cloud data sharing with revocation and equality test under identity-based proxy re-encryption

H.Y. Lin, T.T. Tsai*, and Y.C. Wang

Computers, Materials & Continuavol. 86, no. 3, Article ID 14
2025Journal

Leakage-resilient certificateless public key encryption with equality test resistant to side-channel attacks

T.T. Tsai* and J.H. Yang

Computer Networksvol. 270, Article ID 111485
2025Journal

Anomaly detection through outsourced revocable identity-based signcryption with equality test for sensitive data in consumer IoT environments

T.T. Tsai, H.Y. Lin, W.N. Huang, S. Kumar, K. Agarwal, and C.M. Chen*

IEEE Transactions on Consumer Electronicvol. 71, no. 2, pp. 6327-6339
2025Journal

Leakage-resilient public key signcryption with equality test and its application

T.T. Tsai

Informaticavol. 36, no. 2, pp. 429-452
2025Journal

Leakage-resilient public key encryption with equality test resistant to side-channel attacks

T.T. Tsai, H.Y. Lin, Y.C. Chen*, and Y.C. Chen

Journal of Information Science and Engineeringvol. 41, no. 1, pp. 195-216
2024Journal

A revocable certificateless sanitizable signature scheme with batch verification

H.Y. Lin, T.T. Tsai*, and H.L. Wu

IEEE Accessvol. 12, pp. 143392-143400
2024Journal

AHMRE-SCST: Lightweight anonymous heterogeneous multirecipient encryption with seamlessly compatible system transformation for IoT devices

Y.M. Tseng*, T.C. Ho, T.T. Tsai, and S.S. Huang

IEEE Internet of Things Journalvol. 11, no. 17, pp. 28508-28525
2024Journal

Leakage-resilient anonymous heterogeneous multi-receiver hybrid encryption in heterogeneous public-key system settings

Y.M. Tseng*, T.T. Tsai, S.S. Huang, and T.C. Ho

IEEE Accessvol. 12, pp. 28155-28168
2023Journal

CBEET: constructing certificate-based encryption with equality test in the CB-PKS

T.T. Tsai, H.Y. Lin*, and C.Y. Wu

Information Technology and Controlvol. 52, no. 4, pp. 935-951
2023Journal

Leakage-resilient anonymous multi-receiver certificate-based key encapsulation scheme

T.T. Tsai, Y.M. Tseng*, and S.S. Huang

IEEE Accessvol. 11, pp. 51617-51630
2023Journal

Leakage-resilient certificateless signcryption scheme under a continual leakage model

T.T. Tsai, Y.M. Tseng*, and S.S. Huang

IEEE Accessvol. 11, pp. 54448-54461
2023Journal

Identity-based proxy re-encryption scheme using fog computing and anonymous key generation

H.Y. Lin, T.T. Tsai*, P.Y. Ting, and C.C. Chen

Sensorsvol. 23, no. 5, pp. 2706
2023Journal

Fully continuous leakage-resilient certificate-based signcryption scheme for mobile communications

Y.M. Tseng*, T.T. Tsai, and S.S. Huang

Informaticavol. 34, no. 1, pp. 199-222
2022Journal

Revocable certificateless public key encryption with equality test

T.T. Tsai*, H.Y. Lin, and H.C. Tsai

Information Technology and Controlvol. 51, no. 4, pp. 638-660
2022Journal

Leakage-resilient anonymous multi-recipient signcryption under a continual leakage model

T.T. Tsai, Y.M. Tseng*, S.S. Huang, J.Y. Xie, and Y.H. Hung

IEEE Accessvol. 10, pp. 104636 - 104648
2022Journal

Leakage-resilient certificate-based authenticated key exchange protocol

T.T. Tsai, S.S. Huang, Y.M. Tseng*, Y.H. Chuang, and Y.H. Hung

IEEE Open Journal of the Computer Societyvol. 3, pp. 137-148
2022Journal

An efficient revocable identity-based encryption with equality test scheme for the wireless body area network

T.T. Tsai*, H.Y. Lin, and H.C. Chang

Journal of Sensorsvol. 2022, Article ID 1628344
2022Journal

Secure access control using updateable attribute keys

H.Y. Lin*, T.T. Tsai, H.R. Wu, and M.S. Ku

Mathematical Biosciences and Engineeringvol. 19, no. 11, pp. 11367-12379
2022Journal

An improved ID-based data storage scheme for fog-enabled IoT environments

H.Y. Lin*, T.T. Tsai, P.Y. Ting, C.C. Chen

Sensorsvol. 22, no. 11, pp. 4223
2022Journal

Leakage-resilient revocable certificateless encryption with an outsourced revocation authority

Y.M. Tseng*, S.S. Huang, T.T. Tsai, Y.H. Chuang, and Y.H. Hung

Informaticavol. 33, no. 1, pp. 151-179
2021Journal

A leakage-resilient ID-based authenticated key exchange protocol with a revocation mechanism

T.T. Tsai, Y.H. Chuang, Y.M. Tseng*, S.S. Huang, and Y.H. Hung

IEEE Accessvol. 9, pp. 128633-128647
2020Journal

Leakage-resilient outsourced revocable certificateless signature with a cloud revocation server

Y.M. Tseng*, J.D. Wu, S.S. Huang and T.T. Tsai

Information Technology and Controlvol. 49, no. 4, pp. 464-481
2020Journal

Leakage-resilient certificate-based key encapsulation scheme resistant to continual leakage

J.D. Wu, Y.M. Tseng*, S.S. Huang and T.T. Tsai

IEEE Open Journal of the Computer Societyvol. 1, pp.131-144
2020Journal

Leakage-resilient revocable identity-based signature with cloud revocation authority

J.D. Wu, Y.M. Tseng*, S.S. Huang and T.T. Tsai

Informaticavol. 31, no. 3, pp. 597-620
2019Journal

Efficient certificate-based signature with short key and signature sizes from lattices

Y.M. Tseng*, T.T. Tsai, J.D. Wu and S.S. Huang

Informaticavol. 30, no. 3, pp. 595-612
2019Journal

Leakage-resilient certificate-based signature resistant to side-channel attacks

J.D. Wu, Y.M. Tseng*, S.S. Huang and T.T. Tsai

IEEE Accessvol. 7, no. 1, pp. 19041-19053
2018Journal

Identity-based encryption with cloud revocation authority and its applications

Y.M. Tseng*, T.T. Tsai, S.S. Huang and C.P. Huang

IEEE Transactions on Cloud Computingvol. 6, no. 4, pp. 1041-1053
2017Journal

Efficient anonymous multireceiver certificateless encryption

Y.H. Hung, S.S. Huang, Y.M. Tseng* and T.T. Tsai

IEEE Systems Journalvol. 11, no. 4, pp. 2602-2613
2017Journal

SIBSC: separable identity-based signcryption for resource-constrained devices

T.T. Tsai, S.S. Huang, and Y.M. Tseng*

Informaticavol. 28, no. 1, pp. 193-214
2016Journal

List-free ID-based mutual authentication and key agreement protocol for multi-server architectures

Y.M. Tseng*, S.S. Huang, T.T. Tsai, and J.H. Ke

IEEE Transactions on Emerging Topics in Computingvol. 4, no. 1, pp. 102-122
2015Journal

Efficient revocable certificateless public key encryption with a delegated revocation authority

T.T. Tsai, Y.M. Tseng* and S.S. Huang

Security and Communication Networksvol. 8, no. 18, pp. 3713-3725
2015Journal

Certificateless signature with strong unforgeability in the standard model

Y.H. Hung, S.S. Huang, Y.M. Tseng* and T.T. Tsai

Informaticavol. 26, no. 4, pp. 663-684
2015Journal

Revocable certificateless public key encryption

T.T. Tsai and Y.M. Tseng*

IEEE Systems Journalvol. 9, no. 3, pp. 824-833
2015Journal

Leakage-free ID-based signature

Y.M. Tseng*, T.T. Tsai and S.S. Huang

The Computer Journalvol. 58, no. 4, pp. 750-757
2015Journal

A novel ID-based authentication and key exchange protocol resistant to ephemeral secret leakage attacks for mobile devices

Y.M. Tseng*, S.S. Huang, T.T. Tsai and L. Tseng

International Journal of Distributed Sensor Networksvol. 2015, Article ID 898716, 12 pages
2015Journal

Enhancement on strongly secure group key agreement

Y.M. Tseng*, T.T. Tsai and S.S. Huang

Security and Communication Networksvol. 8, no. 2, pp. 126-135
2014Journal

Secure certificateless signature with revocation in the standard model

T.T. Tsai, S.S. Huang and Y.M. Tseng*

Mathematical Problems in Engineeringvol. 2014, Article ID 728591, 16 pages
2014Journal

Efficient strongly unforgeable ID-based signature without random oracles

T.T. Tsai, Y.M. Tseng* and S.S. Huang

Informaticavol. 25, no. 3, pp. 505-521
2014Journal

Strongly secure revocable ID-based signature without random oracles

Y.H. Hung, T.T. Tsai, Y.M. Tseng* and S.S. Huang

Information Technology and Controlvol. 43, no. 3, pp. 264-276
2014Journal

Efficient searchable ID-based encryption with a designated server

T.Y. Wu, T.T. Tsai and Y.M. Tseng*

Annals of telecommunicationsvol. 69, no. 7, pp. 391-402
2014Journal

A provably secure revocable ID-based authenticated group key exchange protocol with identifying malicious participants

T.Y. Wu*, T.T. Tsai and Y.M. Tseng

Scientific World Journalvol. 2014, Article ID 367264
2014Journal

RHIBE: Constructing revocable hierarchical ID-based encryption from HIBE

T.T. Tsai, Y.M. Tseng* and T.Y. Wu

Informaticavol. 25, no. 2, pp. 299-326
2013Journal

Provably secure revocable ID-based signature in the standard model

T.T. Tsai, Y.M. Tseng* and T.Y. Wu

Security and Communication Networksvol. 6, no. 10, pp. 1250-1260
2013Journal

Efficient revocable multi-receiver ID-based encryption

T.T. Tsai, Y.M. Tseng* and T.Y. Wu

Information Technology and Controlvol. 42, no. 2, pp. 159-169
2012Journal

A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants

T.Y. Wu, Y.M. Tseng* and T.T. Tsai

Computer Networksvol. 56, no. 12, pp. 2994-3006
2012Journal

A fully secure revocable ID-based encryption in the standard model

T.T. Tsai, Y.M. Tseng* and T.Y. Wu

Informaticavol. 23, no. 3, pp. 487-505
2012Journal

A revocable ID-based signcryption scheme

T.Y. Wu*, T.T. Tsai and Y.M. Tseng

Journal of Information Hiding and Multimedia Signal Processingvol. 3, no. 3, pp. 240-251
2012Journal

Efficient revocable ID-based encryption with a public channel

Y.M. Tseng* and T.T. Tsai

The Computer Journalvol. 55, no. 4, pp. 475-486