教師個人簡歷
現職
國立中央大學
管理學院資訊管理學系
助理教授
專長
資訊安全
密碼學
隱私保護技術
Information Security
Cryptography
Privacy Protection Technologies
專長簡述
資訊安全、密碼學、隱私保護技術
最高學歷
國立政治大學
資訊科學學系
博士
相關連結
科技部學門領域
政府GRB研究專長領域
教育部學門領域
國科會計畫統計
-
具身分認證之盲式基於身分加密架構之身分撤銷機制設計
1150801~1160731
-
具身分認證之盲式基於身分加密架構之身分撤銷機制設計
1140801~1150731
期刊著作
-
Public-key encryption with filtered equality test against adaptive chosen-ciphertext attacks
Theoretical Computer Science, 1067, 2026-04-02
[ Adaptive chosen-ciphertext attacks,Filtered equality test,Generic construction,Public-key encryption ] -
On the Proof of Ownership of Digital Wallets
Cryptography, 8, 4, 2024-12-01
[ digital signature,digital wallet,proof of ownership,symmetric encryption,zero-knowledge proof ] -
Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives
Designs, Codes, and Cryptography, 92, 6, 1477-1500, 2024-06-01
[ 68P25,94A60,Attribute-based encryption,Data privacy,Expressive access control,Predicate encryption,Receiver selective-opening attack ] -
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems
Computer Standards and Interfaces, 89, 2024-04-01
[ Adaptive security,Cloud computing,Data sharing,Hierarchical delegation,Identity-based encryption ] -
Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates
IET Information Security, 2024, 1, 2024-01-01 -
Cryptanalysis of a round optimal lattice-based multisignature scheme
Information Processing Letters, 182, 2023-08-01
[ Analysis of algorithms,Cryptanalysis,Lattices,Multisignature,Unforgeability ] -
A Provably Secure Lattice-Based Fuzzy Signature Scheme Using Linear Sketch
IEEE Access, 11, 62510-62521, 2023-01-01
[ Biometrics,fuzzy signatures,lattice-based signatures,quantum resistance ] -
Public-Key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-Resistant Instantiation
Computer Journal, 65, 10, 2828-2844, 2022-10-01
[ generic construction,insider keyword guessing attacks,public-key authenticated encryption with keyword search,quantum-resistant ] -
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT
Journal of Systems Architecture, 130, 2022-09-01
[ Bidirectional keyword search,IIoT,Multi-receiver,Pairing-free ] -
Identity-Certifying Authority-Aided Identity-Based Searchable Encryption Framework in Cloud Systems
IEEE Systems Journal, 16, 3, 4629-4640, 2022-09-01
[ Cloud systems,identity-based searchable encryption,identity-certifying authority,keyword search ] -
Extension of elliptic curve Qu–Vanstone certificates and their applications
Journal of Information Security and Applications, 67, 2022-06-01
[ Authentication,Blockchain-based applications,ECQV implicit certificate,Key management ] -
Quantum-resistant anonymous identity-based encryption with trable identities
IET Information Security, 16, 2, 111-126, 2022-03-01
[ cryptographic protocols,cryptography,lattice theory,public key cryptography ] -
Designated-ciphertext searchable encryption
Journal of Information Security and Applications, 58, 2021-05-01
[ Designated-ciphertext,Insider-keyword-guessing attacks,Lattices,Quantum-resistant,Searchable encryption ] -
A generic construction of predicate proxy key re-encapsulation mechanism1
Journal of Internet Technology, 22, 5, 1185-1197, 2021-01-01
[ Generic construction,Predicate encryption,Predicate proxy reencryption,Single-hop,Unidirectional ] -
Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function
Security and Communication Networks, 2021, 2021-01-01 -
Practical inner product encryption with constant private key
Applied Sciences (Switzerland), 10, 23, 1-14, 2020-12-01
[ Constant pairing computations,Constant-size private key,Efficient decryption,Inner product encryption,Predicate encryption ] -
PrivGRU: Privacy-preserving GRU inference using additive secret sharing
Journal of Intelligent and Fuzzy Systems, 38, 5, 5627-5638, 2020-01-01
[ additive secret sharing,gated recurrent unit,MLaaS,Privacy-preserving,UC framework ] -
Distributed E-voting and E-bidding systems based on smart contract
Electronics (Switzerland), 8, 4, 2019-04-01
[ Blockchain,E-bidding,E-voting,Homomorphic encryption,Oblivious transfer,Smart contract ] -
Identity-Based Blind Multisignature from Lattices
IEEE Access, 7, 182916-182923, 2019-01-01
[ blind multisignature,Lattice-based cryptography,quantum-resistant ]
研討會著作
-
ID-Based Traitor Tracing with Relaxed Black-Box Setting for Group-Based Applications
33-39, 2024-01-01
[ Black-Box,ID-Based Encryption,Relaxed Black-Box,Traitor Tracing ] -
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation
423-436, 2022-05-30
[ cryptanalysis,generic construction,keyword search,post-quantum,public-key authenticated encryption,trapdoor privacy ] -
Cryptanalysis to Ming et al.'s Revocable Multi-Authority Attribute-Based Encryption
29-32, 2022-01-01
[ Attribute-Based Encryption,Cloud,Cryptanalysis,Elliptic Curve Cryptography,Multi-Authority,Revocable ] -
Improved proxy re-encryption scheme with equality test
37-44, 2021-08-01
[ Equality test,Improved keyword search,Proxy re-encryption,Secure data sharing ] -
Partially Blind ECDSA Scheme and Its Application to Bitcoin
2021-01-30
[ Bitcoin,Blockchain,ECDSA,Partially blind signature ] -
Cryptanalysis on 'An efficient identity-based proxy signcryption using lattice'
2021-01-01
[ Cryptanalysis,Identity-based,Lattice-based cryptosystem,Proxy signcryption ] -
Defense against N-pixel Attacks based on Image Reconstruction
3-7, 2020-10-06
[ adversarial examples,defense,image reconstruction,n-pixel attacks ] -
Multi-value Private Information Retrieval using Homomorphic Encryption
82-88, 2020-08-01
[ communication complexity,homomorphic encryption,private information retrieval ] -
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism
1-8, 2020-08-01
[ generic construction,Predicate encryption,predicate proxy re-encryption,single-hop,unidirectional ] -
Practical predicate encryption for inner product
553-558, 2020-01-01
[ Constant pairing computations,Constant-size private key,Efficient decryption,Inner product encryption,Predicate encryption ] -
Signcryption from NTRU lattices without random oracles
134-141, 2019-08-01
[ Lattice-based cryptography,NTRU,Quantum resistant,Signcryption,Standard model ] -
An improved non-interactive zero-knowledge range proof for decentralized applications
129-134, 2019-04-01
[ Blockchain,Commitment scheme,Non-interactive zero-knowledge,Privacy protection,Range proof ] -
Malware image classification using one-shot learning with siamese networks
1863-1871, 2019-01-01
[ Average Hash,Malware Image Classification,One-Shot Learning,Siamese Convolutional Neural Networks ] -
Policy-controlled signature from NTRU lattice
1-5, 2018-03-29
[ Lattice,NTRU,Policy-controlled signature,Post-quantum ]
專書
-
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
147-170, 2023-01-01
[ Authorization,Hierarchical,Multikeyword Search,Public Key Encryption ] -
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
21-38, 2022-01-01
[ Batch revocation,Blockchain,Decentralized identity,Self-sovereign ] -
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
39-56, 2022-01-01
[ Accountability,Blockchain,Confidential transaction,Threshold homomorphic encryption ] -
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
166-186, 2022-01-01
[ 1-out-of-N,Lattices,Oblivious signatures,Quantum-resistant ]
國立中央大學