研究成果

Research

  

期刊論文 | Journal Papers

2024

Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates

IET Information Security, 2024-09 [DOI]
Raylin Tso, Cheng-Yi Lee, Zi-Yuan Liu, Masahiro Mambo

Anonymous Hierarchical Identity-Based Encryption with Delegated Traceability for Cloud-Based Data Sharing Systems

Computer Standards & Interfaces, Volume 89, April 2024, Article 103817 [DOI]
Zi-Yuan Liu, Masahiro Mambo, Raylin Tso, and Yi-Fan Tseng

Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives

Designs, Codes and Cryptography, Vol.92, pp.1477-1500. [DOI]
Yi-Fan Tseng, Raylin Tso, Zi-Yuan Liu

2023

Cryptanalysis of a round optimal lattice-based multisignature scheme

Information Processing Letters, Vol.182, pp.106364. [DOI]
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso

2022

Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT

Journal of Systems Architecture, Vol.130, pp.102642. [DOI]
Cheng-Yi Lee, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng

Quantum-resistant anonymous identity-based encryption with trable identities

IET Information Security, Vol.16, No.2, pp.111-126. [DOI]
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen

Extension of elliptic curve Qu–Vanstone certificates and their applications

Journal of Information Security and Applications, Vol.67, pp.103176. [DOI]
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Peter Shaojui Wang, Qin-Wen Su

2021

Public key encryption with filtered equality test revisited

Designs, Codes and Cryptography 89(10): 2357-2372 (SCIE)
Yu-Chi Chen, Xin Xie, Hung-Yu Tsao, Raylin Tso

Public-key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-resistant Instantiation

The Computer Journali, bxab119 (SCIE)
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen

Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud Systems

IEEE Systems Journal (SCIE, early access, doi: 10.1109/JSYST.2021.3103909)
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Yu-Chi Chen, Masahiro Mambo

Designated-ciphertext searchable encryption

J. Inf. Secur. Appl. 58: 102709. (SCIE)
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo

Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function

Secur. Commun. Networks 2021: 6678194:1-6678194:12. (SCIE)
Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso

Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks

J. Supercomput. 77(7): 6992-7020. (SCIE)
Tsu-Yang Wu, Zhiyuan Lee, Lei Yang, Jia-Ning Luo, Raylin Tso

2020

Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing

IEEE Access 8: 152551-152564.(SCIE)
Raylin Tso, Kaibin Huang, Yu-Chi Chen, Sk. Md. Mizanur Rahman, Tsu-Yang Wu

Intelligence-led response: turning theory into law enforcement practice in cyber security incidents

Int. J. Electron. Bus. 15(4): 325-350. (SCIE)
Da-Yu Kao, Shou-Ching Hsiao, Raylin Tso

PrivGRU: Privacy-preserving GRU inference using additive secret sharing

J. Intell. Fuzzy Syst. 38(5): 5627-5638. (SCIE)
Shou-Ching Hsiao, Zi-Yuan Liu, Raylin Tso, Da-Yu Kao, Chien-Ming Chen

Quantum (t, n) threshold group signature based on Bell state.

Quantum Inf. Process. 19(2): 71. (SCIE)
Huawang Qin, Wallace K. S. Tang, Raylin Tso

2019

Malware Image Classification Using One-Shot Learning with Siamese Networks

Procedia Computer Science (Scopus)
Shou-Ching Hsiao, Da-Yu Kao, Zi-Yuan Liu, Raylin Tso

Two-in-one oblivious signatures

Future Generation Computer Systems, vol. 101, pp. 467-475. (SCIE, IF:5.768)
Raylin Tso

Distributed E-Voting and E-Bidding Systems Based on Smart Contract

Electronics, Vol. 8, No. 4, pp. 422. (SCIE)
Raylin Tso, Zi-Yuan Liu, Jen-Ho Hsiao

Witness-based searchable encryption with optimal overhead for cloud-edge computing

Future Generation Computer Systems, vol. 100, pp. 715-723. (SCIE, IF:5.768)
Yu-Chi Chen, Xin Xie, Peter Shaojui Wang, Raylin Tso

Quantum secret sharing by using Fourier transform on orbital angular momentum

IET Information Security, vol. 13, No. 2, pp. 104-108. (SCIE, IF: 0.949, 5yrsIF:1.514)
Huawang Qin, Raylin Tso, Yuewei Dai

Efficient quantum multi-proxy signature

Quantum Information Processing, vol. 18, No. 2, 53. (SCIE, IF:2.222)
Huawang Qin, Wallace K. S. Tang, Raylin Tso

2018

Privacy-preserving outsourced similarity test for access over encrypted data in the cloud

IEEE Access, vol. 6, pp. 63624-63634. (SCIE, IF:3.557)
Dan Yang, Yu-Chi Chen, Shaozhen Ye, and Raylin Tso

High-capacity quantum secret sharing based on orbital angular momentum

Quantum Information & Computation, vol. 18, No. (7&8), pp. 579-591. (SCIE, IF:3.379)
Huawang Qin, Raylin Tso

Multi-dimensional quantum state sharing based on quantum Fourier transform

Quantum Information Processing, Vol. 17, No. 3, 48. (SCIE, IF:2.222)
Huawang Qin, Raylin Tso, Yuewei Dai

Threshold quantum state sharing based on entanglement swapping

Quantum Information Processing, Vol. 17, No. 6, 142. (SCIE, IF:2.222)
Huawang Qin, Raylin Tso

Batch quantum multi-proxy signature

Optical and Quantum Electronics, Vol. 50, No. 12, 450. (SCIE, IF:1.547)
Huawang Qin, Wallace KS Tang, Raylin Tso

Establishing rational networking using the DL04 quantum secure direct communication protocol

Quantum Information Processing, Vol. 17, No. 6, 152. (SCIE, IF:2.222)
Huawang Qin, Wallace K. S. Tang, Raylin Tso

Multiparty to multiparty quantum secret sharing

Modern Physics Letters B, Vol. 32, No.29, 1850350. (SCI)
Huawang Qin,, Wallace KS Tang, Raylin Tso

Untraceable and anonymous mobile payment scheme based on near field Communication

Symmetry, Vol. 10, No. 12, 685. (SCIE, IF:2.143, 5yrsIF:2.041)
Raylin Tso

A shareable keyword search over encrypted data in cloud computing

The Journal of Supercomputing, Vol. 74, No. 3, pp. 1001-1023. (SCI, IF:2.157)
Li Xu, Chi-Yao Weng, Lun-Pin Yuan, Mu-En Wu, Raylin Tso, Hung-Min Sun

2017

Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption

Journal of Computer and System Sciences, vol. 89, pp. 400-409. 演算法與計算理論學會之2017年度最佳期刊論文獎. (SCI, IF:1.129)
Kaibin Huang, Raylin Tso, Yu-Chi Chen

Privacy-preserving data communication through secure multi-party computation in healthcare sensor cloud

Journal of Signal Processing Systems, Vol. 89, No. 1, pp. 51-59. (SCIE, IF:1.035)
Raylin Tso, Abdulhameed Alelaiwi, Sk. Md. Mizanur Rahman, Mu-En Wu, M. Shamim Hossain

2016

A survey on security of certificateless signature schemes

IETE Technical Review, vol. 33, no. 2, pp. 115-121. (SCIE, IF:1.339)
Yu-Chi Chen and Raylin Tso

2015

Strongly secure certificateless signature: cryptanalysis and improvement of two schemes

Journal of Information Science and Engineering, vol. 31 no. 1, pp. 283-296. (SCIE, IF:0.468)
Yu-Chi Chen, Raylin Tso, Gwoboa Horng, Chun-I Fan, and Ruei-Hau Hsu

Certificateless aggregate signature with efficient verification

Security and Communication Networks, vol. 8, no. 13, pp. 2232-2243. (SCIE)
Yu-Chi Chen, Raylin Tso, Masahiro Mambo, Kaibin Huang, and Gwoboa Horng

PKE-AET: Public key encryption with authorized equality test

Computer Journal, vol. 58, no. 10, pp. 2686-2697. (SCIE, IF:0.98)
Kaibin Huang, Raylin Tso, Yu-Chi Chen, Sk Md Mizanur Rahman, Ahmad Almogren, Atif Alamri

On the security of a user equipment registration procedure in femtocell-enabled networks

Journal of Universal Computer Science, Vol. 21, No. 3, pp. 406-418. (SCIE)
Chien-Ming Chen, Tsu-Yang Wu, Raylin Tso, Masahiro Mambo, Mu-En Wu

Cryptanalysis and improvement of an efficient password authentication scheme based on smart card

Journal of Computers Vol. 25., No.4. (EI)
Raylin Tso, Yi-Shiun Liu, Mu-En Wu

2014

On the improvement of Fermat factorization using a continued fraction technique.

Future Generation Computer Systems, Vol. 30, pp. 162-168. (SCIE, IF:5.768)
Mu-En Wu, Raylin Tso, Hung-Min Sun

A secret sharing scheme for EBTC using steganography.

J. Intell. Manuf. 25(2): 241-249 (SCIE)
Cheonshik Kim, Dongkyoo Shin, Dongil Shin, Raylin Tso, Ching-Nung Yang

2013

A new way to generate a ring: Universal ring signature.

Comput. Math. Appl. 65(9): 1350-1359 (SCIE)
Raylin Tso

Security Analysis of Choi et al.'s Certificateless Short Signature Scheme.

J. Inf. Hiding Multim. Signal Process. 4(3), pp.147-154 (SCIE)
Yu-Chi Chen, Raylin Tso, Gwoboa Horng

Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol.

J. Supercomput. 66(2): 863-874
Raylin Tso

2012

A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adverssaries.

Mob. Networks Ubiquitous Comput. Dependable Appl. 3(1/2): 30-54(SCIE)
Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto

Strongly secure certificateless short signatures.

J. Syst. Softw. 85(6), pp.1409-1417(SCIE)
Raylin Tso, Xinyi Huang, Willy Susilo

Convertible ring signatures with gradual revelation of non-signers.

Secur. Commun. Networks 5(3): 279-286(SCIE)
Raylin Tso

2011

Efficient and short certificateless signatures secure against realistic adversaries.

The Journal of Supercomputing 55(2): 173-191
Raylin Tso, Xun Yi, Xinyi Huang
  

會議論文 | Conference Papers

2024

ID-Based Traitor Tracing with Relaxed Black-Box Setting for Group-Based Applications

2024 19th Asia Joint Conference on Information Security (AsiaJCIS) [DOI]
Yi-Fan Tseng, Raylin Tso, Shi-Sheng Sun, Zi-Yuan Liu;, You-Qian Chen

Cryptanalysis of PiLike: An Impersonation Attack on the Lightweight Identity-Based Authenticated Key Exchange Protocol Using Bi-ISIS

2024 19th Asia Joint Conference on Information Security (AsiaJCIS) [DOI]
Hao-Yi Hsu, Hsin-Yi Lin, Raylin Tso, Tao- Hsiang Chang, Jen-Chieh Hsu

2022

Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Securitym and Quantum-resistant Instantiation

AsiaCCS 2022 (accepted)
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen

2021

Improved Proxy Re-encryption Scheme with Equality Test

AsiaJCIS 2021
Chih-Chen Yang, Raylin Tso, Zi-Yuan Liu, Jen-Chieh Hsu, Yi-Fan Tseng

Partially Blind ECDSA Scheme and Its Application to Bitcoin.

DSC 2021:1-8.
Hongxun Huang, Zi-Yuan Liu, Raylin Tso

2020

Defense against N-pixel Attacks based on Image Reconstruction.

SBC@AsiaCCS 2020: 3-7
Zi-Yuan Liu, Peter Shaojui Wang, Shou-Ching Hsiao, Raylin Tso

A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism.

AsiaJCIS 2020: 1-8.
Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso

Multi-value Private Information Retrieval using Homomorphic Encryption.

AsiaJCIS 2020: 82-88.
Hsiang-Chen Hsu, Zi-Yuan Liu, Raylin Tso, Kung Chen

An Enhanced Mondrian Anonymization Model based on Self-Organizing Map.

AsiaJCIS 2020: 97-100.
Peter Shaojui Wang, Pin-Yen Huang, Yu-An Tsai, Raylin Tso

Practical Predicate Encryption for Inner Product.

ICETE (2) 2020: 553-558.
Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso

2019

PrivGRU: A privacy-preserving GRU inference system using additive secret sharing.

The 6th Euro-China Conference on Intelligent Data Analysis and Application (ECC 2019), accepted.
Shou-Ching Hsiao, Zi-Yuan Liu, Raylin Tso, Da-Yu Kao, Chien-Ming Chen

Signcryption from NTRU lattices without random oracles.

AsiaJCIS 2019, IEEE, 2019: 134-141.
Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng, Masahiro Mambo

An Improved Non-Interactive Zero-Knowledge Range Proof for Decentralized Applications.

IEEE International Conference on Decentralized Applications and Infrastructures 2019 (DAPPCON 2019), 2019: 129-134.
Ya Che Tsai, Raylin Tso, Zi-Yuan Liu, Kung Chen

SCDP: Smart Contract-based Decentralized Privacy System for Securing Data Ownership Management.

GCCE 2019: 881-882
Yunmin He, Yu-Chi Chen, Zhong-Yi Guo, Raylin Tso, Shaozhen Ye

Malware Image Classification Using One-Shot Learning with Siamese Networks.

KES 2019: 1863-1871
Shou-Ching Hsiao, Da-Yu Kao, Zi-Yuan Liu, Raylin Tso

Analyzing WannaCry Ransomware considering the weapons and exploits.

2019 21st International Conference on Advanced Communication Technology (ICACT). IEEE, 2019; 1098-1107.
Da-Yu Kao, Shou-Ching Hsiao, Raylin Tso

2018

Malware-detection model using learning-based discovery of static features

2018 IEEE Conference on Application, Information and Network Security (AINS2018). IEEE, 2018; 54-59
Shou-Ching Hsiao, Da-Yu Kao, Raylin Tso

Oblivious Transfer Protocols Based on Commutative Encryption.

IFIP International Conference on New Technologies, Mobility and Security 2018 (NTMS2018), 2018: 1-5.
Jen-Chieh Hsu, Raylin Tso, Yu-Chi Chen, and Mu-En Wu

Policy-controlled signature from NTRU lattice.

IFIP International Conference on New Technologies, Mobility and Security 2018 (NTMS2018), 2018: 1-5.
Zi-Yuan Liu, Jen-Chieh Hsu, Raylin Tso, Tzong-Chen Wu

2017

An off-line mobile payment protocol providing double-spending detection.

AINA Workshops 2017: 570-575.
Raylin Tso, Chen-Yi Lin

A survey of secret sharing schemes based on Latin squares.

International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Springer, 2017: 267-272.
Raylin Tso, Ying Miao

Decentralized e-voting systems based on the blockchain technology.

CSA/CUTE 2017: 305-309.
Jen-Ho Hsiao, Raylin Tso, Chien-Ming Chen, Mu-En Wu

Reputation-based trust evaluation mechanism for decentralized environments and its applications based on smart contracts

CSA/CUTE 2017: 310-314.
Kun-Tai Chan, Raylin Tso, Chien-Ming Chen, Mu-En Wu

Password-based authenticated key exchange from lattices for client/server model. ” CSA/CUTE 2017: 315-319.

Yi-Siou Jheng, Raylin Tso, Chien-Ming Chen, Mu-En Wu

IoT sandbox: to analysis IoT malware Zollard.

ICC 2017: 4:1-4:8.
Kai-Chi Chang, Raylin Tso, Min-Chun Tsai

Provable secure dual-server public key encryption with keyword search.

IVSW 2017: 39-44.
Kaibin Huang, Raylin Tso

One-Time-Commutative Public Key Encryption.

IEEE Technically Sponsored Computing Conference 2017, 2017, July.
Kaibin Huang, Raylin Tso, and Yu-Chi Chen

On the security of a three-party authenticated key agreement scheme based on chaotic maps.

2nd International Conference on Computer Science and Technology (CST 2017), 2017.
Chien-Ming Chen, Lin-Lin Xu, Tsu-Yang Wu, Mu-En Wu, Raylin Tso

2016

Security analysis of a NTRU-based mutual authentication scheme.

18th Asia-Pacific Network Operations and Management Symposium (APNOMS 2016), 2016: 1-3.
Raylin Tso, Yi-Shio Jheng

NFC-based mobile payment protocol with user anonymity.

AsiaJCIS 2016, 2016: 24-30.
Shang-Wen Chen, Raylin Tso

Two-in-one oblivious signatures secure in the random oracle model.

NSS 2016, 2016: 143-155.
Raylin Tso

2015

Semantic secure public key encryption with filtered equality test.

International Conference on Security and Cryptography (SECRYPT 2015), 2015:327-334
Kaibin Huang, Yu-Chi Chen, and Raylin Tso

Security analysis of an anonymous authentication scheme based on smart cards and biometrics for multi-server environments.

ICGEC (2) 2015: 59-69.
Jeng-Shyang Pan, Raylin Tso, Mu-En Wu, Chien-Ming Chen

An adaptive Kelly betting strategy for finite repeated games.

ICGEC (2) 2015: 39-46
Mu-En Wu , Hui-Huang Tsai, Raylin Tso, Chi-Yao Weng

An empirical comparison between Kelly criterion and Vince's optimal F.

IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity 2015), 2015: 806-810.
Mu-En Wu, Chia-Hung Wang, Wei-Ho Chung, Raylin Tso, I-Hsuan Yang

2014

A new public key encryption with equality test.

The 8th International Conference on Network and System Security (NSS 2014), 2014:550-557.
Kaibin Huang, Raylin Tso, Yu-Chi Chen, Wangyu Lee, and Hung-Min Sun

Security analysis and improvement of femtocell access control.

The 8th International Conference on Network and System Security (NSS 2014), 2014:223-232.
Chien-Ming Chen, Tsu-Yang Wu, Raylin Tso, Mu-En Wu

An incremental algorithm for maintaining the built FUSP trees based on the pre-large concepts.

ECC (1) 2014: 135-144.
Chun-Wei Lin, Wensheng Gan, Tzung-Pei Hong, Raylin Tso

An improved visual cryptography with cheating prevention.

The 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014), 2014, Oct..
Yu-Chi Chen, Kunhan Lu, Raylin Tso, and Mu-En Wu

A virtual network guard system based on cloud computing environments.

ICGEC 2014: 361-370.
Bing-Zhe He, Kuan-Ling Huang, Hung-Min Sun, Raylin Tso

Pitfalls in an ultra-lightweight authentication protocol for low-cost RFID.

IIH-MSP 2014: 634-637.
Chien-Ming Chen, Jeng-Shyang Pan, Raylin Tso, Szu-Wei Huang, Mu-En Wu

A condition-based location authentication protocol for mobile devices.

The 2nd International Conference on Computing, Measurement, Control and Sensor Network (CMSMST2014), 2014.
Ci-Rong Li, Chien-Ming Chen, Mu-En Wu, Tsui-Ping Chung, Raylin Tso

Raylin Tso, Chien-Ming Chen, Xinying Zheng, Mu-En Wu.
“A new ultra-lightweight RFID authentication protocol based on physical unclonable functions,” RFIDSec Asia 2014: 17-28.


Efficient public key encryption with user-friendly keywords search for searchable cloud storage.

International Computer Symposium (ICS), 2014, Dec.
Kuo-Chang Chen, Yu-Chi Chen, Gwoboa Horng, and Raylin Tso

2013

Design and implementation of digital forensic software for iPhone.

AsiaJCIS 2013: 90-95.
Chung-Nan Chen, Raylin Tso, Chung-Huang Yang

A new way to generate a ring: Universal ring signature.

Computers & Mathematics with Applications 65(9): 1350-1359
Raylin Tso

Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol.

The Journal of Supercomputing 66(2): 863-874
Raylin Tso

Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes. IACR Cryptology ePrint Archive 2013: 193

Yu-Chi Chen, Raylin Tso, Willy Susilo, Xinyi Huang, Gwoboa Horng

2012

A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adverssaries.

JoWUA 3(1/2): 30-54
Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto

Strongly secure certificateless short signatures.

Journal of Systems and Software 85(6): 1409-1417
Raylin Tso, Xinyi Huang, Willy Susilo

Convertible ring signatures with gradual revelation of non-signers.

Security and Communication Networks 5(3): 279-286
Raylin Tso

Security Analysis Concerning the Random Numbers of Threshold Ring Signatures.

ITNG 2012: 386-391
Kaibin Huang, Raylin Tso

Cryptanalysis of Exhaustive Search on Attacking RSA.

NSS 2012: 373-379
Mu-En Wu, Raylin Tso, Hung-Min Sun

On the Improvement of Fermat Factorization.

NSS 2012: 380-391
Mu-En Wu, Raylin Tso, Hung-Min Sun

Identity-based Password-Authenticated Key Exchange for Client/Server Model.

SECRYPT 2012: 45-54
Xun Yi, Raylin Tso, Eiji Okamoto

2011

A Privacy Preserved Two-Party Equality Testing Protocol.

ICGEC 2011: 220-223
Shih-Fong Ciou, Raylin Tso

Certificateless Ordered Sequential Aggregate Signature Scheme.

INCoS 2011: 662-667
Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto

Three-party Password-authenticated Key Exchange without Random Oracles.

SECRYPT 2011: 15-24
Xun Yi, Raylin Tso, Eiji Okamoto

2010

Design and Analysis of "Flexible" k-out-of-n Signatures.

ATC 2010: 255-267
Raylin Tso, Xun Yi, Tadahiko Ito, Takeshi Okamoto, Eiji Okamoto

Certificateless Proxy Signature and Its Extension to Blind Signature.

NSS 2010: 542-547
Raylin Tso, Xun Yi

2009

Efficient Short Signatures from Pairing.

ITNG 2009: 417-422
Raylin Tso, Takeshi Okamoto, Eiji Okamoto

ID-Based Group Password-Authenticated Key Exchange.

IWSEC 2009: 192-211
Xun Yi, Raylin Tso, Eiji Okamoto

2008

Signcryption Scheme with Standardized Verification Algorithm.

Raylin Tso

A Restricted Undeniable Designated Verifier Signature.

APSCC 2008: 1375-1380
Atsushi Koide, Raylin Tso, Takeshi Okamoto, Eiji Okamoto

Efficient and Short Certificateless Signature.

CANS 2008: 64-79
Raylin Tso, Xun Yi, Xinyi Huang

A Sanitizing Signature Scheme with Indexing.

EUC (2) 2008: 16-21
Atsushi Koide, Raylin Tso, Eiji Okamoto

Convertible Undeniable Partially Blind Signature from Bilinear Pairings.

EUC (2) 2008: 77-82
Atsushi Koide, Raylin Tso, Eiji Okamoto

Efficient convertible Limited Verifier Signatures.

ISIT 2008: 230-234
Raylin Tso, Xun Yi, Takeshi Okamoto, Eiji Okamoto

1-out-of-.

ISPEC 2008: 45-55
Raylin Tso, Takeshi Okamoto, Eiji Okamoto

2007

ID-Based Group Password-Authenticated Key Exchange.

ACR Cryptology ePrint Archive 2007: 469
Xun Yi, Raylin Tso, Eiji Okamoto

An Improved Signcryption Scheme and Its Variation.

ITNG 2007: 772-778
Raylin Tso, Takeshi Okamoto, Eiji Okamoto

Verifier-Key-Flexible Universal Designated-Verifier Signatures.

IMA Int. Conf. 2007: 403-421
Raylin Tso, Juan Manuel González Nieto, Takeshi Okamoto, Colin Boyd, Eiji Okamoto

ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message.

Inscrypt 2007: 11-24
Raylin Tso, Takeshi Okamoto, Eiji Okamoto

Efficient ID-Based Digital Signatures with Message Recovery.

CANS 2007: 47-59
Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto

ID-Based Key Agreement for Dynamic Peer Groups in Mobile Computing Environments.

APSCC 2007: 103-110
Raylin Tso, Xun Yi, Eiji Okamoto

2006

An Efficient ID-based Digital Signature with Message Recovery Based on Pairing.

IACR Cryptology ePrint Archive 2006: 195
Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto

2005

One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing.

MDAI 2005: 122-133
Takeshi Okamoto, Raylin Tso, Eiji Okamoto

A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment.

IACR Cryptology ePrint Archive 2005: 239
Raylin Tso, Ying Miao, Takeshi Okamoto, Eiji Okamoto

Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms.

CISC 2005: 113-127
Raylin Tso, Takeshi Okamoto, Eiji Okamoto

An id-based non-interactive tripartite key agreement protocol with K-resilience.

Communications and Computer Networks 2005: 38-42
Raylin Tso, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto

2003

A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with Cheaters.

ICISC 2003: 377-385
Raylin Tso, Ying Miao, Eiji Okamoto