Show/Hide Right Push Menu漢堡選單漢堡選單漢堡選單


首頁 / 師資介紹
左瑞麟 教授兼資訊安全碩士學程主任、諮詢委員
職稱 教授兼資訊安全碩士學程主任、諮詢委員
校內分機 62328
類別 專任
研究專長 密碼學、資訊安全、 網路安全、區塊鏈結與隱私保護技術
  • Cheng-Yi Lee*;Zi-Yuan Liu*;左瑞麟*;Yi-Fan Tseng*, 2022.09, 'Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT, ' Journal of Systems Architecture, Vol.130, pp.102642.(SCIE, EI, DBLP, SCOPUS)(*為通訊作者)
  • Zi-Yuan Liu;Yi-Fan Tseng;左瑞麟*;Masahiro Mambo;Yu-Chi Chen, 2022.09, 'Quantum-resistant anonymous identity-based encryption with trable identities, ' IET Information Security, Vol.16, No.2, pp.111-126.(SCIE, EI, ACM, DBLP, IEEE, SCOPUS)(*為通訊作者)
  • Zi-Yuan Liu;Yi-Fan Tseng;左瑞麟*;Peter Shaojui Wang;Qin-Wen Su, 2022.05, 'Extension of elliptic curve Qu–Vanstone certificates and their applications, ' Journal of Information Security and Applications, Vol.67, pp.103176.(SCIE, EI, DBLP, IEEE, SCOPUS)(*為通訊作者)
  • Shou-Ching Hsiao;劉子源;左瑞麟*;Da-Yu Kao;Chien-Ming CHen, 2021.05, 'PrivGRU: Privacy-preserving GRU inference using additive secret sharing, ' Journal of Intelligent & Fuzzy Systems, Vol.5, No.38, pp.5627-5638.(DBLP)(*為通訊作者)
  • 劉子源*;曾一凡*;左瑞麟*;Masahiro Mambo*, 2021.05, 'Designated-ciphertext searchable encryption, ' Journal of Information Security and Applications, Vol.58,, DBLP, SCOPUS)(*為通訊作者)
  • 曾一凡;劉子源*;許仁傑;左瑞麟, 2021.02, 'Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function, ' Security and Communication Networks, Vol.2021, pp.1-12.(SCIE, EI, ACM, DBLP, SCOPUS)(*為通訊作者)
  • Tsu-yang Wu;Zhiyuan Lee;Lei Yang;Jia-Ning Luo;Raylin Tso*, 2021.01, 'Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks, ' The Journal of Supercomputing, Vol.77, pp.6992-7020.(SCIE, EI, ACM, DBLP, SCOPUS)(*為通訊作者)
  • Da-Yu Kao*;Chou-Ching Hsiao;左瑞麟, 2020.11, 'Intelligence-led response: turning theory into law enforcement practice in cyber security incidents, ' International Journal of Electronic Business, Vol.4, No.15, pp.352-350.(DBLP)(*為通訊作者)
  • 左瑞麟*;Kaibin Huang;Yu-Chi Huang;SK MD Mizanur Rahman;Tsu-yang Wu, 2020.08, 'Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing, ' IEEE Access, Vol.8, pp.152551-152564.(SCIE, EI, DBLP)(*為通訊作者)
  • Huawang Qin*;Wallace K. S. Tang, 2020.01, 'Quantum (t, n) threshold group signature based on Bell state, ' Quantum Inf Process, Vol.19, No.2, pp.71.(SCI, SCOPUS)(*為通訊作者)
  • 左瑞麟*;Zi-Yuan Liu;Yi-Fan Tseng, 2019.12, 'Identity-Based Blind Multisignature From Lattices, ' IEEE Access, Vol.7, pp.182916 - 182923.(SCIE, EI, SCOPUS)(*為通訊作者)
  • 左瑞麟*, 2019.12, 'Two-in-one oblivious signatures, ' Future Generation Computer Systems, Vol.101, pp.467-475.(EI, DBLP, SCI, SCOPUS)(*為通訊作者)
  • 左瑞麟*;Zi-Yuan Liu;Jen-Ho Hsiao, 2019.11, 'Distributed E-Voting and E-Bidding Systems Based on Smart Contract, ' electronics, Vol.8, No.4, pp.422.(SCIE, SCOPUS)(*為通訊作者)
  • Yu-Chi Chen*;Xin Xie;Peter Shaojui Wang;左瑞麟, 2019.11, 'Witness-based searchable encryption with optimal overhead for cloud-edge computing, ' Future Generation Computer Systems, Vol.100, pp.715-723.(EI, DBLP, SCI, SCOPUS)(*為通訊作者)
  • Huawang Qin*;左瑞麟;Yuewei Dai, 2018.09, 'Quantum secret sharing by using Fourier transform on orbital angular momentum, ' IET INformation Security, Vol.13, No.2, pp.104-108.(EI, DBLP, SCI, SCOPUS)(*為通訊作者)
  • Huawang Qin*;Wallace K. S. Tang;左瑞麟, 2018.07, 'Batch quantum multi-proxy signature, ' Optical and Quantum Electronics, Vol.50, No.12, pp.450.(SCIE, DBLP)(*為通訊作者)
  • Huawang Qin*;左瑞麟, 2018.06, 'Threshold quantum state sharing based on entanglement swapping, ' Quantum Information Processing, Vol.17, No.6, pp.142.(DBLP)(*為通訊作者)
  • Huawang Qin*;Wallace K. S. Tang;左瑞麟, 2018.05, 'Establishing rational networking using the DL04 quantum secure direct communication protocol, ' Quantum Information Processing, Vol.17, No.6, pp.152.(DBLP)(*為通訊作者)
  • Huawang Qin*; Wallace K. S. Tang;左瑞麟, 2018.05, 'Multiparty to multiparty quantum secret sharing, ' Modern Physics Letters B, Vol.32, No.29, pp.1850350.(SCIE, EI, SCI)(*為通訊作者)
  • Li Xu*;Chi-Yao Weng;Lun-Pin Yuan;Mu-En Wu;左瑞麟;Hung-Min Sun*, 2018.03, 'A shareable keyword search over encrypted data in cloud computing, ' The Journal of Supercomputing, Vol.74, No.1, pp.1001-1023.(SCIE, EI, DBLP)(*為通訊作者)
  • Huawang Qin*;左瑞麟, 2018.02, 'High-capacity quantum secret sharing based on orbital angular momentum, ' Quantum Information & Computation, Vol.18, No.7,8, pp.579-591.(DBLP)(*為通訊作者)
  • Huawang Qin*;左瑞麟;Yuewei Dai, 2018.01, 'Multi-dimensional quantum state sharing based on quantum Fourier transform, ' Quantum Information Processing, Vol.17, No.3, pp.48.(DBLP)(*為通訊作者)
  • KaibinHuang;左瑞麟*;Yu-Chi Chen, 2017.11, 'Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption, ' Journal of Computer and System Sciences, Vol.89, pp.400-409.(SCIE, DBLP, IEEE, SCOPUS)(*為通訊作者)
  • 左瑞麟*;Abdulhameed Alelaiwi;Sk Md Mizanur Rahman;Mu-En Wu;M. Shamim Hossain, 2017.10, 'Privacy-Preserving Data Communication Through Secure Multi-Party Computation in Healthcare Sensor Cloud, ' Journal of Signal Processing Systems, Vol.89, No.1, pp.51-59.(EI, DBLP, SCOPUS)(*為通訊作者)
  • Yu-Chi Chen,*;左瑞麟;Gwoboa Horng;Chun-I Fan,;Ruei-Hau Hsu, 2015.10, 'Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of two Schemes, ' Journal of Information Science and Engineering, Vol.31, No.1, pp.297-314.(SCIE, EI, DBLP, SCI, SCOPUS)(*為通訊作者)
  • 黃凱彬*;左瑞麟*;Yu-Chi Chen;Sk Md Mizanur Rahman;Ahmad Almogren;Atif Alamri, 2015.04, 'PKE-AET: Public Key Encryption with Authorized Equality Test, ' The Computer Journal, Vol.58, No.10, pp.2689-2697.(SCIE, EI, DBLP, SCOPUS)(*為通訊作者)
  • Chien-Ming Chen*;Tsu-Yang Wu;左瑞麟;Masahiro Mambo;Mu-En Wu, 2015.03, 'On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks, ' Journal of Universal Computer Science, Vol.21, No.3, pp.406-418.(SCIE, DBLP)(*為通訊作者)
  • Yu‐Chi Chen*;左瑞麟; Masahiro Mambo; Kaibin Huang; Gwoboa Horng, 2015.01, 'Certificateless aggregate signature with efficient verification., ' Security and Communication Networks, Vol.8, No.13, pp.2232-2243.(SCIE, EI, DBLP, SCOPUS)(*為通訊作者)
  • Mu-En Wu*;左瑞麟;Hung-Ming Sun, 2014.10, 'On the improvement of Fermat factorization using a continued fraction technique, ' Future Generation Computer Systems, Vol.30, pp.162-168.(SCIE, EI, DBLP, SCI, SCOPUS)(*為通訊作者)
  • Cheonshik Kim*;Dongkyoo Shin;Dongil Shin;左瑞麟;Chin-Nung Yang, 2014.06, 'A secret sharing scheme for EBTC using steganography., ' Journal of Intelligent Manufacturing, Vol.25, No.2, pp.241-249.(EI, DBLP, SCOPUS)(*為通訊作者)
  • 左瑞麟*, 2013.11, 'Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol, ' The Journal of Supercomputing, Vol.66, No.2, pp.863-874.(EI, DBLP, SCI)(*為通訊作者) 參考連結
  • 黃凱彬*;左瑞麟, 2013.09, 'New Convertible Ring Signatures Based on RSA, ' Journal of Information, Vol.0, No.0, pp.1-12.(SCIE)(*為通訊作者)(本論著未刊登但已被接受)
  • Yu-Chi Chen*;左瑞麟;Gwoboa Horng, 2013.07, 'Security Analysis of Choi et al.'s Certificateless Short Signature Scheme, ' Journal of Information Hiding and Multimedia Signal Processing, Vol.4, No.3, pp.146-153.(EI)(*為通訊作者) 參考連結
  • 左瑞麟*, 2013.05, 'A new way to generate a ring: Universal ring signature, ' Computers & Mathematics with Applications, Vol.65, No.9, pp.1350-1359.(EI, DBLP, SCI)(*為通訊作者) 參考連結
  • 左瑞麟*;Xinyi Hugan;Willy Susilo, 2012.06, 'Strongly secure certificateless short signatures, ' Journal of Systems and Software, Vol.85, No.6, pp.1409-1417.(SCIE, EI, ACM, DBLP, SCI, SCOPUS)(*為通訊作者)
  • 左瑞麟*;Cheonshik Kim;Xun Yi, 2011.10, 'Certificateless Message recovery signatures providing Girault’s level-3 security, ' Journal of Shanghai Jiaotong University (Science), Vol.16, No.5, pp.577-585.(EI)(*為通訊作者) 參考連結
  • 左瑞麟*, 2011.05, 'Convertible ring signatures with gradual revelation of non-signers, ' Security and Communication Networks, Vol.5, No.3, pp.279-286.(SCIE, DBLP)(*為通訊作者) 參考連結
  • 左瑞麟*;Xun Yi;Xinyi Huang, 2011.01, 'Efficient and short certificateless signatures secure against realistic adversaries, ' The Journal of Supercomputing, Vol.55, No.2, pp.173-191.(EI, DBLP, SCI)(*為通訊作者) 參考連結
  • Raylin Tso*, 2008.12, 'Signcryption revisited: security analysis and improvement schemes, ' Journal of Scientific & Practical Computing, Vol.2, No.2, pp.13-22.(*為通訊作者)
  • Raylin Tso*;Ying Miao;Eiji Okamoto, 2007.01, 'On algorithms for searching a consistent set of shares in a threshold scheme and the related covering problem, ' The Journal of Combinatorial Mathematics and Combinatorial Computing, Vol.60, pp.47-63.(*為通訊作者) 參考連結
  • Raylin Tso*;Ying Miao;Takeshi Okamoto;Eiji Okamoto, 2005, 'A share-correctable protocol for the Shamir threshold scheme and its application to participant enrollment, ' Transactions of Information Processing Society of Japan, Vol.46, No.8, pp.1880-1888.(Science Links Japan)(*為通訊作者) 參考連結
  • Raylin Tso*;Ying Miao;Takeshi Okamoto;Eiji Okamoto, 2005, 'How to verify the threshold t of the Shamir’s (t,n)-threshold scheme, ' Transactions of Information Processing Society of Japan, Vol.46, No.8, pp.1824-1833.(Science Links Japan)(*為通訊作者) 參考連結
  • Jin-Shiuan You;Zi-Yuan Liu;左瑞麟*;Yi-Fan Tseng;Masahiro Mambo, 2022.09, 'Quantum-Resistant 1-out-of-N Oblivious Signatures from Lattices, ' Lecture Notes in Computer Science book series (LNCS,volume 13504), IEICE, pp.166-186.(EI, SCOPUS)(*為通訊作者)
  • Zi-Yuan Liu;Yi-Fan Tseng;左瑞麟*;Masahiro Mambo;Yu-Chi Chen, 2022.05, 'Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation, ' Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, ACM, pp.423-436.(EI, ACM, DBLP, SCOPUS)(*為通訊作者)
  • 曾一凡*;劉子源;左瑞麟, 2021.09, 'Practical Predicate Encryption for Inner Product, ' Proceedings of Secrypt 2020, Fordham University, pp.553-558.(DBLP)(*為通訊作者)
  • 劉子源;Peter Shaojui Wang;Chou-Ching Hsiao;左瑞麟*, 2021.08, 'Defense against N-pixel Attacks based on Image Reconstruction, ' ASIA CCS '20: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ACM, pp.3-7.(DBLP)(*為通訊作者)
  • 曾一凡*;劉子源;左瑞麟, 2021.08, 'A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism, ' Proceedings of AsiaJCIS2020, NCCU, pp.1-8.(DBLP, SCOPUS)(*為通訊作者)
  • 徐珦朕;劉子源;左瑞麟*;陳恭, 2021.08, 'Multi-value Private Information Retrieval using Homomorphic Encryption, ' Proceedings of AsiaJCIS2020, NCCU, pp.82-88.(DBLP, IEEE)(*為通訊作者)
  • Peter Shaojui Wang*;Pin-Yen Huang;Yu-An Tsai;左瑞麟, 2021.08, 'An Enhanced Mondrian Anonymization Model based on Self-Organizing Map, ' Proceedings of AsiaJCIS2020, NCCU, pp.97-100.(DBLP, IEEE)(*為通訊作者)
  • Hongxun Huang;劉子源;左瑞麟*, 2021.01, 'Partially Blind ECDSA Scheme and Its Application to Bitcoin, ' Proceedings of DSC 2021, The University of Aizu, pp.1-8.(EI, IEEE)(*為通訊作者)
  • Jen-Chieh Hsu*;左瑞麟;Yu-Chi Chen;Mu-En Wu, 2018.02, 'Oblivious Transfer Protocols Based on Commutative Encryption, ' Proceedings of NTMS2018, IFIP, pp.1-5.(DBLP)(*為通訊作者)
  • Zi-Yuan Liu*;Jen-Chieh Hsu;左瑞麟;Tzong-Chen Wu, 2018.02, 'Policy-Controlled Signature from NTRU Lattice, ' Proceedings of NTMS2018, IFIP.(DBLP, IEEE)(*為通訊作者)
  • Kaibin Huang*;左瑞麟*, 2017.07, 'Provable secure dual-server public key encryption with keyword search, ' Proceedgins of IVSW, IEEE, pp.39-44.(DBLP, IEEE)(*為通訊作者)
  • Chien-Ming Chen*;Linlin Xu;Tsu-Yang Wu;Mu-En Wu;左瑞麟, 2017.05, 'On the Security of a Three-Party-Authenticated Key Agreement Scheme based on Chaotic Maps, ' The 2nd International Conference on Computer Science and Technology [CST2017], 北方工業大學.(EI)(*為通訊作者)
  • 左瑞麟*;Chen-Yi Lin, 2017.03, 'An Off-Line Mobile Payment Protocol Providing Double-Spending Detection, ' Proceedings of AINA2017, 淡江大學, pp.570-575.(DBLP, IEEE)(*為通訊作者)
  • kai-Chi Chang*;左瑞麟;Min-Chun Tsai, 2017.03, 'IoT sandbox: to analysis IoT malware Zollard, '.(*為通訊作者)
  • 左瑞麟*;Yi-Shio Jheng, 2016.10, 'Security analysis of a NTRU-based mutual authentication scheme, ' Proceedings of APNOMS2017, IEEE, pp.2-3.(DBLP)(*為通訊作者)
  • Shang-Wen Chen;左瑞麟*, 2016.08, 'NFC-based Mobile Payment Protocol with User Anonymity, ' Proceedings of AsiaJCIS2016, Kyushu University, pp.24-30.(DBLP)(*為通訊作者)
  • 左瑞麟*, 2016.08, 'Two-in-One Oblivious Signatures Secure in the Random Oracle Model, ' NSS2016, NTUST.(*為通訊作者)
  • Kaibin Huang*;Yu-Chi Chen;左瑞麟, 2015.08, 'Semantic Secure Public Key Encryption with Filtered Equality Test - PKE-FET, ' Proceedings of 12th International Conference on Security and Cryptography, IACR, pp.327-334.(DBLP, SCOPUS)(*為通訊作者)
  • Jeng-Shyang Pan;左瑞麟*;Mu-En Wu;Chieng-Ming Chen, 2015.08, 'Security Analysis of an Anonymous Authentication Scheme Based on Smart Cards and Biometrics for Multi-Server Environments, ' Proceedings of ICGEC2015, University of Computer Studies.(DBLP)(*為通訊作者)
  • Mu-En Wu*;Hui-Huang Tsai;左瑞麟;Chi-Yao Weng, 2015.06, 'An Adaptive Kelly Betting Strategy for Finite Repeated Games, ' Proceedings of ICGEC2015, University of Computer Studies.(DBLP)(*為通訊作者)
  • Chien-Ming Chen*;Jeng-Shyang Pan;左瑞麟;Szu-Wei Huang;Mu-En Wu, 2014.10, 'Pitfalls in an Ultra-lightweight Authentication Protocol for Low-cost RFID, ' Proceeding of IIH-MSP2014, Waseda University.(*為通訊作者)
  • Chun-Wei Lin*;Wensheng Gan;Tzung-Pei Hong;左瑞麟, 2014.06, 'An incremental algorithm for maintaining the built FUSP trees based on the pre-large concepts, ' Proceeding of the First Euro-China Conferenceon the Intelligent Data Analysis and Applications, 哈爾濱工業大學深圳分院, pp.135-144.(*為通訊作者)
  • Ci-Rong Li*;Chien-Ming Chen;Tsui-Ping Chung;Mu-En We;左瑞麟, 2014.05, 'A Condition-based Location Authentication Protocol for Mobile Devices, ' Proceeding of CMCSN 2014, 東海大學.(*為通訊作者)
  • Chung-Nan Chen*;左瑞麟;楊中皇, 2013.07, 'Design and Implementation of Digital Forensic Software for iPhone, ' Design and Implementation of Digital Forensic Software for iPhone, ‧ Korea Institute on Information Security and Cryptology (KIISA), Kore, pp.1-6.(*為通訊作者)
  • 左瑞麟*, 2013.04, 'Security Weakness in a Privacy Preserved Two-party Equality Testing Protocol, ' Proceedings of ICIPM 2013, AICIT.(*為通訊作者)
  • 左瑞麟*, 2011.12, 'A new way to generate a ring: universal ring signature, ' Proceedings of ACSA 2011, The Future Technology Research Association International (FTRA).(*為通訊作者) 參考連結
  • 左瑞麟*, 2011.12, 'Certificateless signatures with message recovery, ' Proceedings of ACSA 2011, The Future Technology Research Association International (FTRA).(*為通訊作者)
  • 黃凱彬*;左瑞麟, 2011.12, 'New Convertible Ring Signatures Based on RSA, ' Proceedings of ACSA 2011, The Future Technology Research Association International (FTRA).(*為通訊作者)
  • 左瑞麟*, 2010.12, 'Convertible Ring Signatures with Gradual Revelation of Non-Signers, ' Proceedings of ACSA 2010, The Future Technology Research Association International (FTRA).(*為通訊作者) 參考連結
  • 左瑞麟*;Xun Yi;Tadahiko Ito;Takeshi Okamoto;Eiji Okamoto, 2010.10, 'Design and analysis of "flexible" k-out-of-n signatures, ' Lecture Notes in Computer Science Vol. 6407, IEEE / 西安工業大學, pp.255-267.(SCIE, EI, DBLP)(*為通訊作者)
  • 左瑞麟*;Xun Yi, 2010.09, 'Certificateless proxy signature and its extension to blind signature, ' Proceedings of International Conference on Network and System Security (NSS2010), IEEE, pp.542-547.(EI)(*為通訊作者)
  • Xun Yi*;左瑞麟, 2009.10, 'ID-Based Group Password-Authenticated Key Exchange, ' Lecture Notes in Computer Science Vol. 5824, IEICE / IPSJ, pp.192-211.(SCIE, EI)(*為通訊作者)
  • 左瑞麟*;Takeshi Okamoto;Eiji Okamoto, 2009.04, 'Efficient Short Signatures from Pairing, ' Proceedings of ITNG2009.(EI, DBLP, IEEE)(*為通訊作者) 參考連結
  • 左瑞麟*;Xun Yi;Xinyi Huang, 2008.12, 'Efficient and Short Certificateless Signature, ' Lecture Notes in Computer Science Vol. 5339, The University of Hong Kong, pp.64-79.(SCIE, EI, DBLP, IEEE, CITESEEN)(*為通訊作者) 參考連結
  • 左瑞麟*, 2008.12, 'Signcryption Scheme with Standardized Verification Algorithm, ' Proceedings of 2008 IEEE Aisa-Pacific Services Computing Conference, pp.1369-1374.(EI, DBLP, IEEE)(*為通訊作者) 參考連結
  • Atsushi Koide*;左瑞麟;Takeshi Okamoto;Eiji Okamoto, 2008.12, 'A Restricted Undeniable Designated Verifier Signature, ' Proceedings of 2008 IEEE Aisa-Pacific Services Computing Conference, pp.1375-1380.(EI, DBLP, IEEE)(*為通訊作者) 參考連結
  • Atsushi Koide*;左瑞麟;Eiji Okamoto, 2008.12, 'A Sanitizing Signature Scheme with Indexing, ' Proceedings of EUC 2008, pp.16-21.(EI, DBLP, IEEE)(*為通訊作者) 參考連結
  • Atsushi Koide*;左瑞麟;Eiji Okamoto, 2008.12, 'Convertible Undeniable Partially Blind Signature from Bilinear Pairings, ' Proceedings of EUC 2008, pp.77-82.(EI, DBLP, IEEE)(*為通訊作者) 參考連結
  • 左瑞麟*;Xun Yi;Takeshi Okamoto;Eiji Okamoto, 2008.07, 'Efficient convertible limited verifier signatures, ' IEEE International Symposium on Informatoin Theory, IEEE Information Theory Society.(EI, DBLP, IEEE)(*為通訊作者) 參考連結
  • Raylin Tso*;Takeshi Okamoto;Eiji Okamoto, 2008.04, '1-out-of-n oblivious signatures, ' Lecture notes in Computer Sciences Vol 4991, University of Wollongong, pp.45-55.(SCIE, DBLP)(*為通訊作者) 參考連結
  • Raylin Tso*;Xun Yi;Eiji Okamoto, 2007.12, 'ID-based key agreement for dynamic peer groups in mobile computing environments, ' Proceedings of the 2007 IEEE Asia-Pacific Services Computing Conference, University of Tsukuba, pp.103-110.(*為通訊作者)
  • Raylin Tso*;Chunxiang Gu;Takeshi Okamoto;Eiji Okamoto, 2007.12, 'Efficient ID-based digital signatures with message recovery, ' Lecture Notes in Computer Science, Vol. 4856, Nanyang Technological University, pp.47-59.(SCIE, DBLP)(*為通訊作者)
  • Raylin Tso*;Juanma Gonzalez Nieto;Takeshi Okamoto;Colin Boyd;Eiji Okamoto, 2007.12, 'Verifier-key-flexible universal designated-verifier signatures, ' Lecture Notes in Computer Science, Vol.4887, Institute of Mathematics and Its Applications, pp.403-421.(SCIE, DBLP)(*為通訊作者)
  • Raylin Tso*;Takeshi Okamoto;Eiji Okamoto, 2007.08, 'ECDSA-verifiable Signcryption scheme with signature verification on the Signcrypted message, ' Lecture Notes in Computer Science, Vol.4990, Chinese Academy of Science.(SCIE, DBLP)(*為通訊作者)
  • Raylin Tso*;Takeshi Okamoto;Eiji Okamoto, 2007.04, 'An improved signcryption scheme and its variation, ' Proceedings of the Fourth International Conference on Information Technology: New Generation, University of Las Vegas, pp.772-778.(*為通訊作者)
  • Raylin Tso*;Takeshi Okamoto;Eiji Okamoto, 2005.12, 'Practical strong designated verifier signature schemes based on double discrete logarithms, ' Lecture Notes in Computer Science, Vol. 3822, Chinese Academy of Science, pp.113-127.(SCIE, DBLP)(*為通訊作者)
  • Raylin Tso*;Takeshi Okamoto;Eiji Okamoto, 2005.10, 'An ID-based non-interactive tripartite key agreement protocol with k-resilience, ' Proceedings of the Third International Conference on Communications and Computer Networks, International Association of Science and Technology for Development, pp.38-42.(*為通訊作者)
  • Takeshi Okamoto;Raylin Tso*;Eiji Okamoto, 2005.07, 'One-way and two-party authenticated ID-based key agreement protocols using pairing, ' Lecture Notes in Artificial Intelligence, Vol.3558, University of Tsukuba, pp.122-133.(SCIE, DBLP)(*為通訊作者)
  • Takeshi Okamoto;Raylin Tso*;Eiji Okamoto, 2005.03, 'k-Resilient ID-based key distribution schemes from pairing -three party case, ' Proceedings of the International Workshop on Coding and Cryptography, University of Bergen, pp.402-412.(*為通訊作者)
  • Raylin Tso*;Ying Miao;Eiji Okamoto, 2003.11, 'A new algorithm for searching a consistent set of shares in a threshold scheme with cheaters, ' Lecture Notes in Computer Science, Vol.2971, Korea Institute of Information Security and Cryptology, pp.377-385.(SCIE, DBLP)(*為通訊作者)
back to top
回首頁 政治大學 網站導覽 English