Yi Mu

From MaRDI portal
Revision as of 08:54, 6 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:265395

Available identifiers

zbMath Open mu.yiWikidataQ27983580 ScholiaQ27983580MaRDI QIDQ265395

List of research outcomes





PublicationDate of PublicationType
An alternative model of quantum key agreement via photon coupling2024-07-11Paper
Provably secure group authentication in the asynchronous communication model2024-04-19Paper
Structured encryption for knowledge graphs2024-03-07Paper
Practical and malicious private set intersection with improved efficiency2024-03-01Paper
Leakage-resilient identity-based cryptography from minimal assumptions2023-11-07Paper
An Efficient and Provably Secure Private Polynomial Evaluation Scheme2023-06-30Paper
Efficient Traceable Oblivious Transfer and Its Applications2023-06-30Paper
Group-Based Source-Destination Verifiable Encryption with Blacklist Checking2022-12-09Paper
Novel generic construction of leakage-resilient PKE scheme with CCA security2021-06-24Paper
Improvement of attribute-based encryption using Blakley secret sharing2021-06-08Paper
Privacy-enhanced remote data integrity checking with updatable timestamp2021-04-19Paper
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation2020-10-07Paper
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters2020-09-22Paper
Privacy-enhanced attribute-based private information retrieval2020-09-08Paper
Witness-based searchable encryption2020-09-08Paper
A code-based signature scheme from the Lyubashevsky framework2020-08-17Paper
A generic scheme of plaintext-checkable database encryption2020-07-20Paper
Revocable identity-based encryption with server-aided ciphertext evolution2020-04-06Paper
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security2020-01-29Paper
Provably secure proactive secret sharing without the adjacent assumption2020-01-10Paper
Quantum private set intersection cardinality and its application to anonymous authentication2020-01-06Paper
Novel updatable identity-based hash proof system and its applications2019-12-27Paper
Provably Secure (Broadcast) Homomorphic Signcryption2019-12-10Paper
ACE with Compact Ciphertext Size and Decentralized Sanitizers2019-12-10Paper
Strongly leakage resilient authenticated key exchange, revisited2019-11-07Paper
Continuous leakage-resilient identity-based encryption with leakage amplification2019-09-12Paper
The generic construction of continuous leakage-resilient identity-based cryptosystems2019-05-17Paper
Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems2019-03-26Paper
A privacy preserving source verifiable encryption scheme2018-12-07Paper
Efficient attribute-based encryption with blackbox traceability2018-11-07Paper
Deniable ring authentication based on projective hash functions2018-11-07Paper
Provably secure homomorphic signcryption2018-11-07Paper
Policy controlled system with anonymity2018-09-24Paper
Introduction to Security Reduction2018-07-18Paper
Identity-based quotable ring signature2018-05-17Paper
One-Round Attribute-Based Key Exchange in the Multi-Party Setting2018-02-23Paper
Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost2018-02-06Paper
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample2017-11-15Paper
Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query2017-10-24Paper
Strong authenticated key exchange with auxiliary inputs2017-09-15Paper
A note on the strong authenticated key exchange with auxiliary inputs2017-09-15Paper
Privacy-preserving \(k\)-time authenticated secret handshakes2017-08-25Paper
Hierarchical functional encryption for linear transformations2017-08-25Paper
Mergeable and revocable identity-based encryption2017-08-25Paper
ID-based encryption with equality test against insider attack2017-08-25Paper
A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange2017-07-28Paper
Identity-Based Secure DistributedData Storage Schemes2017-06-20Paper
Achieving IND-CCA Security for Functional Encryption for Inner Products2017-05-05Paper
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions2017-02-01Paper
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction2017-01-06Paper
Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update2017-01-06Paper
One-Round Attribute-Based Key Exchange in the Multi-party Setting2017-01-06Paper
Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage2017-01-06Paper
One-Round Strong Oblivious Signature-Based Envelope2016-09-02Paper
Proxy Signature with Revocation2016-09-02Paper
Content-Based Encryption2016-09-02Paper
Public Key Encryption with Authorized Keyword Search2016-09-02Paper
Linear Encryption with Keyword Search2016-09-02Paper
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing2016-09-02Paper
Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance2016-08-31Paper
Threshold Broadcast Encryption with Keyword Search2016-07-25Paper
Generalized closest substring encryption2016-06-27Paper
Relations between robustness and RKA security under public-key encryption2016-04-13Paper
Strongly Leakage-Resilient Authenticated Key Exchange2016-04-08Paper
An efficient quantum scheme for private set intersection2016-04-04Paper
Provably Secure Identity Based Provable Data Possession2016-01-27Paper
Efficient dynamic threshold identity-based encryption with constant-size ciphertext2015-12-08Paper
An Efficient Privacy-Preserving E-coupon System2015-11-25Paper
Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks2015-11-20Paper
A New General Framework for Secure Public Key Encryption with Keyword Search2015-10-20Paper
Improved Identity-Based Online/Offline Encryption2015-10-20Paper
A New Public Remote Integrity Checking Scheme with User Privacy2015-10-20Paper
Complete Robustness in Identity-Based Encryption2015-09-29Paper
PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption2015-07-27Paper
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents2015-06-25Paper
Key management for Smart Grid based on asymmetric key-wrapping2015-06-24Paper
Cardiovascular event risk dynamics over time in older patients on dialysis: A generalized multiple-index varying coefficient model approach2014-11-04Paper
A New Signature Scheme Without Random Oracles from Bilinear Pairings2014-08-21Paper
On security of a certificateless signcryption scheme2014-08-01Paper
Efficient and dynamic key management for multiple identities in identity-based systems2014-08-01Paper
Identity based identification from algebraic coding theory2014-01-13Paper
k-time Proxy Signature: Formal Definition and Efficient Construction2013-10-23Paper
Anonymous Signcryption against Linear Related-Key Attacks2013-10-23Paper
Efficient and secure stored-value cards with leakage resilience2013-08-19Paper
Membership Encryption and Its Applications2013-06-28Paper
Provably secure proxy signature scheme from factorization2013-01-24Paper
A provably secure authenticated key agreement protocol for wireless communications2012-10-19Paper
Efficient oblivious transfers with access control2012-09-30Paper
A Pre-computable Signature Scheme with Efficient Verification for RFID2012-06-29Paper
An efficient dynamic authenticated key exchange protocol with selectable identities2011-09-18Paper
Provably secure server-aided verification signatures2011-08-28Paper
Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase2011-07-29Paper
Electronic Cash with Anonymous User Suspension2011-07-07Paper
Policy-Based Authentication for Mobile Agents2011-05-19Paper
Certificateless threshold signature scheme from bilinear maps2011-01-28Paper
Provably secure identity-based authenticated key agreement protocols with malicious private key generators2011-01-28Paper
Towards a Cryptographic Treatment of Publish/Subscribe Systems2010-12-07Paper
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships2010-07-13Paper
Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting2010-05-28Paper
Escrowed Deniable Identification Schemes2010-04-23Paper
How to Prove Security of a Signature with a Tighter Security Reduction2009-12-11Paper
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?2009-12-11Paper
Server-Controlled Identity-Based Authenticated Key Exchange2009-12-11Paper
Universal Designated Verifier Signatures with Threshold-Signers2009-10-28Paper
https://portal.mardi4nfdi.de/entity/Q36390712009-10-28Paper
Certificateless threshold ring signature2009-10-01Paper
Enhanced Target Collision Resistant Hash Functions Revisited2009-08-11Paper
Efficient Non-interactive Range Proof2009-07-23Paper
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders2009-06-25Paper
Asymmetric Group Key Agreement2009-05-12Paper
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems2009-04-29Paper
Publicly Verifiable Privacy-Preserving Group Decryption2009-04-29Paper
Privacy for Private Key in Signatures2009-04-29Paper
Multi-identity management for identity-based cryptography2009-04-28Paper
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure2009-03-10Paper
Concurrent Signatures without a Conventional Keystone2009-03-09Paper
Practical Compact E-Cash2009-03-06Paper
Certificateless Signature Revisited2009-03-06Paper
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures2009-02-24Paper
Identity-Based Online/Offline Encryption2009-02-12Paper
Efficient Partially Blind Signatures with Provable Security2009-02-10Paper
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility2009-02-10Paper
Multi-Identity Single-Key Decryption without Random Oracles2009-02-10Paper
Optimal Online/Offline Signature: How to Sign a Message without Online Computation2009-01-27Paper
Server-Aided Verification Signatures: Definitions and New Constructions2009-01-27Paper
Sanitizable Signatures Revisited2009-01-09Paper
Constant-Size Dynamic k-TAA2008-11-27Paper
Efficient generic on-line/off-line (threshold) signatures without key exposure2008-11-20Paper
RFID Privacy Models Revisited2008-10-27Paper
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings2008-09-09Paper
Compact E-Cash from Bounded Accumulator2008-04-17Paper
Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles2008-04-15Paper
A Generic Construction for Universally-Convertible Undeniable Signatures2008-04-15Paper
New Construction of Group Secret Handshakes Based on Pairings2008-03-25Paper
Formal Definition and Construction of Nominative Signature2008-03-25Paper
Progress in Cryptology - INDOCRYPT 20032007-11-29Paper
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length2007-11-29Paper
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key2007-11-29Paper
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security2007-09-07Paper
Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures2007-09-04Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Cryptology and Network Security2006-11-14Paper
Information Security and Privacy2006-06-22Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Financial Cryptography and Data Security2005-12-22Paper
Information Security and Privacy2005-09-07Paper
Information and Communications Security2005-08-19Paper
Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making2005-08-17Paper
Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making2005-08-17Paper
Distributed Computing - IWDC 20042005-08-12Paper
Applied Cryptography and Network Security2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q44283492003-09-15Paper
https://portal.mardi4nfdi.de/entity/Q44129952003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q47885782003-05-19Paper
https://portal.mardi4nfdi.de/entity/Q49453852002-04-08Paper
https://portal.mardi4nfdi.de/entity/Q49453742002-03-18Paper
https://portal.mardi4nfdi.de/entity/Q27686552002-02-03Paper
https://portal.mardi4nfdi.de/entity/Q27628992002-01-13Paper
https://portal.mardi4nfdi.de/entity/Q44093532002-01-01Paper
https://portal.mardi4nfdi.de/entity/Q27211652001-07-01Paper
https://portal.mardi4nfdi.de/entity/Q27076022001-04-03Paper
https://portal.mardi4nfdi.de/entity/Q45015102000-09-04Paper
https://portal.mardi4nfdi.de/entity/Q49450422000-08-24Paper
On the design of efficient RSA-based off-line electronic cash schemes2000-08-23Paper
https://portal.mardi4nfdi.de/entity/Q42510311999-11-29Paper
https://portal.mardi4nfdi.de/entity/Q42506331999-06-17Paper

Research outcomes over time

This page was built for person: Yi Mu