
Contact me
<aside>
<img src="/icons/mail_orange.svg" alt="/icons/mail_orange.svg" width="40px" /> yftseng AT cs.nccu.edu.tw
</aside>
<aside>
<img src="/icons/telephone_orange.svg" alt="/icons/telephone_orange.svg" width="40px" /> 02-29393091 ext. 88137
</aside>
<aside>
<img src="https://prod-files-secure.s3.us-west-2.amazonaws.com/32587112-7d2f-4e4c-abf8-6bc1d2cfb152/ba2ea3ec-6319-44c2-9bfd-71001e399b90/icon-dblp.png" alt="https://prod-files-secure.s3.us-west-2.amazonaws.com/32587112-7d2f-4e4c-abf8-6bc1d2cfb152/ba2ea3ec-6319-44c2-9bfd-71001e399b90/icon-dblp.png" width="40px" /> dblp: Yi-Fan Tseng
</aside>
<aside>
<img src="https://prod-files-secure.s3.us-west-2.amazonaws.com/32587112-7d2f-4e4c-abf8-6bc1d2cfb152/bb9060e4-ffb9-47a4-a43c-d984737f4fde/icon-google.png" alt="https://prod-files-secure.s3.us-west-2.amazonaws.com/32587112-7d2f-4e4c-abf8-6bc1d2cfb152/bb9060e4-ffb9-47a4-a43c-d984737f4fde/icon-google.png" width="40px" /> Google Scholar: Yi-Fan Tseng
</aside>
Assistant Professor, Department of Computer Science, National Chengchi University, Taiwan
Applied Cryptography Lab (應用密碼實驗室)
Journal Papers
- Yi-Fan Tseng*, “Post-Quantum Secure ID-Based Encryption with Equality Test Against Insider Attacks from Isogeny,” Computer Standards & Interfaces, Vol. 93, 103958, April, 2025. (SCI)
- Yi-Fan Tseng*, “Blacklisting Access Control via Negated Subset Predicate Encryption: Constant-Size Ciphertexts/Keys Constructions with Adaptive Security or Attribute Hiding,” Journal of Information Security and Applications, Vol. 89, 103959, March, 2025. (SCI)
- Zi-Yuan Liu, Masahiro Mambo*, Raylin Tso*, and Yi-Fan Tseng, “Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems,” Computer Standards & Interfaces, Vol. 89, 103817, April, 2024. (SCI)
- Yi-Fan Tseng*, “Attribute Hiding Subset Predicate Encryption: Quantum-Resistant Construction with Efficient Decryption,” Computer Standards & Interfaces, Vol. 88, 103796, March, 2024. (SCI)
- Yi-Fan Tseng*, Zi-Yuan Liu, and Raylin Tso, “Predicate Encryption with Selective-Opening Security for Receivers: Formal Definition, Generic Construction, and Concrete Instantiations for Several Primitives, ” Designs, Codes and Cryptography, 1-24, Jan., 2024. (SCI)
- Zi-Yuan Liu, Yi-Fan Tseng*, and Raylin Tso, “Cryptanalysis of a round optimal lattice-based multisignature scheme,” Information Processing Letters, Vol. 182, Aug, 2023. (SCI)
- Chun-I Fan, Cheng-Han Shie, Yi-Fan Tseng, and Hui-Chun Huang “An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for MQTT,” ACM Transactions on Sensor Networks, Vol. 19, No. 3, pp. 1-21, March, 2023. (SCI)
- Yi-Fan Tseng, Chun-I Fan*, and Zi-Cheng Liu, “Fast Keyword Search over Encrypted Data with Short Ciphertext in Clouds,” Journal of Information Security and Applications, Vol. 70, Nov., 2022. (SCI)
- Cheng-Yi Lee, Zi-Yuan Liu, Raylin Tso*, and Yi-Fan Tseng, “Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT,” Journal of Systems Architecture, Vol. 130, July, 2022. (SCI)
- Chun-I Fan, Ya-Wen Hsu, Cheng-Han Shie*, and Yi-Fan Tseng, “ID-Based Multi-Receiver Homomorphic Proxy Re-Encryption in Federated Learning,” ACM Transactions on Sensor Networks, Vol. 18, No. 4, Nov, 2022. (SCI)
- Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso*, Peter Shaojui Wang, and Qin-Wen Su, “Extension of elliptic curve Qu–Vanstone certificates and their applications,” Journal of Information Security and Applications, Vol. 67, June 2022. (SCI)
- Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso*, Masahiro Mambo, and Yu-Chi Chen, “Quantum-resistant Anonymous IBE with Traceable Identities,” IET Information Security, vol. 16, no. 2, pp. 111-126, March. 2022. (SCI)
- Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso*, Yu-Chi Chen, and Masahiro Mambo, “Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud Systems,” IEEE Systems Journal, vol. 16, no. 3, pp. 4629-4640, Sept. 2022. (SCI)
- Yi-Fan Tseng, Zi-Yuan Liu*, and Raylin Tso, “A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism,” Journal of Internet Technology, vol. 22, no. 5, pp. 1185-1197, Sep. 2021. (SCI)
- Zi-Yuan Liu, Yi-Fan Tseng*, Raylin Tso, Masahiro Mambo, and Yu-Chi Chen, “Public-key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-resistant Instantiation,” The Computer Journal, Sep. 2021. vol. 64, no. 10, pp. 2828-2844. (SCI)
- Yi-Fan Tseng and Chun-I Fan*, “Anonymous Multireceiver Identity-Based Encryption against Chosen-Ciphertext Attacks with Tight Reduction in the Standard Model,” Security and Communication Networks, Vol. 2021. Jun. 2021. (EI)
- Zi-Yuan Liu, Yi-Fan Tseng*, Raylin Tso, and Masahiro Mambo, “Designated-ciphertext searchable encryption,” Journal of Information Security and Applications, Vol. 58, May 2021. (SCI)
- Yi-Fan Tseng, Zi-Yuan Liu*, Jen-Chieh Hsu, Raylin Tso, “Private Predicate Encryption for Inner Product from Key-homomorphic Pseudorandom Function,” Security and Communication Networks. Vol. 2021. 12 Feb. 2021. (EI)
- Chun-I Fan, Yi-Fan Tseng, Hui-Po Su, Ruei-Hau Hsu and Hiroaki Kikuchi, “Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks,” International Journal of Information Security, Vol. 19, No. 3, pp. 245-255, 2020. (SCI)
- Yi-Fan Tseng, Chun-I Fan, Si-Jing Wu, Hsin-Nan Kuo, Jheng-Jia Huang, “Cryptanalysis and Improvement on Wang et al.'s Attribute-Based Searchable Encryption Scheme,” International Journal of Machine Learning and Computing, vol. 9, no. 5, 636-643, Oct. 2019. (EI, Scopus)
- Yi-Fan Tseng, Chun-I Fan, and Cheng-Wei Sung, “On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki-Okamoto Transformation,” International Journal of Foundations of Computer Science, Vol 30, No. 4, pp. 493-509. 2019 (SCI)
- Yi-Fan Tseng, Chun-I Fan, and Chih-Wen Lin, “Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption,” Journal of Universal Computer Science, Vol. 25, No. 3, pp. 182-202. March, 2019. (SCI)
- Yi-Fan Tseng, Chun-I Fan, and Chin-Yu Wu, “FGAC-NDN: Fine-Grained Access Control for Named Data Networks,” in IEEE Transactions on Network and Service Management, vol. 16, no. 1, pp. 143-152, March, 2019. (SCI)
- Chun-I Fan, Yi-Fan Tseng*, Yi-Hui Lin, and Fangguo Zhang, “Storage-Saving Bi-Dimensional Privacy-Preserving Data Aggregation in Smart Grids,” Journal of Internet Technology, vol. 20, no. 3, 955-962, May, 2019. (SCI)
- Yi-Fan Tseng, Chun-I Fan, and Ching-Wen Chen, “Top-Level Secure Certificateless Signature Scheme in the Standard Model,” in IEEE Systems Journal, vol. 13, no. 3, pp. 2763 - pp. 2774, Sept. 2019. (SCI)
- Yi-Fan Tseng, Chun-I Fan, and Yan-Fu Cho, “An authenticated re‐encryption scheme for secure file transfer in named data networks.” International Journal of Communication Systems., vol. 31, no. 11, May. (SCI)
- Yi-Fan Tseng, Chun-I Fan, “Provably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption,” Journal of Information Science and Engineering, vol. 34, no. 6, pp. 1517-1541, 2018. (SCI)
- Chien-Nan Wu, Chun-I Fan, Jheng-Jia Huang, Yi-Fan Tseng, and Hiroaki Kikuchi, “Probably Secure Efficient Anonymous Credential Scheme.” International Journal of Software Innovation (IJSI) vol. 6, no. 3, pp. 18-35, 2018. (ESCI)
- Chun-I Fan, Yi-Fan Tseng, Jheng-Jia Huang, Shih-Fen Chen, and Hiroaki Kikuchi, “Multireceiver Predicate Encryption for Online Social Networks,” in IEEE Transactions on Signal and Information Processing over Networks, vol. 3, no. 2, pp. 388-403, June 2017. (SCI)
- Shi-Yuan Huang, Chun-I Fan and Yi-Fan Tseng, “Enabled/Disabled Predicate Encryption in Clouds,” Future Generation Computer Systems, vol. 62, pp. 148-160, September 2016. (SCI)
- Chun-I Fan, Pei-Hsiu Ho, and Yi-Feng Tseng, “Strongly Secure Certificateless Signature Scheme Supporting Batch Verification,” Mathematical Problems in Engineering, vol. 2014, Article ID 854135, Apr. 2014. (SCI)
Conference Papers
- Jheng-Jia Huang, Wei-Hsueh Wang, Wen-Yan Dai, Guan-Yu Chen, and Yi-Fan Tseng, “Efficient and Secure Multi-Point Communication Framework Supporting Resource Constraints Environment,” 2024 IEEE Confernece on Dependable and Secure Computing (IEEE DSC 2024), Tokyo, Japan, 6-8, Nov. 2024.
(Doi: 10.1109/DSC63325.2024.00029)
- 何建茂, 陳沅寬, 黃賀軍, 張語軒, and Yi-Fan Tseng, “後量子安全一次性簽章與 Full-Rank 編碼函數實作” The 2024 Cryptology and Information Security Conference (CISC 2024), Taipei, Taiwan, 29- 30 Aug., 2024.
- 簡敦佑, 李映薇, 張語軒, 黃賀軍, and Yi-Fan Tseng, “基於 Falcon 之安全身份簽章機制,” The 2024 Cryptology and Information Security Conference (CISC 2024), Taipei, Taiwan, 29- 30 Aug., 2024.
- Yi-Fan Tseng, Raylin Tso, Shi-Sheng Sun, Zi-Yuan Liu and You-Qian Chen, “ID-Based Traitor Tracing with Relaxed Black-Box Setting for Group-Based Applications,” 2024 19th Asia Joint Conference on Information Security (AsiaJCIS), Tainan, Taiwan, 13 - 14, Aug., 2024.
- Yi-Fan Tseng, Jheng-Jia Huang, Guan-Yu Chen, Wei-Hsueh Wang and Yu-Hsuan Chang, “Pairing-Free Identity-Based Encryption with Security Against the KGC,” 2024 19th Asia Joint Conference on Information Security (AsiaJCIS), Tainan, Taiwan, 13 - 14, Aug., 2024.
- Yi-Fan Tseng, Wen-Yi Chen, You-Qian Chen, and Jheng-Jia Huang, “Cryptanaylsis to Ciphertext-Policy Attribute-Based Encryption of Liu et al and Amirthavalli et al,” 2023 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2023), Taipei, Taiwan, 7-9, Dec. 2023.
(ISBN: 978-981-97-7786-0)
- Jheng-Jia Huang, Chih Yang, Wei-Hsueh Wang and Yi-Fan Tseng, “Securing NLP Systems: A Comprehensive AI-Based Approach,” 2023 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2023), Taipei, Taiwan, 7-9, Dec. 2023.
(ISBN: 978-981-97-7786-0)
- Yi-Fan Tseng, Chun-Lin Huang, Pin-Hao Chen, and Jheng-Jia Huang, “A Novel Secure File Transfer Protocol for Digital Content Platform,” 2023 National Computer Symposium (NCS 2023), Taipei, Taiwan, 1-3, Nov. 2023.
- 曾一凡, 孫士勝, and 呂宜學, “對WN23密鑰策略屬性加密之密碼分析,” 2023 National Computer Symposium (NCS 2023), Taipei, Taiwan, 1-3, Nov. 2023.
- Yi-Fan Tseng, Jheng-Jia Huang*, Guan-Yu Chen, Wei-Hsueh Wang, Yi-Hsueh Lu, Wen-Yi Chen, Shih-Pei Kao, “A Novel Ciphertext-Policy Attribute-Based Encryption Supporting Dual Membership,” 2023 18th Asia Joint Conference on Information Security (AsiaJCIS), Tokyo, Japan, 15 - 16, Aug., 2023.
(ISBN: 979-8-3503-4163-8)
- Jheng-Jia Huang, Wei-Hsueh Wang, Yi-Fan Tseng, Guan-Yu Chen, Hao-Hsiang Chang Chien, Wen-Yan Dai, and Nai-Wei Lo, “Anonymous and Unlinkable Identity Scheme in Open Data Environment,” 2023 18th Asia Joint Conference on Information Security (AsiaJCIS), Tokyo, Japan, 15 - 16, Aug., 2023.
(ISBN: 979-8-3503-4163-8)
- Yi-Fan Tseng and Pin-Hao Chen**,** “Cryptanalysis and Improvement to Two Key-Policy Attribute-Based Encryption Schemes for Weighted Threshold Gates,” 13th International Conference on Frontier Computing, Tokyo, Japan, 10 - 14, July, 2023.
(ISBN:978-981-99-9342-0)
- Yi-Fan Tseng, Chih-Tsen Yang, and Pin-Hao Chen, “Identity-Based Broadcast Encryption Schemes Supporting Traitor Tracing from Quadratic Residues,” The 2023 Cryptology and Information Security Conference (CISC 2023), Chiayi, Taiwan, 1- 2 June, 2023.
- Zi-Yuan Liu, Chu-Chieh Chien, Yi-Fan Tseng, Raylin Tso*, and Masahiro Mambo, “Public Key Encryption with Hierarchical Authorized Keyword Search,” The 25th Annual International Conference on Information Security and Cryptology (ICISC 2022), Seoul, Korea, 30, Nov. - 2, Dec., 2022.
- Yu-Chen Liao, Raylin Tso, Zi-Yuan Liu, and Yi-Fan Tseng, “Blockchain-based Confidential Payment System with Controllable Regulation,” The 17th International Conference on Information Security Practice and Experience (ISPEC 2022), Taiwan, 23-25, Nov. 2022.
(ISBN:978-3-031-21280-2)
- Yi-Hsiu Lee, Zi-Yuan Liu, Raylin Tso, and Yi-Fan Tseng, “Blockchain-based Self-sovereign Identity System with Attribute-based Issuance,” The 17th International Conference on Information Security Practice and Experience (ISPEC 2022), Taiwan, 23-25, Nov. 2022.
(ISBN:978-3-031-21280-2)
- Jing-Shiuan You, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng and Masahiro Mambo, “Quantum-resistant 1-out-of-N Oblivious Signatures from Lattices,” The 17th International Workshop on Security (IWSEC 2022), Japan, 31 Aug. - 2 Sep. 2022.
(ISBN:978-3-031-15255-9)
- Yi-Fan Tseng, Hao-Yu Yang, Chieh-Han Wu, Tsung-Yu Chien, Raylin Tso, Zi Yuan Liu and Jen-Chieh Hsu, “Cryptanalysis to Ming et al.’s Revocable Multi-Authority Attribute-Based Encryption,” 2022 17th Asia Joint Conference on Information Security (AsiaJCIS), China, 2022, 15-16 Aug. (ISBN:978-1-6654-7392-7)
- Yi-Fan Tseng, Jheng-Jia Huang, Hao-Yu Yang, Tsung-Yu Chien and Chieh-Han Wu, “Cryptanalysis and Discussion on Two Attribute-Based Encryption Schemes,” 2022 17th Asia Joint Conference on Information Security (AsiaJCIS), China, 2022, 15-16 Aug. (ISBN:978-1-6654-7392-7)
- Yi-Fan Tseng, Tsung-Yu Chien, Chieh-Han Wu and Hao-Yu Yang, “A Novel Anonymous Identity-Based Encryption,” The 2022 Cryptology and Information Security Conference (CISC 2022), Virtual, Taiwan, 16- 17 June, 2022.
- Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso*, Masahiro Mambo, Yu-Chi Chen, “Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation,” The 17th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2022), Nagasaki, Japan, 30 May - 3 June, 2022.
(ISBN:978-1-4503-9140-5)
- Jheng-Jia Huang, Yi-Fan Tseng, Nai-Wei Lo, Shao-Wei Tung and Wen-Yan Dai, “Lightweight and Efficient Source Authentication Scheme Based on Blockchain Approach in Open Data Environment,” 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2021), Taichung, Taiwan, 18-20, Nov. 2021.
(ISBN:978-3-031-05491-4)
- Yi-Fan Tseng, “Cryptanaylsis to Sowjanya et al.’s ABEs from ECC,” 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2021), Taichung, Taiwan, 18-20, Nov. 2021.
(ISBN:978-3-031-05491-4)
- Yan-Bin Lin and Yi-Fan Tseng, “Cryptanalysis on Lin and Wu’s Undeniable (t, n)-Threshold Signature Scheme with Cheater Identification,” 2021 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), Hualien, Taiwan, 16-19 Nov. 2021.
(ISBN:978-1-6654-1951-2, EI)
- Zi-Yuan Liu, Yi-Fan Tseng, and Raylin Tso, “Cryptanalysis on ‘An efficient identity-based proxy signcryption using lattice’,” 2021 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), Hualien, Taiwan, 16-19 Nov. 2021.
(ISBN:978-1-6654-1951-2, EI)
- Chih-Chen Yang, Raylin Tso, Zi-Yuan Liu, Jen-Chieh Hsu, and Yi-Fan Tseng, “Improved Proxy Re-encryption Scheme with Equality Test,” 2021 16th Asia Joint Conference on Information Security (AsiaJCIS), Korea, 2021, 19-20 Aug.
(ISBN:978-1-6654-1788-4, EI)
- Yi-Fan Tseng and Jheng-Jia Huang, “Identity-Based Signature from Quadratic Residues and Its Application to ID-Based Multi-Signature” 2021 16th Asia Joint Conference on Information Security (AsiaJCIS), Korea, 2021, 19-20 Aug.
(ISBN:978-1-6654-1788-4, EI)
- Yi-Fan Tseng, “Identity-Based Signature Scheme over Conic Curve Cyclic Groups,” The 2021 Cryptology and Information Security Conference (CISC 2021), Taipei, Taiwan, 5 - 6 Aug, 2021.
- Chun-I Fan, Yi-Fan Tseng, and Cheng-Chun Feng, “CCA-Secure Attribute-Based Encryption Supporting Dynamic Membership in the Standard Model,” The 2021 IEEE Conference on Dependable and Secure Computing (IEEE DSC 2021) - Main Track, Fukushima, Japan, 30 Jan - 2 Feb, 2021.
(ISBN:978-1-7281-7534-8, EI)
- Yi-Fan Tseng and Shih-Jie Gao, “Efficient Subset Predicate Encryption for Internet of Things,” The 2021 IEEE Conference on Dependable and Secure Computing (IEEE DSC 2021) - Experience and Practice Track, Fukushima, Japan, 30 Jan - 2 Feb, 2021.
(ISBN:978-1-7281-7534-8, EI)
- Yi-Fan Tseng and Jheng-Jia Huang, “Cryptanalysis on Two Pairing-Free Ciphertext-Policy Attribute-Based Encryption Schemes,” International Computer Symposium (ICS 2020), Tainan, Taiwan, 17-19, Dec, 2020.
(ISBN:978-1-7281-9255-0, EI)
- Chun-I Fan, Yi-Fan Tseng, and Yen-Lin Huang, “Key-Aggregate Proxy Re-Encryption with Dynamic Condition Generation Using Multilinear Map,” 2020 15th Asia Joint Conference on Information Security (AsiaJCIS), Taipei, Taiwan, 20-21, Aug, 2020.
(ISBN:978-1-7281-9922-1, EI)
- Yi-Fan Tseng, Zi-Yuan Liu, and Raylin Tso, “A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism,” 2020 15th Asia Joint Conference on Information Security (AsiaJCIS), Taipei, Taiwan, 20-21, Aug, 2020.
(ISBN:978-1-7281-9922-1, EI)
- Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso, “Practical Predicate Encryption for Inner Product,” The 17th International Conference on Security and Cryptography (SECRYPT 2020), Paris, France, 8-10, July, 2020.(In Proceedings of the 17th International Joint Conference on e-Business and Telecommunications - Volume 3: SECRYPT, ISBN 978-989-758-446-6, pages 553-558. DOI: 10.5220/0009804605530558)
- Yi-Fan Tseng, Chun-I Fan, Si-Jing Wu, Hsin-Nan Kuo, and Jheng-Jia Huang, “Cryptanalysis and Improvement on Wang et al.'s Attribute-Based Searchable Encryption,” The 9th International Conference on Power, Energy and Electrical Engineering, Tokyo, Japan, January 26-28, 2019. (EI, Scopus)
- Chun-I Fan, Yi-Fan Tseng, Chen-Hsi Cheng, Hsin-Nan Kuo, Jheng-Jia Huang, and Yu-Tse Shih “Anonymous Authentication and Key Agreement Protocol for LTE Networks,” 2nd International Conference on Communication Engineering and Technology, Nagoya, Japan, April 12-15, 2019. (EI, Scopus)
- Han Gao, Chun-I Fan, Jheng-Jia Huang, Yi-Fan Tseng, Hsin-Nan Kuo and Yu-Tse Shih, ‘Anonymous Fair P2P-Lending Scheme,’ The International Conference on Innovative Computing and Management Science (ICMS 2019), Osaka, Japan, July 19-22, 2019.
- Siyuan Zhang , Chun-I Fan , Yi-Fan Tseng, Jheng-Jia Huang , Yu-Tse Shih , Hsin-Nan Kuo , Cheng-Han Shie, “Dynamic Blockchain Storage Scheme Based on Sidechains,” Annual Conference on Engineering and Applied Science, Kyoto, Japan, December 17-19, 2019.
- Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng and Masahiro Mambo , “Signcryption from NTRU Lattices Without Random Oracles,” The 14th Asia Joint Conference on Information Security, Kobe, Japan, August 1-2, 2019.
- Wei-Hao Chen, Chun-I Fan , and Yi-Fan Tseng, “Efficient Key-Aggregate Proxy Reencryption for Secure Data Sharing in Clouds,” IEEE Conference on Dependable and Secure Computing, Kaohsiung, Taiwan, December 10-13, 2018.
- Jheng-Jia Huang, Yi-Fan Tseng, Qi-Liang Yang, and Chun-I Fan, “A Lattice-Based Group Authentication Scheme,” The International Conference on Smart Science, Kyoto, Japan, March 29 – April 3, 2018.
- Chun-I Fan, Yi-Fan Tseng, Hui-Po Su, Ruei-Hau Hsu and Hiroaki Kikuchi, “Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks,” IEEE Conference on Dependable and Secure Computing, Kaohsiung, Taiwan, December 10-13, 2018. (Workshop Paper)
- Chun-I Fan, Yi-Fan Tseng, Cheng-Yuan E, Jheng-Jia Huang, “Transformation Between Attribute-Based Encryption and Key-Aggregate Cryptosystem,” The 13th Asia Joint Conference on Information Security, Guilin, China, August 8-9, 2018.
- Chun-I Fan, Yi-Fan Tseng, Jheng-Jia Huang, Yen-Hao Chen, and Hsin-Nan Kuo, “Verifiable Privacy-Preserving Payment Mechanism for Smart Grids,” The 11th International Conference on Internet and Distributed Computing Systems, Tokyo, Japan, October 11-13, 2018.
- Chun-I Fan, Yi-Fan Tseng, Yi-Hui Lin, and Fangguo Zhang, “Storage-Saving Bi-Dimensional Privacy-Preserving Data Aggregation in Smart Grids,” International Conference on Security with Intelligent Computing and Big-Data Services, Hualien, Taiwan, December 15-17, 2017.
- Yi-Fan Tseng, Chun-I Fan, Ting-Chuan Kung, Jheng-Jia Huang, and Hsin-Nan Kuo, “Homomorphic Encryption Supporting Logical Operation,” International Conference on Telecommunications and Communication Engineering, Osaka, Japan, October 22-24, 2017.
- Yi-Fan Tseng and Chun-I Fan, “Cryptanalysis on the Anonymity of Li et al.’s Ciphertext-Policy Attribute-Based Encryption Scheme,” National Computer Symposium, Hualien, Taiwan, December 14-15, 2017.
- Chien-Nan Wu, Chun-I Fan, Jheng-Jia Huang, Yi-Fan Tseng and Hiroaki Kikuchi, “An Efficient Signature Scheme for Anonymous Credentials,” The 5th International Conference on Applied Computing & Information Technology, Hamamatsu, Japan, July 9-13, 2017.
- Jheng-Jia Huang, Wen-Shenq Juang, Chun-I Fan, Yi-Fan Tseng, and Hiroaki Kikuchi, “Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments,” The 13th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Hiroshima, Japan, November 28-December 1, 2016.
- Chun-I Fan, Jian-Sheng Wang, Jheng-Jia Huang, Yi-Fan Tseng, Wen-Sheng Juang, and Hiroaki Kikuchi, “Flexible Authentication Protocol with Key Reconstruction in WBAN Environments,” 6th International Conference on IT Convergence and Security (ICITCS), Prague, Czech Republic, September 26-29, 2016.
- Chun-I Fan, Jheng-Jia Huang, Yi-Fan Tseng, and Huang-Kai Chu, “Mutually Anonymous Fair Exchange Protocol with Offline Third Party,” The 7th International Conference on Internet (ICONI 2015), Kuala Lumpur, Malaysia, Dec 13-16, 2015.
- Chun-I Fan, Yu-Chi Lin, Yi-Fan Tseng, and Jheng-Jia Huang, “Efficient Platform for Traceable Collaborative Workflow Based on Bi-Trapdoor Hash Function,” The Fourth International Conference on Informatics & Applications, Kagawa University, Japan, July 20-22, 2015.
- Chun-I Fan, Han-Wei Hsiao, Chun-Han Chou, and Yi-Fan Tseng, “Malware Detection System Based on API Log Data Mining,” The 2015 IEEE International Computer Software and Applications Conference (COMPSAC 2015), Taichung, Taiwan, July 1-5, 2015.
- Chun-I Fan, Chien-Nan Wu, Chun-Hung Chen, and Yi-Fan Tseng, “Attribute-Based Proxy Re-Encryption with Dynamic Membership,” The 10th Asia Joint Conference on Information Security, Kauhsiung, Taiwan, May 24-26, 2015.
- Chun-I Fan, Jheng-Jia Huang, and Yi-Fan Tseng, “Attribute and Relation Based Encryption for Social Networks,” Asia-Pacific Conference on Engineering and Applied Sciences, Osaka, Japan, August 25-27, 2015.
- Chun-I Fan, Chien-Nan Wu, Jen-Chun Hsu, Yi-Fan Tseng, and Wen-Tsuen Chen, “Anonymous Credential Scheme Supporting Active Revocation,” The 9th Asia Joint Conference on Information Security, Wuhan, China, September 3-5, 2014.
- Chun-I Fan, Pei-Hsiu Ho, Jheng-Jia Huang, and Yi-Fan Tseng, “Secure Certificateless Signature Scheme Supporting Batch Verification,” The 8th Asia Joint Conference on Information Security, Seoul, Korea, July 25-26, 2013.