User profiles for "author:S H Heng"
Swee-Huay HengMultimedia University Verified email at mmu.edu.my Cited by 1830 |
[HTML][HTML] A review of cryptographic electronic voting
A vast number of e-voting schemes including mix-net-based e-voting, homomorphic e-
voting, blind signature-based e-voting, blockchain-based e-voting, post-quantum e-voting …
voting, blind signature-based e-voting, blockchain-based e-voting, post-quantum e-voting …
Off-line keyword guessing attacks on recent public key encryption with keyword search schemes
Abstract The Public Key Encryption with Keyword Search Scheme (PEKS) was first
proposed by Boneh et al. in 2004. This scheme solves the problem of searching on data that …
proposed by Boneh et al. in 2004. This scheme solves the problem of searching on data that …
Blockchain-enabled searchable encryption in clouds: A review
HB How, SH Heng - Journal of Information Security and Applications, 2022 - Elsevier
Nowadays, the demand of storage and computational resources is increasing. As a result,
the number of organisations and individuals that outsource their data to cloud is also …
the number of organisations and individuals that outsource their data to cloud is also …
An efficient certificateless signature scheme
Certificateless public key cryptography (CLPKC) is a paradi-gm to solve the inherent key
escrow problem suffered by identity-based cryptography (IBC). While certificateless …
escrow problem suffered by identity-based cryptography (IBC). While certificateless …
From digital signature to ID-based identification/signature
K Kurosawa, SH Heng - Public Key Cryptography–PKC 2004: 7th …, 2004 - Springer
In this paper, we first formalize the concept of ID-based identification scheme. Secondly, we
show a transformation from any digital signature scheme satisfying certain condition to an ID …
show a transformation from any digital signature scheme satisfying certain condition to an ID …
[HTML][HTML] Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
Ensuring the cloud data security is a major concern for corporate cloud subscribers and in
some cases for the private cloud users. Confidentiality of the stored data can be managed by …
some cases for the private cloud users. Confidentiality of the stored data can be managed by …
Cryptanalysis of a new image alternate encryption algorithm based on chaotic map
Abstract Wang and Guo (Nonlinear Dyn 76 (4): 1943–1950, 2014) proposed a new image
alternate encryption algorithm based on chaotic map. The image alternate encryption can be …
alternate encryption algorithm based on chaotic map. The image alternate encryption can be …
Failed induction of labour
S Arulkumaran, DMF Gibb… - Australian and New …, 1985 - Wiley Online Library
Editorial Comment: There is an important take away message in this paper–namely that
65% of nulliparas with an unfavourable cervix who had induction of labour performed by …
65% of nulliparas with an unfavourable cervix who had induction of labour performed by …
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester
The first searchable public key encryption scheme with designated testers (dPEKS) known
to be secure against keyword guessing attacks was due to Rhee et al.[HS Rhee, W. Susilo …
to be secure against keyword guessing attacks was due to Rhee et al.[HS Rhee, W. Susilo …
Java implementation for pairing-based cryptosystems
We present a Java implementation for Tate pairing over the supersingular curve y 2= x 3+ x
in F_p. We show some available optimisations for group operations by manipulating the …
in F_p. We show some available optimisations for group operations by manipulating the …