Raylin Tso

1.7k total citations
94 papers, 942 citations indexed

About

Raylin Tso is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Raylin Tso has authored 94 papers receiving a total of 942 indexed citations (citations by other indexed papers that have themselves been cited), including 82 papers in Artificial Intelligence, 31 papers in Information Systems and 23 papers in Computer Networks and Communications. Recurrent topics in Raylin Tso's work include Cryptography and Data Security (61 papers), Complexity and Algorithms in Graphs (23 papers) and Privacy-Preserving Technologies in Data (18 papers). Raylin Tso is often cited by papers focused on Cryptography and Data Security (61 papers), Complexity and Algorithms in Graphs (23 papers) and Privacy-Preserving Technologies in Data (18 papers). Raylin Tso collaborates with scholars based in Taiwan, Japan and China. Raylin Tso's co-authors include Huawang Qin, Ziyuan Liu, Yu‐Chi Chen, K.S. Tang, Xinyi Huang, Masahiro Mambo, Da‐Yu Kao, Yi‐Fan Tseng, Willy Susilo and Xun Yi and has published in prestigious journals such as Scientific Reports, IEEE Access and Future Generation Computer Systems.

In The Last Decade

Raylin Tso

82 papers receiving 898 citations

Author Peers

Peers are selected by citation overlap in the author's most active subfields. citations · hero ref

Author Last Decade Papers Cites
Raylin Tso 762 375 252 157 156 94 942
Dowon Hong 528 0.7× 261 0.7× 242 1.0× 83 0.5× 72 0.5× 72 737
Anderson C. A. Nascimento 613 0.8× 187 0.5× 286 1.1× 58 0.4× 78 0.5× 58 845
Chaowen Guan 785 1.0× 564 1.5× 389 1.5× 134 0.9× 17 0.1× 21 1.2k
Yael Tauman Kalai 979 1.3× 232 0.6× 168 0.7× 404 2.6× 28 0.2× 52 1.1k
Tatsuaki Okamoto 707 0.9× 326 0.9× 185 0.7× 163 1.0× 28 0.2× 61 792
Konstantinos M. Giannoutakis 109 0.1× 232 0.6× 348 1.4× 104 0.7× 74 0.5× 56 563
Behzad Bordbar 447 0.6× 549 1.5× 222 0.9× 208 1.3× 23 0.1× 86 970
Antoine Joux 666 0.9× 287 0.8× 161 0.6× 158 1.0× 15 0.1× 36 778
Fangguo Zhang 1.2k 1.6× 743 2.0× 359 1.4× 209 1.3× 18 0.1× 144 1.5k
Sven Groppe 365 0.5× 148 0.4× 354 1.4× 37 0.2× 46 0.3× 108 583

Countries citing papers authored by Raylin Tso

Since Specialization
Citations

This map shows the geographic impact of Raylin Tso's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Raylin Tso with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Raylin Tso more than expected).

Fields of papers citing papers by Raylin Tso

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Raylin Tso. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Raylin Tso. The network helps show where Raylin Tso may publish in the future.

Co-authorship network of co-authors of Raylin Tso

This figure shows the co-authorship network connecting the top 25 collaborators of Raylin Tso. A scholar is included among the top collaborators of Raylin Tso based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Raylin Tso. Raylin Tso is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Tseng, Yi‐Fan, Ziyuan Liu, & Raylin Tso. (2024). Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives. Designs Codes and Cryptography. 92(6). 1477–1500. 1 indexed citations
3.
Liu, Ziyuan, Masahiro Mambo, Raylin Tso, & Yi‐Fan Tseng. (2023). Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems. Computer Standards & Interfaces. 89. 103817–103817. 3 indexed citations
4.
Liu, Ziyuan, et al.. (2022). Extension of elliptic curve Qu–Vanstone certificates and their applications. Journal of Information Security and Applications. 67. 103176–103176. 3 indexed citations
5.
Liu, Ziyuan, et al.. (2022). Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT. Journal of Systems Architecture. 130. 102642–102642. 4 indexed citations
6.
Liu, Ziyuan, Yi‐Fan Tseng, Raylin Tso, Yu‐Chi Chen, & Masahiro Mambo. (2021). Identity-Certifying Authority-Aided Identity-Based Searchable Encryption Framework in Cloud Systems. IEEE Systems Journal. 16(3). 4629–4640. 18 indexed citations
7.
Tseng, Yi‐Fan, et al.. (2021). Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function. Security and Communication Networks. 2021. 1–12. 2 indexed citations
8.
Liu, Ziyuan, Yi‐Fan Tseng, Raylin Tso, Masahiro Mambo, & Yu‐Chi Chen. (2021). Quantum‐resistant anonymous identity‐based encryption with trable identities. IET Information Security. 16(2). 111–126. 3 indexed citations
9.
Liu, Ziyuan, Yi‐Fan Tseng, Raylin Tso, & Masahiro Mambo. (2021). Designated-ciphertext searchable encryption. Journal of Information Security and Applications. 58. 102709–102709. 8 indexed citations
10.
Tseng, Yi‐Fan, Ziyuan Liu, & Raylin Tso. (2020). Practical Inner Product Encryption with Constant Private Key. Applied Sciences. 10(23). 8669–8669. 2 indexed citations
11.
Rahman, Sk. Md. Mizanur, et al.. (2020). An Efficient and Secure, ID-based Authenticated, Asymmetric Group Key Agreement Protocol for Ubiquitous Pay-TV Networks. 網際網路技術學刊. 21(5). 1387–1395. 3 indexed citations
12.
Tso, Raylin, Ziyuan Liu, & Yi‐Fan Tseng. (2019). Identity-Based Blind Multisignature From Lattices. IEEE Access. 7. 182916–182923. 4 indexed citations
13.
Tso, Raylin, et al.. (2019). Distributed E-Voting and E-Bidding Systems Based on Smart Contract. Electronics. 8(4). 422–422. 45 indexed citations
14.
Qin, Huawang, K.S. Tang, & Raylin Tso. (2019). Efficient quantum multi-proxy signature. Quantum Information Processing. 18(2). 25 indexed citations
15.
Qin, Huawang, K.S. Tang, & Raylin Tso. (2018). Rational quantum secret sharing. Scientific Reports. 8(1). 11115–11115. 7 indexed citations
16.
Tso, Raylin, et al.. (2017). One-time-commutative public key encryption. 814–818. 3 indexed citations
17.
Tso, Raylin, et al.. (2017). Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption. Journal of Computer and System Sciences. 89. 400–409. 19 indexed citations
18.
Chen, Yu‐Chi, Raylin Tso, Gwoboa Horng, Chun‐I Fan, & Ruei‐Hau Hsu. (2015). Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of Two Schemes *. Journal of information science and engineering. 31(1). 297–314. 12 indexed citations
19.
Tso, Raylin. (2012). A new way to generate a ring: Universal ring signature. Computers & Mathematics with Applications. 65(9). 1350–1359. 6 indexed citations
20.
Tso, Raylin, Takeshi Okamoto, Tsuyoshi Takagi, & Eiji Okamoto. (2005). An ID-based non-interactive tripartite key agreement protocol with K-resilience. International Conference on Communications. 38–42. 8 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026