Willy Susilo

From MaRDI portal
Person:300390

Available identifiers

zbMath Open susilo.willyWikidataQ8022615 ScholiaQ8022615MaRDI QIDQ300390

List of research outcomes

PublicationDate of PublicationType
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts2024-04-11Paper
A fully secure lattice-based signcryption with designated equality test in standard model2024-02-13Paper
DFE-IP: delegatable functional encryption for inner product2023-09-08Paper
Efficient unique ring signatures from lattices2023-07-28Paper
Puncturable signature: a generic construction and instantiations2023-07-28Paper
Zero-knowledge range arguments for signed fractional numbers from lattices2023-07-21Paper
Spatial encryption revisited: from delegatable multiple inner product encryption and more2023-07-21Paper
Multimodal private signatures2023-06-28Paper
Public-key watermarking schemes for pseudorandom functions2023-06-28Paper
A generalized attack on the multi-prime power RSA2023-06-02Paper
Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy2023-05-26Paper
A new attack on some RSA variants2023-05-19Paper
Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting2023-03-21Paper
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption2022-12-22Paper
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy2022-12-09Paper
A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard Model2022-10-14Paper
A novel identity-based multi-signature scheme over NTRU lattices2022-09-27Paper
Using Freivalds' algorithm to accelerate lattice-based signature verifications2022-08-30Paper
Optimal tightness for chain-based unique signatures2022-08-30Paper
Practical post-quantum signature schemes from isomorphism problems of trilinear forms2022-08-30Paper
Puncturable identity-based and attribute-based encryption from lattices2022-08-25Paper
Lattice-based public-key encryption with equality test supporting flexible authorization in standard model2022-08-25Paper
Attribute based broadcast encryption with short ciphertext and decryption key2022-08-19Paper
Cryptanalysis of RSA variants with primes sharing most significant bits2022-07-13Paper
Lattice-based IBE with equality test supporting flexible authorization in the standard model2022-07-06Paper
Lattice-based HRA-secure attribute-based proxy re-encryption in standard model2022-06-24Paper
Privacy-preserving file sharing on cloud storage with certificateless signcryption2022-05-31Paper
Password protected secret sharing from lattices2022-03-21Paper
Chosen-ciphertext lattice-based public key encryption with equality test in standard model2022-02-01Paper
Wildcarded identity-based encryption from lattices2022-01-18Paper
Group encryption: full dynamicity, message filtering and code-based instantiation2021-12-21Paper
Generic construction for tightly-secure signatures from discrete log2021-09-27Paper
A Wiener-type attack on an RSA-like cryptosystem constructed from cubic Pell equations2021-09-06Paper
Lattice blind signatures with forward security2021-06-08Paper
A new improved AES S-box with enhanced properties2021-06-08Paper
Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model2021-06-08Paper
Short principal ideal problem in multicubic fields2021-05-03Paper
Certificateless aggregate signature scheme secure against fully chosen-key attacks2021-03-31Paper
Leakage-resilient group signature: definitions and constructions2021-03-18Paper
Efficient chameleon hash functions in the enhanced collision resistant model2021-03-18Paper
Accountable identity-based encryption with distributed private key generators2021-03-16Paper
Trapdoor delegation and HIBE from middle-product LWE in standard model2021-02-23Paper
Efficient anonymous multi-group broadcast encryption2021-02-23Paper
Generalized public-key cryptography with tight security2021-02-05Paper
Robust digital signature revisited2020-10-21Paper
Universal designated verifier signature scheme with non-delegatability in the standard model2020-10-07Paper
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters2020-09-22Paper
Privacy-enhanced attribute-based private information retrieval2020-09-08Paper
Privacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attack2020-09-08Paper
Witness-based searchable encryption2020-09-08Paper
A generic scheme of plaintext-checkable database encryption2020-07-20Paper
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes2020-07-20Paper
Ciphertext-delegatable CP-ABE for a dynamic credential: a modular approach2020-05-27Paper
Location based encryption2020-05-27Paper
Improving the security of the DRS scheme with uniformly chosen random noise2020-05-27Paper
A lattice-based public key encryption with equality test in standard model2020-05-27Paper
The Wiener attack on RSA revisited: a quest for the exact bound2020-05-27Paper
Dimensionality reduction and visualization of network intrusion detection data2020-05-27Paper
Revocable identity-based encryption with server-aided ciphertext evolution2020-04-06Paper
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts2020-01-29Paper
Lattice-based IBE with equality test in standard model2020-01-10Paper
Towards enhanced security for certificateless public-key authenticated encryption with keyword search2020-01-10Paper
Improved cryptanalysis of the KMOV elliptic curve cryptosystem2020-01-10Paper
Enhancing Goldreich, Goldwasser and Halevi's scheme with intersecting lattices2019-11-28Paper
Strongly leakage resilient authenticated key exchange, revisited2019-11-07Paper
Cloud-based data-sharing scheme using verifiable and CCA-secure re-encryption from indistinguishability obfuscation2019-10-31Paper
Cooperative secret sharing using QR codes and symmetric keys2019-10-30Paper
Leakage-resilient ring signature schemes2019-01-18Paper
An efficient key-policy attribute-based searchable encryption in prime-order groups2018-11-07Paper
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system2018-10-10Paper
Policy controlled system with anonymity2018-09-24Paper
Introduction to Security Reduction2018-07-18Paper
How to protect privacy in optimistic fair exchange of digital signatures2018-05-18Paper
Identity-based quotable ring signature2018-05-17Paper
Functional encryption for computational hiding in prime order groups via pair encodings2018-01-26Paper
A generalized attack on RSA type cryptosystems2017-11-16Paper
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample2017-11-15Paper
Dirichlet product for Boolean functions2017-11-10Paper
Strong authenticated key exchange with auxiliary inputs2017-09-15Paper
A note on the strong authenticated key exchange with auxiliary inputs2017-09-15Paper
A general framework for secure sharing of personal health records in cloud system2017-09-15Paper
A QR code watermarking approach based on the DWT-DCT technique2017-08-25Paper
Mergeable and revocable identity-based encryption2017-08-25Paper
Dynamic searchable symmetric encryption with physical deletion and small leakage2017-08-25Paper
Identity-Based Secure DistributedData Storage Schemes2017-06-20Paper
<inline-formula><tex-math>$k$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="huang-ieq1-2366741.gif"/></alternatives></inline-formula>-Times Attribute-Based Anonymous Access Control for Cloud Computing2017-05-16Paper
Two-Factor Data Security Protection Mechanism for Cloud Storage System2017-05-16Paper
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions2017-02-01Paper
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction2017-01-06Paper
Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update2017-01-06Paper
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups2016-10-21Paper
One-Round Strong Oblivious Signature-Based Envelope2016-09-02Paper
Edit Distance Based Encryption and Its Application2016-09-02Paper
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing2016-09-02Paper
A New Attack on Three Variants of the RSA Cryptosystem2016-09-02Paper
Towards Efficient Fully Randomized Message-Locked Encryption2016-08-31Paper
Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy2016-08-31Paper
Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing2016-08-31Paper
Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance2016-08-31Paper
Generalized closest substring encryption2016-06-27Paper
Strongly Leakage-Resilient Authenticated Key Exchange2016-04-08Paper
Provably Secure Identity Based Provable Data Possession2016-01-27Paper
Identity-based chameleon hashing and signatures without key exposure2016-01-14Paper
Solutions to the anti-piracy problem in oblivious transfer2015-12-30Paper
Efficient dynamic threshold identity-based encryption with constant-size ciphertext2015-12-08Paper
Lattice Reduction for Modular Knapsack2015-12-04Paper
Improved Identity-Based Online/Offline Encryption2015-10-20Paper
Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy2015-10-20Paper
LLL for ideal lattices: re-evaluation of the security of Gentry-Halevi's FHE scheme2015-09-29Paper
Public key encryption with keyword search secure against keyword guessing attacks without random oracle2015-09-23Paper
https://portal.mardi4nfdi.de/entity/Q55009152015-08-10Paper
Collusion-resistant convertible ring signature schemes2015-08-05Paper
PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption2015-07-27Paper
Efficient Hidden Vector Encryption with Constant-Size Ciphertext2015-07-24Paper
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents2015-06-25Paper
Privacy-preserving encryption scheme using DNA parentage test2015-05-18Paper
Optimistic fair exchange in the enhanced chosen-key model2014-12-02Paper
Efficient algorithms for secure outsourcing of bilinear pairings2014-12-02Paper
Ambiguous optimistic fair exchange: definition and constructions2014-12-02Paper
A New Signature Scheme Without Random Oracles from Bilinear Pairings2014-08-21Paper
Escrowed Linkability of Ring Signatures and Its Applications2014-08-21Paper
On the Internal Structure of Alpha-MAC2014-08-21Paper
The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles2014-08-01Paper
P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures2014-03-28Paper
Attribute-based optimistic fair exchange: how to restrict brokers with policies2014-03-13Paper
Efficient Semi-static Secure Broadcast Encryption Scheme2014-02-18Paper
Identity based identification from algebraic coding theory2014-01-13Paper
Efficient and secure stored-value cards with leakage resilience2013-08-19Paper
Adaptive Precision Floating Point LLL2013-06-28Paper
Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt”2013-06-28Paper
Membership Encryption and Its Applications2013-06-28Paper
Fairness in Concurrent Signatures Revisited2013-06-28Paper
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction2013-02-19Paper
Provably secure proxy signature scheme from factorization2013-01-24Paper
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search2012-11-27Paper
Efficient Escrow-Free Identity-Based Signature2012-11-06Paper
On Capabilities of Hash Domain Extenders to Preserve Enhanced Security Properties2012-11-06Paper
Breaking a 3D-Based CAPTCHA Scheme2012-11-01Paper
Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes2012-11-01Paper
Efficient oblivious transfers with access control2012-09-30Paper
The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles2012-07-20Paper
Group-oriented fair exchange of signatures2012-07-13Paper
A Pre-computable Signature Scheme with Efficient Verification for RFID2012-06-29Paper
Enhanced STE3D-CAP: A Novel 3D CAPTCHA Family2012-06-29Paper
Fault Analysis of the KATAN Family of Block Ciphers2012-06-29Paper
On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers2012-06-29Paper
Identity-based trapdoor mercurial commitments and applications2011-10-10Paper
Concurrent Signatures with Fully Negotiable Binding Control2011-09-16Paper
Provably secure server-aided verification signatures2011-08-28Paper
Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase2011-07-29Paper
Electronic Cash with Anonymous User Suspension2011-07-07Paper
Certificateless threshold signature scheme from bilinear maps2011-01-28Paper
Improvement of Lattice-Based Cryptography Using CRT2010-12-21Paper
Towards a Cryptographic Treatment of Publish/Subscribe Systems2010-12-07Paper
A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange2010-11-26Paper
A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)2010-10-12Paper
Differential Fault Analysis of LEX2010-09-10Paper
Recursive Lattice Reduction2010-09-10Paper
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships2010-07-13Paper
Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting2010-05-28Paper
Escrowed Deniable Identification Schemes2010-04-23Paper
Anonymous Conditional Proxy Re-encryption without Random Oracle2009-12-11Paper
How to Prove Security of a Signature with a Tighter Security Reduction2009-12-11Paper
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?2009-12-11Paper
Universal Designated Verifier Signatures with Threshold-Signers2009-10-28Paper
https://portal.mardi4nfdi.de/entity/Q36390712009-10-28Paper
A five-round algebraic property of AES and its application to the ALPHA-MAC2009-10-12Paper
Enhanced Target Collision Resistant Hash Functions Revisited2009-08-11Paper
Efficient Non-interactive Range Proof2009-07-23Paper
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders2009-06-25Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Asymmetric Group Key Agreement2009-05-12Paper
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems2009-04-29Paper
Publicly Verifiable Privacy-Preserving Group Decryption2009-04-29Paper
Privacy for Private Key in Signatures2009-04-29Paper
Short fail-stop signature scheme based on factorization and discrete logarithm assumptions2009-03-17Paper
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure2009-03-10Paper
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme2009-03-10Paper
Fuzzy Identity-based Encryption: New and Efficient Schemes2009-03-09Paper
Concurrent Signatures without a Conventional Keystone2009-03-09Paper
Certificateless Signature Revisited2009-03-06Paper
Practical Compact E-Cash2009-03-06Paper
Efficient lattice-based signature scheme2009-02-24Paper
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures2009-02-24Paper
Efficient Partially Blind Signatures with Provable Security2009-02-10Paper
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility2009-02-10Paper
Ambiguous Optimistic Fair Exchange2009-02-10Paper
Server-Aided Verification Signatures: Definitions and New Constructions2009-01-27Paper
Sanitizable Signatures Revisited2009-01-09Paper
Constant-Size Dynamic k-TAA2008-11-27Paper
Efficient generic on-line/off-line (threshold) signatures without key exposure2008-11-20Paper
Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework)2008-11-20Paper
Certificate-Based Signature Schemes without Pairings or Random Oracles2008-11-20Paper
A Five-Round Algebraic Property of the Advanced Encryption Standard2008-11-20Paper
RFID Privacy Models Revisited2008-10-27Paper
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings2008-09-09Paper
Multi-party Concurrent Signatures2008-06-17Paper
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search2008-06-17Paper
Traceable and Retrievable Identity-Based Encryption2008-06-13Paper
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles2008-04-24Paper
Compact E-Cash from Bounded Accumulator2008-04-17Paper
A Generic Construction for Universally-Convertible Undeniable Signatures2008-04-15Paper
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature2008-04-11Paper
New Construction of Group Secret Handshakes Based on Pairings2008-03-25Paper
Formal Definition and Construction of Nominative Signature2008-03-25Paper
(Convertible) Undeniable Signatures Without Random Oracles2008-03-25Paper
Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature)2008-03-18Paper
Short E-Cash2008-03-17Paper
A Digital Signature Scheme Based on CVP  ∞2008-03-05Paper
Progress in Cryptology - INDOCRYPT 20032007-11-29Paper
Progress in Cryptology - INDOCRYPT 20032007-11-29Paper
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length2007-11-29Paper
Event-Oriented k-Times Revocable-iff-Linked Group Signatures2007-09-07Paper
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security2007-09-07Paper
Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures2007-09-04Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Cryptology and Network Security2006-11-14Paper
Cryptology and Network Security2006-11-14Paper
Information and Communications Security2006-10-24Paper
Information Security2006-10-20Paper
Information Security and Privacy2006-06-22Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Financial Cryptography and Data Security2005-12-22Paper
Public Key Cryptography - PKC 20052005-12-07Paper
Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'032005-11-22Paper
Information Security Practice and Experience2005-09-13Paper
Information Security and Privacy2005-09-07Paper
Information and Communications Security2005-08-19Paper
Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making2005-08-17Paper
Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making2005-08-17Paper
Applied Cryptography and Network Security2005-06-13Paper
Applied Cryptography and Network Security2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q44724282004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44133132003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q31497082002-09-26Paper
https://portal.mardi4nfdi.de/entity/Q31497622002-09-26Paper
https://portal.mardi4nfdi.de/entity/Q27086332001-07-17Paper
https://portal.mardi4nfdi.de/entity/Q27076032001-07-08Paper
https://portal.mardi4nfdi.de/entity/Q27211372001-07-01Paper
https://portal.mardi4nfdi.de/entity/Q44950802000-08-10Paper
https://portal.mardi4nfdi.de/entity/Q42506321999-06-17Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Willy Susilo