Rongmao Chen

From MaRDI portal
(Redirected from Person:1680227)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Parameter-hiding order-revealing encryption without pairings2024-11-12Paper
Sender-anamorphic encryption reformulated: achieving robust and generic constructions2024-09-13Paper
Hardware acceleration of NTT-based polynomial multiplication in CRYSTALS-Kyber2024-07-19Paper
Secure approximate nearest neighbor search with locality-sensitive hashing2024-06-19Paper
Subversion-resilient signatures without random oracles2024-05-31Paper
A lattice-based forward secure IBE scheme for Internet of things
Information Sciences
2024-03-20Paper
Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE
Lecture Notes in Computer Science
2023-05-12Paper
Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption2023-03-21Paper
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy
Information Security Practice and Experience
2022-12-09Paper
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved2022-05-18Paper
Subversion-resilient public key encryption with practical watchdogs2021-12-21Paper
Security of auditing protocols against subversion attacks
International Journal of Foundations of Computer Science
2021-04-20Paper
Privacy-enhanced remote data integrity checking with updatable timestamp
Information Sciences
2021-04-19Paper
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters
Information Sciences
2020-09-22Paper
Strongly leakage resilient authenticated key exchange, revisited
Designs, Codes and Cryptography
2019-11-07Paper
Asymmetric subversion attacks on signature schemes2018-09-26Paper
Privacy-preserving mining of association rule on outsourced cloud data from multiple parties2018-09-26Paper
Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost
Theoretical Computer Science
2018-02-06Paper
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample2017-11-15Paper
Strong authenticated key exchange with auxiliary inputs
Designs, Codes and Cryptography
2017-09-15Paper
A note on the strong authenticated key exchange with auxiliary inputs
Designs, Codes and Cryptography
2017-09-15Paper
Cryptographic reverse firewall via malleable smooth projective hash functions
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Iterated random oracle: a universal approach for finding loss in security reduction
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Oblivious keyword search with authorization
Provable Security
2017-01-06Paper
Anonymous identity-based broadcast encryption with revocation for file sharing
Information Security and Privacy
2016-09-02Paper
One-round strong oblivious signature-based envelope
Information Security and Privacy
2016-09-02Paper
Strongly leakage-resilient authenticated key exchange
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
A new general framework for secure public key encryption with keyword search
Information Security and Privacy
2015-10-20Paper


Research outcomes over time


This page was built for person: Rongmao Chen