Person:744323: Difference between revisions

From MaRDI portal
Person:744323
Created automatically from import231006081045
 
m AuthorDisambiguator moved page Xin-Yi Huang to Xin-Yi Huang: Duplicate
 
(No difference)

Latest revision as of 23:39, 10 December 2023

Available identifiers

zbMath Open huang.xinyiMaRDI QIDQ744323

List of research outcomes

PublicationDate of PublicationType
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts2024-04-11Paper
A New Design of Online/Offline Signatures Based on Lattice2023-06-30Paper
Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE2023-05-12Paper
Privacy-preserving authentication for tree-structured data with designated verification in outsourced environments2023-03-21Paper
Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption2023-03-21Paper
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment2022-12-22Paper
Linearly Homomorphic Signatures with Designated Entities2022-12-09Paper
Dissemination of authenticated tree-structured data with privacy protection and fine-grained control in outsourced databases2022-08-25Paper
Ring Trapdoor Redactable Signatures from Lattice2022-08-11Paper
Universal product learning with errors: a new variant of \textsf{LWE} for lattice-based cryptography2022-05-31Paper
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved2022-05-18Paper
Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control2022-03-23Paper
An efficient blind signature scheme based on SM2 signature algorithm2021-12-08Paper
Blockchain-based system for secure outsourcing of bilinear pairings2021-04-19Paper
Functional broadcast encryption with applications to data sharing for cloud storage2021-02-04Paper
A code-based signature scheme from the Lyubashevsky framework2020-08-17Paper
Equilibrium competition binding assay: inhibition mechanism from a single dose response2020-05-06Paper
Supporting dynamic updates in storage clouds with the Akl-Taylor scheme2020-02-06Paper
Revocable threshold attribute-based signature against signing key exposure2018-12-07Paper
https://portal.mardi4nfdi.de/entity/Q45580302018-11-27Paper
Secure publicly verifiable computation with polynomial commitment in cloud computing2018-09-26Paper
Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security2018-05-14Paper
Self-adaptive trust management based on game theory in fuzzy large-scale networks2018-02-27Paper
Dual trapdoor identity-based encryption with keyword search2018-02-27Paper
A general framework for secure sharing of personal health records in cloud system2017-09-15Paper
Towards revocable fine-grained encryption of cloud data: reducing trust upon cloud2017-08-25Paper
<inline-formula><tex-math>$k$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="huang-ieq1-2366741.gif"/></alternatives></inline-formula>-Times Attribute-Based Anonymous Access Control for Cloud Computing2017-05-16Paper
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security2017-05-16Paper
Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing2017-05-16Paper
Secure Distributed Deduplication Systems with Improved Reliability2017-05-16Paper
A new universal designated verifier transitive signature scheme for big graph data2016-09-16Paper
Accelerating Oblivious Transfer with Batch Multi-exponentiation2016-08-31Paper
Forgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanism2014-10-07Paper
Certificate-based signcryption with enhanced security features2013-07-25Paper
Efficient Escrow-Free Identity-Based Signature2012-11-06Paper
Dynamic Secure Cloud Storage with Provenance2012-06-08Paper
Provably secure server-aided verification signatures2011-08-28Paper
Certificateless threshold signature scheme from bilinear maps2011-01-28Paper
Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting2010-05-28Paper
https://portal.mardi4nfdi.de/entity/Q36390712009-10-28Paper
Further Observations on Certificateless Public Key Encryption2009-04-29Paper
Certificateless Signature Revisited2009-03-06Paper
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures2009-02-24Paper
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility2009-02-10Paper
Server-Aided Verification Signatures: Definitions and New Constructions2009-01-27Paper
Efficient and Short Certificateless Signature2009-01-09Paper
A Generic Construction for Universally-Convertible Undeniable Signatures2008-04-15Paper
Formal Definition and Construction of Nominative Signature2008-03-25Paper
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length2007-11-29Paper
Cryptology and Network Security2006-11-14Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Xin-Yi Huang