Guomin Yang

From MaRDI portal
(Redirected from Person:391759)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Reinsurance contracts under Stackelberg game and market equilibrium
RAIRO. Operations Research
2025-01-08Paper
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts
Information Sciences
2024-04-11Paper
A tightly secure ID-based signature scheme under DL assumption in AGM2024-01-11Paper
Efficient Traceable Oblivious Transfer and Its Applications
Information Security Practice and Experience
2023-06-30Paper
DSH: Deniable Secret Handshake Framework
Information Security Practice and Experience
2023-06-30Paper
Multimodal private signatures
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Public key encryption with fuzzy matching2023-04-13Paper
Broadcast Authenticated Encryption with Keyword Search2023-04-13Paper
Concise Mercurial Subvector Commitments: Definitions and Constructions2023-04-13Paper
A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key
1511.9413
2022-12-22Paper
Group-Based Source-Destination Verifiable Encryption with Blacklist Checking
Information Security Practice and Experience
2022-12-09Paper
Attribute based broadcast encryption with short ciphertext and decryption key2022-08-19Paper
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved2022-05-18Paper
Privacy-enhanced remote data integrity checking with updatable timestamp
Information Sciences
2021-04-19Paper
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation
Information Sciences
2020-10-07Paper
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters
Information Sciences
2020-09-22Paper
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes
Information Sciences
2020-07-20Paper
The Wiener attack on RSA revisited: a quest for the exact bound2020-05-27Paper
Location based encryption2020-05-27Paper
Towards enhanced security for certificateless public-key authenticated encryption with keyword search2020-01-10Paper
Strongly leakage resilient authenticated key exchange, revisited
Designs, Codes and Cryptography
2019-11-07Paper
Outsourced ciphertext-policy attribute-based encryption with equality test2019-10-31Paper
Cooperative secret sharing using QR codes and symmetric keys
Symmetry
2019-10-30Paper
A privacy preserving source verifiable encryption scheme2018-12-07Paper
A new public remote integrity checking scheme with user and data privacy
International Journal of Applied Cryptography
2018-11-26Paper
Efficient attribute-based encryption with blackbox traceability2018-11-07Paper
Deniable ring authentication based on projective hash functions2018-11-07Paper
One-Round Attribute-Based Key Exchange in the Multi-Party Setting
International Journal of Foundations of Computer Science
2018-02-23Paper
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample2017-11-15Paper
Strong authenticated key exchange with auxiliary inputs
Designs, Codes and Cryptography
2017-09-15Paper
A note on the strong authenticated key exchange with auxiliary inputs
Designs, Codes and Cryptography
2017-09-15Paper
Mergeable and revocable identity-based encryption2017-08-25Paper
Privacy-preserving \(k\)-time authenticated secret handshakes2017-08-25Paper
Hierarchical functional encryption for linear transformations2017-08-25Paper
A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange
International Journal of Computer Mathematics
2017-07-28Paper
Comments on "Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting
IEEE Transactions on Information Theory
2017-07-27Paper
Achieving IND-CCA Security for Functional Encryption for Inner Products
Information Security and Cryptology
2017-05-05Paper
Cryptographic reverse firewall via malleable smooth projective hash functions
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Iterated random oracle: a universal approach for finding loss in security reduction
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
One-round attribute-based key exchange in the multi-party setting
Provable Security
2017-01-06Paper
Edit distance based encryption and its application
Information Security and Privacy
2016-09-02Paper
One-round strong oblivious signature-based envelope
Information Security and Privacy
2016-09-02Paper
Proxy signature with revocation
Information Security and Privacy
2016-09-02Paper
Linear encryption with keyword search
Information Security and Privacy
2016-09-02Paper
Exploiting the error correction mechanism in QR codes for secret sharing
Information Security and Privacy
2016-08-31Paper
Threshold broadcast encryption with keyword search
Information Security and Cryptology
2016-07-25Paper
Strongly leakage-resilient authenticated key exchange
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
An efficient privacy-preserving e-coupon system
Information Security and Cryptology
2015-11-25Paper
A new general framework for secure public key encryption with keyword search
Information Security and Privacy
2015-10-20Paper
A new public remote integrity checking scheme with user privacy
Information Security and Privacy
2015-10-20Paper
Efficient Hidden Vector Encryption with Constant-Size Ciphertext
Computer Security - ESORICS 2014
2015-07-24Paper
Ambiguous optimistic fair exchange: definition and constructions
Theoretical Computer Science
2014-12-02Paper
Identity based identification from algebraic coding theory
Theoretical Computer Science
2014-01-13Paper
\(k\)-time proxy signature: formal definition and efficient construction
Provable Security
2013-10-23Paper
Certificateless cryptography with KGC trust level 3
Theoretical Computer Science
2011-10-10Paper
Certificateless public key encryption: a new generic construction and two pairing-free schemes
Theoretical Computer Science
2011-02-21Paper
Dynamic group key exchange revisited
Cryptology and Network Security
2010-12-07Paper
Probabilistic public key encryption with equality test
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Efficient Non-interactive Range Proof
Lecture Notes in Computer Science
2009-07-23Paper
A More Natural Way to Construct Identity-Based Identification Schemes
Applied Cryptography and Network Security
2009-03-10Paper
Ambiguous Optimistic Fair Exchange
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
Two-factor mutual authentication based on smart cards and passwords
Journal of Computer and System Sciences
2008-11-19Paper
A new framework for the design and analysis of identity-based identification schemes
Theoretical Computer Science
2008-11-18Paper
Traceable and Retrievable Identity-Based Encryption
Applied Cryptography and Network Security
2008-06-13Paper
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
Efficient Anonymous Roaming and Its Security Analysis
Applied Cryptography and Network Security
2007-09-24Paper
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
Theoretical Computer Science
2007-06-13Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Information Security
Lecture Notes in Computer Science
2006-10-20Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper


Research outcomes over time


This page was built for person: Guomin Yang