論文發表
Full Publication List (61 papers)
On the construction of a leakage-resilient certificate-based encryption with equality test scheme
T.T. Tsai, H.Y. Lin*, T.H. Yu, Y.C. Chen, Y.J. Ye
IoT-assisted cloud data sharing with revocation and equality test under identity-based proxy re-encryption
H.Y. Lin, T.T. Tsai*, and Y.C. Wang
Leakage-resilient certificateless public key encryption with equality test resistant to side-channel attacks
T.T. Tsai* and J.H. Yang
Anomaly detection through outsourced revocable identity-based signcryption with equality test for sensitive data in consumer IoT environments
T.T. Tsai, H.Y. Lin, W.N. Huang, S. Kumar, K. Agarwal, and C.M. Chen*
Leakage-resilient public key signcryption with equality test and its application
T.T. Tsai
Leakage-resilient public key encryption with equality test resistant to side-channel attacks
T.T. Tsai, H.Y. Lin, Y.C. Chen*, and Y.C. Chen
A revocable certificateless sanitizable signature scheme with batch verification
H.Y. Lin, T.T. Tsai*, and H.L. Wu
AHMRE-SCST: Lightweight anonymous heterogeneous multirecipient encryption with seamlessly compatible system transformation for IoT devices
Y.M. Tseng*, T.C. Ho, T.T. Tsai, and S.S. Huang
Leakage-resilient anonymous heterogeneous multi-receiver hybrid encryption in heterogeneous public-key system settings
Y.M. Tseng*, T.T. Tsai, S.S. Huang, and T.C. Ho
CBEET: constructing certificate-based encryption with equality test in the CB-PKS
T.T. Tsai, H.Y. Lin*, and C.Y. Wu
Leakage-resilient anonymous multi-receiver certificate-based key encapsulation scheme
T.T. Tsai, Y.M. Tseng*, and S.S. Huang
Leakage-resilient certificateless signcryption scheme under a continual leakage model
T.T. Tsai, Y.M. Tseng*, and S.S. Huang
Identity-based proxy re-encryption scheme using fog computing and anonymous key generation
H.Y. Lin, T.T. Tsai*, P.Y. Ting, and C.C. Chen
Fully continuous leakage-resilient certificate-based signcryption scheme for mobile communications
Y.M. Tseng*, T.T. Tsai, and S.S. Huang
Revocable certificateless public key encryption with equality test
T.T. Tsai*, H.Y. Lin, and H.C. Tsai
Leakage-resilient anonymous multi-recipient signcryption under a continual leakage model
T.T. Tsai, Y.M. Tseng*, S.S. Huang, J.Y. Xie, and Y.H. Hung
Leakage-resilient certificate-based authenticated key exchange protocol
T.T. Tsai, S.S. Huang, Y.M. Tseng*, Y.H. Chuang, and Y.H. Hung
An efficient revocable identity-based encryption with equality test scheme for the wireless body area network
T.T. Tsai*, H.Y. Lin, and H.C. Chang
Secure access control using updateable attribute keys
H.Y. Lin*, T.T. Tsai, H.R. Wu, and M.S. Ku
An improved ID-based data storage scheme for fog-enabled IoT environments
H.Y. Lin*, T.T. Tsai, P.Y. Ting, C.C. Chen
Leakage-resilient revocable certificateless encryption with an outsourced revocation authority
Y.M. Tseng*, S.S. Huang, T.T. Tsai, Y.H. Chuang, and Y.H. Hung
A leakage-resilient ID-based authenticated key exchange protocol with a revocation mechanism
T.T. Tsai, Y.H. Chuang, Y.M. Tseng*, S.S. Huang, and Y.H. Hung
Leakage-resilient outsourced revocable certificateless signature with a cloud revocation server
Y.M. Tseng*, J.D. Wu, S.S. Huang and T.T. Tsai
Leakage-resilient certificate-based key encapsulation scheme resistant to continual leakage
J.D. Wu, Y.M. Tseng*, S.S. Huang and T.T. Tsai
Leakage-resilient revocable identity-based signature with cloud revocation authority
J.D. Wu, Y.M. Tseng*, S.S. Huang and T.T. Tsai
Efficient certificate-based signature with short key and signature sizes from lattices
Y.M. Tseng*, T.T. Tsai, J.D. Wu and S.S. Huang
Leakage-resilient certificate-based signature resistant to side-channel attacks
J.D. Wu, Y.M. Tseng*, S.S. Huang and T.T. Tsai
Identity-based encryption with cloud revocation authority and its applications
Y.M. Tseng*, T.T. Tsai, S.S. Huang and C.P. Huang
Efficient anonymous multireceiver certificateless encryption
Y.H. Hung, S.S. Huang, Y.M. Tseng* and T.T. Tsai
SIBSC: separable identity-based signcryption for resource-constrained devices
T.T. Tsai, S.S. Huang, and Y.M. Tseng*
List-free ID-based mutual authentication and key agreement protocol for multi-server architectures
Y.M. Tseng*, S.S. Huang, T.T. Tsai, and J.H. Ke
Efficient revocable certificateless public key encryption with a delegated revocation authority
T.T. Tsai, Y.M. Tseng* and S.S. Huang
Certificateless signature with strong unforgeability in the standard model
Y.H. Hung, S.S. Huang, Y.M. Tseng* and T.T. Tsai
Revocable certificateless public key encryption
T.T. Tsai and Y.M. Tseng*
Leakage-free ID-based signature
Y.M. Tseng*, T.T. Tsai and S.S. Huang
A novel ID-based authentication and key exchange protocol resistant to ephemeral secret leakage attacks for mobile devices
Y.M. Tseng*, S.S. Huang, T.T. Tsai and L. Tseng
Enhancement on strongly secure group key agreement
Y.M. Tseng*, T.T. Tsai and S.S. Huang
Secure certificateless signature with revocation in the standard model
T.T. Tsai, S.S. Huang and Y.M. Tseng*
Efficient strongly unforgeable ID-based signature without random oracles
T.T. Tsai, Y.M. Tseng* and S.S. Huang
Strongly secure revocable ID-based signature without random oracles
Y.H. Hung, T.T. Tsai, Y.M. Tseng* and S.S. Huang
Efficient searchable ID-based encryption with a designated server
T.Y. Wu, T.T. Tsai and Y.M. Tseng*
A provably secure revocable ID-based authenticated group key exchange protocol with identifying malicious participants
T.Y. Wu*, T.T. Tsai and Y.M. Tseng
RHIBE: Constructing revocable hierarchical ID-based encryption from HIBE
T.T. Tsai, Y.M. Tseng* and T.Y. Wu
Provably secure revocable ID-based signature in the standard model
T.T. Tsai, Y.M. Tseng* and T.Y. Wu
Efficient revocable multi-receiver ID-based encryption
T.T. Tsai, Y.M. Tseng* and T.Y. Wu
A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants
T.Y. Wu, Y.M. Tseng* and T.T. Tsai
A fully secure revocable ID-based encryption in the standard model
T.T. Tsai, Y.M. Tseng* and T.Y. Wu
A revocable ID-based signcryption scheme
T.Y. Wu*, T.T. Tsai and Y.M. Tseng
Efficient revocable ID-based encryption with a public channel
Y.M. Tseng* and T.T. Tsai