Yu Chen

From MaRDI portal
Person:247152

Available identifiers

zbMath Open chen.yu.4MaRDI QIDQ247152

List of research outcomes





PublicationDate of PublicationType
A simple and efficient framework of proof systems for NP2024-06-26Paper
Sigma protocols from verifiable secret sharing and their applications2024-06-26Paper
Fast two-party signature for upgrading ECDSA to two-party scenario easily2024-01-16Paper
Fine-grained secure attribute-based encryption2023-08-22Paper
Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds)2023-05-12Paper
Fine-grained secure attribute-based encryption2022-05-18Paper
Non-malleable functions and their applications2022-04-04Paper
Public-key authenticated encryption with keyword search revisited: security model and constructions2021-03-31Paper
KDM security for identity-based encryption: constructions and separations2020-12-10Paper
Regularly lossy functions and applications2020-01-21Paper
Two-message key exchange with strong security from ideal lattices2020-01-21Paper
Leakage-resilient cryptography from puncturable primitives and obfuscation2019-01-23Paper
Regular lossy functions and their applications in leakage-resilient cryptography2018-06-18Paper
On the security of classic protocols for unique witness relations2018-05-29Paper
From attack on Feige-Shamir to construction of oblivious transfer2018-04-20Paper
How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks2017-05-05Paper
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes2016-11-09Paper
Non-Malleable Functions and Their Applications2016-04-13Paper
Generic constructions of integrated PKE and PEKS2016-02-19Paper
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model2016-01-27Paper
Black-Box Separations for One-More (Static) CDH and Its Generalization2015-01-06Paper
Publicly Evaluable Pseudorandom Functions and Their Applications2014-10-14Paper
Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited2014-07-24Paper
All-but-One Dual Projective Hashing and Its Applications2014-07-07Paper
PRE: stronger security notions and efficient construction with non-interactive opening2014-06-23Paper
Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme2014-03-05Paper
Anonymous Identity-Based Hash Proof System and Its Applications2012-11-06Paper
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model2012-11-01Paper
Identity-Based Extractable Hash Proofs and Their Applications2012-09-10Paper
A Novel Commutative Blinding Identity Based Encryption Scheme2012-06-08Paper
The Twin Bilinear Diffie-Hellman Inversion Problem and Applications2011-10-27Paper

Research outcomes over time

This page was built for person: Yu Chen