Publications
Publications
(Please see https://dblp.uni-trier.de/pid/179/6837.html or https://scholar.google.com/citations?user=9RXIMtkAAAAJ&hl=en for the most up-to-date list of publications)
Edited Book
Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Dung Hoang Duong. "Mathematical Modelling for Next-Generation Cryptography - CREST Crypto-Math Project". Springer 2018
Conference Papers
Mei Jiang, Dung Hoang Duong, Willy Susilo:
Puncturable Signature: A Generic Construction and Instantiations. ESORICS 2022 (accepted)Tuong Ngoc Nguyen, Anh The Ta, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Efficient Unique Ring Signatures From Lattices. ESORICS 2022 (accepted)Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Josef Pieprzyk:
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More. ESORICS 2022 (accepted)P. Dutta; M. Jiang; D. Duong; W. Susilo; K. Fukushima; S. Kiyomoto:
Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security, ASIACCS 2022 (accepted)Gang Tang and Dung Hoang Duong and Antoine Joux and Thomas Plantard and Youming Qiao and Willy Susilo:
Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms. EUROCRYPT 2022 (accepted)Anh The Ta, Thanh Xuan Khuc, Tuong Ngoc Nguyen, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto: Efficient Unique Ring Signature for Blockchain Privacy Protection. ACISP 2021: 391-407
Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Partha Sarathi Roy:
Puncturable Identity-Based Encryption from Lattices. ACISP 2021: 571-589Willy Susilo, Priyanka Dutta, Dung Hoang Duong, Partha Sarathi Roy:
Lattice-based HRA-secure Attribute-based Proxy Re-Encryption in Standard Model. ESORICS (2) 2021: 169-191Willy Susilo, Dung Hoang Duong, Huy Quoc Le:
Efficient Post-quantum Identity-based Encryption with Equality Test. IEEE ICPADS 2020, pp.633-640Giang Linh Duc Nguyen, Willy Susilo, Dung Hoang Duong, Huy Quoc Le and Fuchun Guo:
Lattice-based IBE with Equality Test Supporting Flexible Authorization in the Standard Model , Indocrypt 2020, to appearPriyanka Putta, Willy Susilo, Dung Hoang Duong, Joonsang Baek, Partha Sarathi Roy:
Identity-based Unidirectional Proxy Re-Encryption in Standard Model: A Lattice-based Construction, to appear in WISA 2020, Best Paper AwardWilly Susilo, Dung Hoang Duong, Huy Quoc Le, Josef Pieprzyk:
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption, to appear in ESORICS 2020Huy Quoc Le, Dung Hoang Duong, Ha Thanh Nguyen Tran, , Willy Susilo, Josef Pieprzyk, Thomas Plantard:
Lattice Blind Signature with Forward Secrecy, to appear in ACISP 2020, Best Paper AwardHuy Quoc Le, Dung Hoang Duong, Willy Susilo, Josef Pieprzyk:
Polynomial Trapdoor Delegation and Application to a Standard Model HIBE Construction, to appear in ACNS 2020Dung Hoang Duong, Willy Susilo, Minh Kim Bui and Thanh Xuan Khuc:
A Lattice-based Certificateless Public Key Encryption with Equality Test in Standard Model, to appear in Inscrypt 2019Huy Quoc Le, Willy Susilo, Thanh Xuan Khuc, Minh Kim Bui and Dung Hoang Duong:
A Blind Signature from Module Lattices, to appear in IEEE Conference on Dependable and Secure Computing 2019Hiroki Furue, Dung Hoang Duong, Tsuyoshi Takagi:
An Efficient MQ-based Signature in the QROM, to appear in CANDAR 2019, Outstanding Paper AwardHuy Quoc Le, Dung Hoang Duong, Willy Susilo
A Blind Ring Signature from SIS , to appear in WISA 2019Dung Hoang Duong, Huy Quoc Le, Partha Sarathi Roy, Willy Susilo
Lattice-based IBE with equality test in standard model, ProvSec 2019: 1-22Dung Hoang Duong, Kazuhide Fukushima, Shinsaku Kiyomoto, Partha Sarathi Roy, Willy Susilo
A Lattice-Based Public Key Encryption with Equality Test in Standard Model. ACISP 2019: 138-155Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong, Tsuyoshi Takagi
Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes. ACISP 2018: 487-501Huy Quoc Le, Pradeep Kumar Mishra, Dung Hoang Duong, Masaya Yasuda:
Solving LWR via BDD Strategy: Modulus Switching Approach. CANS 2018: 357-376Yasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi:
Revisiting the Efficient Key Generation of ZHFE. C2SI 2017: 195-212Pradeep Kumar Mishra, Dung Hoang Duong, Masaya Yasuda:
Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption. ISPEC 2017: 320-330Dung Hoang Duong, Masaya Yasuda, Tsuyoshi Takagi:
Choosing Parameters for the Subfield Lattice Attack Against Overstretched NTRU. ISC 2017: 79-91Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi:
Reducing the Key Size of the SRP Encryption Scheme. ACISP (2) 2016: 427-434Dung Hoang Duong, Albrecht Petzoldt, Yacheng Wang, Tsuyoshi Takagi:
Revisiting the Cubic UOV Signature Scheme. ICISC 2016: 223-238
Journal Papers
Minh Thuy Truc Pham, Ngoc Ai Van Nguyen, Mei Jiang, Dung Hoang Duong, Willy Susilo:
Wildcarded identity-based encryption from lattices. Theor. Comput. Sci. 902: 41-53 (2022)Dung Hoang Duong, Partha Sarathi Roy, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto, Arnaud Sipasseuth:
Chosen-ciphertext lattice-based public key encryption with equality test in standard model. Theor. Comput. Sci. 905: 31-53 (2022)Huy Quoc Le; Bay Vo; Dung Hoang Duong; Willy Susilo; Ngoc T. Le; Kazuhide Fukushima; Shinsaku Kiyomoto:
Identity-Based Linkable Ring Signatures From Lattices. IEEE Access, vol. 9, pp. 84739-84755, 2021Huy Quoc Le; Dung Hoang Duong; Partha Sarathi Roy; Willy Susilo; Kazuhide Fukushima; Shinsaku Kiyomoto:
Lattice-based signcryption with equality test in standard model. Computer Standards & Interfaces, 76, p.103515, 2021Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Partha Sarathi Roy:
Collusion-resistant identity-based Proxy Re-encryption: Lattice-based constructions in Standard Model. Theoretical Computer Science, 871, pp.16–29, 2021.Yang Zhichao, Dung H. Duong, Willy Susilo, Yang Guomin, Li Chao, Chen Rongmao:
An Efficient Post‐quantum Identity‐Based Signature. Chinese Journal of Electronics, 30(2), pp.238–248, 2021Yang Zhichao, Dung H. Duong, Willy Susilo, Yang Guomin, Li Chao, Chen Rongmao:
Hierarchical Identity-Based Signature in Polynomial Rings. The Computer Journal, [online] 63(10), pp.1490–1499, 2020.Fucai Luo, Saif Al-Kuwari. Willy Susilo, Chunpeng Ge, Dung Hoang Duong:
Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption, to appear in IEEE Transactions on Cloud ComputingPradeep Mishra, Deevashwer Rathee, Dung Hoang Duong, Masaya Yasuda:
Fast Secure Matrix Multiplications over Ring-Based Homomorphic Encryption , Information Security Journal: A Global Perspective, 2020, to appearPriyanka Putta, Willy Susilo, Dung Hoang Duong, Joonsang Baek, Partha Sarathi Roy:
Identity-based Unidirectional Proxy Re-Encryption and Re-Signature in Standard Model: Lattice-based Constructions, Journal of Internet Services and Information Security (JISIS), 2020, to appearDung Hoang Duong, Willy Susilo, Viet Cuong Trinh:
A New Approach to Keep the Privacy Information of the Signer in a Digital Signature Scheme, Information 2020, 11(5), 260Dung Hoang Duong, Willy Susilo, Viet Cuong Trinh:
Wildcarded Identity-Based Encryption with Constant-size Ciphertext and Secret Key, JoWUA, 11(2):74-86, June 2020Hiroki Furue, Dung Hoang Duong, Tsuyoshi Takagi:
An Efficient MQ-based Signature with Tight Security Proof, to appear in International Journal of Networking and ComputingHuy Le, Pradeep Kumar Mishra, Satoshi Nakamura, Koha Kinjo, Dung Hoang Duong, Masaya Yasuda:
The Impact of the Modulus Switching Technique on Some Attacks against Learning Problem, IET Information Security, Vol. 14, Issue 3, pp. 286-303 (2020)Zhichao Yang, Dung Hoang Duong, Willy Susilo, Guomin Yang, Chao Li, Rongmao Chen:
Hierachical Identity-based Signature in Polynomial Ring, The Computer Journal, bxaa033, 2020Dung Hoang Duong, Le Van Luyen, Ha Tran:
Choosing Subfields for LUOV and Lifting Fields for Rainbow, IET Information Security, Vol. 14, Issue 2, pp. 196-201 (2020), ErrataDung Hoang Duong, Willy Susilo, Ha Tran:
A multivariate blind ring signature scheme, The Computer Journal, bxz128, 2019Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong, Tsuyoshi Takagi:
The Secure Parameters and Efficient Decryption Algorithm for Multivariate Public Key Cryptosystem EFC, IEICE Transactions, Vol.E102-A, No.9,Sep. 2019Yasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi:
An Efficient Key Generation of ZHFE Public Key Cryptosystem. IEICE Transactions 101-A(1): 29-38 (2018)Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi:
CyclicSRP - A Multivariate Encryption Scheme with a Partially Cyclic Public Key. IEICE Transactions 100-A(12): 2691-2698 (2017)Dung Hoang Duong, Pradeep Kumar Mishra, Masaya Yasuda:
Efficient Secure Matrix Multiplication Over LWE-Based Homomorphic Encryption. Tatra Mountains Mathematical Publications, Volume 67, Issue 1, Pages 69–83Dung Hoang Duong and Christopher Voll:
Uniform analytic properties of representation zeta functions of finitely generated nilpotent groups. Trans. Amer. Math. Soc. 369 (2017), 6327-6349Dung Hoang Duong
Representation growth of the Heisenberg group over O[x]/(x^3), Journal of Algebra and its Applications, Vol. 16, No. 2 (2017)Dung Hoang Duong
Recognizing PSL(2,p) in the non-Frattini chief factors of finite groups, Archiv der Mathematik, Vol. 106, Issue 3, pp 201-208 (2016)Dung Hoang Duong
Finiteness of profinite groups with a rational probabilistic zeta function. Communications in Algebra, 44:2, 787-795 (2016).Mai Hoang Bien and Dung Hoang Duong:
On normal subgroups of division rings which are radical over a proper division subring. Studia Sci. Math. Hungar. 51 (2), 231-242 (2014)Dung Hoang Duong and Andrea Lucchini:
Rationality of the probabilistic zeta function of finitely generated profinite groups. J. Group Theory 17 (2014), 317-335Dung Hoang Duong and Andrea Lucchini:
A finiteness condition on the coefficients of the probabilistic zeta function.. Int. J. Group Theory, Vol. 2 No. 1 (2013), 167-174