Yu Chen

From MaRDI portal
Person:247152

Available identifiers

zbMath Open chen.yu.4MaRDI QIDQ247152

List of research outcomes





PublicationDate of PublicationType
A simple and efficient framework of proof systems for NP2024-06-26Paper
Sigma protocols from verifiable secret sharing and their applications2024-06-26Paper
Fast two-party signature for upgrading ECDSA to two-party scenario easily2024-01-16Paper
Fine-grained secure attribute-based encryption2023-08-22Paper
Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds)2023-05-12Paper
Fine-grained secure attribute-based encryption2022-05-18Paper
Non-malleable functions and their applications2022-04-04Paper
Public-key authenticated encryption with keyword search revisited: security model and constructions2021-03-31Paper
KDM security for identity-based encryption: constructions and separations2020-12-10Paper
Regularly lossy functions and applications2020-01-21Paper
Two-message key exchange with strong security from ideal lattices2020-01-21Paper
Leakage-resilient cryptography from puncturable primitives and obfuscation2019-01-23Paper
Regular lossy functions and their applications in leakage-resilient cryptography2018-06-18Paper
On the security of classic protocols for unique witness relations2018-05-29Paper
From attack on Feige-Shamir to construction of oblivious transfer2018-04-20Paper
How to make the Cramer-Shoup cryptosystem secure against linear related-key attacks2017-05-05Paper
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes2016-11-09Paper
Non-malleable functions and their applications2016-04-13Paper
Generic constructions of integrated PKE and PEKS2016-02-19Paper
Black-box separations of hash-and-sign signatures in the non-programmable random oracle model2016-01-27Paper
Black-box separations for one-more (static) CDH and its generalization2015-01-06Paper
Publicly evaluable pseudorandom functions and their applications2014-10-14Paper
Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange scheme. Revisited2014-07-24Paper
All-but-one dual projective hashing and its applications2014-07-07Paper
PRE: stronger security notions and efficient construction with non-interactive opening2014-06-23Paper
Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme2014-03-05Paper
Anonymous Identity-Based Hash Proof System and Its Applications2012-11-06Paper
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model2012-11-01Paper
Identity-based extractable hash proofs and their applications2012-09-10Paper
A novel commutative blinding identity based encryption scheme2012-06-08Paper
The twin bilinear Diffie-Hellman inversion problem and applications2011-10-27Paper

Research outcomes over time

This page was built for person: Yu Chen