Yi Mu

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
An alternative model of quantum key agreement via photon coupling
 
2024-07-11Paper
Provably secure group authentication in the asynchronous communication model
 
2024-04-19Paper
Structured encryption for knowledge graphs
Information Sciences
2024-03-07Paper
Practical and malicious private set intersection with improved efficiency
Theoretical Computer Science
2024-03-01Paper
Leakage-resilient identity-based cryptography from minimal assumptions
Designs, Codes and Cryptography
2023-11-07Paper
Efficient Traceable Oblivious Transfer and Its Applications
Information Security Practice and Experience
2023-06-30Paper
An Efficient and Provably Secure Private Polynomial Evaluation Scheme
Information Security Practice and Experience
2023-06-30Paper
Group-Based Source-Destination Verifiable Encryption with Blacklist Checking
Information Security Practice and Experience
2022-12-09Paper
Novel generic construction of leakage-resilient PKE scheme with CCA security
Designs, Codes and Cryptography
2021-06-24Paper
Improvement of attribute-based encryption using Blakley secret sharing
 
2021-06-08Paper
Privacy-enhanced remote data integrity checking with updatable timestamp
Information Sciences
2021-04-19Paper
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation
Information Sciences
2020-10-07Paper
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters
Information Sciences
2020-09-22Paper
Privacy-enhanced attribute-based private information retrieval
Information Sciences
2020-09-08Paper
Witness-based searchable encryption
Information Sciences
2020-09-08Paper
A code-based signature scheme from the Lyubashevsky framework
Theoretical Computer Science
2020-08-17Paper
A generic scheme of plaintext-checkable database encryption
Information Sciences
2020-07-20Paper
Revocable identity-based encryption with server-aided ciphertext evolution
Theoretical Computer Science
2020-04-06Paper
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
Theoretical Computer Science
2020-01-29Paper
Provably secure proactive secret sharing without the adjacent assumption
 
2020-01-10Paper
Quantum private set intersection cardinality and its application to anonymous authentication
Information Sciences
2020-01-06Paper
Novel updatable identity-based hash proof system and its applications
Theoretical Computer Science
2019-12-27Paper
ACE with compact ciphertext size and decentralized sanitizers
International Journal of Foundations of Computer Science
2019-12-10Paper
Provably secure (broadcast) homomorphic signcryption
International Journal of Foundations of Computer Science
2019-12-10Paper
Strongly leakage resilient authenticated key exchange, revisited
Designs, Codes and Cryptography
2019-11-07Paper
Continuous leakage-resilient identity-based encryption with leakage amplification
Designs, Codes and Cryptography
2019-09-12Paper
The generic construction of continuous leakage-resilient identity-based cryptosystems
Theoretical Computer Science
2019-05-17Paper
Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems
Theoretical Computer Science
2019-03-26Paper
A privacy preserving source verifiable encryption scheme
 
2018-12-07Paper
Efficient attribute-based encryption with blackbox traceability
 
2018-11-07Paper
Deniable ring authentication based on projective hash functions
 
2018-11-07Paper
Provably secure homomorphic signcryption
 
2018-11-07Paper
Policy controlled system with anonymity
Theoretical Computer Science
2018-09-24Paper
Introduction to security reduction
 
2018-07-18Paper
Identity-based quotable ring signature
Information Sciences
2018-05-17Paper
One-Round Attribute-Based Key Exchange in the Multi-Party Setting
International Journal of Foundations of Computer Science
2018-02-23Paper
Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost
Theoretical Computer Science
2018-02-06Paper
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample
 
2017-11-15Paper
Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query
Quantum Information Processing
2017-10-24Paper
A note on the strong authenticated key exchange with auxiliary inputs
Designs, Codes and Cryptography
2017-09-15Paper
Strong authenticated key exchange with auxiliary inputs
Designs, Codes and Cryptography
2017-09-15Paper
Hierarchical functional encryption for linear transformations
 
2017-08-25Paper
Mergeable and revocable identity-based encryption
 
2017-08-25Paper
ID-based encryption with equality test against insider attack
 
2017-08-25Paper
Privacy-preserving \(k\)-time authenticated secret handshakes
 
2017-08-25Paper
A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange
International Journal of Computer Mathematics
2017-07-28Paper
Identity-Based Secure DistributedData Storage Schemes
IEEE Transactions on Computers
2017-06-20Paper
Achieving IND-CCA Security for Functional Encryption for Inner Products
Information Security and Cryptology
2017-05-05Paper
Cryptographic reverse firewall via malleable smooth projective hash functions
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Iterated random oracle: a universal approach for finding loss in security reduction
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
One-round attribute-based key exchange in the multi-party setting
Provable Security
2017-01-06Paper
Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage
Provable Security
2017-01-06Paper
Ciphertext-policy attribute based encryption supporting access policy update
Provable Security
2017-01-06Paper
One-round strong oblivious signature-based envelope
Information Security and Privacy
2016-09-02Paper
Proxy signature with revocation
Information Security and Privacy
2016-09-02Paper
Content-based encryption
Information Security and Privacy
2016-09-02Paper
Linear encryption with keyword search
Information Security and Privacy
2016-09-02Paper
Public Key Encryption with Authorized Keyword Search
Information Security and Privacy
2016-09-02Paper
Anonymous identity-based broadcast encryption with revocation for file sharing
Information Security and Privacy
2016-09-02Paper
Ciphertext-policy attribute-based encryption with key-delegation abuse resistance
Information Security and Privacy
2016-08-31Paper
Threshold broadcast encryption with keyword search
Information Security and Cryptology
2016-07-25Paper
Generalized closest substring encryption
Designs, Codes and Cryptography
2016-06-27Paper
Relations between robustness and RKA security under public-key encryption
Theoretical Computer Science
2016-04-13Paper
Strongly leakage-resilient authenticated key exchange
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
An efficient quantum scheme for private set intersection
Quantum Information Processing
2016-04-04Paper
Provably Secure Identity Based Provable Data Possession
Provable Security
2016-01-27Paper
Efficient dynamic threshold identity-based encryption with constant-size ciphertext
Theoretical Computer Science
2015-12-08Paper
An efficient privacy-preserving e-coupon system
Information Security and Cryptology
2015-11-25Paper
Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks
Frontiers of Computer Science
2015-11-20Paper
Improved identity-based online/offline encryption
Information Security and Privacy
2015-10-20Paper
A new public remote integrity checking scheme with user privacy
Information Security and Privacy
2015-10-20Paper
A new general framework for secure public key encryption with keyword search
Information Security and Privacy
2015-10-20Paper
Complete robustness in identity-based encryption
Provable Security
2015-09-29Paper
PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption
Computer Security - ESORICS 2014
2015-07-27Paper
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents
Information Processing Letters
2015-06-25Paper
Key management for smart grid based on asymmetric key-wrapping
International Journal of Computer Mathematics
2015-06-24Paper
A new signature scheme without random oracles from bilinear pairings
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
Efficient and dynamic key management for multiple identities in identity-based systems
Information Sciences
2014-08-01Paper
On security of a certificateless signcryption scheme
Information Sciences
2014-08-01Paper
Identity based identification from algebraic coding theory
Theoretical Computer Science
2014-01-13Paper
\(k\)-time proxy signature: formal definition and efficient construction
Provable Security
2013-10-23Paper
Anonymous signcryption against linear related-key attacks
Provable Security
2013-10-23Paper
Efficient and secure stored-value cards with leakage resilience
Computers and Electrical Engineering
2013-08-19Paper
Membership encryption and its applications
Information Security and Privacy
2013-06-28Paper
Provably secure proxy signature scheme from factorization
Mathematical and Computer Modelling
2013-01-24Paper
A provably secure authenticated key agreement protocol for wireless communications
Computers and Electrical Engineering
2012-10-19Paper
Efficient oblivious transfers with access control
Computers & Mathematics with Applications
2012-09-30Paper
A pre-computable signature scheme with efficient verification for RFID
Information Security Practice and Experience
2012-06-29Paper
An efficient dynamic authenticated key exchange protocol with selectable identities
Computers & Mathematics with Applications
2011-09-18Paper
Provably secure server-aided verification signatures
Computers & Mathematics with Applications
2011-08-28Paper
Efficient online/offline signatures with computational leakage resilience in online phase
Information Security and Cryptology
2011-07-29Paper
Electronic cash with anonymous user suspension
Information Security and Privacy
2011-07-07Paper
Policy-based authentication for mobile agents
Information Security Practice and Experience
2011-05-19Paper
Provably secure identity-based authenticated key agreement protocols with malicious private key generators
Information Sciences
2011-01-28Paper
Certificateless threshold signature scheme from bilinear maps
Information Sciences
2011-01-28Paper
Towards a cryptographic treatment of publish/subscribe systems
Cryptology and Network Security
2010-12-07Paper
Enhanced security notions for dedicated-key hash functions: definitions and relationships
Fast Software Encryption
2010-07-13Paper
Further observations on optimistic fair exchange protocols in the multi-user setting
Public Key Cryptography – PKC 2010
2010-05-28Paper
Escrowed deniable identification schemes
Security Technology
2010-04-23Paper
Server-controlled identity-based authenticated key exchange
Provable Security
2009-12-11Paper
How to prove security of a signature with a tighter security reduction
Provable Security
2009-12-11Paper
Is the notion of divisible on-line/off-line signatures stronger than on-line/off-line signatures?
Provable Security
2009-12-11Paper
scientific article; zbMATH DE number 5622710 (Why is no real title available?)
 
2009-10-28Paper
Universal Designated Verifier Signatures with Threshold-Signers
Advances in Information and Computer Security
2009-10-28Paper
Certificateless threshold ring signature
Information Sciences
2009-10-01Paper
Enhanced Target Collision Resistant Hash Functions Revisited
Fast Software Encryption
2009-08-11Paper
Efficient Non-interactive Range Proof
Lecture Notes in Computer Science
2009-07-23Paper
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders
Information Security and Privacy
2009-06-25Paper
Asymmetric Group Key Agreement
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Privacy for Private Key in Signatures
Information Security and Cryptology
2009-04-29Paper
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
Publicly Verifiable Privacy-Preserving Group Decryption
Information Security and Cryptology
2009-04-29Paper
Multi-identity management for identity-based cryptography
Journal of Discrete Mathematical Sciences and Cryptography
2009-04-28Paper
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure
Applied Cryptography and Network Security
2009-03-10Paper
Concurrent Signatures without a Conventional Keystone
Coding and Cryptology
2009-03-09Paper
Practical Compact E-Cash
Information Security and Privacy
2009-03-06Paper
Certificateless Signature Revisited
Information Security and Privacy
2009-03-06Paper
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures
Information Security Applications
2009-02-24Paper
Identity-Based Online/Offline Encryption
Financial Cryptography and Data Security
2009-02-12Paper
Multi-Identity Single-Key Decryption without Random Oracles
Information Security and Cryptology
2009-02-10Paper
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility
Information Security and Cryptology
2009-02-10Paper
Efficient Partially Blind Signatures with Provable Security
Computational Science and Its Applications - ICCSA 2006
2009-02-10Paper
Optimal Online/Offline Signature: How to Sign a Message without Online Computation
Provable Security
2009-01-27Paper
Server-Aided Verification Signatures: Definitions and New Constructions
Provable Security
2009-01-27Paper
Sanitizable Signatures Revisited
Cryptology and Network Security
2009-01-09Paper
Constant-Size Dynamic k-TAA
Lecture Notes in Computer Science
2008-11-27Paper
Efficient generic on-line/off-line (threshold) signatures without key exposure
Information Sciences
2008-11-20Paper
RFID Privacy Models Revisited
Computer Security - ESORICS 2008
2008-10-27Paper
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings
Financial Cryptography and Data Security
2008-09-09Paper
Compact E-Cash from Bounded Accumulator
Lecture Notes in Computer Science
2008-04-17Paper
A Generic Construction for Universally-Convertible Undeniable Signatures
Cryptology and Network Security
2008-04-15Paper
Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles
Cryptology and Network Security
2008-04-15Paper
New Construction of Group Secret Handshakes Based on Pairings
Information and Communications Security
2008-03-25Paper
Formal Definition and Construction of Nominative Signature
Information and Communications Security
2008-03-25Paper
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key
Pairing-Based Cryptography – Pairing 2007
2007-11-29Paper
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length
Pairing-Based Cryptography – Pairing 2007
2007-11-29Paper
Progress in Cryptology - INDOCRYPT 2003
Lecture Notes in Computer Science
2007-11-29Paper
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Information Security and Privacy
2007-09-07Paper
Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures
Public Key Cryptography – PKC 2007
2007-09-04Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
Financial Cryptography and Data Security
Lecture Notes in Computer Science
2005-12-22Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making
Lecture Notes in Computer Science
2005-08-17Paper
Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making
Lecture Notes in Computer Science
2005-08-17Paper
Distributed Computing - IWDC 2004
Lecture Notes in Computer Science
2005-08-12Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 1980964 (Why is no real title available?)
 
2003-09-15Paper
scientific article; zbMATH DE number 1950357 (Why is no real title available?)
 
2003-07-17Paper
scientific article; zbMATH DE number 1857529 (Why is no real title available?)
 
2003-05-19Paper
scientific article; zbMATH DE number 1424187 (Why is no real title available?)
 
2002-04-08Paper
scientific article; zbMATH DE number 1424177 (Why is no real title available?)
 
2002-03-18Paper
scientific article; zbMATH DE number 1700046 (Why is no real title available?)
 
2002-02-03Paper
scientific article; zbMATH DE number 1689603 (Why is no real title available?)
 
2002-01-13Paper
scientific article; zbMATH DE number 1942816 (Why is no real title available?)
 
2002-01-01Paper
scientific article; zbMATH DE number 1612525 (Why is no real title available?)
 
2001-07-01Paper
scientific article; zbMATH DE number 1583942 (Why is no real title available?)
 
2001-04-03Paper
scientific article; zbMATH DE number 1500498 (Why is no real title available?)
 
2000-09-04Paper
scientific article; zbMATH DE number 1420970 (Why is no real title available?)
 
2000-08-24Paper
On the design of efficient RSA-based off-line electronic cash schemes
Theoretical Computer Science
2000-08-23Paper
scientific article; zbMATH DE number 1304304 (Why is no real title available?)
 
1999-11-29Paper
scientific article; zbMATH DE number 1303965 (Why is no real title available?)
 
1999-06-17Paper


Research outcomes over time


This page was built for person: Yi Mu