The following pages link to Guomin Yang (Q391759):
Displaying 45 items.
- Identity based identification from algebraic coding theory (Q391761) (← links)
- Ambiguous optimistic fair exchange: definition and constructions (Q476859) (← links)
- Certificateless public key encryption: a new generic construction and two pairing-free schemes (Q627164) (← links)
- Certificateless cryptography with KGC trust level 3 (Q719284) (← links)
- Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes (Q781862) (← links)
- An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices (Q884001) (← links)
- A new framework for the design and analysis of identity-based identification schemes (Q955014) (← links)
- Two-factor mutual authentication based on smart cards and passwords (Q955348) (← links)
- Efficient attribute-based encryption with blackbox traceability (Q1616654) (← links)
- Deniable ring authentication based on projective hash functions (Q1616869) (← links)
- A new public remote integrity checking scheme with user and data privacy (Q1626117) (← links)
- A privacy preserving source verifiable encryption scheme (Q1631848) (← links)
- Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample (Q1680228) (← links)
- Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation (Q2004746) (← links)
- Privacy-preserving \(k\)-time authenticated secret handshakes (Q2014619) (← links)
- Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved (Q2139637) (← links)
- Attribute based broadcast encryption with short ciphertext and decryption key (Q2165461) (← links)
- Location based encryption (Q2183910) (← links)
- The Wiener attack on RSA revisited: a quest for the exact bound (Q2183937) (← links)
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters (Q2200685) (← links)
- Towards enhanced security for certificateless public-key authenticated encryption with keyword search (Q2283603) (← links)
- Cooperative secret sharing using QR codes and symmetric keys (Q2331807) (← links)
- Outsourced ciphertext-policy attribute-based encryption with equality test (Q2331978) (← links)
- Strongly leakage resilient authenticated key exchange, revisited (Q2334443) (← links)
- Hierarchical functional encryption for linear transformations (Q2399945) (← links)
- Mergeable and revocable identity-based encryption (Q2399952) (← links)
- Strong authenticated key exchange with auxiliary inputs (Q2402976) (← links)
- A note on the strong authenticated key exchange with auxiliary inputs (Q2402977) (← links)
- Privacy-enhanced remote data integrity checking with updatable timestamp (Q2663494) (← links)
- Public key encryption with fuzzy matching (Q2697907) (← links)
- Strongly Leakage-Resilient Authenticated Key Exchange (Q2799004) (← links)
- Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing (Q2817480) (← links)
- One-Round Strong Oblivious Signature-Based Envelope (Q2817800) (← links)
- Proxy Signature with Revocation (Q2817801) (← links)
- Edit Distance Based Encryption and Its Application (Q2817807) (← links)
- Linear Encryption with Keyword Search (Q2817812) (← links)
- k-time Proxy Signature: Formal Definition and Efficient Construction (Q2856163) (← links)
- Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction (Q2953795) (← links)
- One-Round Attribute-Based Key Exchange in the Multi-party Setting (Q2953862) (← links)
- Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions (Q2958150) (← links)
- Achieving IND-CCA Security for Functional Encryption for Inner Products (Q2980849) (← links)
- Dynamic Group Key Exchange Revisited (Q3058766) (← links)
- A New General Framework for Secure Public Key Encryption with Keyword Search (Q3194589) (← links)
- A New Public Remote Integrity Checking Scheme with User Privacy (Q3194614) (← links)
- Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts (Q6205019) (← links)