Xinyi Huang

From MaRDI portal
(Redirected from Person:744323)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Parameter-hiding order-revealing encryption without pairings
 
2024-11-12Paper
Sender-anamorphic encryption reformulated: achieving robust and generic constructions
 
2024-09-13Paper
Blockwise rank decoding problem and LRPC codes: cryptosystems with smaller sizes
 
2024-08-30Paper
Grey-prediction-based double model predictive control strategy for the speed and current control of permanent magnet synchronous motor
Asian Journal of Control
2024-07-25Paper
Complicated dynamical behaviors of a geometrical oscillator with a mass parameter
International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
2024-05-14Paper
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts
Information Sciences
2024-04-11Paper
A New Design of Online/Offline Signatures Based on Lattice
Information Security Practice and Experience
2023-06-30Paper
Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE
Lecture Notes in Computer Science
2023-05-12Paper
Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption
 
2023-03-21Paper
Privacy-preserving authentication for tree-structured data with designated verification in outsourced environments
 
2023-03-21Paper
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment
1524.68044
2022-12-22Paper
Linearly Homomorphic Signatures with Designated Entities
Information Security Practice and Experience
2022-12-09Paper
Dissemination of authenticated tree-structured data with privacy protection and fine-grained control in outsourced databases
 
2022-08-25Paper
Ring trapdoor redactable signatures from lattice
Information Security Practice and Experience
2022-08-11Paper
Universal product learning with errors: a new variant of \textsf{LWE} for lattice-based cryptography
Theoretical Computer Science
2022-05-31Paper
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved
 
2022-05-18Paper
Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control
IEEE Transactions on Computers
2022-03-23Paper
An efficient blind signature scheme based on SM2 signature algorithm
 
2021-12-08Paper
Blockchain-based system for secure outsourcing of bilinear pairings
Information Sciences
2021-04-19Paper
Functional broadcast encryption with applications to data sharing for cloud storage
Information Sciences
2021-02-04Paper
A code-based signature scheme from the Lyubashevsky framework
Theoretical Computer Science
2020-08-17Paper
Equilibrium competition binding assay: inhibition mechanism from a single dose response
Journal of Theoretical Biology
2020-05-06Paper
Supporting dynamic updates in storage clouds with the Akl-Taylor scheme
Information Sciences
2020-02-06Paper
Revocable threshold attribute-based signature against signing key exposure
 
2018-12-07Paper
An efficient certificate-based designated verifier signature scheme
 
2018-11-27Paper
Secure publicly verifiable computation with polynomial commitment in cloud computing
 
2018-09-26Paper
Cost-effective and scalable data sharing in cloud storage using hierarchical attribute-based encryption with forward security
International Journal of Foundations of Computer Science
2018-05-14Paper
Self-adaptive trust management based on game theory in fuzzy large-scale networks
Soft Computing
2018-02-27Paper
Dual trapdoor identity-based encryption with keyword search
Soft Computing
2018-02-27Paper
A general framework for secure sharing of personal health records in cloud system
Journal of Computer and System Sciences
2017-09-15Paper
Towards revocable fine-grained encryption of cloud data: reducing trust upon cloud
 
2017-08-25Paper
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
IEEE Transactions on Computers
2017-05-16Paper
Secure Distributed Deduplication Systems with Improved Reliability
IEEE Transactions on Computers
2017-05-16Paper
Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing
IEEE Transactions on Computers
2017-05-16Paper
<inline-formula><tex-math>$k$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="huang-ieq1-2366741.gif"/></alternatives></inline-formula>-Times Attribute-Based Anonymous Access Control for Cloud Computing
IEEE Transactions on Computers
2017-05-16Paper
A new universal designated verifier transitive signature scheme for big graph data
Journal of Computer and System Sciences
2016-09-16Paper
Accelerating oblivious transfer with batch multi-exponentiation
Information Security and Privacy
2016-08-31Paper
Forgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanism
Journal of Computer Science and Technology
2014-10-07Paper
Certificate-based signcryption with enhanced security features
Computers & Mathematics with Applications
2013-07-25Paper
Efficient escrow-free identity-based signature
Provable Security
2012-11-06Paper
Dynamic Secure Cloud Storage with Provenance
Cryptography and Security: From Theory to Applications
2012-06-08Paper
Provably secure server-aided verification signatures
Computers & Mathematics with Applications
2011-08-28Paper
Certificateless threshold signature scheme from bilinear maps
Information Sciences
2011-01-28Paper
Further observations on optimistic fair exchange protocols in the multi-user setting
Public Key Cryptography – PKC 2010
2010-05-28Paper
scientific article; zbMATH DE number 5622710 (Why is no real title available?)
 
2009-10-28Paper
Further Observations on Certificateless Public Key Encryption
Information Security and Cryptology
2009-04-29Paper
Certificateless Signature Revisited
Information Security and Privacy
2009-03-06Paper
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures
Information Security Applications
2009-02-24Paper
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility
Information Security and Cryptology
2009-02-10Paper
Server-Aided Verification Signatures: Definitions and New Constructions
Provable Security
2009-01-27Paper
Efficient and Short Certificateless Signature
Cryptology and Network Security
2009-01-09Paper
A Generic Construction for Universally-Convertible Undeniable Signatures
Cryptology and Network Security
2008-04-15Paper
Formal Definition and Construction of Nominative Signature
Information and Communications Security
2008-03-25Paper
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length
Pairing-Based Cryptography – Pairing 2007
2007-11-29Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper


Research outcomes over time


This page was built for person: Xinyi Huang