2009 |
9 | EE | Jian Weng,
Robert H. Deng,
Xuhua Ding,
Cheng-Kang Chu,
Junzuo Lai:
Conditional proxy re-encryption secure against chosen-ciphertext attack.
ASIACCS 2009: 322-332 |
2008 |
8 | | Cheng-Kang Chu,
Wen-Guey Tzeng:
Efficient k-out-of-n Oblivious Transfer Schemes.
J. UCS 14(3): 397-415 (2008) |
2007 |
7 | EE | Cheng-Kang Chu,
Wen-Guey Tzeng:
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures.
ACISP 2007: 323-337 |
6 | EE | Cheng-Kang Chu,
Wen-Guey Tzeng:
Identity-Based Proxy Re-encryption Without Random Oracles.
ISC 2007: 189-202 |
5 | EE | Cheng-Kang Chu,
Wen-Guey Tzeng:
Optimal resilient threshold GQ signatures.
Inf. Sci. 177(8): 1834-1851 (2007) |
2006 |
4 | EE | Cheng-Kang Chu,
Wen-Guey Tzeng:
Conditional Oblivious Cast.
Public Key Cryptography 2006: 443-457 |
2005 |
3 | EE | Cheng-Kang Chu,
Wen-Guey Tzeng:
Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries.
Public Key Cryptography 2005: 172-183 |
2003 |
2 | EE | Li-Shan Liu,
Cheng-Kang Chu,
Wen-Guey Tzeng:
A Threshold GQ Signature Scheme.
ACNS 2003: 137-150 |
2002 |
1 | EE | Cheng-Kang Chu,
Wen-Guey Tzeng:
Distributed Key Generation as a Component of an Integrated Protocol.
ICICS 2002: 411-421 |