Guomin Yang

From MaRDI portal
Person:391759

Available identifiers

zbMath Open yang.guominWikidataQ89417744 ScholiaQ89417744MaRDI QIDQ391759

List of research outcomes

PublicationDate of PublicationType
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts2024-04-11Paper
DSH: Deniable Secret Handshake Framework2023-06-30Paper
Efficient Traceable Oblivious Transfer and Its Applications2023-06-30Paper
Multimodal private signatures2023-06-28Paper
Public key encryption with fuzzy matching2023-04-13Paper
A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key2022-12-22Paper
Group-Based Source-Destination Verifiable Encryption with Blacklist Checking2022-12-09Paper
Attribute based broadcast encryption with short ciphertext and decryption key2022-08-19Paper
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved2022-05-18Paper
Privacy-enhanced remote data integrity checking with updatable timestamp2021-04-19Paper
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation2020-10-07Paper
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters2020-09-22Paper
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes2020-07-20Paper
Location based encryption2020-05-27Paper
The Wiener attack on RSA revisited: a quest for the exact bound2020-05-27Paper
Towards enhanced security for certificateless public-key authenticated encryption with keyword search2020-01-10Paper
Strongly leakage resilient authenticated key exchange, revisited2019-11-07Paper
Outsourced ciphertext-policy attribute-based encryption with equality test2019-10-31Paper
Cooperative secret sharing using QR codes and symmetric keys2019-10-30Paper
A privacy preserving source verifiable encryption scheme2018-12-07Paper
A new public remote integrity checking scheme with user and data privacy2018-11-26Paper
Efficient attribute-based encryption with blackbox traceability2018-11-07Paper
Deniable ring authentication based on projective hash functions2018-11-07Paper
One-Round Attribute-Based Key Exchange in the Multi-Party Setting2018-02-23Paper
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample2017-11-15Paper
Strong authenticated key exchange with auxiliary inputs2017-09-15Paper
A note on the strong authenticated key exchange with auxiliary inputs2017-09-15Paper
Privacy-preserving \(k\)-time authenticated secret handshakes2017-08-25Paper
Hierarchical functional encryption for linear transformations2017-08-25Paper
Mergeable and revocable identity-based encryption2017-08-25Paper
A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange2017-07-28Paper
Comments on "Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting2017-07-27Paper
Achieving IND-CCA Security for Functional Encryption for Inner Products2017-05-05Paper
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions2017-02-01Paper
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction2017-01-06Paper
One-Round Attribute-Based Key Exchange in the Multi-party Setting2017-01-06Paper
One-Round Strong Oblivious Signature-Based Envelope2016-09-02Paper
Proxy Signature with Revocation2016-09-02Paper
Edit Distance Based Encryption and Its Application2016-09-02Paper
Linear Encryption with Keyword Search2016-09-02Paper
Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing2016-08-31Paper
Threshold Broadcast Encryption with Keyword Search2016-07-25Paper
Strongly Leakage-Resilient Authenticated Key Exchange2016-04-08Paper
An Efficient Privacy-Preserving E-coupon System2015-11-25Paper
A New General Framework for Secure Public Key Encryption with Keyword Search2015-10-20Paper
A New Public Remote Integrity Checking Scheme with User Privacy2015-10-20Paper
Efficient Hidden Vector Encryption with Constant-Size Ciphertext2015-07-24Paper
Ambiguous optimistic fair exchange: definition and constructions2014-12-02Paper
Identity based identification from algebraic coding theory2014-01-13Paper
k-time Proxy Signature: Formal Definition and Efficient Construction2013-10-23Paper
Certificateless cryptography with KGC trust level 32011-10-10Paper
Certificateless public key encryption: a new generic construction and two pairing-free schemes2011-02-21Paper
Dynamic Group Key Exchange Revisited2010-12-07Paper
Probabilistic Public Key Encryption with Equality Test2010-03-16Paper
Efficient Non-interactive Range Proof2009-07-23Paper
A More Natural Way to Construct Identity-Based Identification Schemes2009-03-10Paper
Ambiguous Optimistic Fair Exchange2009-02-10Paper
Two-factor mutual authentication based on smart cards and passwords2008-11-19Paper
A new framework for the design and analysis of identity-based identification schemes2008-11-18Paper
Traceable and Retrievable Identity-Based Encryption2008-06-13Paper
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles2008-04-24Paper
Efficient Anonymous Roaming and Its Security Analysis2007-09-24Paper
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices2007-06-13Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Information Security2006-10-20Paper
Information Security and Privacy2006-06-22Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Guomin Yang