W
Wen-Guey Tzeng
Researcher at National Chiao Tung University
Publications - 94
Citations - 3632
Wen-Guey Tzeng is an academic researcher from National Chiao Tung University. The author has contributed to research in topics: Encryption & Public-key cryptography. The author has an hindex of 29, co-authored 94 publications receiving 3331 citations. Previous affiliations of Wen-Guey Tzeng include Stony Brook University.
Papers
More filters
Journal ArticleDOI
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
TL;DR: New public-key cryptosystems that produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertextS are possible are described, giving the first public-keys patient-controlled encryption for flexible hierarchy.
Book ChapterDOI
Identity-based proxy re-encryption without random oracles
Cheng-Kang Chu,Wen-Guey Tzeng +1 more
TL;DR: Two identity-based proxy re-encryption schemes are proposed, one of which is efficient in both computation and ciphertext length, and the other achieves chosen-ciphertext security.
Book ChapterDOI
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares
Wen-Guey Tzeng,Zhi-Jia Tzeng +1 more
TL;DR: A new public-key traitor tracing scheme with revocation capability using the dynamic share and entity revocation techniques and fully k-resilient such that the traitor tracing algorithm can find all traitors if the number of them is k or less.
Journal ArticleDOI
A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
Hsiao-Ying Lin,Wen-Guey Tzeng +1 more
TL;DR: This work proposes a threshold proxy re-encryption scheme and integrates it with a decentralized erasure code such that a secure distributed storage system is formulated and fully integrates encrypting, encoding, and forwarding.
Journal ArticleDOI
A time-bound cryptographic key assignment scheme for access control in a hierarchy
TL;DR: A time-bound cryptographic key assignment scheme in which the cryptographic keys of a class are different for each time period, which is to broadcast data to authorized users in a multilevel-security way and the other is to construct a flexible cryptographic key backup system.