Yu Long

From MaRDI portal
(Redirected from Person:407485)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
FaBFT: flexible asynchronous BFT protocol using DAG2024-07-19Paper
Tracy-Widom limit for the largest eigenvalue of high-dimensional covariance matrices in elliptical distributions
Bernoulli
2022-09-28Paper
Access control encryption with efficient verifiable sanitized decryption
Information Sciences
2020-09-22Paper
Attribute-based key-insulated signature and its applications
Information Sciences
2016-07-11Paper
Identity-based key-insulated proxy signature without random oracles
Journal of Shanghai Jiaotong University (Science)
2014-09-02Paper
An efficient threshold key-insulated signature scheme
Journal of Shanghai Jiaotong University (Science)
2014-03-27Paper
Identity-based key-insulated signcryption2013-04-30Paper
Accountable authority key policy attribute-based encryption
Science China Information Sciences
2012-08-17Paper
Key updating technique in identity-based encryption
Information Sciences
2011-06-22Paper
Certificateless key-insulated signature without random oracles
Journal of Zhejiang University. Science A
2011-02-02Paper
Distributed certificateless key encapsulation mechanism secure against the adaptive adversary
Journal of Shanghai Jiaotong University (Science)
2011-01-05Paper
Strong key-insulated signature in the standard model
Journal of Shanghai Jiaotong University (Science)
2011-01-05Paper
Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism
Information Sciences
2010-03-11Paper
Certificateless threshold cryptosystem secure against chosen-ciphertext attack
Information Sciences
2008-01-03Paper
ID-based threshold decryption secure against adaptive chosen-ciphertext attack
Computers and Electrical Engineering
2007-06-08Paper
Adaptive chosen ciphertext secure threshold key escrow scheme from pairing2007-04-05Paper
ID-based threshold decryption secure against chosen plaintext attack
Journal of Shanghai Jiaotong University (Science)
2006-11-15Paper
A dynamic threshold commercial key escrow scheme based on conic
Applied Mathematics and Computation
2006-05-18Paper
scientific article; zbMATH DE number 888803 (Why is no real title available?)1991-01-01Paper


Research outcomes over time


This page was built for person: Yu Long