Liang, Kaitai; Chu, Cheng-Kang; Tan, Xiao; Wong, Duncan S.; Tang, Chunming; Zhou, Jianying Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts. (English) Zbl 1358.94069 Theor. Comput. Sci. 539, 87-105 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Liang} et al., Theor. Comput. Sci. 539, 87--105 (2014; Zbl 1358.94069) Full Text: DOI
Chow, Sherman S. M.; Chu, Cheng-Kang; Huang, Xinyi; Zhou, Jianying; Deng, Robert H. Dynamic secure cloud storage with provenance. (English) Zbl 1301.68116 Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 442-464 (2012). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{S. S. M. Chow} et al., Lect. Notes Comput. Sci. 6805, 442--464 (2012; Zbl 1301.68116) Full Text: DOI Link
Liu, Joseph K.; Chu, Cheng Kang; Zhou, Jianying Identity-based server-aided decryption. (English) Zbl 1295.94107 Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 337-352 (2011). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J. K. Liu} et al., Lect. Notes Comput. Sci. 6812, 337--352 (2011; Zbl 1295.94107) Full Text: DOI
Baek, Joonsang; Chu, Cheng-Kang; Zhou, Jianying On shortening ciphertexts: new constructions for compact public key and stateful encryption schemes. (English) Zbl 1284.94051 Kiayias, Aggelos (ed.), Topics in cryptology – CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 302-318 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Baek} et al., Lect. Notes Comput. Sci. 6558, 302--318 (2011; Zbl 1284.94051) Full Text: DOI
Chu, Cheng-Kang; Weng, Jian; Chow, Sherman S. M.; Zhou, Jianying; Deng, Robert H. Conditional proxy broadcast re-encryption. (English) Zbl 1284.94065 Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 327-342 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{C.-K. Chu} et al., Lect. Notes Comput. Sci. 5594, 327--342 (2009; Zbl 1284.94065) Full Text: DOI Link