Yi‐Fan Tseng

ORCID: 0000-0001-6948-2405
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Complexity and Algorithms in Graphs
  • Cryptographic Implementations and Security
  • Cloud Data Security Solutions
  • Chaos-based Image/Signal Encryption
  • Internet Traffic Analysis and Secure E-voting
  • Cryptography and Residue Arithmetic
  • Blockchain Technology Applications and Security
  • Advanced Authentication Protocols Security
  • User Authentication and Security Systems
  • Quantum Computing Algorithms and Architecture
  • Caching and Content Delivery
  • Network Security and Intrusion Detection
  • Coding theory and cryptography
  • Spam and Phishing Detection
  • Smart Grid Security and Resilience
  • Advanced Steganography and Watermarking Techniques
  • Advanced Malware Detection Techniques
  • Security and Verification in Computing
  • Cooperative Communication and Network Coding
  • Security in Wireless Sensor Networks
  • Wireless Body Area Networks
  • Advanced Data Storage Technologies
  • graph theory and CDMA systems

National Chengchi University
2019-2024

National Taiwan University
2024

National Sun Yat-sen University
2013-2019

As information technology improves, the Internet is involved in every area our daily life. When mobile devices and cloud computing start to play important parts of life, they have become more susceptible attacks. In recent years, phishing malicious websites increasingly serious problems field network security. Attackers use many approaches implant malware into target hosts order steal significant data cause substantial damage. The growth has been very rapid, purpose changed from destruction...

10.1109/compsac.2015.241 article EN 2015-07-01

With the rapid development of cloud computing, an increasing number companies are adopting storage technology to reduce overhead. However, ensure privacy sensitive data, uploaded data need be encrypted before being outsourced cloud. The concept public-key encryption with keyword search (PEKS) was introduced by Boneh et al. provide flexible usage data. Unfortunately, most PEKS schemes not secure against inside guessing attacks (IKGA), so information trapdoor may leaked adversary. To solve...

10.1145/3488932.3497760 article EN Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security 2022-05-24

Abstract The industrial Internet of Things (IIoT) integrates sensors, instruments, equipment and applications, enabling traditional industries to automate intelligently process data. To reduce the cost demand required service equipment, IIoT relies on cloud computing further store Public-key encryption with keyword search (PEKS) plays an important role, due its functionality, ensure privacy confidentiality outsourced data maintenance flexibility in use Recently, Huang Li proposed ‘public-key...

10.1093/comjnl/bxab119 article EN The Computer Journal 2021-08-04

In the era of cloud computing, massive quantities data are encrypted and uploaded to realize a variety applications services while protecting user confidentiality. Accordingly, formulation methods for efficiently searching has become critical problem. Public-key encryption with keyword search is an efficient solution that allows owner generate keywords given document also allowing corresponding trapdoor searching. Huang Li proposed public-key authenticated (PAEKS) scheme resist guessing...

10.1109/jsyst.2021.3103909 article EN IEEE Systems Journal 2021-09-28

In a multi-receiver encryption system, sender chooses set of authorized receivers and sends them message securely efficiently, as the is well encrypted only one ciphertext corresponding to generated no matter how many has chosen. It can be applied video conferencing systems, pay-per-view channels, remote education, so forth. Due privacy considerations, an receiver may not expect that his identity revealed. 2010, anonymous identity-based (ID-based) was first discussed, furthermore, works on...

10.3390/sym7041856 article EN Symmetry 2015-10-16

Named data network (NDN) is one of the most promising information-centric networking architectures, where core concept to focus on named (or contents) themselves. Users in NDN can easily send a request packet get desired content regardless its address. The routers have cache functionality make users instantly retrieve file. Thus, user immediately file from nearby nodes instead remote host. Nevertheless, novel proposal and there are still some open issues be resolved. In view previous...

10.1109/tnsm.2018.2864330 article EN IEEE Transactions on Network and Service Management 2018-08-17

Cloud computing undoubtedly is the most unparalleled technique in rapidly developing industries. Protecting sensitive files stored clouds from being accessed by malicious attackers essential to success of clouds. In proxy re-encryption schemes, users delegate their encrypted other using keys, which elegantly transfers users' burden cloud servers. Moreover, one can adopt conditional schemes employ access control policy on be shared. However, we recognize that size keys will grow linearly with...

10.1109/desec.2018.8625149 article EN 2018-12-01

Data privacy has become a growing concern with advances in machine learning. Federated learning (FL) is type of invented by Google 2016. In FL, the main aim to train high-accuracy global model aggregating local models uploaded participants, and all data process are kept locally. However, compromises security cloud server or among participants render this insufficiently secure. To solve problem, article presents an identity-based multireceiver homomorphic proxy re-encryption (IMHPRE) scheme...

10.1145/3540199 article EN ACM Transactions on Sensor Networks 2022-06-11

10.1016/j.jisa.2020.102709 article EN Journal of Information Security and Applications 2021-02-16

10.1016/j.future.2015.12.008 article EN Future Generation Computer Systems 2015-12-18

In order to overcome the key escrow problem, Al- Riyami and Paterson introduced concept of certificateless public cryptography (CL-PKC) in 2003. CL-PKC requires neither certification nor problem. After that, has been widely applied. 1991, Girault defined three security levels generation center (KGC), where higher level KGC means stronger system. Recently, lots signature schemes their models have presented. However, there is no scheme proposed literature that achieves property Girault's...

10.1109/jsyst.2018.2889780 article EN IEEE Systems Journal 2019-01-14

In IoT environments, the user may have many devices to connect each other and share data. Also, device will not powerful computation storage ability. Many studies focused on lightweight authentication between cloud server client in this environment. They can use help sensors or proxies finish authentication. But side, how create group session key without capability is most important issue environments. The popular application network of environments wireless body area (WBAN). WBAN, proxy...

10.1145/3004010.3004020 article EN 2016-11-28

As Internet of Things (IoT) thrives over the whole world, more and IoT devices IoT-based protocols have been designed proposed in order to meet people’s needs. Among those protocols, message queueing telemetry transport (MQTT) is one most emerging promising which provides many-to-many transmissions based on “publish/subscribe” mechanism. It has widely used industries such as energy industry, chemical engineering, self-driving, so on. While transporting important messages, MQTT specification...

10.1145/3570506 article EN ACM Transactions on Sensor Networks 2022-11-07

Lattice is widely used in cryptography since it has potential for defending quantum attacks. One of the significant problems such shortest vector problem (SVP). This to find non-zero lattice. The SVP an NP-hard under randomized reductions proven by Ajtai, and many cryptosystems are secure assumption that hard, as NTRU. On other hand, some primitives lattice-based require relatively short vectors. In this paper, we propose a new algorithm can be performed time complexity O(n <sup...

10.1109/access.2018.2876401 article EN cc-by-nc-nd IEEE Access 2018-01-01

As the rising popularity of Bitcoin, people tend to use Bitcoin wallets managing keys for spending or receiving funds. Instead generating pairs randomly which are hard be stored, hierarchical deterministic (HD) derive all from a single seed, thus storing that seed is sufficient recover keys. In an HD wallet, it allows users generate child public parent without knowledge any private key. A suitable case this feature auditor permitted auditing, However, impressive makes suffered so-called...

10.1109/desec.2018.8625151 article EN 2018-12-01

Among the applications of internet and cloud computing, online social network (OSN) is a very popular service. Since lot personal information stored on OSN platform, privacy protection such an application has become critical issue. Apart from this, platforms need advertisement revenue to enable continued operations. However, if users encrypt their messages, then providers cannot generate accurate users. Thus, how achieve both preserving worth-discussing Unfortunately, none works OSNs can...

10.1109/tsipn.2017.2697580 article EN IEEE Transactions on Signal and Information Processing over Networks 2017-04-24

Cloud computing has been developed rapidly in recent years, and offers novel concepts innovations computer use. The applications of cloud are that people can put their data on also designate a proxy to help them execute number tasks certain situations. re-encryption which is cryptographic primitive proposed solve this problem. In the system, when user (e.g., Alice) wants send cipher text encrypted by her public key stored another Bob), she transform into different be decrypted Bob's private...

10.1109/asiajcis.2015.21 article EN 2015-05-01

Blind multisignature (BMS), first introduced by Horster et al, constitutes a crucial primitive that allows user to generate signature of message from multiple signers, while the signers cannot obtain any information about message. With these useful properties, blind is suitable for electronic payments and voting. However, most current BMS schemes may be attacked quantum computers in future because they are based on traditional number theories, such as discrete logarithm assumption large...

10.1109/access.2019.2959943 article EN cc-by IEEE Access 2019-01-01

Multireceiver identity-based encryption is a cryptographic primitive, which allows sender to encrypt message for multiple receivers efficiently and securely. In some applications, the may not want their identities be revealed. Motivated by this issue, in 2010, Fan et al. first proposed concept of anonymous multireceiver (AMRIBE). Since then, lots literature studies field have been proposed. After surveying existing works, however, we found that most them fail achieve provable anonymity with...

10.1155/2021/5519721 article EN cc-by Security and Communication Networks 2021-06-14

10.1016/j.jisa.2022.103320 article EN Journal of Information Security and Applications 2022-09-06
Coming Soon ...