Chun‐I Fan

2.7k total citations
130 papers, 2.0k citations indexed

About

Chun‐I Fan is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Chun‐I Fan has authored 130 papers receiving a total of 2.0k indexed citations (citations by other indexed papers that have themselves been cited), including 103 papers in Artificial Intelligence, 64 papers in Information Systems and 45 papers in Computer Networks and Communications. Recurrent topics in Chun‐I Fan's work include Cryptography and Data Security (91 papers), Privacy-Preserving Technologies in Data (29 papers) and Advanced Authentication Protocols Security (27 papers). Chun‐I Fan is often cited by papers focused on Cryptography and Data Security (91 papers), Privacy-Preserving Technologies in Data (29 papers) and Advanced Authentication Protocols Security (27 papers). Chun‐I Fan collaborates with scholars based in Taiwan, Japan and China. Chun‐I Fan's co-authors include Shiyuan Huang, Yi‐Fan Tseng, Ruei‐Hau Hsu, Yih‐Loong Lai, Chin‐Laung Lei, Wei Guo, Liang Chang, Yining Liu, Cheng Chi and Vincent Huang and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Access and Information Sciences.

In The Last Decade

Chun‐I Fan

123 papers receiving 1.8k citations

Author Peers

Peers are selected by citation overlap in the author's most active subfields. citations · hero ref

Author Last Decade Papers Cites
Chun‐I Fan 1.3k 1.0k 863 277 230 130 2.0k
Kwangjo Kim 1.4k 1.1× 654 0.6× 1.0k 1.2× 171 0.6× 294 1.3× 129 1.9k
Junbeom Hur 1.4k 1.1× 1.1k 1.1× 531 0.6× 151 0.5× 114 0.5× 120 2.0k
Masahiro Mambo 1.4k 1.1× 1.2k 1.1× 1.2k 1.3× 346 1.2× 139 0.6× 71 2.3k
Huaxiong Wang 1.5k 1.1× 858 0.8× 628 0.7× 274 1.0× 126 0.5× 144 2.0k
Chunfu Jia 1.1k 0.8× 764 0.7× 497 0.6× 89 0.3× 253 1.1× 139 1.6k
David Pointcheval 2.1k 1.6× 1.1k 1.0× 1.2k 1.4× 302 1.1× 91 0.4× 72 2.5k
Shiuh‐Pyng Shieh 689 0.5× 743 0.7× 1.2k 1.4× 200 0.7× 503 2.2× 85 1.7k
Tao Peng 1.2k 0.9× 413 0.4× 820 1.0× 226 0.8× 354 1.5× 51 1.7k
Carol Fung 656 0.5× 424 0.4× 1.2k 1.4× 143 0.5× 369 1.6× 109 1.6k
Chunxiang Xu 2.2k 1.7× 1.9k 1.8× 664 0.8× 153 0.6× 82 0.4× 154 2.8k

Countries citing papers authored by Chun‐I Fan

Since Specialization
Citations

This map shows the geographic impact of Chun‐I Fan's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Chun‐I Fan with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Chun‐I Fan more than expected).

Fields of papers citing papers by Chun‐I Fan

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Chun‐I Fan. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Chun‐I Fan. The network helps show where Chun‐I Fan may publish in the future.

Co-authorship network of co-authors of Chun‐I Fan

This figure shows the co-authorship network connecting the top 25 collaborators of Chun‐I Fan. A scholar is included among the top collaborators of Chun‐I Fan based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Chun‐I Fan. Chun‐I Fan is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Fan, Chun‐I, et al.. (2025). Attribute-Based Encryption Supporting Multi-Keyword Search With Effective User Revocation in Public Cloud Storage. IEEE Transactions on Dependable and Secure Computing. 22(6). 7790–7801.
2.
Fan, Chun‐I, et al.. (2024). CAKE-PUF: A Collaborative Authentication and Key Exchange Protocol Based on Physically Unclonable Functions for Industrial Internet of Things. IEEE Internet of Things Journal. 11(24). 39709–39720. 7 indexed citations
4.
Fan, Chun‐I, et al.. (2023). Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices. Mathematics. 11(18). 3830–3830. 2 indexed citations
5.
Fan, Chun‐I, et al.. (2022). ID-Based Multireceiver Homomorphic Proxy Re-Encryption in Federated Learning. ACM Transactions on Sensor Networks. 18(4). 1–25. 10 indexed citations
6.
Fan, Chun‐I, et al.. (2022). An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for MQTT. ACM Transactions on Sensor Networks. 19(3). 1–21. 13 indexed citations
7.
Tseng, Yi‐Fan, et al.. (2022). Fast keyword search over encrypted data with short ciphertext in clouds. Journal of Information Security and Applications. 70. 103320–103320. 3 indexed citations
8.
Fan, Chun‐I, et al.. (2022). A Multiple End-Devices Authentication Scheme for LoRaWAN. Electronics. 11(5). 797–797. 7 indexed citations
9.
Tseng, Yi‐Fan & Chun‐I Fan. (2018). Provably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption.. Journal of information science and engineering. 34. 1517–1541. 4 indexed citations
10.
Chen, Yu‐Chi, Raylin Tso, Gwoboa Horng, Chun‐I Fan, & Ruei‐Hau Hsu. (2015). Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of Two Schemes *. Journal of information science and engineering. 31(1). 297–314. 12 indexed citations
11.
Li, Chun‐Ta, Cheng‐Chi Lee, Chi-Yao Weng, & Chun‐I Fan. (2015). A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture. Journal of information science and engineering. 31(6). 1975–1992. 17 indexed citations
12.
Fan, Chun‐I, et al.. (2014). Timed-Release Predicate Encryption and Its Extensions in Cloud Computing. 網際網路技術學刊. 15(3). 413–425. 6 indexed citations
13.
Fan, Chun‐I, et al.. (2011). Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings. Journal of information science and engineering. 27(3). 969–982. 25 indexed citations
14.
Fan, Chun‐I, et al.. (2010). Anonymous Multireceiver Identity-Based Encryption. IEEE Transactions on Computers. 59(9). 1239–1249. 102 indexed citations
15.
Fan, Chun‐I, et al.. (2009). Fast Randomization Schemes for Chaum Blind Signatures. International journal of innovative computing, information & control. 5(11). 311–320. 12 indexed citations
16.
Fan, Chun‐I, et al.. (2006). Remote Password Authentication Scheme with Smart Cards and Biometrics 12. Global Communications Conference. 7 indexed citations
17.
Fan, Chun‐I & Chin‐Laung Lei. (2002). A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash. Journal of information science and engineering. 18. 47–58. 4 indexed citations
18.
Fan, Chun‐I, et al.. (1999). Blind Signatures with Double-Hashes Messages for Fair Electronic Elections and Ownership Claimable Digital Cash.. International Conference on Enterprise Information Systems. 612–618. 5 indexed citations
19.
Lei, Chin‐Laung & Chun‐I Fan. (1998). A Universal Single-Authority Election System. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. 81(10). 2186–2193. 13 indexed citations
20.
Fan, Chun‐I & Chin‐Laung Lei. (1998). Low-computation partially blind signatures for electronic cash. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. 81(5). 818–824. 32 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026