Bo Yang

From MaRDI portal
(Redirected from Person:266834)
Bo Yang Q266834



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Provably secure group authentication in the asynchronous communication model2024-04-19Paper
Leakage-resilient identity-based cryptography from minimal assumptions
Designs, Codes and Cryptography
2023-11-07Paper
An Efficient and Provably Secure Private Polynomial Evaluation Scheme
Information Security Practice and Experience
2023-06-30Paper
Public-key encryption scheme with optimal continuous leakage resilience
Information Processing Letters
2023-01-30Paper
Novel generic construction of leakage-resilient PKE scheme with CCA security
Designs, Codes and Cryptography
2021-06-24Paper
Improvement of attribute-based encryption using Blakley secret sharing2021-06-08Paper
Cryptanalysis of Cramer-Shoup like cryptosystems based on index exchangeable family
International Journal of Foundations of Computer Science
2021-04-19Paper
Efficient attribute-based encryption with attribute revocation for assured data deletion
Information Sciences
2020-10-07Paper
Secure rational numbers equivalence test based on threshold cryptosystem with rational numbers
Information Sciences
2020-09-22Paper
Witness-based searchable encryption
Information Sciences
2020-09-08Paper
A construction of highly nonlinear Boolean functions with optimal algebraic immunity and low hardware implementation cost
Discrete Applied Mathematics
2020-08-31Paper
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
Theoretical Computer Science
2020-01-29Paper
Provably secure proactive secret sharing without the adjacent assumption2020-01-10Paper
Novel updatable identity-based hash proof system and its applications
Theoretical Computer Science
2019-12-27Paper
Novel identity-based hash proof system with compact master public key from lattices in the standard model
International Journal of Foundations of Computer Science
2019-12-10Paper
Continuous leakage-resilient identity-based encryption with leakage amplification
Designs, Codes and Cryptography
2019-09-12Paper
An alternative approach to public cloud data auditing supporting data dynamics
Soft Computing
2019-08-14Paper
scientific article; zbMATH DE number 7071594 (Why is no real title available?)2019-06-21Paper
The generic construction of continuous leakage-resilient identity-based cryptosystems
Theoretical Computer Science
2019-05-17Paper
基于身份的多接收者(多消息)匿名混合签密机制2018-10-22Paper
Verifiable secret sharing based on hyperplane geometry with its applications to optimal resilient proactive cryptosystems2018-09-26Paper
Anonymous identity-based hash proof system from lattices in the standard model2018-09-26Paper
Secure certificateless signcryption scheme without bilinear pairing2018-07-18Paper
Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing
Information Processing Letters
2017-11-22Paper
Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures
IEEE Transactions on Computers
2017-07-12Paper
Anonymous spatial encryption under affine space delegation functionality with full security
Information Sciences
2017-01-31Paper
Secure and efficient roaming authentication protocol with controllable anonymity for heterogeneous wireless network
Journal of Software
2016-10-06Paper
scientific article; zbMATH DE number 6611931 (Why is no real title available?)2016-08-10Paper
scientific article; zbMATH DE number 6611934 (Why is no real title available?)2016-08-10Paper
Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing
Discrete Applied Mathematics
2016-04-07Paper
On security against the server in designated tester public key encryption with keyword search
Information Processing Letters
2015-09-15Paper
Effective error-tolerant keyword search for secure cloud computing
Journal of Computer Science and Technology
2014-10-07Paper
Constructions of balanced Boolean functions with high nonlinearity and high algebraic degree
International Journal of Computer Mathematics
2014-05-20Paper
A secure scalar product protocol against malicious adversaries
Journal of Computer Science and Technology
2014-02-11Paper
A ciphertext-based proxy secure two-party computation protocol2013-06-20Paper
LR-UESDE: a continual-leakage resilient encryption with unbounded extensible set delegation
Provable Security
2012-11-06Paper
Group-oriented setting's multisigncryption scheme with threshold designcryption
Information Sciences
2012-07-13Paper
Anonymous encryption with partial-order subset delegation functionality
Provable Security
2011-09-16Paper
Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem
Provable Security
2009-01-27Paper
A potential approach of internet worm propagation based on P2P
Wuhan University Journal of Natural Sciences
2007-06-01Paper
scientific article; zbMATH DE number 2080673 (Why is no real title available?)2004-08-04Paper


Research outcomes over time


This page was built for person: Bo Yang