| Publication | Date of Publication | Type |
|---|
Time-based attribute-based proxy re-encryption with decryption key update Designs, Codes and Cryptography | 2024-12-11 | Paper |
Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond | 2024-11-12 | Paper |
Non-interactive zero-knowledge functional proofs | 2024-09-13 | Paper |
Robust publicly verifiable covert security: limited information leakage and guaranteed correctness with low overhead | 2024-08-30 | Paper |
Optimizing rectangle and boomerang attacks: a unified and generic framework for key recovery Journal of Cryptology | 2024-05-13 | Paper |
Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing Information Sciences | 2024-04-30 | Paper |
Identifying buckling resistance of reinforced concrete columns during inelastic deformation International Journal of Structural Stability and Dynamics | 2024-04-23 | Paper |
Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance Information Sciences | 2024-02-28 | Paper |
Asymmetric group message franking: definitions and constructions Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
Predicate private set intersection with linear complexity | 2023-11-10 | Paper |
Generalized attack on ECDSA: known bits in arbitrary positions Designs, Codes and Cryptography | 2023-11-07 | Paper |
Single-state distributed \(k\)-winners-take-all neural network model Information Sciences | 2023-09-08 | Paper |
Optimizing rectangle attacks: a unified and generic framework for key recovery Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Anonymous public key encryption under corruptions Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
EHNP strikes back: analyzing SM2 implementations Progress in Cryptology - AFRICACRYPT 2022 | 2023-06-02 | Paper |
Simulation-based bi-selective opening security for public key encryption Lecture Notes in Computer Science | 2023-05-12 | Paper |
Simulatable verifiable random function from the LWE assumption Theoretical Computer Science | 2023-04-27 | Paper |
Two-pass authenticated key exchange with explicit authentication and tight security | 2023-03-21 | Paper |
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment 1524.68044 | 2022-12-22 | Paper |
New Proof for BKP IBE Scheme and Improvement in the MIMC Setting Information Security Practice and Experience | 2022-12-09 | Paper |
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles Science China Information Sciences | 2022-10-28 | Paper |
On Low-Complexity Lattice Reduction Algorithms for Large-Scale MIMO Detection: The Blessing of Sequential Reduction IEEE Transactions on Signal Processing | 2022-09-23 | Paper |
Attribute-based conditional proxy re-encryption in the standard model under LWE | 2022-06-24 | Paper |
Efficient and fully secure lattice-based IBE with equality test | 2022-06-08 | Paper |
Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting | 2022-04-22 | Paper |
Long Optimal and Small-Defect LRC Codes With Unbounded Minimum Distances IEEE Transactions on Information Theory | 2021-07-22 | Paper |
Robustly reusable fuzzy extractor with imperfect randomness Designs, Codes and Cryptography | 2021-05-10 | Paper |
Scalable revocable identity-based signature over lattices in the standard model Information Sciences | 2021-04-14 | Paper |
Key regeneration-free ciphertext-policy attribute-based encryption and its application Information Sciences | 2021-03-31 | Paper |
Solving large-scale many-objective optimization problems by covariance matrix adaptation evolution strategy with scalable small subpopulations Information Sciences | 2021-03-18 | Paper |
A hybrid universal blind quantum computation Information Sciences | 2020-12-10 | Paper |
Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification Information Sciences | 2020-12-10 | Paper |
New Constructions of Subspace Codes Using Subsets of MRD Codes in Several Blocks IEEE Transactions on Information Theory | 2020-09-29 | Paper |
Notes on a provably-secure certificate-based encryption against malicious CA attacks Information Sciences | 2020-09-09 | Paper |
New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model Information and Communications Security | 2020-07-20 | Paper |
Collision resistant hashing from sub-exponential learning parity with noise | 2020-05-05 | Paper |
Differential Spectrum of Kasami Power Permutations Over Odd Characteristic Finite Fields IEEE Transactions on Information Theory | 2020-01-28 | Paper |
On Low-complexity Lattice Reduction Algorithms for Large-scale MIMO Detection: the Blessing of Sequential Reduction | 2019-12-12 | Paper |
Indistinguishability of pure orthogonal product states by LOCC Quantum Information Processing | 2017-10-25 | Paper |
Tightly Secure IBE Under Constant-Size Master Public Key Lecture Notes in Computer Science | 2017-06-13 | Paper |
Verifiable Computation over Large Database with Incremental Updates IEEE Transactions on Computers | 2017-05-16 | Paper |
On the security of two identity-based conditional proxy re-encryption schemes Theoretical Computer Science | 2016-11-04 | Paper |
Generic anonymous identity-based broadcast encryption with chosen-ciphertext security Information Security and Privacy | 2016-09-02 | Paper |
Towards semantically secure outsourcing of association rule mining on categorical data Information Sciences | 2016-07-08 | Paper |
CCA-secure keyed-fully homomorphic encryption Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Quantum bit commitment with application in quantum zero-knowledge proof (extended abstract) Algorithms and Computation | 2016-01-11 | Paper |
(Almost) optimal constructions of UOWHFs from 1-to-1, regular one-way functions and beyond Lecture Notes in Computer Science | 2015-12-10 | Paper |
Security model and analysis of FHMQV, revisited Information Security and Cryptology | 2015-12-02 | Paper |
Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext Science China Information Sciences | 2015-11-20 | Paper |
Fine-grained conditional proxy re-encryption and application Provable Security | 2015-09-29 | Paper |
A note on the security of KHL scheme Theoretical Computer Science | 2015-09-25 | Paper |
Verifiable computation over large database with incremental updates Computer Security - ESORICS 2014 | 2015-07-24 | Paper |
Verifiable computation on outsourced encrypted data Computer Security - ESORICS 2014 | 2015-07-24 | Paper |
Authorized keyword search on encrypted data Computer Security - ESORICS 2014 | 2015-07-24 | Paper |
The randomized iterate, revisited -- almost linear seed length PRGs from a broader class of one-way functions Theory of Cryptography | 2015-07-06 | Paper |
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model Mathematical and Computer Modelling | 2015-02-19 | Paper |
Pseudorandom generators from regular one-way functions: new constructions with improved parameters Theoretical Computer Science | 2015-01-28 | Paper |
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model Information and Communications Security | 2014-09-29 | Paper |
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
Adaptable Ciphertext-Policy Attribute-Based Encryption Pairing-Based Cryptography – Pairing 2013 | 2014-02-18 | Paper |
Constructing practical signcryption KEM from standard assumptions without random oracles Applied Cryptography and Network Security | 2014-01-24 | Paper |
Pseudorandom generators from regular one-way functions: new constructions with improved parameters Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Cryptanalysis of an identity based broadcast encryption scheme without random oracles Information Processing Letters | 2013-03-28 | Paper |
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
Accountable Authority Identity-Based Encryption with Public Traceability Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
Zero-knowledge argument for simultaneous discrete logarithms Algorithmica | 2012-11-21 | Paper |
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption Lecture Notes in Computer Science | 2012-06-08 | Paper |
On the security of a bidirectional proxy re-encryption scheme from PKC 2010 Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
Certificateless key-insulated signature without random oracles Journal of Zhejiang University. Science A | 2011-02-02 | Paper |
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings Information Sciences | 2011-01-28 | Paper |
Cryptanalysis of a certificateless signcryption scheme in the standard model Information Sciences | 2011-01-28 | Paper |
Strong key-insulated signature in the standard model Journal of Shanghai Jiaotong University (Science) | 2011-01-05 | Paper |
Optionally identifiable private handshakes Information Security and Cryptology | 2010-11-23 | Paper |
Generic constructions of parallel key-insulated encryption Lecture Notes in Computer Science | 2010-09-10 | Paper |
Zero-knowledge argument for simultaneous discrete logarithms Lecture Notes in Computer Science | 2010-07-20 | Paper |
Efficient Unidirectional Proxy Re-Encryption Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Efficient discrete logarithm based multi-signature scheme in the plain public key model Designs, Codes and Cryptography | 2010-02-25 | Paper |
Identity-Based Strong Key-Insulated Signature Without Random Oracles Journal of Software | 2010-02-12 | Paper |
Self-enforcing private inference control Provable Security | 2009-12-11 | Paper |
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security Lecture Notes in Computer Science | 2009-09-29 | Paper |
Conditional Proxy Broadcast Re-Encryption Information Security and Privacy | 2009-06-25 | Paper |
Identity-Based Key-Insulated Signature with Secure Key-Updates Information Security and Cryptology | 2009-01-15 | Paper |
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings Cryptology and Network Security | 2009-01-09 | Paper |
Identity-Based Threshold Key-Insulated Encryption without Random Oracles Topics in Cryptology – CT-RSA 2008 | 2008-04-24 | Paper |
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
Pirate decoder for the broadcast encryption schemes from Crypto 2005 Science in China. Series F | 2007-10-12 | Paper |