Rongmao Chen

From MaRDI portal
Person:1680227

Available identifiers

zbMath Open chen.rongmaoMaRDI QIDQ1680227

List of research outcomes





PublicationDate of PublicationType
Parameter-hiding order-revealing encryption without pairings2024-11-12Paper
Sender-anamorphic encryption reformulated: achieving robust and generic constructions2024-09-13Paper
Hardware acceleration of NTT-based polynomial multiplication in CRYSTALS-Kyber2024-07-19Paper
Secure approximate nearest neighbor search with locality-sensitive hashing2024-06-19Paper
Subversion-resilient signatures without random oracles2024-05-31Paper
A lattice-based forward secure IBE scheme for Internet of things2024-03-20Paper
Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE2023-05-12Paper
Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption2023-03-21Paper
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy2022-12-09Paper
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved2022-05-18Paper
Subversion-resilient public key encryption with practical watchdogs2021-12-21Paper
Security of auditing protocols against subversion attacks2021-04-20Paper
Privacy-enhanced remote data integrity checking with updatable timestamp2021-04-19Paper
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters2020-09-22Paper
Strongly leakage resilient authenticated key exchange, revisited2019-11-07Paper
Asymmetric subversion attacks on signature schemes2018-09-26Paper
Privacy-preserving mining of association rule on outsourced cloud data from multiple parties2018-09-26Paper
Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost2018-02-06Paper
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample2017-11-15Paper
Strong authenticated key exchange with auxiliary inputs2017-09-15Paper
A note on the strong authenticated key exchange with auxiliary inputs2017-09-15Paper
Cryptographic reverse firewall via malleable smooth projective hash functions2017-02-01Paper
Iterated random oracle: a universal approach for finding loss in security reduction2017-01-06Paper
Oblivious keyword search with authorization2017-01-06Paper
Anonymous identity-based broadcast encryption with revocation for file sharing2016-09-02Paper
One-round strong oblivious signature-based envelope2016-09-02Paper
Strongly leakage-resilient authenticated key exchange2016-04-08Paper
A new general framework for secure public key encryption with keyword search2015-10-20Paper

Research outcomes over time

This page was built for person: Rongmao Chen