Yanjiang Yang

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Ramp hyper-invertible matrices and their applications to MPC protocols2024-08-30Paper
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
Science China Information Sciences
2022-10-28Paper
Towards revocable fine-grained encryption of cloud data: reducing trust upon cloud2017-08-25Paper
Towards lightweight anonymous entity authentication for IoT applications
Information Security and Privacy
2016-08-31Paper
Privacy-preserving \(k\)-nearest neighbour query on outsourced database
Information Security and Privacy
2016-08-31Paper
On lightweight security enforcement in cyber-physical systems
Lecture Notes in Computer Science
2016-02-22Paper
Fine-grained conditional proxy re-encryption and application
Provable Security
2015-09-29Paper
A note on the security of KHL scheme
Theoretical Computer Science
2015-09-25Paper
Adaptable Ciphertext-Policy Attribute-Based Encryption
Pairing-Based Cryptography – Pairing 2013
2014-02-18Paper
Cryptanalysis of an identity based broadcast encryption scheme without random oracles
Information Processing Letters
2013-03-28Paper
Optionally identifiable private handshakes
Information Security and Cryptology
2010-11-23Paper
Efficient Unidirectional Proxy Re-Encryption
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Self-enforcing private inference control
Provable Security
2009-12-11Paper
Multiuser private queries over encrypted databases
International Journal of Applied Cryptography
2009-10-12Paper
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
Lecture Notes in Computer Science
2009-09-29Paper
An Efficient PIR Construction Using Trusted Hardware
Lecture Notes in Computer Science
2008-11-20Paper
Information Security
Lecture Notes in Computer Science
2006-10-20Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 1950329 (Why is no real title available?)2003-07-17Paper


Research outcomes over time


This page was built for person: Yanjiang Yang