The following pages link to Bo Yang (Q266834):
Displaying 41 items.
- Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing (Q266836) (← links)
- (Q433056) (redirect page) (← links)
- Group-oriented setting's multisigncryption scheme with threshold designcryption (Q433057) (← links)
- Effective error-tolerant keyword search for secure cloud computing (Q458133) (← links)
- (Q495679) (redirect page) (← links)
- On security against the server in designated tester public key encryption with keyword search (Q495680) (← links)
- Anonymous spatial encryption under affine space delegation functionality with full security (Q506150) (← links)
- Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing (Q1679904) (← links)
- Verifiable secret sharing based on hyperplane geometry with its applications to optimal resilient proactive cryptosystems (Q1784440) (← links)
- Anonymous identity-based hash proof system from lattices in the standard model (Q1784489) (← links)
- Efficient attribute-based encryption with attribute revocation for assured data deletion (Q2004758) (← links)
- Improvement of attribute-based encryption using Blakley secret sharing (Q2030889) (← links)
- Novel generic construction of leakage-resilient PKE scheme with CCA security (Q2035456) (← links)
- Witness-based searchable encryption (Q2195400) (← links)
- A construction of highly nonlinear Boolean functions with optimal algebraic immunity and low hardware implementation cost (Q2197451) (← links)
- Secure rational numbers equivalence test based on threshold cryptosystem with rational numbers (Q2200560) (← links)
- Novel updatable identity-based hash proof system and its applications (Q2283028) (← links)
- Provably secure proactive secret sharing without the adjacent assumption (Q2283612) (← links)
- Identity-based encryption with leakage-amplified chosen-ciphertext attacks security (Q2290636) (← links)
- An alternative approach to public cloud data auditing supporting data dynamics (Q2318271) (← links)
- Continuous leakage-resilient identity-based encryption with leakage amplification (Q2324786) (← links)
- The generic construction of continuous leakage-resilient identity-based cryptosystems (Q2632014) (← links)
- A secure scalar product protocol against malicious adversaries (Q2637306) (← links)
- Public-key encryption scheme with optimal continuous leakage resilience (Q2680220) (← links)
- (Q2824410) (← links)
- (Q2993249) (← links)
- (Q2993252) (← links)
- Anonymous Encryption with Partial-Order Subset Delegation Functionality (Q3092355) (← links)
- (Q3175581) (← links)
- (Q4473569) (← links)
- 基于身份的多接收者(多消息)匿名混合签密机制 (Q4688872) (← links)
- (Q4926906) (← links)
- LR-UESDE: A Continual-Leakage Resilient Encryption with Unbounded Extensible Set Delegation (Q5200577) (← links)
- Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model (Q5205013) (← links)
- Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures (Q5274491) (← links)
- (Q5382005) (← links)
- Constructions of balanced Boolean functions with high nonlinearity and high algebraic degree (Q5416434) (← links)
- Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem (Q5505454) (← links)
- Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family (Q5859674) (← links)
- A potential approach of internet worm propagation based on P2P (Q5899427) (← links)
- Leakage-resilient identity-based cryptography from minimal assumptions (Q6063141) (← links)