Yunlei Zhao

From MaRDI portal
Person:271591

Available identifiers

zbMath Open zhao.yunleiMaRDI QIDQ271591

List of research outcomes





PublicationDate of PublicationType
Sign-then-encrypt with security enhancement and compressed ciphertext2025-01-08Paper
Fully anonymous identity-based broadcast signcryption with public verification2024-03-05Paper
Half-aggregation of Schnorr signatures with tight reductions2023-07-28Paper
Compact Lossy and All-but-One Trapdoor Functions from Lattice2022-12-09Paper
Tight Analysis of Decryption Failure Probability of Kyber in Reality2022-12-09Paper
Certificateless identity-concealed authenticated encryption under multi-KGC2022-10-14Paper
Compact and Flexible KEM From Ideal Lattice2022-07-13Paper
Identity-based authenticated encryption with identity confidentiality2022-01-18Paper
Number theoretic transform: generalization, optimization, concrete analysis and applications2021-12-08Paper
SKCN: practical and flexible digital signature from module lattice2021-06-08Paper
Functional broadcast encryption with applications to data sharing for cloud storage2021-02-04Paper
Generic and practical key establishment from lattice2020-01-30Paper
Efficient tag path authentication protocol with less tag memory2018-12-07Paper
Cryptanalysis of RLWE-based one-pass authenticated key exchange2018-09-12Paper
Concurrent knowledge extraction in public-key models2016-04-07Paper
Black-box separations of hash-and-sign signatures in the non-programmable random oracle model2016-01-27Paper
Security model and analysis of FHMQV, revisited2015-12-02Paper
A note on the security of KHL scheme2015-09-25Paper
All-but-one dual projective hashing and its applications2014-07-07Paper
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack2014-05-27Paper
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks2013-03-18Paper
Accountable Authority Identity-Based Encryption with Public Traceability2013-03-18Paper
Computationally-fair group and identity-based key-exchange2012-07-16Paper
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption2012-06-08Paper
Designated confirmer signatures with unified verification2011-12-16Paper
Taxonomical security consideration of authenticated key exchange resilient to intermediate computation leakage2011-09-16Paper
On the security of a bidirectional proxy re-encryption scheme from PKC 20102011-03-15Paper
A new framework for RFID privacy2010-09-20Paper
Concurrent knowledge extraction in the public-key model2010-09-07Paper
Deniable internet key exchange2010-07-06Paper
A note on the Dwork-Naor timed deniable authentication2010-01-29Paper
A note on the feasibility of generalised universal composability2009-03-24Paper
A note on the Cramer-Damgård identification scheme2009-03-24Paper
A note on universal composable zero-knowledge in the common reference string model2009-03-20Paper
Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model2007-11-29Paper
A Note on the Feasibility of Generalized Universal Composability2007-11-13Paper
A Note on Universal Composable Zero Knowledge in Common Reference String Model2007-11-13Paper
Theory of Cryptography2007-02-12Paper
Some variants of SAT and their properties2004-03-16Paper
Present random computations in a uniform way2004-03-16Paper
Efficient 4-round zero-knowledge proof system for NP2004-03-16Paper

Research outcomes over time

This page was built for person: Yunlei Zhao