scispace - formally typeset
F

Fuchun Guo

Researcher at Information Technology University

Publications -  142
Citations -  2293

Fuchun Guo is an academic researcher from Information Technology University. The author has contributed to research in topics: Encryption & Public-key cryptography. The author has an hindex of 20, co-authored 126 publications receiving 1701 citations. Previous affiliations of Fuchun Guo include Shandong Normal University & Fujian Normal University.

Papers
More filters
Journal ArticleDOI

Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage

TL;DR: This paper proposes a new PEKS framework named dual-server PEKS (DS-PEKS), and defines a new variant of the smooth projective hash functions (SPHFs) referred to as linear and homomorphic SPHF (LH-SPHF), which can achieve the strong security against inside the KGA.
Journal ArticleDOI

CP-ABE With Constant-Size Keys for Lightweight Devices

TL;DR: This paper proposes a novel CP-ABE scheme with constant-size decryption keys independent of the number of attributes, which can be as small as 672 bits, and is the only CP- ABE with expressive access structures, which is suitable for CP-abE key storage in lightweight devices.
Journal ArticleDOI

Server-Aided Public Key Encryption With Keyword Search

TL;DR: A practical and applicable treatment on this security vulnerability by formalizing a new PEKS system named server-aided public key encryption with keyword search (SA-PEKS), and introduces a universal transformation from any PEKS scheme to a secure SA-PE KS scheme using the deterministic blind signature.
Journal ArticleDOI

BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication

TL;DR: This approach can achieve file-level and block-level deduplication, block key management, and proof of ownership simultaneously using a small set of metadata and can be easily extended to support proof of storage, which makes it multi-purpose for secure cloud storage.
Journal ArticleDOI

Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing

TL;DR: This work introduces a new mechanism to enhance CP-ABE schemes that provide protections against this key-delegation abuse issue, and formalizes the security requirements for such a property, and construct a CP- ABE scheme that satisfies the new security requirements.