Guomin Yang

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Reinsurance contracts under Stackelberg game and market equilibrium
RAIRO. Operations Research
2025-01-08Paper
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts
Information Sciences
2024-04-11Paper
A tightly secure ID-based signature scheme under DL assumption in AGM
 
2024-01-11Paper
Efficient Traceable Oblivious Transfer and Its Applications
Information Security Practice and Experience
2023-06-30Paper
DSH: Deniable Secret Handshake Framework
Information Security Practice and Experience
2023-06-30Paper
Multimodal private signatures
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Public key encryption with fuzzy matching
 
2023-04-13Paper
Broadcast Authenticated Encryption with Keyword Search
 
2023-04-13Paper
Concise Mercurial Subvector Commitments: Definitions and Constructions
 
2023-04-13Paper
A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key
1511.9413
2022-12-22Paper
Group-Based Source-Destination Verifiable Encryption with Blacklist Checking
Information Security Practice and Experience
2022-12-09Paper
Attribute based broadcast encryption with short ciphertext and decryption key
 
2022-08-19Paper
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved
 
2022-05-18Paper
Privacy-enhanced remote data integrity checking with updatable timestamp
Information Sciences
2021-04-19Paper
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation
Information Sciences
2020-10-07Paper
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters
Information Sciences
2020-09-22Paper
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes
Information Sciences
2020-07-20Paper
The Wiener attack on RSA revisited: a quest for the exact bound
 
2020-05-27Paper
Location based encryption
 
2020-05-27Paper
Towards enhanced security for certificateless public-key authenticated encryption with keyword search
 
2020-01-10Paper
Strongly leakage resilient authenticated key exchange, revisited
Designs, Codes and Cryptography
2019-11-07Paper
Outsourced ciphertext-policy attribute-based encryption with equality test
 
2019-10-31Paper
Cooperative secret sharing using QR codes and symmetric keys
Symmetry
2019-10-30Paper
A privacy preserving source verifiable encryption scheme
 
2018-12-07Paper
A new public remote integrity checking scheme with user and data privacy
International Journal of Applied Cryptography
2018-11-26Paper
Efficient attribute-based encryption with blackbox traceability
 
2018-11-07Paper
Deniable ring authentication based on projective hash functions
 
2018-11-07Paper
One-Round Attribute-Based Key Exchange in the Multi-Party Setting
International Journal of Foundations of Computer Science
2018-02-23Paper
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample
 
2017-11-15Paper
Strong authenticated key exchange with auxiliary inputs
Designs, Codes and Cryptography
2017-09-15Paper
A note on the strong authenticated key exchange with auxiliary inputs
Designs, Codes and Cryptography
2017-09-15Paper
Mergeable and revocable identity-based encryption
 
2017-08-25Paper
Privacy-preserving \(k\)-time authenticated secret handshakes
 
2017-08-25Paper
Hierarchical functional encryption for linear transformations
 
2017-08-25Paper
A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange
International Journal of Computer Mathematics
2017-07-28Paper
Comments on "Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting
IEEE Transactions on Information Theory
2017-07-27Paper
Achieving IND-CCA Security for Functional Encryption for Inner Products
Information Security and Cryptology
2017-05-05Paper
Cryptographic reverse firewall via malleable smooth projective hash functions
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Iterated random oracle: a universal approach for finding loss in security reduction
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
One-round attribute-based key exchange in the multi-party setting
Provable Security
2017-01-06Paper
Edit distance based encryption and its application
Information Security and Privacy
2016-09-02Paper
One-round strong oblivious signature-based envelope
Information Security and Privacy
2016-09-02Paper
Proxy signature with revocation
Information Security and Privacy
2016-09-02Paper
Linear encryption with keyword search
Information Security and Privacy
2016-09-02Paper
Exploiting the error correction mechanism in QR codes for secret sharing
Information Security and Privacy
2016-08-31Paper
Threshold broadcast encryption with keyword search
Information Security and Cryptology
2016-07-25Paper
Strongly leakage-resilient authenticated key exchange
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
An efficient privacy-preserving e-coupon system
Information Security and Cryptology
2015-11-25Paper
A new general framework for secure public key encryption with keyword search
Information Security and Privacy
2015-10-20Paper
A new public remote integrity checking scheme with user privacy
Information Security and Privacy
2015-10-20Paper
Efficient Hidden Vector Encryption with Constant-Size Ciphertext
Computer Security - ESORICS 2014
2015-07-24Paper
Ambiguous optimistic fair exchange: definition and constructions
Theoretical Computer Science
2014-12-02Paper
Identity based identification from algebraic coding theory
Theoretical Computer Science
2014-01-13Paper
\(k\)-time proxy signature: formal definition and efficient construction
Provable Security
2013-10-23Paper
Certificateless cryptography with KGC trust level 3
Theoretical Computer Science
2011-10-10Paper
Certificateless public key encryption: a new generic construction and two pairing-free schemes
Theoretical Computer Science
2011-02-21Paper
Dynamic group key exchange revisited
Cryptology and Network Security
2010-12-07Paper
Probabilistic public key encryption with equality test
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Efficient Non-interactive Range Proof
Lecture Notes in Computer Science
2009-07-23Paper
A More Natural Way to Construct Identity-Based Identification Schemes
Applied Cryptography and Network Security
2009-03-10Paper
Ambiguous Optimistic Fair Exchange
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
Two-factor mutual authentication based on smart cards and passwords
Journal of Computer and System Sciences
2008-11-19Paper
A new framework for the design and analysis of identity-based identification schemes
Theoretical Computer Science
2008-11-18Paper
Traceable and Retrievable Identity-Based Encryption
Applied Cryptography and Network Security
2008-06-13Paper
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
Efficient Anonymous Roaming and Its Security Analysis
Applied Cryptography and Network Security
2007-09-24Paper
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
Theoretical Computer Science
2007-06-13Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Information Security
Lecture Notes in Computer Science
2006-10-20Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper


Research outcomes over time


This page was built for person: Guomin Yang