Liu, Joseph K.; Baek, Joonsang; Zhou, Jianying Online/offline identity-based signcryption revisited. (English) Zbl 1295.94182 Lai, Xuejia (ed.) et al., Information security and cryptology. 6th international conference, Inscrypt 2010, Shanghai, China, October 20–24, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21517-9/pbk). Lecture Notes in Computer Science 6584, 36-51 (2011). MSC: 94A62 PDFBibTeX XMLCite \textit{J. K. Liu} et al., Lect. Notes Comput. Sci. 6584, 36--51 (2011; Zbl 1295.94182) Full Text: DOI
Baek, Joonsang; Chu, Cheng-Kang; Zhou, Jianying On shortening ciphertexts: new constructions for compact public key and stateful encryption schemes. (English) Zbl 1284.94051 Kiayias, Aggelos (ed.), Topics in cryptology – CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 302-318 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Baek} et al., Lect. Notes Comput. Sci. 6558, 302--318 (2011; Zbl 1284.94051) Full Text: DOI
Baek, Joonsang; Susilo, Willy; Zhou, Jianying Fuzzy identity-based encryption: new and efficient schemes. (English) Zbl 1156.94332 Li, Yongqing (ed.) et al., Coding and cryptology. Proceedings of the first international workshop, Wuyi Mountain, Fujian, China, June 11–15, 2007. Hackensack, NJ: World Scientific (ISBN 978-981-283-223-8/hbk). Series on Coding Theory and Cryptology 4, 1-14 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Baek} et al., Ser. Coding Theory Cryptol. 4, 1--14 (2008; Zbl 1156.94332) Full Text: DOI
Liu, Joseph K.; Baek, Joonsang; Susilo, Willy; Zhou, Jianying Certificate-based signature schemes without pairings or random oracles. (English) Zbl 1181.94113 Wu, Tzong-Chen (ed.) et al., Information security. 11th international conference, ISC 2008, Taipei, Taiwan, September 15–18, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85884-3/pbk). Lecture Notes in Computer Science 5222, 285-297 (2008). MSC: 94A62 PDFBibTeX XMLCite \textit{J. K. Liu} et al., Lect. Notes Comput. Sci. 5222, 285--297 (2008; Zbl 1181.94113) Full Text: DOI
Baek, Joonsang; Galindo, David; Susilo, Willy; Zhou, Jianying Constructing strong KEM from weak KEM (or how to revive the KEM/DEM framework). (English) Zbl 1180.94045 Ostrovsky, Rafail (ed.) et al., Security and cryptography for networks. 6th international conference, SCN 2008, Amalfi, Italy, September 10–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85854-6/pbk). Lecture Notes in Computer Science 5229, 358-374 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J. Baek} et al., Lect. Notes Comput. Sci. 5229, 358--374 (2008; Zbl 1180.94045) Full Text: DOI
Baek, Joonsang; Zhou, Jianying; Bao, Feng Generic constructions of stateful public key encryption and their applications. (English) Zbl 1319.94052 Bellovin, Steven M. (ed.) et al., Applied cryptography and network security. 6th international conference, ACNS 2008, New York, NY, USA, June 3–6, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68913-3/pbk). Lecture Notes in Computer Science 5037, 75-93 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Baek} et al., Lect. Notes Comput. Sci. 5037, 75--93 (2008; Zbl 1319.94052) Full Text: DOI