Guomin Yang

From MaRDI portal
Person:391759

Available identifiers

zbMath Open yang.guominWikidataQ89417744 ScholiaQ89417744MaRDI QIDQ391759

List of research outcomes





PublicationDate of PublicationType
Reinsurance contracts under Stackelberg game and market equilibrium2025-01-08Paper
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts2024-04-11Paper
A tightly secure ID-based signature scheme under DL assumption in AGM2024-01-11Paper
Efficient Traceable Oblivious Transfer and Its Applications2023-06-30Paper
DSH: Deniable Secret Handshake Framework2023-06-30Paper
Multimodal private signatures2023-06-28Paper
Public key encryption with fuzzy matching2023-04-13Paper
Broadcast Authenticated Encryption with Keyword Search2023-04-13Paper
Concise Mercurial Subvector Commitments: Definitions and Constructions2023-04-13Paper
A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key2022-12-22Paper
Group-Based Source-Destination Verifiable Encryption with Blacklist Checking2022-12-09Paper
Attribute based broadcast encryption with short ciphertext and decryption key2022-08-19Paper
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved2022-05-18Paper
Privacy-enhanced remote data integrity checking with updatable timestamp2021-04-19Paper
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation2020-10-07Paper
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters2020-09-22Paper
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes2020-07-20Paper
The Wiener attack on RSA revisited: a quest for the exact bound2020-05-27Paper
Location based encryption2020-05-27Paper
Towards enhanced security for certificateless public-key authenticated encryption with keyword search2020-01-10Paper
Strongly leakage resilient authenticated key exchange, revisited2019-11-07Paper
Outsourced ciphertext-policy attribute-based encryption with equality test2019-10-31Paper
Cooperative secret sharing using QR codes and symmetric keys2019-10-30Paper
A privacy preserving source verifiable encryption scheme2018-12-07Paper
A new public remote integrity checking scheme with user and data privacy2018-11-26Paper
Efficient attribute-based encryption with blackbox traceability2018-11-07Paper
Deniable ring authentication based on projective hash functions2018-11-07Paper
One-Round Attribute-Based Key Exchange in the Multi-Party Setting2018-02-23Paper
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample2017-11-15Paper
Strong authenticated key exchange with auxiliary inputs2017-09-15Paper
A note on the strong authenticated key exchange with auxiliary inputs2017-09-15Paper
Mergeable and revocable identity-based encryption2017-08-25Paper
Privacy-preserving \(k\)-time authenticated secret handshakes2017-08-25Paper
Hierarchical functional encryption for linear transformations2017-08-25Paper
A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange2017-07-28Paper
Comments on "Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting2017-07-27Paper
Achieving IND-CCA Security for Functional Encryption for Inner Products2017-05-05Paper
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions2017-02-01Paper
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction2017-01-06Paper
One-Round Attribute-Based Key Exchange in the Multi-party Setting2017-01-06Paper
Edit Distance Based Encryption and Its Application2016-09-02Paper
One-Round Strong Oblivious Signature-Based Envelope2016-09-02Paper
Proxy Signature with Revocation2016-09-02Paper
Linear Encryption with Keyword Search2016-09-02Paper
Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing2016-08-31Paper
Threshold Broadcast Encryption with Keyword Search2016-07-25Paper
Strongly Leakage-Resilient Authenticated Key Exchange2016-04-08Paper
An Efficient Privacy-Preserving E-coupon System2015-11-25Paper
A New General Framework for Secure Public Key Encryption with Keyword Search2015-10-20Paper
A New Public Remote Integrity Checking Scheme with User Privacy2015-10-20Paper
Efficient Hidden Vector Encryption with Constant-Size Ciphertext2015-07-24Paper
Ambiguous optimistic fair exchange: definition and constructions2014-12-02Paper
Identity based identification from algebraic coding theory2014-01-13Paper
k-time Proxy Signature: Formal Definition and Efficient Construction2013-10-23Paper
Certificateless cryptography with KGC trust level 32011-10-10Paper
Certificateless public key encryption: a new generic construction and two pairing-free schemes2011-02-21Paper
Dynamic Group Key Exchange Revisited2010-12-07Paper
Probabilistic Public Key Encryption with Equality Test2010-03-16Paper
Efficient Non-interactive Range Proof2009-07-23Paper
A More Natural Way to Construct Identity-Based Identification Schemes2009-03-10Paper
Ambiguous Optimistic Fair Exchange2009-02-10Paper
Two-factor mutual authentication based on smart cards and passwords2008-11-19Paper
A new framework for the design and analysis of identity-based identification schemes2008-11-18Paper
Traceable and Retrievable Identity-Based Encryption2008-06-13Paper
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles2008-04-24Paper
Efficient Anonymous Roaming and Its Security Analysis2007-09-24Paper
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices2007-06-13Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Information Security2006-10-20Paper
Information Security and Privacy2006-06-22Paper

Research outcomes over time

This page was built for person: Guomin Yang