×

zbMATH — the first resource for mathematics

Susilo, Willy

Compute Distance To:
Author ID: susilo.willy Recent zbMATH articles by "Susilo, Willy"
Published as: Susilo, Willy; Susilo, W.
Homepage: https://www.uow.edu.au/~wsusilo/
External Links: ORCID · Wikidata · Google Scholar · ResearchGate · dblp
Documents Indexed: 225 Publications since 1999, including 11 Books
all top 5

Co-Authors

1 single-authored
89 Mu, Yi
32 Guo, Fuchun
28 Au, Man Ho
24 Yang, Guomin
21 Safavi-Naini, Reihaneh
19 Huang, Qiong
18 Wong, Duncan S.
16 Plantard, Thomas
16 Zhang, Fangguo
15 Huang, Xinyi
13 Liu, Joseph K. K.
12 Baek, Joonsang
10 Chen, Rongmao
10 Tonien, Joseph
10 Wu, Qianhong
10 Yuen, Tsz Hon
9 Chen, Xiaofeng
8 Lai, Jianchang
8 Seberry, Jennifer R.
7 Kim, Jongkil
6 Chow, Yang-Wai
5 Duong, Dung Hoang
5 Han, Jinguang
5 Nitaj, Abderrahmane
5 Reyhanitabar, Mohammad Reza
5 Zhang, Zhenfei
5 Zhou, Jianying
4 Fang, Liming
4 Huang, Jianyong
4 Li, Jin
4 Pieprzyk, Josef P.
4 Qin, Bo
4 Wang, Jiandong
4 Wang, Yang
4 Wu, Ge
4 Yu, Yong
4 Zhang, Futai
3 Chow, Sherman S. M.
3 Ge, Chunpeng
3 Jiang, Peng
3 Le, Huy Quoc
3 Liang, Kaitai
3 Ma, Jianfeng
3 Sarathi Roy, Partha
3 Thorncharoensri, Pairat
3 Tian, Haibo
3 Wang, Huaxiong
3 Win, Khin Than
3 Xiang, Yang
3 Zhang, Mingwu
3 Zhao, Zhen
2 Bunder, Martin W.
2 Chen, Liqun
2 Dakhilalian, Mohammad
2 Domingo-Ferrer, Josep
2 Gritti, Clémentine
2 Horton, Jeffrey
2 Hu, Yupu
2 Huang, Jianye
2 Jiang, Yinhao
2 Kim, Kwangjo
2 Li, Yannan
2 Lin, Yanxia
2 Liu, Dongxi
2 Lu, Liang
2 Ma, Sha
2 Nepal, Surya
2 Phuong, Tran Viet Xuan
2 Sipasseuth, Arnaud
2 Tsang, Patrick P.
2 Varadharajan, Vijay
2 Wang, Baocang
2 Wang, Guilin
2 Wong, Duncan
2 Yan, Jun
2 Zong, Wei
1 Abdul-Latip, Shekh Faisal
1 Barmawi, Ari Moesriami
1 Berenjkoub, Mehdi
1 Chang, Ku-Young
1 Cheng, Qiong
1 Cho, Hyunsook
1 Choo, Kim-Kwang Raymond
1 Cui, Hui
1 Curtis, Nathan
1 Deng, Robert Huijie
1 Dutta, Priyanka
1 Fu, Anmin
1 Fukushima, Kazuhide
1 Galindo, David
1 Gao, Chongzhi
1 He, Pei
1 Hwang, Jung Yeon
1 Hwang, Seongoun
1 Intan, Rolly
1 Ji, Yafu
1 Jiang, Yan
1 Jiang, Zoe L.
1 Jin, Hai
1 Khalili, Mojtaba
...and 66 more Co-Authors

Publications by Year

Citations contained in zbMATH Open

107 Publications have been cited 441 times in 295 Documents Cited by Year
An efficient signature scheme from bilinear pairings and its applications. Zbl 1198.94169
Zhang, Fangguo; Safavi-Naini, Reihaneh; Susilo, Willy
32
2004
Certificateless signature revisited. Zbl 1213.94158
Huang, Xinyi; Mu, Yi; Susilo, Willy; Wong, Duncan S.; Wu, Wei
28
2007
On the security of certificateless signature schemes from Asiacrypt 2003. Zbl 1154.94459
Huang, Xinyi; Susilo, Willy; Mu, Yi; Zhang, Futai
27
2005
Certificateless public key encryption without pairing. Zbl 1127.94358
Baek, Joonsang; Safavi-Naini, Reihaneh; Susilo, Willy
17
2005
Identity-based strong designated verifier signature schemes. Zbl 1098.94630
Susilo, Willy; Zhang, Fangguo; Mu, Yi
14
2004
Asymmetric group key agreement. Zbl 1239.94078
Wu, Qianhong; Mu, Yi; Susilo, Willy; Qin, Bo; Domingo-Ferrer, Josep
13
2009
Efficient verifiably encrypted signature and partially blind signature from bilinear pairings. Zbl 1123.94369
Zhang, Fangguo; Safavi-Naini, Reihaneh; Susilo, Willy
11
2003
Efficient optimistic fair exchange secure in the multi-user setting and chosen-key model without random oracles. Zbl 1153.94394
Huang, Qiong; Yang, Guomin; Wong, Duncan S.; Susilo, Willy
11
2008
Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Zbl 1321.94057
Fang, Liming; Susilo, Willy; Ge, Chunpeng; Wang, Jiandong
11
2013
On the integration of public key data encryption and public key encryption with keyword search. Zbl 1156.94331
Baek, Joonsang; Safavi-Naini, Reihaneh; Susilo, Willy
11
2006
Efficient multi-receiver identity-based encryption and its application to broadcast encryption. Zbl 1081.94516
Baek, Joonsang; Safavi-Naini, Reihaneh; Susilo, Willy
10
2005
Strongly leakage-resilient authenticated key exchange. Zbl 1332.94088
Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun
10
2016
Constant-size dynamic \(k\)-TAA. Zbl 1152.94445
Au, Man Ho; Susilo, Willy; Mu, Yi
9
2006
Ambiguous optimistic fair exchange. Zbl 1206.94075
Huang, Qiong; Yang, Guomin; Wong, Duncan S.; Susilo, Willy
9
2008
Strong authenticated key exchange with auxiliary inputs. Zbl 1381.94065
Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun
7
2017
Efficient generic on-line/off-line signatures without key exposure. Zbl 1214.94061
Chen, Xiaofeng; Zhang, Fangguo; Susilo, Willy; Mu, Yi
7
2007
Certificateless threshold signature scheme from bilinear maps. Zbl 1208.94062
Yuan, Hong; Zhang, Futai; Huang, Xinyi; Mu, Yi; Susilo, Willy; Zhang, Lei
7
2010
Certificate-based signature schemes without pairings or random oracles. Zbl 1181.94113
Liu, Joseph K.; Baek, Joonsang; Susilo, Willy; Zhou, Jianying
6
2008
Identity-based authenticated broadcast encryption and distributed authenticated encryption. Zbl 1115.68407
Mu, Yi; Susilo, Willy; Lin, Yan-Xia; Ruan, Chun
6
2004
Multi-party stand-alone and setup-free verifiably committed signatures. Zbl 1127.94381
Zhu, Huafei; Susilo, Willy; Mu, Yi
5
2007
Online/offline signatures and multisignatures for aodv and dsr routing security. Zbl 1176.94062
Xu, Shidi; Mu, Yi; Susilo, Willy
5
2006
A new signature scheme without random oracles from bilinear pairings. Zbl 1295.94192
Zhang, Fangguo; Chen, Xiaofeng; Susilo, Willy; Mu, Yi
5
2006
Dynamic universal accumulators for DDH groups and their application to attribute-based anonymous credential systems. Zbl 1237.94048
Au, Man Ho; Tsang, Patrick P.; Susilo, Willy; Mu, Yi
5
2009
Group-oriented fair exchange of signatures. Zbl 1242.94037
Huang, Qiong; Wong, Duncan S.; Susilo, Willy
5
2011
Generic construction of (identity-based) perfect concurrent signatures. Zbl 1122.94413
Chow, Sherman S. M.; Susilo, Willy
4
2005
Provably secure pairing-based convertible undeniable signature with short signature length. Zbl 1151.94610
Huang, Xinyi; Mu, Yi; Susilo, Willy; Wu, Wei
4
2007
Universal designated verifier signature proof (or how to efficiently prove knowledge of a signature). Zbl 1154.94447
Baek, Joonsang; Safavi-Naini, Reihaneh; Susilo, Willy
4
2005
Constant-size ID-based linkable and revocable-iff-linked ring signature. Zbl 1175.94103
Au, Man Ho; Liu, Joseph K.; Susilo, Willy; Yuen, Tsz Hon
4
2006
Escrowed linkability of ring signatures and its applications. Zbl 1295.94175
Chow, Sherman S. M.; Susilo, Willy; Yuen, Tsz Hon
4
2006
Perfect concurrent signature schemes. Zbl 1109.68487
Susilo, Willy; Mu, Yi; Zhang, Fangguo
4
2004
Identity-based partial message recovery signatures (or how to shorten ID-based signatures). Zbl 1120.94334
Zhang, Fangguo; Susilo, Willy; Mu, Yi
4
2005
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction. Zbl 1258.68050
Au, Man Ho; Liu, Joseph K.; Susilo, Willy; Yuen, Tsz Hon
4
2013
Traceable and retrievable identity-based encryption. Zbl 1319.94051
Au, Man Ho; Huang, Qiong; Liu, Joseph K.; Susilo, Willy; Wong, Duncan S.; Yang, Guomin
4
2008
Multi-party concurrent signatures. Zbl 1156.94423
Tonien, Dongvu; Susilo, Willy; Safavi-Naini, Reihaneh
4
2006
A new attack on three variants of the RSA cryptosystem. Zbl 1346.94094
Bunder, Martin; Nitaj, Abderrahmane; Susilo, Willy; Tonien, Joseph
4
2016
Anonymous conditional proxy re-encryption without random oracle. Zbl 1267.94057
Fang, Liming; Susilo, Willy; Wang, Jiandong
4
2009
Membership encryption and its applications. Zbl 1316.94076
Guo, Fuchun; Mu, Yi; Susilo, Willy; Varadharajan, Vijay
4
2013
On the security of nominative signatures. Zbl 1127.94373
Susilo, Willy; Mu, Yi
3
2005
(Convertible) undeniable signatures without random oracles. Zbl 1285.94116
Yuen, Tsz Hon; Au, Man Ho; Liu, Joseph K.; Susilo, Willy
3
2008
Efficient generic on-line/off-line (threshold) signatures without key exposure. Zbl 1148.94008
Chen, Xiaofeng; Zhang, Fangguo; Tian, Haibo; Wei, Baodian; Susilo, Willy; Mu, Yi; Lee, Hyunrok; Kim, Kwangjo
3
2008
Server-aided verification signatures: Definitions and new constructions. Zbl 1204.94093
Wu, Wei; Mu, Yi; Susilo, Willy; Huang, Xinyi
3
2008
P\(^2\)OFE: privacy-preserving optimistic fair exchange of digital signatures. Zbl 1337.94097
Huang, Qiong; Wong, Duncan S.; Susilo, Willy
3
2014
Fully secure hidden vector encryption under standard assumptions. Zbl 1293.68113
Park, Jong Hwan; Lee, Kwangsu; Susilo, Willy; Lee, Dong Hoon
3
2013
The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles. Zbl 1293.94102
Huang, Qiong; Wong, Duncan S.; Susilo, Willy
3
2013
Non-interactive deniable ring authentication. Zbl 1092.94515
Susilo, Willy; Mu, Yi
3
2004
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system. Zbl 1401.94155
Ge, Chunpeng; Susilo, Willy; Fang, Liming; Wang, Jiandong; Shi, Yunqing
3
2018
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search. Zbl 1253.68117
Fang, Liming; Susilo, Willy; Ge, Chunpeng; Wang, Jiandong
3
2012
A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity (extended abstract). Zbl 1286.94099
Tsang, Patrick P.; Au, Man Ho; Liu, Joseph K.; Susilo, Willy; Wong, Duncan S.
3
2010
A new construction of designated confirmer signature and its application to optimistic fair exchange (extended abstract). Zbl 1287.94112
Huang, Qiong; Wong, Duncan S.; Susilo, Willy
3
2010
Identity-based chameleon hashing and signatures without key exposure. Zbl 1328.94063
Chen, Xiaofeng; Zhang, Fangguo; Susilo, Willy; Tian, Haibo; Li, Jin; Kim, Kwangjo
3
2014
Cryptographic reverse firewall via malleable smooth projective hash functions. Zbl 1404.94052
Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun; Zhang, Mingwu
3
2016
Certificate-based signatures revisited. Zbl 1216.94055
Wu, W.; Mu, Y.; Susilo, W.; Huang, X.
3
2009
Threshold fail-stop signature schemes based on discrete logarithm and factorization. Zbl 1044.68615
Safavi-Naini, Rei; Susilo, Willy
2
2000
A digital signature scheme based on \(CVP_{ \infty }\). Zbl 1162.94398
Plantard, Thomas; Susilo, Willy; Win, Khin Than
2
2008
Provably secure identity-based undeniable signatures with selective and universal convertibility. Zbl 1166.94345
Wu, Wei; Mu, Yi; Susilo, Willy; Huang, Xinyi
2
2008
Attribute-based optimistic fair exchange: how to restrict brokers with policies. Zbl 1282.68099
Wang, Yang; Au, Man Ho; Susilo, Willy
2
2014
LLL for ideal lattices: re-evaluation of the security of Gentry-Halevi’s FHE scheme. Zbl 1360.11144
Plantard, Thomas; Susilo, Willy; Zhang, Zhenfei
2
2015
Fail-stop threshold signature schemes based on elliptic curves. Zbl 0919.94045
Susilo, Willy; Safavi-Naini, Rei; Pieprzyk, Josef
2
1999
An efficient fail-stop signature scheme based on factorization. Zbl 1031.94540
Susilo, Willy; Safavi-Naini, Rei
2
2003
Improving BDD cryptosystems in general lattices. Zbl 1326.94118
Rose, Michael; Plantard, Thomas; Susilo, Willy
2
2011
Publicly verifiable privacy-preserving group decryption. Zbl 1237.94090
Qin, Bo; Wu, Qianhong; Susilo, Willy; Mu, Yi
2
2009
Strongly leakage resilient authenticated key exchange, revisited. Zbl 1423.94116
Yang, Guomin; Chen, Rongmao; Mu, Yi; Susilo, Willy; Guo, Fuchun; Li, Jie
2
2019
Concurrent signatures with fully negotiable binding control. Zbl 1298.94126
Yuen, Tsz Hon; Wong, Duncan S.; Susilo, Willy; Huang, Qiong
2
2011
Efficient non-interactive range proof. Zbl 1248.94098
Yuen, Tsz Hon; Huang, Qiong; Mu, Yi; Susilo, Willy; Wong, Duncan S.; Yang, Guomin
2
2009
Provably secure identity based provable data possession. Zbl 1388.94087
Yu, Yong; Zhang, Yafang; Mu, Yi; Susilo, Willy; Liu, Hongyu
2
2015
Efficient algorithms for secure outsourcing of bilinear pairings. Zbl 1303.68050
Chen, Xiaofeng; Susilo, Willy; Li, Jin; Wong, Duncan S.; Ma, Jianfeng; Tang, Shaohua; Tang, Qiang
2
2015
On the CCA-1 security of somewhat homomorphic encryption over the integers. Zbl 1291.94176
Zhang, Zhenfei; Plantard, Thomas; Susilo, Willy
2
2012
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample. Zbl 1410.94078
Guo, Fuchun; Chen, Rongmao; Susilo, Willy; Lai, Jianchang; Yang, Guomin; Mu, Yi
2
2017
A generalized attack on RSA type cryptosystems. Zbl 1419.94031
Bunder, Martin; Nitaj, Abderrahmane; Susilo, Willy; Tonien, Joseph
2
2017
Efficient oblivious transfers with access control. Zbl 1247.94035
Han, Jinguang; Susilo, Willy; Mu, Yi; Yan, Jun
2
2012
Identity-based broadcasting. Zbl 1123.94379
Mu, Yi; Susilo, Willy; Lin, Yan-Xia
1
2003
Provable security. First international conference, ProvSec 2007, Wollongong, Australia, November 1–2, 2007. Proceedings. Zbl 1137.94001
Susilo, Willy (ed.); Liu, Joseph K. (ed.); Mu, Yi (ed.)
1
2007
Efficient provably secure restrictive partially blind signatures from bilinear pairings. Zbl 1152.94409
Chen, Xiaofeng; Zhang, Fangguo; Mu, Yi; Susilo, Willy
1
2006
Sanitizable signatures revisited. Zbl 1362.94059
Yuen, Tsz Hon; Susilo, Willy; Liu, Joseph K.; Mu, Yi
1
2008
Certificate-based signatures: new definitions and a generic construction from certificateless signatures. Zbl 1352.94072
Wu, Wei; Mu, Yi; Susilo, Willy; Huang, Xinyi
1
2009
Efficient dynamic provable data possession with public verifiability and data privacy. Zbl 1368.94099
Gritti, Clémentine; Susilo, Willy; Plantard, Thomas
1
2015
Efficient dynamic threshold identity-based encryption with constant-size ciphertext. Zbl 1358.94078
Susilo, Willy; Guo, Fuchun; Mu, Yi
1
2016
A note on the strong authenticated key exchange with auxiliary inputs. Zbl 1381.94066
Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun; Zheng, Yang
1
2017
Two-factor data security protection mechanism for cloud storage system. Zbl 1360.94319
Liu, Joseph K.; Liang, Kaitai; Susilo, Willy; Liu, Jianghua; Xiang, Yang
1
2016
Publicly verifiable databases with efficient insertion/deletion operations. Zbl 1370.68072
Miao, Meixia; Wang, Jianfeng; Ma, Jianfeng; Susilo, Willy
1
2017
Identity-based secure distributed data storage schemes. Zbl 1364.94541
Han, Jinguang; Susilo, Willy; Mu, Yi
1
2014
Dynamic searchable symmetric encryption with physical deletion and small leakage. Zbl 1386.94088
Xu, Peng; Liang, Shuai; Wang, Wei; Susilo, Willy; Wu, Qianhong; Jin, Hai
1
2017
A QR code watermarking approach based on the DWT-DCT technique. Zbl 1426.94092
Chow, Yang-Wai; Susilo, Willy; Tonien, Joseph; Zong, Wei
1
2017
Token-controlled public key encryption. Zbl 1118.68473
Baek, Joonsang; Safavi-Naini, Reihaneh; Susilo, Willy
1
2005
A general construction for fail-stop signature using authentication codes. Zbl 0997.94551
Safavi-Naini, Rei; Susilo, Willy
1
2001
Provably secure proxy signature scheme from factorization. Zbl 1255.94081
Yu, Yong; Mu, Yi; Susilo, Willy; Sun, Ying; Ji, Yafu
1
2012
An efficient key-policy attribute-based searchable encryption in prime-order groups. Zbl 1439.94051
Meng, Ru; Zhou, Yanwei; Ning, Jianting; Liang, Kaitai; Han, Jinguang; Susilo, Willy
1
2017
Lattice-based IBE with equality test in standard model. Zbl 1426.94094
Duong, Dung Hoang; Le, Huy Quoc; Roy, Partha Sarathi; Susilo, Willy
1
2019
Privacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attack. Zbl 1440.68210
Gao, Chong-zhi; Cheng, Qiong; He, Pei; Susilo, Willy; Li, Jin
1
2018
Improving the security of the DRS scheme with uniformly chosen random noise. Zbl 1439.94060
Sipasseuth, Arnaud; Plantard, Thomas; Susilo, Willy
1
2019
The Wiener attack on RSA revisited: a quest for the exact bound. Zbl 1439.94061
Susilo, Willy; Tonien, Joseph; Yang, Guomin
1
2019
Leakage-resilient ring signature schemes. Zbl 1423.94129
Huang, Jianye; Huang, Qiong; Susilo, Willy
1
2019
Lattice reduction for modular knapsack. Zbl 1327.94068
Plantard, Thomas; Susilo, Willy; Zhang, Zhenfei
1
2013
Practical compact e-cash. Zbl 1213.68244
Au, Man Ho; Susilo, Willy; Mu, Yi
1
2007
Public cloud data auditing with practical key update and zero knowledge privacy. Zbl 1405.94093
Yu, Yong; Li, Yannan; Au, Man Ho; Susilo, Willy; Choo, Kim-Kwang Raymond; Zhang, Xinpeng
1
2016
Exploiting the error correction mechanism in QR codes for secret sharing. Zbl 1405.94100
Chow, Yang-Wai; Susilo, Willy; Yang, Guomin; Phillips, James G.; Pranata, Ilung; Barmawi, Ari Moesriami
1
2016
Ciphertext-policy attribute-based encryption with key-delegation abuse resistance. Zbl 1405.94070
Jiang, Yinhao; Susilo, Willy; Mu, Yi; Guo, Fuchun
1
2016
One-round strong oblivious signature-based envelope. Zbl 1346.94098
Chen, Rongmao; Mu, Yi; Susilo, Willy; Yang, Guomin; Guo, Fuchun; Zhang, Mingwu
1
2016
Anonymous identity-based broadcast encryption with revocation for file sharing. Zbl 1346.94108
Lai, Jianchang; Mu, Yi; Guo, Fuchun; Susilo, Willy; Chen, Rongmao
1
2016
A tag based encoding: an efficient encoding for predicate encryption in prime order groups. Zbl 1400.94158
Kim, Jongkil; Susilo, Willy; Guo, Fuchun; Au, Man Ho
1
2016
Strongly leakage resilient authenticated key exchange, revisited. Zbl 1423.94116
Yang, Guomin; Chen, Rongmao; Mu, Yi; Susilo, Willy; Guo, Fuchun; Li, Jie
2
2019
Lattice-based IBE with equality test in standard model. Zbl 1426.94094
Duong, Dung Hoang; Le, Huy Quoc; Roy, Partha Sarathi; Susilo, Willy
1
2019
Improving the security of the DRS scheme with uniformly chosen random noise. Zbl 1439.94060
Sipasseuth, Arnaud; Plantard, Thomas; Susilo, Willy
1
2019
The Wiener attack on RSA revisited: a quest for the exact bound. Zbl 1439.94061
Susilo, Willy; Tonien, Joseph; Yang, Guomin
1
2019
Leakage-resilient ring signature schemes. Zbl 1423.94129
Huang, Jianye; Huang, Qiong; Susilo, Willy
1
2019
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system. Zbl 1401.94155
Ge, Chunpeng; Susilo, Willy; Fang, Liming; Wang, Jiandong; Shi, Yunqing
3
2018
Privacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attack. Zbl 1440.68210
Gao, Chong-zhi; Cheng, Qiong; He, Pei; Susilo, Willy; Li, Jin
1
2018
Strong authenticated key exchange with auxiliary inputs. Zbl 1381.94065
Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun
7
2017
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample. Zbl 1410.94078
Guo, Fuchun; Chen, Rongmao; Susilo, Willy; Lai, Jianchang; Yang, Guomin; Mu, Yi
2
2017
A generalized attack on RSA type cryptosystems. Zbl 1419.94031
Bunder, Martin; Nitaj, Abderrahmane; Susilo, Willy; Tonien, Joseph
2
2017
A note on the strong authenticated key exchange with auxiliary inputs. Zbl 1381.94066
Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun; Zheng, Yang
1
2017
Publicly verifiable databases with efficient insertion/deletion operations. Zbl 1370.68072
Miao, Meixia; Wang, Jianfeng; Ma, Jianfeng; Susilo, Willy
1
2017
Dynamic searchable symmetric encryption with physical deletion and small leakage. Zbl 1386.94088
Xu, Peng; Liang, Shuai; Wang, Wei; Susilo, Willy; Wu, Qianhong; Jin, Hai
1
2017
A QR code watermarking approach based on the DWT-DCT technique. Zbl 1426.94092
Chow, Yang-Wai; Susilo, Willy; Tonien, Joseph; Zong, Wei
1
2017
An efficient key-policy attribute-based searchable encryption in prime-order groups. Zbl 1439.94051
Meng, Ru; Zhou, Yanwei; Ning, Jianting; Liang, Kaitai; Han, Jinguang; Susilo, Willy
1
2017
Strongly leakage-resilient authenticated key exchange. Zbl 1332.94088
Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun
10
2016
A new attack on three variants of the RSA cryptosystem. Zbl 1346.94094
Bunder, Martin; Nitaj, Abderrahmane; Susilo, Willy; Tonien, Joseph
4
2016
Cryptographic reverse firewall via malleable smooth projective hash functions. Zbl 1404.94052
Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun; Zhang, Mingwu
3
2016
Efficient dynamic threshold identity-based encryption with constant-size ciphertext. Zbl 1358.94078
Susilo, Willy; Guo, Fuchun; Mu, Yi
1
2016
Two-factor data security protection mechanism for cloud storage system. Zbl 1360.94319
Liu, Joseph K.; Liang, Kaitai; Susilo, Willy; Liu, Jianghua; Xiang, Yang
1
2016
Public cloud data auditing with practical key update and zero knowledge privacy. Zbl 1405.94093
Yu, Yong; Li, Yannan; Au, Man Ho; Susilo, Willy; Choo, Kim-Kwang Raymond; Zhang, Xinpeng
1
2016
Exploiting the error correction mechanism in QR codes for secret sharing. Zbl 1405.94100
Chow, Yang-Wai; Susilo, Willy; Yang, Guomin; Phillips, James G.; Pranata, Ilung; Barmawi, Ari Moesriami
1
2016
Ciphertext-policy attribute-based encryption with key-delegation abuse resistance. Zbl 1405.94070
Jiang, Yinhao; Susilo, Willy; Mu, Yi; Guo, Fuchun
1
2016
One-round strong oblivious signature-based envelope. Zbl 1346.94098
Chen, Rongmao; Mu, Yi; Susilo, Willy; Yang, Guomin; Guo, Fuchun; Zhang, Mingwu
1
2016
Anonymous identity-based broadcast encryption with revocation for file sharing. Zbl 1346.94108
Lai, Jianchang; Mu, Yi; Guo, Fuchun; Susilo, Willy; Chen, Rongmao
1
2016
A tag based encoding: an efficient encoding for predicate encryption in prime order groups. Zbl 1400.94158
Kim, Jongkil; Susilo, Willy; Guo, Fuchun; Au, Man Ho
1
2016
Iterated random oracle: a universal approach for finding loss in security reduction. Zbl 1407.94115
Guo, Fuchun; Susilo, Willy; Mu, Yi; Chen, Rongmao; Lai, Jianchang; Yang, Guomin
1
2016
LLL for ideal lattices: re-evaluation of the security of Gentry-Halevi’s FHE scheme. Zbl 1360.11144
Plantard, Thomas; Susilo, Willy; Zhang, Zhenfei
2
2015
Provably secure identity based provable data possession. Zbl 1388.94087
Yu, Yong; Zhang, Yafang; Mu, Yi; Susilo, Willy; Liu, Hongyu
2
2015
Efficient algorithms for secure outsourcing of bilinear pairings. Zbl 1303.68050
Chen, Xiaofeng; Susilo, Willy; Li, Jin; Wong, Duncan S.; Ma, Jianfeng; Tang, Shaohua; Tang, Qiang
2
2015
Efficient dynamic provable data possession with public verifiability and data privacy. Zbl 1368.94099
Gritti, Clémentine; Susilo, Willy; Plantard, Thomas
1
2015
P\(^2\)OFE: privacy-preserving optimistic fair exchange of digital signatures. Zbl 1337.94097
Huang, Qiong; Wong, Duncan S.; Susilo, Willy
3
2014
Identity-based chameleon hashing and signatures without key exposure. Zbl 1328.94063
Chen, Xiaofeng; Zhang, Fangguo; Susilo, Willy; Tian, Haibo; Li, Jin; Kim, Kwangjo
3
2014
Attribute-based optimistic fair exchange: how to restrict brokers with policies. Zbl 1282.68099
Wang, Yang; Au, Man Ho; Susilo, Willy
2
2014
Identity-based secure distributed data storage schemes. Zbl 1364.94541
Han, Jinguang; Susilo, Willy; Mu, Yi
1
2014
Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Zbl 1321.94057
Fang, Liming; Susilo, Willy; Ge, Chunpeng; Wang, Jiandong
11
2013
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction. Zbl 1258.68050
Au, Man Ho; Liu, Joseph K.; Susilo, Willy; Yuen, Tsz Hon
4
2013
Membership encryption and its applications. Zbl 1316.94076
Guo, Fuchun; Mu, Yi; Susilo, Willy; Varadharajan, Vijay
4
2013
Fully secure hidden vector encryption under standard assumptions. Zbl 1293.68113
Park, Jong Hwan; Lee, Kwangsu; Susilo, Willy; Lee, Dong Hoon
3
2013
The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles. Zbl 1293.94102
Huang, Qiong; Wong, Duncan S.; Susilo, Willy
3
2013
Lattice reduction for modular knapsack. Zbl 1327.94068
Plantard, Thomas; Susilo, Willy; Zhang, Zhenfei
1
2013
Fairness in concurrent signatures revisited. Zbl 1316.94104
Susilo, Willy; Au, Man Ho; Wang, Yang; Wong, Duncan S.
1
2013
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search. Zbl 1253.68117
Fang, Liming; Susilo, Willy; Ge, Chunpeng; Wang, Jiandong
3
2012
On the CCA-1 security of somewhat homomorphic encryption over the integers. Zbl 1291.94176
Zhang, Zhenfei; Plantard, Thomas; Susilo, Willy
2
2012
Efficient oblivious transfers with access control. Zbl 1247.94035
Han, Jinguang; Susilo, Willy; Mu, Yi; Yan, Jun
2
2012
Provably secure proxy signature scheme from factorization. Zbl 1255.94081
Yu, Yong; Mu, Yi; Susilo, Willy; Sun, Ying; Ji, Yafu
1
2012
The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles. Zbl 1290.94089
Huang, Qiong; Wong, Duncan S.; Susilo, Willy
1
2012
Group-oriented fair exchange of signatures. Zbl 1242.94037
Huang, Qiong; Wong, Duncan S.; Susilo, Willy
5
2011
Improving BDD cryptosystems in general lattices. Zbl 1326.94118
Rose, Michael; Plantard, Thomas; Susilo, Willy
2
2011
Concurrent signatures with fully negotiable binding control. Zbl 1298.94126
Yuen, Tsz Hon; Wong, Duncan S.; Susilo, Willy; Huang, Qiong
2
2011
Identity-based trapdoor mercurial commitments and applications. Zbl 1236.94072
Chen, Xiaofeng; Susilo, Willy; Zhang, Fangguo; Tian, Haibo; Li, Jin
1
2011
Certificateless threshold signature scheme from bilinear maps. Zbl 1208.94062
Yuan, Hong; Zhang, Futai; Huang, Xinyi; Mu, Yi; Susilo, Willy; Zhang, Lei
7
2010
A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity (extended abstract). Zbl 1286.94099
Tsang, Patrick P.; Au, Man Ho; Liu, Joseph K.; Susilo, Willy; Wong, Duncan S.
3
2010
A new construction of designated confirmer signature and its application to optimistic fair exchange (extended abstract). Zbl 1287.94112
Huang, Qiong; Wong, Duncan S.; Susilo, Willy
3
2010
Enhanced security notions for dedicated-key hash functions: definitions and relationships. Zbl 1285.94093
Reyhanitabar, Mohammad Reza; Susilo, Willy; Mu, Yi
1
2010
Asymmetric group key agreement. Zbl 1239.94078
Wu, Qianhong; Mu, Yi; Susilo, Willy; Qin, Bo; Domingo-Ferrer, Josep
13
2009
Dynamic universal accumulators for DDH groups and their application to attribute-based anonymous credential systems. Zbl 1237.94048
Au, Man Ho; Tsang, Patrick P.; Susilo, Willy; Mu, Yi
5
2009
Anonymous conditional proxy re-encryption without random oracle. Zbl 1267.94057
Fang, Liming; Susilo, Willy; Wang, Jiandong
4
2009
Certificate-based signatures revisited. Zbl 1216.94055
Wu, W.; Mu, Y.; Susilo, W.; Huang, X.
3
2009
Publicly verifiable privacy-preserving group decryption. Zbl 1237.94090
Qin, Bo; Wu, Qianhong; Susilo, Willy; Mu, Yi
2
2009
Efficient non-interactive range proof. Zbl 1248.94098
Yuen, Tsz Hon; Huang, Qiong; Mu, Yi; Susilo, Willy; Wong, Duncan S.; Yang, Guomin
2
2009
Certificate-based signatures: new definitions and a generic construction from certificateless signatures. Zbl 1352.94072
Wu, Wei; Mu, Yi; Susilo, Willy; Huang, Xinyi
1
2009
Analysis of property-preservation capabilities of the ROX and ESh hash domain extenders. Zbl 1284.94104
Reyhanitabar, Mohammad Reza; Susilo, Willy; Mu, Yi
1
2009
Enhanced target collision resistant hash functions revisited. Zbl 1248.94089
Reyhanitabar, Mohammad Reza; Susilo, Willy; Mu, Yi
1
2009
Efficient optimistic fair exchange secure in the multi-user setting and chosen-key model without random oracles. Zbl 1153.94394
Huang, Qiong; Yang, Guomin; Wong, Duncan S.; Susilo, Willy
11
2008
Ambiguous optimistic fair exchange. Zbl 1206.94075
Huang, Qiong; Yang, Guomin; Wong, Duncan S.; Susilo, Willy
9
2008
Certificate-based signature schemes without pairings or random oracles. Zbl 1181.94113
Liu, Joseph K.; Baek, Joonsang; Susilo, Willy; Zhou, Jianying
6
2008
Traceable and retrievable identity-based encryption. Zbl 1319.94051
Au, Man Ho; Huang, Qiong; Liu, Joseph K.; Susilo, Willy; Wong, Duncan S.; Yang, Guomin
4
2008
(Convertible) undeniable signatures without random oracles. Zbl 1285.94116
Yuen, Tsz Hon; Au, Man Ho; Liu, Joseph K.; Susilo, Willy
3
2008
Efficient generic on-line/off-line (threshold) signatures without key exposure. Zbl 1148.94008
Chen, Xiaofeng; Zhang, Fangguo; Tian, Haibo; Wei, Baodian; Susilo, Willy; Mu, Yi; Lee, Hyunrok; Kim, Kwangjo
3
2008
Server-aided verification signatures: Definitions and new constructions. Zbl 1204.94093
Wu, Wei; Mu, Yi; Susilo, Willy; Huang, Xinyi
3
2008
A digital signature scheme based on \(CVP_{ \infty }\). Zbl 1162.94398
Plantard, Thomas; Susilo, Willy; Win, Khin Than
2
2008
Provably secure identity-based undeniable signatures with selective and universal convertibility. Zbl 1166.94345
Wu, Wei; Mu, Yi; Susilo, Willy; Huang, Xinyi
2
2008
Sanitizable signatures revisited. Zbl 1362.94059
Yuen, Tsz Hon; Susilo, Willy; Liu, Joseph K.; Mu, Yi
1
2008
Certificateless signature revisited. Zbl 1213.94158
Huang, Xinyi; Mu, Yi; Susilo, Willy; Wong, Duncan S.; Wu, Wei
28
2007
Efficient generic on-line/off-line signatures without key exposure. Zbl 1214.94061
Chen, Xiaofeng; Zhang, Fangguo; Susilo, Willy; Mu, Yi
7
2007
Multi-party stand-alone and setup-free verifiably committed signatures. Zbl 1127.94381
Zhu, Huafei; Susilo, Willy; Mu, Yi
5
2007
Provably secure pairing-based convertible undeniable signature with short signature length. Zbl 1151.94610
Huang, Xinyi; Mu, Yi; Susilo, Willy; Wu, Wei
4
2007
Provable security. First international conference, ProvSec 2007, Wollongong, Australia, November 1–2, 2007. Proceedings. Zbl 1137.94001
Susilo, Willy; Liu, Joseph K.; Mu, Yi
1
2007
Practical compact e-cash. Zbl 1213.68244
Au, Man Ho; Susilo, Willy; Mu, Yi
1
2007
On the integration of public key data encryption and public key encryption with keyword search. Zbl 1156.94331
Baek, Joonsang; Safavi-Naini, Reihaneh; Susilo, Willy
11
2006
Constant-size dynamic \(k\)-TAA. Zbl 1152.94445
Au, Man Ho; Susilo, Willy; Mu, Yi
9
2006
Online/offline signatures and multisignatures for aodv and dsr routing security. Zbl 1176.94062
Xu, Shidi; Mu, Yi; Susilo, Willy
5
2006
A new signature scheme without random oracles from bilinear pairings. Zbl 1295.94192
Zhang, Fangguo; Chen, Xiaofeng; Susilo, Willy; Mu, Yi
5
2006
Constant-size ID-based linkable and revocable-iff-linked ring signature. Zbl 1175.94103
Au, Man Ho; Liu, Joseph K.; Susilo, Willy; Yuen, Tsz Hon
4
2006
Escrowed linkability of ring signatures and its applications. Zbl 1295.94175
Chow, Sherman S. M.; Susilo, Willy; Yuen, Tsz Hon
4
2006
Multi-party concurrent signatures. Zbl 1156.94423
Tonien, Dongvu; Susilo, Willy; Safavi-Naini, Reihaneh
4
2006
Efficient provably secure restrictive partially blind signatures from bilinear pairings. Zbl 1152.94409
Chen, Xiaofeng; Zhang, Fangguo; Mu, Yi; Susilo, Willy
1
2006
On the security of certificateless signature schemes from Asiacrypt 2003. Zbl 1154.94459
Huang, Xinyi; Susilo, Willy; Mu, Yi; Zhang, Futai
27
2005
Certificateless public key encryption without pairing. Zbl 1127.94358
Baek, Joonsang; Safavi-Naini, Reihaneh; Susilo, Willy
17
2005
Efficient multi-receiver identity-based encryption and its application to broadcast encryption. Zbl 1081.94516
Baek, Joonsang; Safavi-Naini, Reihaneh; Susilo, Willy
10
2005
Generic construction of (identity-based) perfect concurrent signatures. Zbl 1122.94413
Chow, Sherman S. M.; Susilo, Willy
4
2005
Universal designated verifier signature proof (or how to efficiently prove knowledge of a signature). Zbl 1154.94447
Baek, Joonsang; Safavi-Naini, Reihaneh; Susilo, Willy
4
2005
Identity-based partial message recovery signatures (or how to shorten ID-based signatures). Zbl 1120.94334
Zhang, Fangguo; Susilo, Willy; Mu, Yi
4
2005
On the security of nominative signatures. Zbl 1127.94373
Susilo, Willy; Mu, Yi
3
2005
Token-controlled public key encryption. Zbl 1118.68473
Baek, Joonsang; Safavi-Naini, Reihaneh; Susilo, Willy
1
2005
An efficient signature scheme from bilinear pairings and its applications. Zbl 1198.94169
Zhang, Fangguo; Safavi-Naini, Reihaneh; Susilo, Willy
32
2004
Identity-based strong designated verifier signature schemes. Zbl 1098.94630
Susilo, Willy; Zhang, Fangguo; Mu, Yi
14
2004
Identity-based authenticated broadcast encryption and distributed authenticated encryption. Zbl 1115.68407
Mu, Yi; Susilo, Willy; Lin, Yan-Xia; Ruan, Chun
6
2004
Perfect concurrent signature schemes. Zbl 1109.68487
Susilo, Willy; Mu, Yi; Zhang, Fangguo
4
2004
...and 7 more Documents
all top 5

Cited by 555 Authors

42 Susilo, Willy
26 Mu, Yi
16 Guo, Fuchun
15 Wong, Duncan S.
14 Wu, Qianhong
11 Yang, Bo
11 Yang, Guomin
10 Huang, Qiong
9 Li, Jiguo
8 Huang, Xinyi
8 Zhang, Fangguo
7 Au, Man Ho
7 Weng, Jian
7 Zhang, Futai
7 Zhang, Lei
7 Zhou, Yanwei
6 Chen, Kefei
6 Chen, Rongmao
6 Domingo-Ferrer, Josep
6 Hu, Yupu
6 Qin, Bo
6 Shim, Kyungah
5 Cao, Zhenfu
5 Deng, Robert Huijie
5 Jiang, Peng
5 Lai, Jianchang
5 Lu, Yang
5 Wang, Baocang
5 Wu, Ge
5 Zhang, Yichen
4 Chen, Xiaofeng
4 Choo, Kim-Kwang Raymond
4 He, Debiao
4 Park, Jonghwan
4 Rangan, Chandrasekharan Pandu
4 Slamanig, Daniel
4 Tang, Chunming
4 Tonien, Joseph
4 Wen, Qiaoyan
4 Xia, Zhe
4 Xiong, Hu
4 Zhang, Mingwu
4 Zhang, Zhenfeng
3 Biswas, G. P.
3 Camenisch, Jan L.
3 Chow, Sherman S. M.
3 Deng, Lunzhi
3 Derler, David
3 Hanser, Christian
3 Islam, Sk Hafizul
3 Khan, Muhammad Khurram
3 Kim, Kwangjo
3 Li, Fagen
3 Liu, JianWei
3 Liu, Joseph K. K.
3 Liu, Shengli
3 Long, Yu
3 Luo, Fucai
3 Ma, Sha
3 Selvi, S. Sharmila Deva
3 Shao, Zuhua
3 Shen, Jian
3 Tan, Xiao
3 Tian, Haibo
3 Tso, Raylin
3 Vivek, S. Sree
3 Wang, Zhiwei
3 Wei, Baodian
3 Zeng, Jiwen
3 Zhang, Jianhong
3 Zhao, Zhen
2 Al-Kuwari, Saif
2 Bunder, Martin W.
2 Chen, Yu
2 Choi, Kyu Young
2 Cui, Hui
2 Ding, Yong
2 Dong, Xiaolei
2 Dutta, Ratna
2 Emura, Keita
2 Fang, Liming
2 Feng, Dengguo
2 Ge, Chunpeng
2 Gu, Ke
2 Heng, Swee-Huay
2 Hu, Lei
2 Hur, Junbeom
2 Hwang, Jung Yeon
2 Hwang, Tzonelih
2 Jonker, Willem
2 Krenn, Stephan
2 Lai, Junzuo
2 Lai, Qiqi
2 Lee, Hyunrok
2 Lee, Kwangsu
2 Li, Chuan-Ming
2 Li, Jin
2 Li, Xiangxue
2 Lin, Chao
2 Lin, XiJun
...and 455 more Authors

Citations by Year

Wikidata Timeline

The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.