Rui Zhang

From MaRDI portal
Person:744325


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Efficient secure multi-party computation for proof of custody in Ethereum sharding
Designs, Codes and Cryptography
2024-06-28Paper
Forward security of Fiat-Shamir lattice signatures
 
2023-11-09Paper
Modular Design of Role-Symmetric Authenticated Key Exchange Protocols
Lecture Notes in Computer Science
2023-05-26Paper
Fast Fourier Orthogonalization over NTRU Lattices
 
2022-12-09Paper
Updatable hash proof system and its applications
Computer Security -- ESORICS 2015
2022-08-19Paper
More efficient construction of anonymous signatures
 
2022-06-08Paper
An efficient CCA-secure access control encryption for any policy
 
2021-12-08Paper
Fully secure ABE with outsourced decryption against chosen ciphertext attack
 
2021-12-08Paper
Distributed key generation for SM9-based systems
 
2021-12-08Paper
Key dependent message security for revocable identity-based encryption and identity-based encryption
 
2021-01-18Paper
Certifying variant of RSA with generalized moduli
 
2021-01-18Paper
Tightly secure two-pass authenticated key exchange protocol in the CK model
 
2020-08-05Paper
Reducing randomness complexity of mask refreshing algorithm
Information and Communications Security
2020-07-20Paper
Multipurpose public-key encryption
 
2018-10-24Paper
A deterministic algorithm for computing divisors in an interval
Information Security and Privacy
2018-09-26Paper
scientific article; zbMATH DE number 6874618 (Why is no real title available?)
 
2018-05-25Paper
An approach for mitigating potential threats in practical SSO systems
Information Security and Cryptology
2016-07-25Paper
Solving linear equations modulo unknown divisors: revisited
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Towards optimal bounds for implicit factorization problem
Lecture Notes in Computer Science
2016-05-19Paper
A solution of code authentication on android
Information and Communications Security
2016-04-21Paper
Simpler CCA-secure public key encryption from lossy trapdoor functions
Information Security and Cryptology
2015-11-25Paper
Forgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanism
Journal of Computer Science and Technology
2014-10-07Paper
New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents
Applied Cryptography and Network Security
2014-07-07Paper
Improved bounds for the implicit factorization problem
Advances in Mathematics of Communications
2013-07-31Paper
Factoring multi-power RSA modulus \(N = p^r q\) with partial known bits
Information Security and Privacy
2013-06-28Paper
Stronger Security Model for Public-Key Encryption with Equality Test
Pairing-Based Cryptography – Pairing 2012
2013-04-04Paper
A generic construction from selective-IBE to public-key encryption with non-interactive opening
Information Security and Cryptology
2013-01-07Paper
Deterministic public key encryption and identity-based encryption from lattices in the auxiliary-input setting
Lecture Notes in Computer Science
2012-09-25Paper
Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts
Information Security and Privacy
2012-09-07Paper
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
Lecture Notes in Computer Science
2012-06-08Paper
Efficient threshold encryption from lossy trapdoor functions
Post-Quantum Cryptography
2011-11-25Paper
Acquiring key privacy from data privacy
Information Security and Cryptology
2011-07-29Paper
Constructing Better KEMs with Partial Message Recovery
Information Security and Cryptology
2010-11-23Paper
Generic Construction of Stateful Identity Based Encryption
Lecture Notes in Computer Science
2009-09-29Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
Strong Anonymous Signatures
Information Security and Cryptology
2009-04-29Paper
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
Applied Cryptography and Network Security
2009-03-10Paper
Orthogonality between Key Privacy and Data Privacy, Revisited
Information Security and Cryptology
2009-02-10Paper
Efficient Identity-Based Encryption with Tight Security Reduction
Cryptology and Network Security
2009-01-09Paper
Relations Among Notions of Security for Identity Based Encryption Schemes
LATIN 2006: Theoretical Informatics
2008-09-18Paper
Formal Security Treatments for Signatures from Identity-Based Encryption
Provable Security
2008-06-10Paper
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption
Cryptology and Network Security
2008-04-15Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2008-02-19Paper
Short Signature and Universal Designated Verifier Signature Without Random Oracles
Applied Cryptography and Network Security
2007-09-24Paper
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT
Information Security and Privacy
2007-09-07Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Lecture Notes in Computer Science
2007-02-12Paper
Information Security and Cryptology
Lecture Notes in Computer Science
2006-11-14Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper


Research outcomes over time


This page was built for person: Rui Zhang