What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Fuchun Guo
Google Scholar
ORCID:
0000-0001-6939-7710
53
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/icics
Public Verifiable Server-Aided Revocable Attribute-Based Encryption.
Luqi Huang
Fuchun Guo
Willy Susilo
Yumei Li
2024
journals/tifs
Exploring Unobservable Blockchain-Based Covert Channel for Censorship-Resistant Systems.
Zhuo Chen
Liehuang Zhu
Peng Jiang
Can Zhang
Feng Gao
Fuchun Guo
2024
journals/tifs
SDSS: Sequential Data Sharing System in IoT.
Jianchang Lai
Willy Susilo
Robert H. Deng
Fuchun Guo
2024
conf/uss
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus.
Jianghong Wei
Guohua Tian
Ding Wang
Fuchun Guo
Willy Susilo
Xiaofeng Chen
2024
conf/acisp
Pairing-Free ID-Based Signatures as Secure as Discrete Logarithm in AGM.
Jia-Chng Loh
Fuchun Guo
Willy Susilo
2024
conf/acisp
CrossAAD: Cross-Chain Abnormal Account Detection.
Yong Lin
Peng Jiang
Fuchun Guo
Liehuang Zhu
2024
conf/acisp
Key Cooperative Attribute-Based Encryption.
Luqi Huang
Willy Susilo
Guomin Yang
Fuchun Guo
2024
conf/acisp
Threshold Ring Signatures with Accountability.
Thanh Xuan Khuc
Willy Susilo
Dung Hoang Duong
Fuchun Guo
Kazuhide Fukushima
Shinsaku Kiyomoto
2024
conf/acisp
A Fault-Tolerant Content Moderation Mechanism for Secure Messaging Systems.
Tuong Ngoc Nguyen
Willy Susilo
Dung Hoang Duong
Fuchun Guo
Kazuhide Fukushima
Shinsaku Kiyomoto
2024
conf/icisc
Designated-Verifier Ring Signatures: Strong Definitions, Generic Constructions and Efficient Instantiations.
Jiaming Wen
Willy Susilo
Yanhua Zhang
Fuchun Guo
Huanguo Zhang
2024
conf/provsec
Tightly Secure Identity-Based Signature from Cryptographic Group Actions.
Thanh Xuan Khuc
Willy Susilo
Dung Hoang Duong
Fuchun Guo
Hyungrok Jo
Tsuyoshi Takagi
2024
conf/provsec
Traceable Ring Signatures: Logarithmic-Size, Without Any Setup, from Standard Assumptions.
Thanh Xuan Khuc
Willy Susilo
Dung Hoang Duong
Fuchun Guo
Kazuhide Fukushima
Shinsaku Kiyomoto
2023
conf/acisp
A Tightly Secure ID-Based Signature Scheme Under DL Assumption in AGM.
Jia-Chng Loh
Fuchun Guo
Willy Susilo
Guomin Yang
2023
conf/asiacrypt
Robust Decentralized Multi-client Functional Encryption: Motivation, Definition, and Inner-Product Constructions.
Yamin Li
Jianghong Wei
Fuchun Guo
Willy Susilo
Xiaofeng Chen
2022
conf/crypto
Multimodal Private Signatures.
Khoa Nguyen
Fuchun Guo
Willy Susilo
Guomin Yang
2022
conf/esorics
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost.
Willy Susilo
Yannan Li
Fuchun Guo
Jianchang Lai
Ge Wu
2022
conf/esorics
Efficient Unique Ring Signatures from Lattices.
Tuong Ngoc Nguyen
Anh The Ta
Huy Quoc Le
Dung Hoang Duong
Willy Susilo
Fuchun Guo
Kazuhide Fukushima
Shinsaku Kiyomoto
2022
conf/eurocrypt
Optimal Tightness for Chain-Based Unique Signatures.
Fuchun Guo
Willy Susilo
2020
conf/esorics
Secure Cloud Auditing with Efficient Ownership Transfer.
Jun Shen
Fuchun Guo
Xiaofeng Chen
Willy Susilo
2019
conf/acns
A New Encoding Framework for Predicate Encryption with Non-linear Structures in Prime Order Groups.
Jongkil Kim
Willy Susilo
Fuchun Guo
Joonsang Baek
Nan Li
2017
journals/compsec
Secure-channel free keyword search with authorization in manager-centric databases.
Peng Jiang
Yi Mu
Fuchun Guo
Qiaoyan Wen
2017
journals/istr
Sequence aware functional encryption and its application in searchable encryption.
Tran Viet Xuan Phuong
Guomin Yang
Willy Susilo
Fuchun Guo
Qiong Huang
2017
journals/tifs
EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud.
Willy Susilo
Peng Jiang
Fuchun Guo
Guomin Yang
Yong Yu
Yi Mu
2017
conf/ccs
An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption.
Jongkil Kim
Willy Susilo
Fuchun Guo
Man Ho Au
Surya Nepal
2017
conf/crypto
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample.
Fuchun Guo
Rongmao Chen
Willy Susilo
Jianchang Lai
Guomin Yang
Yi Mu
2016
journals/tifs
Server-Aided Public Key Encryption With Keyword Search.
Rongmao Chen
Yi Mu
Guomin Yang
Fuchun Guo
Xinyi Huang
Xiaofen Wang
Yongjun Wang
2016
journals/tifs
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage.
Rongmao Chen
Yi Mu
Guomin Yang
Fuchun Guo
Xiaofen Wang
2016
journals/tifs
Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data.
Kaitai Liang
Xinyi Huang
Fuchun Guo
Joseph K. Liu
2016
journals/tifs
Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption.
Fuchun Guo
Willy Susilo
Yi Mu
2016
conf/ccs
Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext.
Willy Susilo
Rongmao Chen
Fuchun Guo
Guomin Yang
Yi Mu
Yang-Wai Chow
2016
conf/acisp
Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance.
Yinhao Jiang
Willy Susilo
Yi Mu
Fuchun Guo
2016
conf/acisp
Public Key Encryption with Authorized Keyword Search.
Peng Jiang
Yi Mu
Fuchun Guo
Qiaoyan Wen
2016
conf/acisp
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing.
Jianchang Lai
Yi Mu
Fuchun Guo
Willy Susilo
Rongmao Chen
2016
conf/acisp
One-Round Strong Oblivious Signature-Based Envelope.
Rongmao Chen
Yi Mu
Willy Susilo
Guomin Yang
Fuchun Guo
Mingwu Zhang
2016
conf/provsec
Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update.
Yinhao Jiang
Willy Susilo
Yi Mu
Fuchun Guo
2016
conf/provsec
Oblivious Keyword Search with Authorization.
Peng Jiang
Xiaofen Wang
Jianchang Lai
Fuchun Guo
Rongmao Chen
2016
conf/ctrsa
Strongly Leakage-Resilient Authenticated Key Exchange.
Rongmao Chen
Yi Mu
Guomin Yang
Willy Susilo
Fuchun Guo
2016
conf/asiacrypt
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
Rongmao Chen
Yi Mu
Guomin Yang
Willy Susilo
Fuchun Guo
Mingwu Zhang
2016
conf/asiacrypt
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction.
Fuchun Guo
Willy Susilo
Yi Mu
Rongmao Chen
Jianchang Lai
Guomin Yang
2015
journals/tifs
BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication.
Rongmao Chen
Yi Mu
Guomin Yang
Fuchun Guo
2015
conf/acisp
A New General Framework for Secure Public Key Encryption with Keyword Search.
Rongmao Chen
Yi Mu
Guomin Yang
Fuchun Guo
Xiaofen Wang
2015
conf/acisp
Improved Identity-Based Online/Offline Encryption.
Jianchang Lai
Yi Mu
Fuchun Guo
Willy Susilo
2014
journals/tifs
CP-ABE With Constant-Size Keys for Lightweight Devices.
Fuchun Guo
Yi Mu
Willy Susilo
Duncan S. Wong
Vijay Varadharajan
2014
journals/tifs
Subset Membership Encryption and Its Applications to Oblivious Transfer.
Fuchun Guo
Yi Mu
Willy Susilo
2014
conf/ccs
POSTER: Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption.
Fuchun Guo
Willy Susilo
Yi Mu
2013
conf/acisp
Membership Encryption and Its Applications.
Fuchun Guo
Yi Mu
Willy Susilo
Vijay Varadharajan
2012
conf/esorics
Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext.
Fuchun Guo
Yi Mu
Willy Susilo
2011
conf/ccs
Self-certified ring signatures.
Nan Li
Yi Mu
Willy Susilo
Fuchun Guo
2009
conf/provsec
How to Prove Security of a Signature with a Tighter Security Reduction.
Fuchun Guo
Yi Mu
Willy Susilo
2008
conf/fc
Identity-Based Online/Offline Encryption.
Fuchun Guo
Yi Mu
Zhide Chen
2008
conf/provsec
Optimal Online/Offline Signature: How to Sign a Message without Online Computation.
Fuchun Guo
Yi Mu
2008
conf/iwsec
Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles.
Fuchun Guo
Yi Mu
Zhide Chen
2007
conf/cans
Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles.
Fuchun Guo
Yi Mu
Zhide Chen
Coauthors
Anh The Ta
(1)
Can Zhang
(1)
Ding Wang
(1)
Duncan S. Wong
(1)
Dung Hoang Duong
(5)
Feng Gao
(1)
Fuchun Guo
(53)
Ge Wu
(1)
Guohua Tian
(1)
Guomin Yang
(15)
Huanguo Zhang
(1)
Huy Quoc Le
(1)
Hyungrok Jo
(1)
Jia-Chng Loh
(2)
Jiaming Wen
(1)
Jianchang Lai
(7)
Jianghong Wei
(2)
Jongkil Kim
(2)
Joonsang Baek
(1)
Joseph K. Liu
(1)
Jun Shen
(1)
Kaitai Liang
(1)
Kazuhide Fukushima
(4)
Khoa Nguyen
(1)
Liehuang Zhu
(2)
Luqi Huang
(2)
Man Ho Au
(1)
Mingwu Zhang
(2)
Nan Li
(2)
Peng Jiang
(6)
Qiaoyan Wen
(2)
Qiong Huang
(1)
Robert H. Deng
(1)
Rongmao Chen
(12)
Shinsaku Kiyomoto
(4)
Surya Nepal
(1)
Thanh Xuan Khuc
(3)
Tran Viet Xuan Phuong
(1)
Tsuyoshi Takagi
(1)
Tuong Ngoc Nguyen
(2)
Vijay Varadharajan
(2)
Willy Susilo
(39)
Xiaofen Wang
(4)
Xiaofeng Chen
(3)
Xinyi Huang
(2)
Yamin Li
(1)
Yang-Wai Chow
(1)
Yanhua Zhang
(1)
Yannan Li
(1)
Yi Mu
(29)
Yinhao Jiang
(2)
Yong Lin
(1)
Yong Yu
(1)
Yongjun Wang
(1)
Yumei Li
(1)
Zhide Chen
(3)
Zhuo Chen
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to