Yi Mu

From MaRDI portal
Revision as of 12:30, 28 January 2024 by Import240128110107 (talk | contribs) (Created automatically from import240128110107)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:265395

Available identifiers

zbMath Open mu.yiWikidataQ27983580 ScholiaQ27983580MaRDI QIDQ265395

List of research outcomes

PublicationDate of PublicationType
Structured encryption for knowledge graphs2024-03-07Paper
Practical and malicious private set intersection with improved efficiency2024-03-01Paper
Leakage-resilient identity-based cryptography from minimal assumptions2023-11-07Paper
An Efficient and Provably Secure Private Polynomial Evaluation Scheme2023-06-30Paper
Efficient Traceable Oblivious Transfer and Its Applications2023-06-30Paper
Group-Based Source-Destination Verifiable Encryption with Blacklist Checking2022-12-09Paper
Novel generic construction of leakage-resilient PKE scheme with CCA security2021-06-24Paper
Improvement of attribute-based encryption using Blakley secret sharing2021-06-08Paper
Privacy-enhanced remote data integrity checking with updatable timestamp2021-04-19Paper
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation2020-10-07Paper
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters2020-09-22Paper
Privacy-enhanced attribute-based private information retrieval2020-09-08Paper
Witness-based searchable encryption2020-09-08Paper
A code-based signature scheme from the Lyubashevsky framework2020-08-17Paper
A generic scheme of plaintext-checkable database encryption2020-07-20Paper
Revocable identity-based encryption with server-aided ciphertext evolution2020-04-06Paper
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security2020-01-29Paper
Provably secure proactive secret sharing without the adjacent assumption2020-01-10Paper
Quantum private set intersection cardinality and its application to anonymous authentication2020-01-06Paper
Novel updatable identity-based hash proof system and its applications2019-12-27Paper
Provably Secure (Broadcast) Homomorphic Signcryption2019-12-10Paper
ACE with Compact Ciphertext Size and Decentralized Sanitizers2019-12-10Paper
Strongly leakage resilient authenticated key exchange, revisited2019-11-07Paper
Continuous leakage-resilient identity-based encryption with leakage amplification2019-09-12Paper
The generic construction of continuous leakage-resilient identity-based cryptosystems2019-05-17Paper
Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems2019-03-26Paper
A privacy preserving source verifiable encryption scheme2018-12-07Paper
Efficient attribute-based encryption with blackbox traceability2018-11-07Paper
Deniable ring authentication based on projective hash functions2018-11-07Paper
Provably secure homomorphic signcryption2018-11-07Paper
Policy controlled system with anonymity2018-09-24Paper
Introduction to Security Reduction2018-07-18Paper
Identity-based quotable ring signature2018-05-17Paper
One-Round Attribute-Based Key Exchange in the Multi-Party Setting2018-02-23Paper
Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost2018-02-06Paper
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample2017-11-15Paper
Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query2017-10-24Paper
Strong authenticated key exchange with auxiliary inputs2017-09-15Paper
A note on the strong authenticated key exchange with auxiliary inputs2017-09-15Paper
Privacy-preserving \(k\)-time authenticated secret handshakes2017-08-25Paper
Hierarchical functional encryption for linear transformations2017-08-25Paper
Mergeable and revocable identity-based encryption2017-08-25Paper
ID-based encryption with equality test against insider attack2017-08-25Paper
A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange2017-07-28Paper
Identity-Based Secure DistributedData Storage Schemes2017-06-20Paper
Achieving IND-CCA Security for Functional Encryption for Inner Products2017-05-05Paper
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions2017-02-01Paper
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction2017-01-06Paper
Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update2017-01-06Paper
One-Round Attribute-Based Key Exchange in the Multi-party Setting2017-01-06Paper
Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage2017-01-06Paper
One-Round Strong Oblivious Signature-Based Envelope2016-09-02Paper
Proxy Signature with Revocation2016-09-02Paper
Content-Based Encryption2016-09-02Paper
Public Key Encryption with Authorized Keyword Search2016-09-02Paper
Linear Encryption with Keyword Search2016-09-02Paper
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing2016-09-02Paper
Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance2016-08-31Paper
Threshold Broadcast Encryption with Keyword Search2016-07-25Paper
Generalized closest substring encryption2016-06-27Paper
Relations between robustness and RKA security under public-key encryption2016-04-13Paper
Strongly Leakage-Resilient Authenticated Key Exchange2016-04-08Paper
An efficient quantum scheme for private set intersection2016-04-04Paper
Provably Secure Identity Based Provable Data Possession2016-01-27Paper
Efficient dynamic threshold identity-based encryption with constant-size ciphertext2015-12-08Paper
An Efficient Privacy-Preserving E-coupon System2015-11-25Paper
Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks2015-11-20Paper
A New General Framework for Secure Public Key Encryption with Keyword Search2015-10-20Paper
Improved Identity-Based Online/Offline Encryption2015-10-20Paper
A New Public Remote Integrity Checking Scheme with User Privacy2015-10-20Paper
Complete Robustness in Identity-Based Encryption2015-09-29Paper
PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption2015-07-27Paper
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents2015-06-25Paper
Key management for Smart Grid based on asymmetric key-wrapping2015-06-24Paper
Cardiovascular event risk dynamics over time in older patients on dialysis: A generalized multiple-index varying coefficient model approach2014-11-04Paper
A New Signature Scheme Without Random Oracles from Bilinear Pairings2014-08-21Paper
On security of a certificateless signcryption scheme2014-08-01Paper
Efficient and dynamic key management for multiple identities in identity-based systems2014-08-01Paper
Identity based identification from algebraic coding theory2014-01-13Paper
k-time Proxy Signature: Formal Definition and Efficient Construction2013-10-23Paper
Anonymous Signcryption against Linear Related-Key Attacks2013-10-23Paper
Efficient and secure stored-value cards with leakage resilience2013-08-19Paper
Membership Encryption and Its Applications2013-06-28Paper
Provably secure proxy signature scheme from factorization2013-01-24Paper
A provably secure authenticated key agreement protocol for wireless communications2012-10-19Paper
Efficient oblivious transfers with access control2012-09-30Paper
A Pre-computable Signature Scheme with Efficient Verification for RFID2012-06-29Paper
An efficient dynamic authenticated key exchange protocol with selectable identities2011-09-18Paper
Provably secure server-aided verification signatures2011-08-28Paper
Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase2011-07-29Paper
Electronic Cash with Anonymous User Suspension2011-07-07Paper
Policy-Based Authentication for Mobile Agents2011-05-19Paper
Certificateless threshold signature scheme from bilinear maps2011-01-28Paper
Provably secure identity-based authenticated key agreement protocols with malicious private key generators2011-01-28Paper
Towards a Cryptographic Treatment of Publish/Subscribe Systems2010-12-07Paper
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships2010-07-13Paper
Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting2010-05-28Paper
Escrowed Deniable Identification Schemes2010-04-23Paper
How to Prove Security of a Signature with a Tighter Security Reduction2009-12-11Paper
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?2009-12-11Paper
Server-Controlled Identity-Based Authenticated Key Exchange2009-12-11Paper
Universal Designated Verifier Signatures with Threshold-Signers2009-10-28Paper
https://portal.mardi4nfdi.de/entity/Q36390712009-10-28Paper
Certificateless threshold ring signature2009-10-01Paper
Enhanced Target Collision Resistant Hash Functions Revisited2009-08-11Paper
Efficient Non-interactive Range Proof2009-07-23Paper
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders2009-06-25Paper
Asymmetric Group Key Agreement2009-05-12Paper
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems2009-04-29Paper
Publicly Verifiable Privacy-Preserving Group Decryption2009-04-29Paper
Privacy for Private Key in Signatures2009-04-29Paper
Multi-identity management for identity-based cryptography2009-04-28Paper
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure2009-03-10Paper
Concurrent Signatures without a Conventional Keystone2009-03-09Paper
Practical Compact E-Cash2009-03-06Paper
Certificateless Signature Revisited2009-03-06Paper
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures2009-02-24Paper
Identity-Based Online/Offline Encryption2009-02-12Paper
Efficient Partially Blind Signatures with Provable Security2009-02-10Paper
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility2009-02-10Paper
Multi-Identity Single-Key Decryption without Random Oracles2009-02-10Paper
Optimal Online/Offline Signature: How to Sign a Message without Online Computation2009-01-27Paper
Server-Aided Verification Signatures: Definitions and New Constructions2009-01-27Paper
Sanitizable Signatures Revisited2009-01-09Paper
Constant-Size Dynamic k-TAA2008-11-27Paper
Efficient generic on-line/off-line (threshold) signatures without key exposure2008-11-20Paper
RFID Privacy Models Revisited2008-10-27Paper
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings2008-09-09Paper
Compact E-Cash from Bounded Accumulator2008-04-17Paper
Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles2008-04-15Paper
A Generic Construction for Universally-Convertible Undeniable Signatures2008-04-15Paper
New Construction of Group Secret Handshakes Based on Pairings2008-03-25Paper
Formal Definition and Construction of Nominative Signature2008-03-25Paper
Progress in Cryptology - INDOCRYPT 20032007-11-29Paper
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length2007-11-29Paper
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key2007-11-29Paper
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security2007-09-07Paper
Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures2007-09-04Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Cryptology and Network Security2006-11-14Paper
Information Security and Privacy2006-06-22Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Financial Cryptography and Data Security2005-12-22Paper
Information Security and Privacy2005-09-07Paper
Information and Communications Security2005-08-19Paper
Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making2005-08-17Paper
Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making2005-08-17Paper
Distributed Computing - IWDC 20042005-08-12Paper
Applied Cryptography and Network Security2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q44283492003-09-15Paper
https://portal.mardi4nfdi.de/entity/Q44129952003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q47885782003-05-19Paper
https://portal.mardi4nfdi.de/entity/Q49453852002-04-08Paper
https://portal.mardi4nfdi.de/entity/Q49453742002-03-18Paper
https://portal.mardi4nfdi.de/entity/Q27686552002-02-03Paper
https://portal.mardi4nfdi.de/entity/Q27628992002-01-13Paper
https://portal.mardi4nfdi.de/entity/Q44093532002-01-01Paper
https://portal.mardi4nfdi.de/entity/Q27211652001-07-01Paper
https://portal.mardi4nfdi.de/entity/Q27076022001-04-03Paper
https://portal.mardi4nfdi.de/entity/Q45015102000-09-04Paper
https://portal.mardi4nfdi.de/entity/Q49450422000-08-24Paper
On the design of efficient RSA-based off-line electronic cash schemes2000-08-23Paper
https://portal.mardi4nfdi.de/entity/Q42510311999-11-29Paper
https://portal.mardi4nfdi.de/entity/Q42506331999-06-17Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Yi Mu