#### Filter Results:

- Full text PDF available (35)

#### Publication Year

1980

2012

- This year (0)
- Last 5 years (1)
- Last 10 years (4)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Victor K.-W. Wei
- IEEE Trans. Information Theory
- 1991

Error control codes are widely used to increase the reliability of transmission of information over various forms of communications channels. The Hamming weight of a codeword is the number of nonzero entries in the word; the weights of the words in a linear code determine the error-correcting capacity of the code. The r th generalized Hamming weight for a… (More)

- Fan Chung Graham, Jawad A. Salehi, Victor K.-W. Wei
- IEEE Trans. Information Theory
- 1989

Optical Orthogonal codes; design analysis and applications – p. 1/33

- Jon Louis Bentley, Daniel Dominic Sleator, Robert E. Tarjan, Victor K.-W. Wei
- Commun. ACM
- 1986

- Zhen Zhang, En-Hui Yang, Victor K.-W. Wei
- IEEE Trans. Information Theory
- 1997

- Clyde L. Monma, Victor K.-W. Wei
- J. Comb. Theory, Ser. B
- 1986

- Joseph K. Liu, Victor K.-W. Wei, Duncan S. Wong
- IACR Cryptology ePrint Archive
- 2004

We present a linkable spontaneously anonymous group (LSAG) signature scheme (alternatively known as linkable ring signature scheme) satisfying the following three properties. (1) Anonymity, or signer indis-tinguishability. (2) Linkability: That two signatures by the same signer can be linked. (3) Spontaneity: No group secret, therefore no group manager or… (More)

- Abbas El Gamal, Lane A. Hemaspaandra, Itzhak Shperling, Victor K.-W. Wei
- IEEE Trans. Information Theory
- 1987

Absfruct-Simulated annealing is a computational heuristic for obtaining approximate solutions to combinatorial optimization problems. It is used to construct good source codes, error-correcting codes, and spherical codes. For certain sets of parameters codes that are better than any other known in the literature are found.

- Patrick P. Tsang, Victor K.-W. Wei
- IACR Cryptology ePrint Archive
- 2004

A ring signature scheme can be viewed as a group signature scheme with no anonymity revocation and with simple group setup. A linkable ring signature (LRS) scheme additionally allows anyone to determine if two ring signatures have been signed by the same group member. Recently, Dodis et al. [19] gave a short (constant-sized) ring signature scheme. We extend… (More)

- Victor K.-W. Wei, Kyeongcheol Yang
- IEEE Trans. Information Theory
- 1993

- Tsz Hon Yuen, Victor K.-W. Wei
- CT-RSA
- 2004

We present the first blind identity-based signcryption (BIBSC). We formulate its security model and define the security notions of blindness and parallel one-more unforgeability (p1m-uf). We present an efficient construction from pairings, then prove a security theorem that reduces its p1m-uf to Schnorr's ROS Problem in the random oracle model plus the… (More)