2024

  1. CSI
    Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems
    Zi-Yuan LiuMasahiro MamboRaylin Tso, and Yi-Fan Tseng
    Comput. Stand. Interfaces, 89, 103817, 2024
  2. DCC
    Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives
    Yi-Fan TsengZi-Yuan Liu, and Raylin Tso
    Des. Codes Cryptogr., 1–24, 2024
    Early Access

2023

  1. IEEE Access
    A Provably Secure Lattice-Based Fuzzy Signature Scheme Using Linear Sketch
    Mingmei Zheng, Zi-Yuan Liu, and Masahiro Mambo
    IEEE Access, 11, 62510–62521, 2023
  2. IPL
    Cryptanalysis of a round optimal lattice-based multisignature scheme
    Zi-Yuan LiuYi-Fan Tseng, and Raylin Tso
    Inf. Process. Lett., 182, 106364, 2023
  3. arXiv
    Comments on “Dynamic Consensus Committee-Based for Secure Data Sharing With Authorized Multi-Receiver Searchable Encryption”
    Zi-Yuan Liu, and Raylin Tso
    CoRR, abs/2311.08813, 106364, 2023

2022

  1. Comput. J.
    Public-Key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-Resistant Instantiation
    Comput. J., 65, 2828–2844, 2022
  2. IET Inf. Secur.
    Quantum-resistant anonymous identity-based encryption with trable identities
    IET Inf. Secur., 16, 111–126, 2022
  3. JISA
    Extension of elliptic curve Qu-Vanstone certificates and their applications
    Zi-Yuan LiuYi-Fan TsengRaylin TsoPeter Shaojui Wang, and Qin-Wen Su
    J. Inf. Secur. Appl., 67, 103176, 2022
  4. JSA
    Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT
    Cheng-Yi Lee, Zi-Yuan LiuRaylin Tso, and Yi-Fan Tseng
    J. Syst. Archit., 130, 102642, 2022
  5. IEEE Syst. J.
    Identity-Certifying Authority-Aided Identity-Based Searchable Encryption Framework in Cloud Systems
    IEEE Syst. J., 16, 4629–4640, 2022
  6. AsiaCCS
    Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation
    In ASIA CCS ’22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022 , 423–436, 2022
  7. AsiaJCIS
    Cryptanalysis to Ming et al.’s Revocable Multi-Authority Attribute-Based Encryption
    Yi-Fan Tseng, Hao-Yu Yang, Chieh-Han Wu, Tsung-Yu Chien, Raylin Tso, and 2 more authors
    In 17th Asia Joint Conference on Information Security, AsiaJCIS 2022, Baoding, China, July 15-16, 2022 , 29–32, 2022
  8. ICISC
    Public Key Encryption with Hierarchical Authorized Keyword Search
    Zi-Yuan Liu, Chu-Chieh Chien, Yi-Fan TsengRaylin Tso, and Masahiro Mambo
    In Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers , 13849, 147–170, 2022
  9. ISPEC
    Blockchain-Based Self-Sovereign Identity System with Attribute-Based Issuance
    Yi-Hsiu Lee, Zi-Yuan LiuRaylin Tso, and Yi-Fan Tseng
    In Information Security Practice and Experience - 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23-25, 2022, Proceedings , 13620, 21–38, 2022
  10. ISPEC
    Blockchain-Based Confidential Payment System with Controllable Regulation
    Yu-Chen Liao, Raylin TsoZi-Yuan Liu, and Yi-Fan Tseng
    In Information Security Practice and Experience - 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23-25, 2022, Proceedings , 13620, 39–56, 2022
  11. IWSEC
    Quantum-Resistant 1-out-of-N Oblivious Signatures from Lattices
    Jing-Shiuan You, Zi-Yuan LiuRaylin TsoYi-Fan Tseng, and Masahiro Mambo
    In Advances in Information and Computer Security - 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings , 13504, 166–186, 2022

2021

  1. JISA
    Designated-ciphertext searchable encryption
    Zi-Yuan LiuYi-Fan TsengRaylin Tso, and Masahiro Mambo
    J. Inf. Secur. Appl., 58, 102709, 2021
  2. SCN
    Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function
    Yi-Fan TsengZi-Yuan Liu, Jen-Chieh Hsu, and Raylin Tso
    Secur. Commun. Networks, 2021, 6678194:1–6678194:12, 2021
  3. AsiaJCIS
    Improved Proxy Re-encryption Scheme with Equality Test
    Chih-Chen Yang, Raylin TsoZi-Yuan Liu, Jen-Chieh Hsu, and Yi-Fan Tseng
    In 16th Asia Joint Conference on Information Security, AsiaJCIS 2021, Seoul, Republic of Korea, August 19-20, 2021 , 37–44, 2021
  4. DSC
    Partially Blind ECDSA Scheme and Its Application to Bitcoin
    Hongxun Huang, Zi-Yuan Liu, and Raylin Tso
    In IEEE Conference on Dependable and Secure Computing, DSC 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021 , 1–8, 2021
  5. ISPACS
    Cryptanalysis on ‘An efficient identity-based proxy signcryption using lattice’
    Zi-Yuan LiuYi-Fan Tseng, and Raylin Tso
    In International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2021, Hualien City, Taiwan, November 16-19, 2021 , 1–2, 2021

2020

  1. JIFS
    PrivGRU: Privacy-preserving GRU inference using additive secret sharing
    Shou-Ching Hsiao, Zi-Yuan LiuRaylin Tso, Da-Yu Kao, and Chien-Ming Chen
    J. Intell. Fuzzy Syst., 38, 5627–5638, 2020
  2. SBC@AsiaCCS
    Defense against N-pixel Attacks based on Image Reconstruction
    Zi-Yuan LiuPeter Shaojui Wang, Shou-Ching Hsiao, and Raylin Tso
    In Proceedings of the 8th International Workshop on Security in Blockchain and Cloud Computing, SBC@AsiaCCS 2020, Virtual Online Conference, October 6, 2020 , 3–7, 2020
  3. AsiaJCIS
    A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism
    Yi-Fan TsengZi-Yuan Liu, and Raylin Tso
    In 15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020 , 1–8, 2020
  4. AsiaJCIS
    Multi-value Private Information Retrieval using Homomorphic Encryption
    Hsiang-Chen Hsu, Zi-Yuan LiuRaylin Tso, and Kung Chen
    In 15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020 , 82–88, 2020
  5. SECRYPT
    Practical Predicate Encryption for Inner Product
    Yi-Fan TsengZi-Yuan Liu, and Raylin Tso
    In Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020 , 553–558, 2020
  6. ePrint
    A Study on Privacy-Preserving GRU Inference Framework
    Shou-Ching Hsiao, Zi-Yuan Liu, and Raylin Tso
    IACR Cryptol. ePrint Arch., 1013, 2020

2019

  1. IEEE Access
    Identity-Based Blind Multisignature From Lattices
    Raylin TsoZi-Yuan Liu, and Yi-Fan Tseng
    IEEE Access, 7, 182916–182923, 2019
  2. AsiaJCIS
    Signcryption from NTRU Lattices Without Random Oracles
    Zi-Yuan LiuRaylin TsoYi-Fan Tseng, and Masahiro Mambo
    In 14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019 , 134–141, 2019
  3. DAPPCON
    An Improved Non-Interactive Zero-Knowledge Range Proof for Decentralized Applications
    Ya Che Tsai, Raylin TsoZi-Yuan Liu, and Kung Chen
    In IEEE International Conference on Decentralized Applications and Infrastructures, DAPPCON 2019, Newark, CA, USA, April 4-9, 2019 , 129–134, 2019
  4. KES
    Malware Image Classification Using One-Shot Learning with Siamese Networks
    Shou-Ching Hsiao, Da-Yu Kao, Zi-Yuan Liu, and Raylin Tso
    In Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, Budapest, Hungary, 4-6 September 2019 , 159, 1863–1871, 2019

2018

  1. NTMS
    Policy-Controlled Signature from NTRU Lattice
    Zi-Yuan Liu, Jen-Chieh Hsu, Raylin Tso, and Tzong-Chen Wu
    In 9th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2018, Paris, France, February 26-28, 2018 , 1–5, 2018