Cited by 10
A Fully Secure Revocable ID-Based Encryption in the Standard Model

Cryptanalysis of a Pairing-based Authentication Scheme for Smart Grid Communications
Yu-Qi Lee, Tsu-Yang Wu, Xiao-Cong Liang, Tao Wang, Chien-Ming Chen, Jerry Chun-Wei Lin, Yeh-Cheng Chen
Book:  Smart Innovation, Systems and Technologies (Advances in Smart Vehicular Technology, Transportation, Communication and Applications) Volume 226 (2021), p. 75
2014 International Conference on Information Science, Electronics and Electrical Engineering
Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang, Hung-Yu Chien
Conference:  (2014), p. 131
A Provably Secure Lightweight Subtree-Based Short Signature Scheme With Fuzzy User Data Sharing for Human-Centered IoT
Chandrashekhar Meshram, Ahmed Alsanad, Jitendra V. Tembhurne, Shailendra W. Shende, Kailash Wamanrao Kalare, Sarita Gajbhiye Meshram, Muhammad Azeem Akbar, Abdu Gumaei
Journal:  IEEE Access Volume 9 (2021), p. 3649
A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng
Journal:  The Scientific World Journal Volume 2014 (2014), p. 1
A Remark on “ Efficient Revocable ID-Based Encryption with a Public Channel”
Jae Hong SEO, Keita EMURA
Journal:  IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Volume E96.A, Issue 11 (2013), p. 2282
A brief review of revocable ID-based public key cryptosystem
Tsu-Yang Wu, Jerry Chun-Wei Lin, Chien-Ming Chen, Yuh-Min Tseng, Jaroslav Frnda, Lukas Sevcik, Miroslav Voznak
Journal:  Perspectives in Science Volume 7 (2016), p. 81
Cryptanalysis of a Compact Anonymous HIBE with Constant Size Private Keys
Xi-Jun Lin, Lin Sun, Haipeng Qu, He-Qun Xian, Chris Mitchell
Journal:  The Computer Journal Volume 62, Issue 8 (2019), p. 1087
Efficient Anonymous Multireceiver Certificateless Encryption
Ying-Hao Hung, Sen-Shan Huang, Yuh-Min Tseng, Tung-Tso Tsai
Journal:  IEEE Systems Journal Volume 11, Issue 4 (2017), p. 2602
Leakage-free ID-Based Signature, Revisited
Xi-Jun Lin, Lin Sun, Haipeng Qu, Kaitai Liang
Journal:  The Computer Journal Volume 63, Issue 8 (2020), p. 1263
Revocable and strongly unforgeable identity‐based signature scheme in the standard model
Zhenhua Liu, Xiangsong Zhang, Yupu Hu, Tsuyoshi Takagi
Journal:  Security and Communication Networks Volume 9, Issue 14 (2016), p. 2422