Conference:

  1. Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang and Yi Mu. Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample. The 37th International Cryptology Conference (CRYPTO 2017), Lecture Notes in Computer Science, 2017 (to appear).

  2. Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au and Surya Nepal. An Efficient KP-ABE with Short Ciphertexts in Prime Order Groups under Standard Assumption. The 12th ACM Asia Conference on Computer and Communications Security (ASIACCS 2017), ACM (to appear).

  3. Ge Wu, Yi Mu, Willy Susilo and Fuchun Guo. Privacy-preserving Cloud Auditing with Multiple Uploaders. The 12th International Conference on Information Security Practice and Experience (ISPEC 2016), Lecture Notes in Computer Science, 2016 (to appear).

  4. Peng Jiang, Xiaofen Wang, Jianchang Lai, Fuchun Guo and Rongmao Chen. Oblivious Keyword Search with Authorization. The 10th International Conference on Provable Security (ProvSec 2016), Lecture Notes in Computer Science, 2016 (to appear).

  5. Yinhao Jiang, Willy Susilo, Yi Mu, and Fuchun Guo. Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update. The 10th International Conference on Provable Security (ProvSec 2016), Lecture Notes in Computer Science, 2016 (to appear).

  6. Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo and Mingwu Zhang.Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. The 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT 2016), Lecture Notes in Computer Science, 2016 (to appear). (Paper)

  7. Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai and Guomin Yang. Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction. The 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT 2016), Lecture Notes in Computer Science, 2016 (to appear). (Paper)

  8. Jongkil Kim, Willy Susilo, Fuchun Guo and Man Ho Au. A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups. 10th Conference on Security and Cryptography for Networks (SCN 2016), Lecture Notes in Computer Science, 2016 (to appear).

  9. Peng Jiang, Yi Mu and Fuchun Guo ``Public Key Encryption with Authorized Keyword Search," 21th Australasian Conference on Information Security and Privacy (ACISP 2016), Lecture Notes in Computer Science, Springer Verlag, 2016.

  10. Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo and Rongmao Chen ``Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing," 21th Australasian Conference on Information Security and Privacy (ACISP 2016), Lecture Notes in Computer Science, Springer Verlag, 2016.

  11. Rongmao Chen, Yi Mu, Willy Susilo, Guomin Yang, Fuchun Guo and Mingwu Zhang ``One-Round Strong Oblivious Signature-Based Envelope," 21th Australasian Conference on Information Security and Privacy (ACISP 2016), Lecture Notes in Computer Science, Springer Verlag, 2016.

  12. Yinhao Jiang, Willy Susilo, Yi Mu, and Fuchun Guo. Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance. 21st Australasian Conference on Information Security and Privacy (ACISP 2016), Lecture Notes in Computer Science, 2016 (to appear).

  13. Willy Susilo, Rongmao Chen, Fuchun Guo, Guomin Yang, Yi Mu and Yang-Wai Chow, " Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext", The 11th ACM Asia Conference on Computer and Communications Security (ASIACCS 2016), ACM, 2016.

  14. Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, ``Strongly Leakage-Resilient Authenticated Key Exchange," CT-RSA 2016, Lecture Notes in Computer Science, Springer Verlag, 2016.

  15. Rongmao Chen, Yi Mu, GuominYang, Fuchun Guo and Xiaofen Wang ``A New General Framework for Secure Public Key Encryption with Keyword Search," 20th Australasian Conference on Information Security and Privacy (ACISP 2015), Lecture Notes in Computer Science, Springer Verlag, 2015.

  16. Jianchang Lai, Yi Mu, Fuchun Guo and Willy Susilo ``Improved Identity-Based Online/Offline Encryption," 20th Australasian Conference on Information Security and Privacy (ACISP 2015), Lecture Notes in Computer Science, Springer Verlag, 2015.

  17. Fuchun Guo, Willy Susilo, and Yi Mu, ``POSTER: Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption," 21st ACM Conference on Computer and Communications Security (ACM CCS 2014), ACM, 2014. (Poster Paper)

  18. Nan Li, Yi Mu, Willy Susilo, Fuchun Guo, and Vijay Varadharajan, ``Privacy-preserving Authorized RFID Authentication Protocols," 10th Workshop on RFID Security (RFIDSec 2014), Lecture Notes in Computer Science, Springer Verlag, 2014.

  19. Kefeng Wang, Yi Mu, Willy Susilo, and Fuchun Guo, ``Attribute-Based Signature with Message Recovery," 10th Information Security Practice and Experience (ISPEC 2014), Lecture Notes in Computer Science, Springer Verlag, 2014.

  20. Fuchun Guo, Yi Mu, Willy Susilo, and Vijay Varadharajan, ``Membership Encryption and Its Applications," 18th Australasian Conference on Information Secuiryt and Privacy (ACISP 2013), Lecture Notes in Computer Science vol.7959, Springer Verlag, 2013, pp. 219-234. (PDF)

  21. Nan Li, Yi Mu, Willy Susilo, Fuchun Guo and Vijay Varadharajan, ``On RFID Authentication Protocols with Wide-Strong Privacy," RFIDSec Asia Workshop 2013, Cryptology and Information Security Series vol. 11, 2013, pp. 3-16

  22. Fuchun Guo, Yi Mu and Willy Susilo, ``Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext," 17th European Symposium on Research in Computer Security (ESORICS 2012), Lecture Notes in Computer Science vol.7459, Springer Verlag, 2012, pp. 609-626. (PDF)

  23. Fuchun Guo, Yi Mu, Willy Susilo and Vaijay Varadharajan, ``A Pre-computable Signature Scheme with Efficient Verification for RFID," 8th Information Security Practice and Experience (ISPEC 2012), Lecture Notes in Computer Science vol.7232, Springer Verlag, 2012, pp. 1-16

  24. Nan Li, Yi Mu, Willy Susilo and Fuchun Guo, `Self-Certified Ring Signatures," 6th ACM Symposium on Information, Computer and Communications Security (AisaCCS 2011), ACM Press, 2011, pp. 396-400

  25. Fuchun Guo, Yi Mu, and Willy Susilo, ``Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase," 6th Information Security and Cryptology(Inscrypt 2010), Lecture Notes in Computer Science vol.6584, Springer Verlag, 2011, pp. 455-470

  26. Yilian Zhang, Zhide Chen and Fuchun Guo, ``Online/Offline Verification of Short Signatures," 6th Information Security and Cryptology(Inscrypt 2010), Lecture Notes in Computer Science vol.6584, Springer Verlag, 2011, pp. 350-358.

  27. Fuchun Guo, Yi Mu and Willy Susilo, ``How to Prove Security of A Signature with A Tighter Security Reduction," 3rd Provable Security (ProvSec 2009), Lecture Notes in Computer Science vol.5848, Springer Verlag, 2009, pp. 90-103.

  28. Fuchun Guo and Yi Mu, ``Optimal Online/Offline Signature: How to Sign a Message Without Online Computation," 2nd Provable Security (ProvSec 2008), Lecture Notes in Computer Science vol.5324, Springer Verlag, 2008, pp.98-111.

  29. Fuchun Guo, Yi Mu, and Zhide Chen, ``Efficient Batch Verification of Short Signatures for A Single-signer Setting Without Random Oracles," 3rd International Workshop on Security (IWSEC 2008), Lecture Notes in Computer Science vol.5312, Springer Verlag, 2008, pp.49-63. (Best Student Paper)

  30. Zhongren Liu, Li Xu, Zhide Chen, Yi Mu, and Fuchun Guo, ``Hierarchical Identity-Based Online/Offline Encryption," International Symposium on Electronic Commerce and Security( ISECS 2008), 2008, pp. 2115-2119.

  31. Fuchun Guo, Yi Mu, and Zhide Chen, ``Identity-Based Online/Offline Encryption," 12th Financial Cryptography and Data Security (FC 2008), Lecture Notes in Computer Science vol.5143, Springer Verlag, 2008, pp.247-261. (PDF)

  32. Zhao-Hui Tang, Li Xu, Zhide Chen and Fuchun Guo, "On the Security of WAI Protocol in the Third Version of WAPI," 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), IEEE Computer Society, 2008, pp.516-519.

  33. Fuchun Guo, Yi Mu, and Zhide Chen, ``Mutative Identity-Based Signatures or Dynamic Credentials without Random Oracles," 6th International Conference on Cryptology and Network Security (CANS 2007), Lecture Notes in Computer Science vol.4856, Springer Verlag, 2007, pp.1-14.

  34. Fuchun Guo, Yi Mu, Zhide Chen, and Li Xu, ``Multi-Identity Single-Key Decryption without Random Oracles," 3rd Information Security and Cryptology(Inscrypt 2007), Lecture Notes in Computer Science, vol.4990 Springer Verlag, 2008, pp.384-398.

  35. Fuchun Guo, Yi Mu, and Zhide Chen, ``Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key," 1st International Conference on Pairing-based Cryptography(Pairing 2007), Lecture Notes in Computer Science vol.4575, Springer Verlag,2007, pp.392-406.

  36. Zhongren Liu, Li Xu, Zhide Chen and Fuchun Guo, "Private Key Management in Hierarchical Identity-Based Encryption," International IEEE Conference on Signal-Image Technologies and Internet-Based System (SITIS 2007), pp.206-212.

  37. Zhongsheng Wu, Zhide Chen, Li Xu and Fuchun Guo, "Routing Protocols Based on Double Auction for Ad Hoc Networks," Networking, Architecture, and Storage(IEEE NAS 2007), IEEE Computer Society, 2007, pp.55-61.

  38. Fuchun Guo, Zhide Chen, and Yi Mu, ``Trust Negotiation with Trust Parameters," International Conference on Computational Intelligence and Security (CIS'06), Lecture Notes in Computer Science vol.4456, Springer Verlag,2007, pp.374-384.



    Journal: (back to top)

  1. Willy Susilo, Peng Jiang, Fuchun Guo, Guomin Yang, Yong Yu and Yi Mu. EACSIP: Extendable Access Control System with Integrity Protection for Enhancing Collaboration in the Cloud. IEEE Transactions on Information Forensics and Security, 2017 (to appear). Acceptance Date: 24 July 2017.

  2. Fuchun Guo, Yi Mu, Willy Susilo and Vijay Varadharajan. Privacy-Preserving Mutual Authentication in RFID with Designated Readers", Wireless Personal Communications (accepted, 15 May)

  3. Jongkil Kim, Willy Susilo, Fuchun Guo and Man Ho Au. Functional Encryption for Computational Hiding in Prime Order Groups via Pair Encodings. Designs, Codes and Cryptography, 2017 (to appear).

  4. Peng Jiang, Yi Mu, Fuchun Guo and Qiaoyan Wen, `` Secure-Channel Free Keyword Search with Authorization in Manager-centric Databases," Computers & Security, 2017

  5. Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo and Xinyi Huang, ``Strong Authenticated Key Exchange with Auxiliary Inputs" Designs, Codes and Cryptography (accepted, 22 Oct. 2016)

  6. Peng Jiang, Yi Mu, Fuchun Guo, Xiaofen Wang and Jianchang Lai, ``Centralized Keyword Search on Encrypted Data for Cloud Applications," Security and Communication Networks, (accepted, 16 Sep. 2016)

  7. Kaitai Liang, Xinyi Huang, Fuchun Guo, Joseph K. Liu: Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data. IEEE Trans. Information Forensics and Security 11(10): 2365-2376 (2016)

  8. Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xinyi Huang and Xiaofen Wang, ``Server-Aided Public Key Encryption with Keyword Search," IEEE Transactions on Information Forensics and Security, (accepted, 25 June)

  9. Jianchang Lai, Yi Mu, Fuchun Guo, ``Efficient Identity-Based Online/Offline Encryption and Signcryption with Short Ciphertext ,'' International Journal of Information Security, (accepted. 5 FEB. 2016)

  10. Rongmao Chen, Yi Mu, GuominYang, Fuchun Guo and Xiaofen Wang, ``Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage,'' IEEE Transactions on Information Forensics & Security, (accepted. 17 DEC. 2015)

  11. Peng Jiang, Yi Mu, Fuchun Guo, and Xiaofen Wang, ``Online/offline Ciphertext Retrieval on Resource Constrained Devices," The Computer Journal, Oxford, (accepted, 13 Oct. 2015)

  12. Fuchun Guo, Willy Susilo and Yi Mu. Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption. IEEE Transactions on Information Forensics and Security, 2015 (accepted. 21 Sep. 2015)

  13. Willy Susilo, Fuchun Guo and Yi Mu "Efficient Dynamic Threshold Identity-based Encryption with Constant-size Ciphertext," Theoretical Computer Science (accepted. 7 Sep. 2015)

  14. Rongmao Chen, Yi Mu, Guomin Yang and Fuchun Guo, ``BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication,'' IEEE Transactions on Information Forensics & Security, (accepted. 7 Aug. 2015)

  15. Fuchun Guo, Yi Mu, Willy Susilo, Homer Hsing, Duncan S. Wong and Vijay Varadharajan, "Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices," IEEE Transactions on Dependable and Secure Computing (accepted, 7 June 2015)

  16. Fuchun Guo, Willy Susilo and Yi Mu, "Generalized Closest Substring Encryption," Designs, Codes and Cryptography, 2015, DOI: 10.1007/s10623-015-0068-4. Acceptance Date: 16 March 2015. (PDF)

  17. Nan Li, Yi Mu, Willy Susilo,Fuchun Guo and Vijay Varadharajan, "Vulnerabilities of an ECC-Based RFID Authentication Scheme," Security and Communication Networks (accepted, 2015)

  18. Fuchun Guo, Yi Mu and Willy Susilo, "Subset Membership Encryption and Its Applications to Oblivious Transfer," IEEE Transactions on Information Forensics & Security, 2014 (to appear). Acceptance Date: 29 April 2014. (PDF)

  19. Fuchun Guo, Yi Mu, Willy Susilo, Duncan S. Wong, and Vijay Varadharajan, ``CP-ABE with Constant-Size Keys for Lightweight Devices," IEEE Transactions on Information Forensics & Security, vol.PP, no.99, pp.1,1, 2014 doi: 10.1109/TIFS.2014.2309858.

  20. Tim Wellsmore, Yi Mu, Jennifer Seberry and Fuchun Guo, ``Efficient Authentication and Integrity Protection for the Border Gateway Protocol," International Journal of Security and Networks (accepted, 2 October 2013)

  21. Jorge Munilla, Fuchun Guo and Willy Susilo. "Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme," Wireless Communications, September 2013, Volume 72, Issue 1, pp 245-258, 2013.

  22. Hui Cui, Yi Mu, and Fuchun Guo, ``Server-Aided Identity-Based Anonymous Broadcast Encryption," International Journal of Security and Networks, 2013 Vol.8, No.1, pp.29-39

  23. Fuchun Guo, Yi Mu, Willy Susilo, and Vijay Varadharajan, ``Server-Aided Signature Verification for Lightweight Devices," The Computer Journal, 2013, doi: 10.1093/comjnl/bxt003

  24. Fuchun Guo, Yi Mu, and Willy Susilo, ``Efficient and Secure Stored-Value Cards with Leakage Resilience," Computers and Electrical Engineering, vol 38, no. 2, 2012, pp.370-380

  25. Zhide Chen, Yilian Zhang, Li Xu, Fuchun Guo, ``Efficient batch verification of online/offline short signature for a multi-signer setting," Wuhan University Journal of Natural Sciences Vol. 16, Issue 6, 2011, pp 481-486.

  26. Fuchun Guo, Yi Mu, and Willy Susilo, ``Improving Security of q-SDH Based Digital Signatures," Journal of Systems and Software, Vol. 84, No. 10, pp.1783-1790, 2011

  27. Fuchun Guo, Yi Mu, Willy Susilo, ``Short Signatures with A Tighter Security Reduction without Random Oracles," The Computer Journal,vol. 54, Issue 4, pp. 513-524, 2011.

  28. Fuchun Guo, Yi Mu, and Zhide Chen, ``Multi-Identity Management for Identity-Based Cryptography," Journal of Discrete Mathematical Sciences & Cryptography, 11 (6), pp. 639-672, 2008.