scispace - formally typeset
W

Wen-Guey Tzeng

Researcher at National Chiao Tung University

Publications -  94
Citations -  3632

Wen-Guey Tzeng is an academic researcher from National Chiao Tung University. The author has contributed to research in topics: Encryption & Public-key cryptography. The author has an hindex of 29, co-authored 94 publications receiving 3331 citations. Previous affiliations of Wen-Guey Tzeng include Stony Brook University.

Papers
More filters
Journal ArticleDOI

Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage

TL;DR: New public-key cryptosystems that produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertextS are possible are described, giving the first public-keys patient-controlled encryption for flexible hierarchy.
Book ChapterDOI

Identity-based proxy re-encryption without random oracles

TL;DR: Two identity-based proxy re-encryption schemes are proposed, one of which is efficient in both computation and ciphertext length, and the other achieves chosen-ciphertext security.
Book ChapterDOI

A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares

TL;DR: A new public-key traitor tracing scheme with revocation capability using the dynamic share and entity revocation techniques and fully k-resilient such that the traitor tracing algorithm can find all traitors if the number of them is k or less.
Journal ArticleDOI

A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding

TL;DR: This work proposes a threshold proxy re-encryption scheme and integrates it with a decentralized erasure code such that a secure distributed storage system is formulated and fully integrates encrypting, encoding, and forwarding.
Journal ArticleDOI

A time-bound cryptographic key assignment scheme for access control in a hierarchy

TL;DR: A time-bound cryptographic key assignment scheme in which the cryptographic keys of a class are different for each time period, which is to broadcast data to authorized users in a multilevel-security way and the other is to construct a flexible cryptographic key backup system.