Book       Conference Papers       Journal Papers

Authored Book:

Fuchun Guo, Willy Susilo, and Yi Mu. Introduction to Security Reduction (to appear).

Conference:

  1. Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang and Yi Mu. Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample. The 37th International Cryptology Conference (CRYPTO 2017), Lecture Notes in Computer Science, 2017 (to appear).

  2. Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo and Mingwu Zhang.Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. The 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT 2016), Lecture Notes in Computer Science, 2016 (to appear). (Paper)

  3. Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai and Guomin Yang. Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction. The 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT 2016), Lecture Notes in Computer Science, 2016 (to appear). (Paper)

  4. Jongkil Kim, Willy Susilo, Fuchun Guo and Man Ho Au. A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups. 10th Conference on Security and Cryptography for Networks (SCN 2016), Lecture Notes in Computer Science, 2016 (to appear).

  5. Fuchun Guo, Yi Mu, Willy Susilo, and Vijay Varadharajan, ``Membership Encryption and Its Applications," 18th Australasian Conference on Information Secuiryt and Privacy (ACISP 2013), Lecture Notes in Computer Science vol.7959, Springer Verlag, 2013, pp. 219-234. (PDF)

  6. Fuchun Guo, Yi Mu and Willy Susilo, ``Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext," 17th European Symposium on Research in Computer Security (ESORICS 2012), Lecture Notes in Computer Science vol.7459, Springer Verlag, 2012, pp. 609-626. (PDF)

  7. Fuchun Guo, Yi Mu, and Zhide Chen, ``Efficient Batch Verification of Short Signatures for A Single-signer Setting Without Random Oracles," 3rd International Workshop on Security (IWSEC 2008), Lecture Notes in Computer Science vol.5312, Springer Verlag, 2008, pp.49-63. (Best Student Paper)

  8. Fuchun Guo, Yi Mu, and Zhide Chen, ``Identity-Based Online/Offline Encryption," 12th Financial Cryptography and Data Security (FC 2008), Lecture Notes in Computer Science vol.5143, Springer Verlag, 2008, pp.247-261. (PDF)

  9. Fuchun Guo, Yi Mu, Zhide Chen, and Li Xu, ``Multi-Identity Single-Key Decryption without Random Oracles," 3rd Information Security and Cryptology(Inscrypt 2007), Lecture Notes in Computer Science, vol.4990 Springer Verlag, 2008, pp.384-398.

  10. Fuchun Guo, Yi Mu, and Zhide Chen, ``Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key," 1st International Conference on Pairing-based Cryptography(Pairing 2007), Lecture Notes in Computer Science vol.4575, Springer Verlag,2007, pp.392-406.



    Journal: (back to top)

  1. 赵臻, 吴戈, 赖建昌, 蒋芃, 朱斌瑞, 穆怡, Willy Susilo, 郭福春. 公钥密码方案构造及安全证明的知识 要点和方法论[J]. 密码学报, 2018.

  2. Peng Jiang, Fuchun Guo, Willy Susilo, Man Ho Au, Xinyi Huang, Joseph Liu. Efficient and Adaptive Procurement Protocol with Purchasing Privacy. IEEE Transactions on Services Computing, to appear, 2018. Acceptance Date: 21 March 2018.

  3. Willy Susilo, Guomin Yang, Fuchun Guo and Qiong Huang. Constant-Size Ciphertexts in Threshold Attribute-Based Encryption without Dummy Attributes. Information Sciences, Volume 429, pp. 349360, March 2018. https://doi.org/10.1016/j.ins.2017.11.037

  4. Willy Susilo, Peng Jiang, Fuchun Guo, Guomin Yang, Yong Yu and Yi Mu. EACSIP: Extendable Access Control System with Integrity Protection for Enhancing Collaboration in the Cloud. IEEE Transactions on Information Forensics and Security, 2017 (to appear). Acceptance Date: 24 July 2017.

  5. Jongkil Kim, Willy Susilo, Fuchun Guo and Man Ho Au. Functional Encryption for Computational Hiding in Prime Order Groups via Pair Encodings. Designs, Codes and Cryptography, 2017 (to appear).

  6. Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo and Xinyi Huang, ``Strong Authenticated Key Exchange with Auxiliary Inputs" Designs, Codes and Cryptography (accepted, 22 Oct. 2016)

  7. Kaitai Liang, Xinyi Huang, Fuchun Guo, Joseph K. Liu: Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data. IEEE Trans. Information Forensics and Security 11(10): 2365-2376 (2016)

  8. Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xinyi Huang and Xiaofen Wang, ``Server-Aided Public Key Encryption with Keyword Search," IEEE Transactions on Information Forensics and Security, (accepted, 25 June)

  9. Rongmao Chen, Yi Mu, GuominYang, Fuchun Guo and Xiaofen Wang, ``Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage,'' IEEE Transactions on Information Forensics & Security, (accepted. 17 DEC. 2015)

  10. Fuchun Guo, Willy Susilo and Yi Mu. Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption. IEEE Transactions on Information Forensics and Security, 2015 (accepted. 21 Sep. 2015)

  11. Willy Susilo, Fuchun Guo and Yi Mu "Efficient Dynamic Threshold Identity-based Encryption with Constant-size Ciphertext," Theoretical Computer Science (accepted. 7 Sep. 2015)

  12. Rongmao Chen, Yi Mu, Guomin Yang and Fuchun Guo, ``BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication,'' IEEE Transactions on Information Forensics & Security, (accepted. 7 Aug. 2015)

  13. Fuchun Guo, Yi Mu, Willy Susilo, Homer Hsing, Duncan S. Wong and Vijay Varadharajan, "Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices," IEEE Transactions on Dependable and Secure Computing (accepted, 7 June 2015)

  14. Fuchun Guo, Willy Susilo and Yi Mu, "Generalized Closest Substring Encryption," Designs, Codes and Cryptography, 2015, DOI: 10.1007/s10623-015-0068-4. Acceptance Date: 16 March 2015. (PDF)

  15. Fuchun Guo, Yi Mu and Willy Susilo, "Subset Membership Encryption and Its Applications to Oblivious Transfer," IEEE Transactions on Information Forensics & Security, 2014 (to appear). Acceptance Date: 29 April 2014. (PDF)

  16. Fuchun Guo, Yi Mu, Willy Susilo, Duncan S. Wong, and Vijay Varadharajan, ``CP-ABE with Constant-Size Keys for Lightweight Devices," IEEE Transactions on Information Forensics & Security, vol.PP, no.99, pp.1,1, 2014 doi: 10.1109/TIFS.2014.2309858.