Xiangxue Li

From MaRDI portal
Person:615207

Available identifiers

zbMath Open li.xiangxueMaRDI QIDQ615207

List of research outcomes





PublicationDate of PublicationType
PFE: linear active security, double-shuffle proofs, and low-complexity communication2024-07-17Paper
Constant-round multiparty private function evaluation with (quasi-)linear complexities2023-11-10Paper
SecureBiNN: 3-party secure computation for binarized neural network inference2023-07-28Paper
CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN2021-09-06Paper
Simpler CCA secure PKE from LPN problem without double-trapdoor2021-01-18Paper
CCA secure multi-recipient KEM from LPN2021-01-18Paper
Collision resistant hashing from sub-exponential learning parity with noise2020-05-05Paper
On the robustness of learning parity with noise2018-10-26Paper
An effective localization attack in location-based social network2016-10-06Paper
Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations2016-08-31Paper
Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption2016-07-11Paper
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond2015-12-10Paper
The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions2015-07-06Paper
Optimal assignment schemes for general access structures based on linear programming2015-03-12Paper
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model2015-02-19Paper
Pseudorandom generators from regular one-way functions: new constructions with improved parameters2015-01-28Paper
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model2014-09-29Paper
Efficient democratic group signatures with threshold traceability2014-09-02Paper
An efficient threshold key-insulated signature scheme2014-03-27Paper
Balanced \(2p\)-variable rotation symmetric Boolean functions with optimal algebraic immunity, good nonlinearity, and good algebraic degree2014-01-28Paper
Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles2014-01-24Paper
Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters2013-12-10Paper
https://portal.mardi4nfdi.de/entity/Q49250682013-06-11Paper
https://portal.mardi4nfdi.de/entity/Q49174502013-04-30Paper
Pitfalls in identity based encryption using an elliptic curve combined public key2012-08-30Paper
Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator2012-07-23Paper
Cryptanalysis of a certificateless signcryption scheme in the standard model2011-01-28Paper
Distributed certificateless key encapsulation mechanism secure against the adaptive adversary2011-01-05Paper
A universal composability framework for analysis of proxy threshold signature2011-01-05Paper
Identity-Based Strong Key-Insulated Signature Without Random Oracles2010-02-12Paper
Democratic group signatures with collective traceability2009-10-15Paper
Identity-Based Key-Insulated Signature with Secure Key-Updates2009-01-15Paper
Efficient Partially Blind Signature Scheme with Provable Security2007-09-10Paper
Simulatability and security of certificateless threshold signatures2007-02-20Paper
Verifiable encrypted signatures without random oracles2006-11-15Paper
ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings2005-11-16Paper

Research outcomes over time

This page was built for person: Xiangxue Li