期刊論文 | Journal Papers
2024
Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates
IET Information Security, 2024-09
[DOI]
Raylin Tso, Cheng-Yi Lee, Zi-Yuan Liu, Masahiro Mambo
Anonymous Hierarchical Identity-Based Encryption with Delegated Traceability for Cloud-Based Data Sharing Systems
Computer Standards & Interfaces, Volume 89, April 2024, Article 103817
[DOI]
Zi-Yuan Liu, Masahiro Mambo, Raylin Tso, and Yi-Fan Tseng
Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives
Designs, Codes and Cryptography, Vol.92, pp.1477-1500.
[DOI]
Yi-Fan Tseng, Raylin Tso, Zi-Yuan Liu
2023
Cryptanalysis of a round optimal lattice-based multisignature scheme
Information Processing Letters, Vol.182, pp.106364.
[DOI]
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso
2022
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT
Journal of Systems Architecture, Vol.130, pp.102642.
[DOI]
Cheng-Yi Lee, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng
Quantum-resistant anonymous identity-based encryption with trable identities
IET Information Security, Vol.16, No.2, pp.111-126.
[DOI]
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen
Extension of elliptic curve Qu–Vanstone certificates and their applications
Journal of Information Security and Applications, Vol.67, pp.103176.
[DOI]
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Peter Shaojui Wang, Qin-Wen Su
2021
Public key encryption with filtered equality test revisited
Designs, Codes and Cryptography 89(10): 2357-2372 (SCIE)
Yu-Chi Chen, Xin Xie, Hung-Yu Tsao, Raylin Tso
Public-key Authenticated Encryption with Keyword Search: A Generic Construction and Its
Quantum-resistant Instantiation
The Computer Journali, bxab119 (SCIE)
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen
Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud
Systems
IEEE Systems Journal (SCIE, early access, doi: 10.1109/JSYST.2021.3103909)
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Yu-Chi Chen, Masahiro Mambo
Designated-ciphertext searchable encryption
J. Inf. Secur. Appl. 58: 102709. (SCIE)
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo
Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function
Secur. Commun. Networks 2021: 6678194:1-6678194:12. (SCIE)
Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso
Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks
J. Supercomput. 77(7): 6992-7020. (SCIE)
Tsu-Yang Wu, Zhiyuan Lee, Lei Yang, Jia-Ning Luo, Raylin Tso
2020
Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing
IEEE Access 8: 152551-152564.(SCIE)
Raylin Tso, Kaibin Huang, Yu-Chi Chen, Sk. Md. Mizanur Rahman, Tsu-Yang Wu
Intelligence-led response: turning theory into law enforcement practice in cyber security
incidents
Int. J. Electron. Bus. 15(4): 325-350. (SCIE)
Da-Yu Kao, Shou-Ching Hsiao, Raylin Tso
PrivGRU: Privacy-preserving GRU inference using additive secret sharing
J. Intell. Fuzzy Syst. 38(5): 5627-5638. (SCIE)
Shou-Ching Hsiao, Zi-Yuan Liu, Raylin Tso, Da-Yu Kao, Chien-Ming Chen
Quantum (t, n) threshold group signature based on Bell state.
Quantum Inf. Process. 19(2): 71. (SCIE)
Huawang Qin, Wallace K. S. Tang, Raylin Tso
2019
Malware Image Classification Using One-Shot Learning with Siamese Networks
Procedia Computer Science (Scopus)
Shou-Ching Hsiao, Da-Yu Kao, Zi-Yuan Liu, Raylin Tso
Two-in-one oblivious signatures
Future Generation Computer Systems, vol. 101, pp. 467-475. (SCIE, IF:5.768)
Raylin Tso
Distributed E-Voting and E-Bidding Systems Based on Smart Contract
Electronics, Vol. 8, No. 4, pp. 422. (SCIE)
Raylin Tso, Zi-Yuan Liu, Jen-Ho Hsiao
Witness-based searchable encryption with optimal overhead for cloud-edge computing
Future Generation Computer Systems, vol. 100, pp. 715-723. (SCIE, IF:5.768)
Yu-Chi Chen, Xin Xie, Peter Shaojui Wang, Raylin Tso
Quantum secret sharing by using Fourier transform on orbital angular momentum
IET Information Security, vol. 13, No. 2, pp. 104-108. (SCIE, IF: 0.949, 5yrsIF:1.514)
Huawang Qin, Raylin Tso, Yuewei Dai
Efficient quantum multi-proxy signature
Quantum Information Processing, vol. 18, No. 2, 53. (SCIE, IF:2.222)
Huawang Qin, Wallace K. S. Tang, Raylin Tso
2018
Privacy-preserving outsourced similarity test for access over encrypted data in the cloud
IEEE Access, vol. 6, pp. 63624-63634. (SCIE, IF:3.557)
Dan Yang, Yu-Chi Chen, Shaozhen Ye, and Raylin Tso
High-capacity quantum secret sharing based on orbital angular momentum
Quantum Information & Computation, vol. 18, No. (7&8), pp. 579-591. (SCIE, IF:3.379)
Huawang Qin, Raylin Tso
Multi-dimensional quantum state sharing based on quantum Fourier transform
Quantum Information Processing, Vol. 17, No. 3, 48. (SCIE, IF:2.222)
Huawang Qin, Raylin Tso, Yuewei Dai
Threshold quantum state sharing based on entanglement swapping
Quantum Information Processing, Vol. 17, No. 6, 142. (SCIE, IF:2.222)
Huawang Qin, Raylin Tso
Batch quantum multi-proxy signature
Optical and Quantum Electronics, Vol. 50, No. 12, 450. (SCIE, IF:1.547)
Huawang Qin, Wallace KS Tang, Raylin Tso
Establishing rational networking using the DL04 quantum secure direct communication protocol
Quantum Information Processing, Vol. 17, No. 6, 152. (SCIE, IF:2.222)
Huawang Qin, Wallace K. S. Tang, Raylin Tso
Multiparty to multiparty quantum secret sharing
Modern Physics Letters B, Vol. 32, No.29, 1850350. (SCI)
Huawang Qin,, Wallace KS Tang, Raylin Tso
Untraceable and anonymous mobile payment scheme based on near field Communication
Symmetry, Vol. 10, No. 12, 685. (SCIE, IF:2.143, 5yrsIF:2.041)
Raylin Tso
A shareable keyword search over encrypted data in cloud computing
The Journal of Supercomputing, Vol. 74, No. 3, pp. 1001-1023. (SCI, IF:2.157)
Li Xu, Chi-Yao Weng, Lun-Pin Yuan, Mu-En Wu, Raylin Tso, Hung-Min Sun
2017
Somewhat semantic secure public key encryption with filtered-equality-test in the standard model
and its extension to searchable encryption
Journal of Computer and System Sciences, vol. 89, pp. 400-409. 演算法與計算理論學會之2017年度最佳期刊論文獎. (SCI,
IF:1.129)
Kaibin Huang, Raylin Tso, Yu-Chi Chen
Privacy-preserving data communication through secure multi-party computation in healthcare
sensor cloud
Journal of Signal Processing Systems, Vol. 89, No. 1, pp. 51-59. (SCIE, IF:1.035)
Raylin Tso, Abdulhameed Alelaiwi, Sk. Md. Mizanur Rahman, Mu-En Wu, M. Shamim Hossain
2016
A survey on security of certificateless signature schemes
IETE Technical Review, vol. 33, no. 2, pp. 115-121. (SCIE, IF:1.339)
Yu-Chi Chen and Raylin Tso
2015
Strongly secure certificateless signature: cryptanalysis and improvement of two schemes
Journal of Information Science and Engineering, vol. 31 no. 1, pp. 283-296. (SCIE, IF:0.468)
Yu-Chi Chen, Raylin Tso, Gwoboa Horng, Chun-I Fan, and Ruei-Hau Hsu
Certificateless aggregate signature with efficient verification
Security and Communication Networks, vol. 8, no. 13, pp. 2232-2243. (SCIE)
Yu-Chi Chen, Raylin Tso, Masahiro Mambo, Kaibin Huang, and Gwoboa Horng
PKE-AET: Public key encryption with authorized equality test
Computer Journal, vol. 58, no. 10, pp. 2686-2697. (SCIE, IF:0.98)
Kaibin Huang, Raylin Tso, Yu-Chi Chen, Sk Md Mizanur Rahman, Ahmad Almogren, Atif Alamri
On the security of a user equipment registration procedure in femtocell-enabled networks
Journal of Universal Computer Science, Vol. 21, No. 3, pp. 406-418. (SCIE)
Chien-Ming Chen, Tsu-Yang Wu, Raylin Tso, Masahiro Mambo, Mu-En Wu
Cryptanalysis and improvement of an efficient password authentication scheme based on smart card
Journal of Computers Vol. 25., No.4. (EI)
Raylin Tso, Yi-Shiun Liu, Mu-En Wu
2014
On the improvement of Fermat factorization using a continued fraction technique.
Future Generation Computer Systems, Vol. 30, pp. 162-168. (SCIE, IF:5.768)
Mu-En Wu, Raylin Tso, Hung-Min Sun
A secret sharing scheme for EBTC using steganography.
J. Intell. Manuf. 25(2): 241-249 (SCIE)
Cheonshik Kim, Dongkyoo Shin, Dongil Shin, Raylin Tso, Ching-Nung Yang
2013
A new way to generate a ring: Universal ring signature.
Comput. Math. Appl. 65(9): 1350-1359 (SCIE)
Raylin Tso
Security Analysis of Choi et al.'s Certificateless Short Signature Scheme.
J. Inf. Hiding Multim. Signal Process. 4(3), pp.147-154 (SCIE)
Yu-Chi Chen, Raylin Tso, Gwoboa Horng
Security analysis and improvements of a communication-efficient three-party password
authenticated key exchange protocol.
J. Supercomput. 66(2): 863-874
Raylin Tso
2012
A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super
Adverssaries.
Mob. Networks Ubiquitous Comput. Dependable Appl. 3(1/2): 30-54(SCIE)
Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto
Strongly secure certificateless short signatures.
J. Syst. Softw. 85(6), pp.1409-1417(SCIE)
Raylin Tso, Xinyi Huang, Willy Susilo
Convertible ring signatures with gradual revelation of non-signers.
Secur. Commun. Networks 5(3): 279-286(SCIE)
Raylin Tso
2011
Efficient and short certificateless signatures secure against realistic adversaries.
The Journal of Supercomputing 55(2): 173-191
Raylin Tso, Xun Yi, Xinyi Huang
會議論文 | Conference Papers
2024
ID-Based Traitor Tracing with Relaxed Black-Box Setting for Group-Based Applications
2024 19th Asia Joint Conference on Information Security (AsiaJCIS)
[DOI]
Yi-Fan Tseng, Raylin Tso, Shi-Sheng Sun, Zi-Yuan Liu;, You-Qian Chen
Cryptanalysis of PiLike: An Impersonation Attack on the Lightweight Identity-Based Authenticated Key Exchange Protocol Using Bi-ISIS
2024 19th Asia Joint Conference on Information Security (AsiaJCIS)
[DOI]
Hao-Yi Hsu, Hsin-Yi Lin, Raylin Tso, Tao- Hsiang Chang, Jen-Chieh Hsu
2022
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Securitym and Quantum-resistant Instantiation
AsiaCCS 2022 (accepted)
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen
2021
Improved Proxy Re-encryption Scheme with Equality Test
AsiaJCIS 2021
Chih-Chen Yang, Raylin Tso, Zi-Yuan Liu, Jen-Chieh Hsu, Yi-Fan Tseng
Partially Blind ECDSA Scheme and Its Application to Bitcoin.
DSC 2021:1-8.
Hongxun Huang, Zi-Yuan Liu, Raylin Tso
2020
Defense against N-pixel Attacks based on Image Reconstruction.
SBC@AsiaCCS 2020: 3-7
Zi-Yuan Liu, Peter Shaojui Wang, Shou-Ching Hsiao, Raylin Tso
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism.
AsiaJCIS 2020: 1-8.
Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso
Multi-value Private Information Retrieval using Homomorphic Encryption.
AsiaJCIS 2020: 82-88.
Hsiang-Chen Hsu, Zi-Yuan Liu, Raylin Tso, Kung Chen
An Enhanced Mondrian Anonymization Model based on Self-Organizing Map.
AsiaJCIS 2020: 97-100.
Peter Shaojui Wang, Pin-Yen Huang, Yu-An Tsai, Raylin Tso
Practical Predicate Encryption for Inner Product.
ICETE (2) 2020: 553-558.
Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso
2019
PrivGRU: A privacy-preserving GRU inference system using additive secret sharing.
The 6th Euro-China Conference on Intelligent Data Analysis and Application (ECC 2019), accepted.
Shou-Ching Hsiao, Zi-Yuan Liu, Raylin Tso, Da-Yu Kao, Chien-Ming Chen
Signcryption from NTRU lattices without random oracles.
AsiaJCIS 2019, IEEE, 2019: 134-141.
Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng, Masahiro Mambo
An Improved Non-Interactive Zero-Knowledge Range Proof for Decentralized Applications.
IEEE International Conference on Decentralized Applications and Infrastructures 2019 (DAPPCON
2019), 2019: 129-134.
Ya Che Tsai, Raylin Tso, Zi-Yuan Liu, Kung Chen
SCDP: Smart Contract-based Decentralized Privacy System for Securing Data Ownership Management.
GCCE 2019: 881-882
Yunmin He, Yu-Chi Chen, Zhong-Yi Guo, Raylin Tso, Shaozhen Ye
Malware Image Classification Using One-Shot Learning with Siamese Networks.
KES 2019: 1863-1871
Shou-Ching Hsiao, Da-Yu Kao, Zi-Yuan Liu, Raylin Tso
Analyzing WannaCry Ransomware considering the weapons and exploits.
2019 21st International Conference on Advanced Communication Technology (ICACT). IEEE, 2019;
1098-1107.
Da-Yu Kao, Shou-Ching Hsiao, Raylin Tso
2018
Malware-detection model using learning-based discovery of static features
2018 IEEE Conference on Application, Information and Network Security (AINS2018). IEEE, 2018;
54-59
Shou-Ching Hsiao, Da-Yu Kao, Raylin Tso
Oblivious Transfer Protocols Based on Commutative Encryption.
IFIP International Conference on New Technologies, Mobility and Security 2018 (NTMS2018), 2018:
1-5.
Jen-Chieh Hsu, Raylin Tso, Yu-Chi Chen, and Mu-En Wu
Policy-controlled signature from NTRU lattice.
IFIP International Conference on New Technologies, Mobility and Security 2018 (NTMS2018), 2018:
1-5.
Zi-Yuan Liu, Jen-Chieh Hsu, Raylin Tso, Tzong-Chen Wu
2017
An off-line mobile payment protocol providing double-spending detection.
AINA Workshops 2017: 570-575.
Raylin Tso, Chen-Yi Lin
A survey of secret sharing schemes based on Latin squares.
International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
Springer, 2017: 267-272.
Raylin Tso, Ying Miao
Decentralized e-voting systems based on the blockchain technology.
CSA/CUTE 2017: 305-309.
Jen-Ho Hsiao, Raylin Tso, Chien-Ming Chen, Mu-En Wu
Reputation-based trust evaluation mechanism for decentralized environments and its applications
based on smart contracts
CSA/CUTE 2017: 310-314.
Kun-Tai Chan, Raylin Tso, Chien-Ming Chen, Mu-En Wu
Password-based authenticated key exchange from lattices for client/server model.
” CSA/CUTE 2017: 315-319.
Yi-Siou Jheng, Raylin Tso, Chien-Ming Chen, Mu-En Wu
IoT sandbox: to analysis IoT malware Zollard.
ICC 2017: 4:1-4:8.
Kai-Chi Chang, Raylin Tso, Min-Chun Tsai
Provable secure dual-server public key encryption with keyword search.
IVSW 2017: 39-44.
Kaibin Huang, Raylin Tso
One-Time-Commutative Public Key Encryption.
IEEE Technically Sponsored Computing Conference 2017, 2017, July.
Kaibin Huang, Raylin Tso, and Yu-Chi Chen
On the security of a three-party authenticated key agreement scheme based on chaotic maps.
2nd International Conference on Computer Science and Technology (CST 2017), 2017.
Chien-Ming Chen, Lin-Lin Xu, Tsu-Yang Wu, Mu-En Wu, Raylin Tso
2016
Security analysis of a NTRU-based mutual authentication scheme.
18th Asia-Pacific Network Operations and Management Symposium (APNOMS 2016), 2016: 1-3.
Raylin Tso, Yi-Shio Jheng
NFC-based mobile payment protocol with user anonymity.
AsiaJCIS 2016, 2016: 24-30.
Shang-Wen Chen, Raylin Tso
Two-in-one oblivious signatures secure in the random oracle model.
NSS 2016, 2016: 143-155.
Raylin Tso
2015
Semantic secure public key encryption with filtered equality test.
International Conference on Security and Cryptography (SECRYPT 2015), 2015:327-334
Kaibin Huang, Yu-Chi Chen, and Raylin Tso
Security analysis of an anonymous authentication scheme based on smart cards and biometrics for
multi-server environments.
ICGEC (2) 2015: 59-69.
Jeng-Shyang Pan, Raylin Tso, Mu-En Wu, Chien-Ming Chen
An adaptive Kelly betting strategy for finite repeated games.
ICGEC (2) 2015: 39-46
Mu-En Wu , Hui-Huang Tsai, Raylin Tso, Chi-Yao Weng
An empirical comparison between Kelly criterion and Vince's optimal F.
IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity 2015), 2015:
806-810.
Mu-En Wu, Chia-Hung Wang, Wei-Ho Chung, Raylin Tso, I-Hsuan Yang
2014
A new public key encryption with equality test.
The 8th International Conference on Network and System Security (NSS 2014), 2014:550-557.
Kaibin Huang, Raylin Tso, Yu-Chi Chen, Wangyu Lee, and Hung-Min Sun
Security analysis and improvement of femtocell access control.
The 8th International Conference on Network and System Security (NSS 2014), 2014:223-232.
Chien-Ming Chen, Tsu-Yang Wu, Raylin Tso, Mu-En Wu
An incremental algorithm for maintaining the built FUSP trees based on the pre-large concepts.
ECC (1) 2014: 135-144.
Chun-Wei Lin, Wensheng Gan, Tzung-Pei Hong, Raylin Tso
An improved visual cryptography with cheating prevention.
The 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014), 2014, Oct..
Yu-Chi Chen, Kunhan Lu, Raylin Tso, and Mu-En Wu
A virtual network guard system based on cloud computing environments.
ICGEC 2014: 361-370.
Bing-Zhe He, Kuan-Ling Huang, Hung-Min Sun, Raylin Tso
Pitfalls in an ultra-lightweight authentication protocol for low-cost RFID.
IIH-MSP 2014: 634-637.
Chien-Ming Chen, Jeng-Shyang Pan, Raylin Tso, Szu-Wei Huang, Mu-En Wu
A condition-based location authentication protocol for mobile devices.
The 2nd International Conference on Computing, Measurement, Control and Sensor Network
(CMSMST2014), 2014.
Ci-Rong Li, Chien-Ming Chen, Mu-En Wu, Tsui-Ping Chung, Raylin Tso
Raylin Tso, Chien-Ming Chen, Xinying Zheng, Mu-En Wu.
“A new ultra-lightweight RFID authentication protocol based on physical unclonable functions,”
RFIDSec Asia 2014: 17-28.
Efficient public key encryption with user-friendly keywords search for searchable cloud storage.
International Computer Symposium (ICS), 2014, Dec.
Kuo-Chang Chen, Yu-Chi Chen, Gwoboa Horng, and Raylin Tso
2013
Design and implementation of digital forensic software for iPhone.
AsiaJCIS 2013: 90-95.
Chung-Nan Chen, Raylin Tso, Chung-Huang Yang
A new way to generate a ring: Universal ring signature.
Computers & Mathematics with Applications 65(9): 1350-1359
Raylin Tso
Security analysis and improvements of a communication-efficient three-party password
authenticated key exchange protocol.
The Journal of Supercomputing 66(2): 863-8745>
Raylin Tso
Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure
Schemes. IACR Cryptology ePrint Archive 2013: 193
Yu-Chi Chen, Raylin Tso, Willy Susilo, Xinyi Huang, Gwoboa Horng
2012
A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super
Adverssaries.
JoWUA 3(1/2): 30-54
Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto
Strongly secure certificateless short signatures.
Journal of Systems and Software 85(6): 1409-1417
Raylin Tso, Xinyi Huang, Willy Susilo
Convertible ring signatures with gradual revelation of non-signers.
Security and Communication Networks 5(3): 279-286
Raylin Tso
Security Analysis Concerning the Random Numbers of Threshold Ring Signatures.
ITNG 2012: 386-391
Kaibin Huang, Raylin Tso
Cryptanalysis of Exhaustive Search on Attacking RSA.
NSS 2012: 373-379
Mu-En Wu, Raylin Tso, Hung-Min Sun
On the Improvement of Fermat Factorization.
NSS 2012: 380-391
Mu-En Wu, Raylin Tso, Hung-Min Sun
Identity-based Password-Authenticated Key Exchange for Client/Server Model.
SECRYPT 2012: 45-54
Xun Yi, Raylin Tso, Eiji Okamoto
2011
A Privacy Preserved Two-Party Equality Testing Protocol.
ICGEC 2011: 220-223
Shih-Fong Ciou, Raylin Tso
Certificateless Ordered Sequential Aggregate Signature Scheme.
INCoS 2011: 662-667
Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto
Three-party Password-authenticated Key Exchange without Random Oracles.
SECRYPT 2011: 15-24
Xun Yi, Raylin Tso, Eiji Okamoto
2010
Design and Analysis of "Flexible" k-out-of-n Signatures.
ATC 2010: 255-267
Raylin Tso, Xun Yi, Tadahiko Ito, Takeshi Okamoto, Eiji Okamoto
Certificateless Proxy Signature and Its Extension to Blind Signature.
NSS 2010: 542-547
Raylin Tso, Xun Yi
2009
Efficient Short Signatures from Pairing.
ITNG 2009: 417-422
Raylin Tso, Takeshi Okamoto, Eiji Okamoto
ID-Based Group Password-Authenticated Key Exchange.
IWSEC 2009: 192-211
Xun Yi, Raylin Tso, Eiji Okamoto
2008
Signcryption Scheme with Standardized Verification Algorithm.
Raylin Tso
A Restricted Undeniable Designated Verifier Signature.
APSCC 2008: 1375-1380
Atsushi Koide, Raylin Tso, Takeshi Okamoto, Eiji Okamoto
Efficient and Short Certificateless Signature.
CANS 2008: 64-79
Raylin Tso, Xun Yi, Xinyi Huang
A Sanitizing Signature Scheme with Indexing.
EUC (2) 2008: 16-21
Atsushi Koide, Raylin Tso, Eiji Okamoto
Convertible Undeniable Partially Blind Signature from Bilinear Pairings.
EUC (2) 2008: 77-82
Atsushi Koide, Raylin Tso, Eiji Okamoto
Efficient convertible Limited Verifier Signatures.
ISIT 2008: 230-234
Raylin Tso, Xun Yi, Takeshi Okamoto, Eiji Okamoto
1-out-of-.
ISPEC 2008: 45-55
Raylin Tso, Takeshi Okamoto, Eiji Okamoto
2007
ID-Based Group Password-Authenticated Key Exchange.
ACR Cryptology ePrint Archive 2007: 469
Xun Yi, Raylin Tso, Eiji Okamoto
An Improved Signcryption Scheme and Its Variation.
ITNG 2007: 772-778
Raylin Tso, Takeshi Okamoto, Eiji Okamoto
Verifier-Key-Flexible Universal Designated-Verifier Signatures.
IMA Int. Conf. 2007: 403-421
Raylin Tso, Juan Manuel González Nieto, Takeshi Okamoto, Colin Boyd, Eiji Okamoto
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message.
Inscrypt 2007: 11-24
Raylin Tso, Takeshi Okamoto, Eiji Okamoto
Efficient ID-Based Digital Signatures with Message Recovery.
CANS 2007: 47-59
Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto
ID-Based Key Agreement for Dynamic Peer Groups in Mobile Computing Environments.
APSCC 2007: 103-110
Raylin Tso, Xun Yi, Eiji Okamoto
2006
An Efficient ID-based Digital Signature with Message Recovery Based on Pairing.
IACR Cryptology ePrint Archive 2006: 195
Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto
2005
One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing.
MDAI 2005: 122-133
Takeshi Okamoto, Raylin Tso, Eiji Okamoto
A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant
Enrollment.
IACR Cryptology ePrint Archive 2005: 239
Raylin Tso, Ying Miao, Takeshi Okamoto, Eiji Okamoto
Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms.
CISC 2005: 113-127
Raylin Tso, Takeshi Okamoto, Eiji Okamoto
An id-based non-interactive tripartite key agreement protocol with K-resilience.
Communications and Computer Networks 2005: 38-42
Raylin Tso, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto
2003
A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with Cheaters.
ICISC 2003: 377-385
Raylin Tso, Ying Miao, Eiji Okamoto