Yu Long

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
FaBFT: flexible asynchronous BFT protocol using DAG
 
2024-07-19Paper
Tracy-Widom limit for the largest eigenvalue of high-dimensional covariance matrices in elliptical distributions
Bernoulli
2022-09-28Paper
Access control encryption with efficient verifiable sanitized decryption
Information Sciences
2020-09-22Paper
Attribute-based key-insulated signature and its applications
Information Sciences
2016-07-11Paper
Identity-based key-insulated proxy signature without random oracles
Journal of Shanghai Jiaotong University (Science)
2014-09-02Paper
An efficient threshold key-insulated signature scheme
Journal of Shanghai Jiaotong University (Science)
2014-03-27Paper
Identity-based key-insulated signcryption
 
2013-04-30Paper
Accountable authority key policy attribute-based encryption
Science China Information Sciences
2012-08-17Paper
Key updating technique in identity-based encryption
Information Sciences
2011-06-22Paper
Certificateless key-insulated signature without random oracles
Journal of Zhejiang University. Science A
2011-02-02Paper
Distributed certificateless key encapsulation mechanism secure against the adaptive adversary
Journal of Shanghai Jiaotong University (Science)
2011-01-05Paper
Strong key-insulated signature in the standard model
Journal of Shanghai Jiaotong University (Science)
2011-01-05Paper
Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism
Information Sciences
2010-03-11Paper
Certificateless threshold cryptosystem secure against chosen-ciphertext attack
Information Sciences
2008-01-03Paper
ID-based threshold decryption secure against adaptive chosen-ciphertext attack
Computers and Electrical Engineering
2007-06-08Paper
Adaptive chosen ciphertext secure threshold key escrow scheme from pairing
 
2007-04-05Paper
ID-based threshold decryption secure against chosen plaintext attack
Journal of Shanghai Jiaotong University (Science)
2006-11-15Paper
A dynamic threshold commercial key escrow scheme based on conic
Applied Mathematics and Computation
2006-05-18Paper
scientific article; zbMATH DE number 888803 (Why is no real title available?)
 
1991-01-01Paper


Research outcomes over time


This page was built for person: Yu Long