Notice: Unexpected clearActionName after getActionName already called in /var/www/html/w/includes/context/RequestContext.php on line 333
Xin-Yi Huang - MaRDI portal

Xin-Yi Huang

From MaRDI portal
(Redirected from Person:314804)
Person:744323

Available identifiers

zbMath Open huang.xinyiMaRDI QIDQ744323

List of research outcomes





PublicationDate of PublicationType
Parameter-hiding order-revealing encryption without pairings2024-11-12Paper
Sender-anamorphic encryption reformulated: achieving robust and generic constructions2024-09-13Paper
Blockwise rank decoding problem and LRPC codes: cryptosystems with smaller sizes2024-08-30Paper
Grey-prediction-based double model predictive control strategy for the speed and current control of permanent magnet synchronous motor2024-07-25Paper
Complicated dynamical behaviors of a geometrical oscillator with a mass parameter2024-05-14Paper
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts2024-04-11Paper
A New Design of Online/Offline Signatures Based on Lattice2023-06-30Paper
Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE2023-05-12Paper
Privacy-preserving authentication for tree-structured data with designated verification in outsourced environments2023-03-21Paper
Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption2023-03-21Paper
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment2022-12-22Paper
Linearly Homomorphic Signatures with Designated Entities2022-12-09Paper
Dissemination of authenticated tree-structured data with privacy protection and fine-grained control in outsourced databases2022-08-25Paper
Ring Trapdoor Redactable Signatures from Lattice2022-08-11Paper
Universal product learning with errors: a new variant of \textsf{LWE} for lattice-based cryptography2022-05-31Paper
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved2022-05-18Paper
Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control2022-03-23Paper
An efficient blind signature scheme based on SM2 signature algorithm2021-12-08Paper
Blockchain-based system for secure outsourcing of bilinear pairings2021-04-19Paper
Functional broadcast encryption with applications to data sharing for cloud storage2021-02-04Paper
A code-based signature scheme from the Lyubashevsky framework2020-08-17Paper
Equilibrium competition binding assay: inhibition mechanism from a single dose response2020-05-06Paper
Supporting dynamic updates in storage clouds with the Akl-Taylor scheme2020-02-06Paper
Revocable threshold attribute-based signature against signing key exposure2018-12-07Paper
https://portal.mardi4nfdi.de/entity/Q45580302018-11-27Paper
Secure publicly verifiable computation with polynomial commitment in cloud computing2018-09-26Paper
Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security2018-05-14Paper
Self-adaptive trust management based on game theory in fuzzy large-scale networks2018-02-27Paper
Dual trapdoor identity-based encryption with keyword search2018-02-27Paper
A general framework for secure sharing of personal health records in cloud system2017-09-15Paper
Towards revocable fine-grained encryption of cloud data: reducing trust upon cloud2017-08-25Paper
<inline-formula><tex-math>$k$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="huang-ieq1-2366741.gif"/></alternatives></inline-formula>-Times Attribute-Based Anonymous Access Control for Cloud Computing2017-05-16Paper
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security2017-05-16Paper
Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing2017-05-16Paper
Secure Distributed Deduplication Systems with Improved Reliability2017-05-16Paper
A new universal designated verifier transitive signature scheme for big graph data2016-09-16Paper
Accelerating Oblivious Transfer with Batch Multi-exponentiation2016-08-31Paper
Forgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanism2014-10-07Paper
Certificate-based signcryption with enhanced security features2013-07-25Paper
Efficient Escrow-Free Identity-Based Signature2012-11-06Paper
Dynamic Secure Cloud Storage with Provenance2012-06-08Paper
Provably secure server-aided verification signatures2011-08-28Paper
Certificateless threshold signature scheme from bilinear maps2011-01-28Paper
Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting2010-05-28Paper
https://portal.mardi4nfdi.de/entity/Q36390712009-10-28Paper
Further Observations on Certificateless Public Key Encryption2009-04-29Paper
Certificateless Signature Revisited2009-03-06Paper
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures2009-02-24Paper
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility2009-02-10Paper
Server-Aided Verification Signatures: Definitions and New Constructions2009-01-27Paper
Efficient and Short Certificateless Signature2009-01-09Paper
A Generic Construction for Universally-Convertible Undeniable Signatures2008-04-15Paper
Formal Definition and Construction of Nominative Signature2008-03-25Paper
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length2007-11-29Paper
Cryptology and Network Security2006-11-14Paper

Research outcomes over time

This page was built for person: Xin-Yi Huang