Yu Chen

From MaRDI portal
(Redirected from Person:247152)
Yu Chen Q247152



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A simple and efficient framework of proof systems for NP2024-06-26Paper
Sigma protocols from verifiable secret sharing and their applications2024-06-26Paper
Fast two-party signature for upgrading ECDSA to two-party scenario easily
Theoretical Computer Science
2024-01-16Paper
Fine-grained secure attribute-based encryption
Journal of Cryptology
2023-08-22Paper
Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds)
Lecture Notes in Computer Science
2023-05-12Paper
Fine-grained secure attribute-based encryption2022-05-18Paper
Non-malleable functions and their applications
Journal of Cryptology
2022-04-04Paper
Public-key authenticated encryption with keyword search revisited: security model and constructions
Information Sciences
2021-03-31Paper
KDM security for identity-based encryption: constructions and separations
Information Sciences
2020-12-10Paper
Regularly lossy functions and applications2020-01-21Paper
Two-message key exchange with strong security from ideal lattices2020-01-21Paper
Leakage-resilient cryptography from puncturable primitives and obfuscation2019-01-23Paper
Regular lossy functions and their applications in leakage-resilient cryptography
Theoretical Computer Science
2018-06-18Paper
On the security of classic protocols for unique witness relations2018-05-29Paper
From attack on Feige-Shamir to construction of oblivious transfer2018-04-20Paper
How to make the Cramer-Shoup cryptosystem secure against linear related-key attacks
Information Security and Cryptology
2017-05-05Paper
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
Advances in Cryptology – CRYPTO 2016
2016-11-09Paper
Non-malleable functions and their applications
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Generic constructions of integrated PKE and PEKS
Designs, Codes and Cryptography
2016-02-19Paper
Black-box separations of hash-and-sign signatures in the non-programmable random oracle model
Provable Security
2016-01-27Paper
Black-box separations for one-more (static) CDH and its generalization
Lecture Notes in Computer Science
2015-01-06Paper
Publicly evaluable pseudorandom functions and their applications
Lecture Notes in Computer Science
2014-10-14Paper
Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange scheme. Revisited
Information Security and Privacy
2014-07-24Paper
All-but-one dual projective hashing and its applications
Applied Cryptography and Network Security
2014-07-07Paper
PRE: stronger security notions and efficient construction with non-interactive opening
Theoretical Computer Science
2014-06-23Paper
Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme
Science China. Mathematics
2014-03-05Paper
Anonymous Identity-Based Hash Proof System and Its Applications
Provable Security
2012-11-06Paper
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model
Information Security and Cryptology - ICISC 2011
2012-11-01Paper
Identity-based extractable hash proofs and their applications
Applied Cryptography and Network Security
2012-09-10Paper
A novel commutative blinding identity based encryption scheme
Foundations and Practice of Security
2012-06-08Paper
The twin bilinear Diffie-Hellman inversion problem and applications
Information Security and Cryptology - ICISC 2010
2011-10-27Paper


Research outcomes over time


This page was built for person: Yu Chen