Skip to main content

previous disabled Page of 10
and
  1. No Access

    Article

    Leakage-resilient identity-based cryptography from minimal assumptions

    Identity-based hash proof system (IB-HPS), a variant of hash proof system (HPS) in the identity-based setting, is a useful building block in cryptography. In EUROCRYPT 2010 (Alwen et al in Advances in cryptolo...

    Yanwei Zhou, Bo Yang, Zirui Qiao, Zhe **a, Mingwu Zhang in Designs, Codes and Cryptography (2023)

  2. No Access

    Article

    Novel generic construction of leakage-resilient PKE scheme with CCA security

    Leakage of private state information (e.g. the secret keys) through various leakage attacks (e.g. side channel attacks, cold-boot attacks, etc) has become a serious threat to the security of computer systems i...

    Yanwei Zhou, Bo Yang, Zhe **a, Mingwu Zhang, Yi Mu in Designs, Codes and Cryptography (2021)

  3. No Access

    Article

    Strongly leakage resilient authenticated key exchange, revisited

    Authenticated Key Exchange (AKE) protocols allow two (or multiple) parties to authenticate each other and agree on a common secret key, which is essential for establishing a secure communication channel over a...

    Guomin Yang, Rongmao Chen, Yi Mu, Willy Susilo in Designs, Codes and Cryptography (2019)

  4. No Access

    Article

    Continuous leakage-resilient identity-based encryption with leakage amplification

    In modern computer systems, leakage of private information may cause catastrophic consequences, especially those are related to the secret keys in cryptographic mechanisms. Therefore, it has been widely accept...

    Yanwei Zhou, Bo Yang, Yi Mu in Designs, Codes and Cryptography (2019)

  5. No Access

    Article

    Threshold privacy-preserving cloud auditing with multiple uploaders

    Data integrity is a critical security issue in cloud storage. The data integrity checking schemes by a third-party auditor (TPA) have attracted a lot of attention. Sharing data among multiple users (uploaders)...

    Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo in International Journal of Information Secur… (2019)

  6. No Access

    Book and Conference Proceedings

    Cryptology and Network Security

    18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings

    Yi Mu, Prof. Robert H. Deng, **nyi Huang in Lecture Notes in Computer Science (2019)

  7. No Access

    Chapter and Conference Paper

    Provably Secure Proactive Secret Sharing Without the Adjacent Assumption

    In secret sharing (SS), the secret is shared among a number of parties so that only a quorum of these parties can recover the secret, but a smaller set of parties cannot learn any information about the secret....

    Zhe **a, Bo Yang, Yanwei Zhou, Mingwu Zhang, Hua Shen, Yi Mu in Provable Security (2019)

  8. No Access

    Article

    Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes

    Attribute-based encryption (ABE) allows one-to-many encryption with static access control. In many occasions, the access control policy must be updated, but the original encryptor might be unavailable to re-en...

    Yinhao Jiang, Willy Susilo, Yi Mu in International Journal of Information Secur… (2018)

  9. No Access

    Article

    Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts

    Ciphertext-policy attribute-based encryption (CP-ABE) is a very promising cryptographic primitive that allows a data owner to encrypt messages and manage access policies themselves. Most of the existing CP-ABE...

    Yinhao Jiang, Willy Susilo, Yi Mu in International Journal of Information Secur… (2018)

  10. No Access

    Chapter and Conference Paper

    Efficient Traceable Oblivious Transfer and Its Applications

    Oblivious transfer (OT) has been applied widely in privacy-sensitive systems such as on-line transactions and electronic commerce to protect users’ private information. Traceability is an interesting feature o...

    Weiwei Liu, Yinghui Zhang, Yi Mu in Information Security Practice and Experien… (2018)

  11. No Access

    Chapter and Conference Paper

    Efficient Attribute-Based Encryption with Blackbox Traceability

    Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encryption. In CCS’13, Liu et al. proposed an attribute-based traitor tracing (ABTT) scheme with blackbox traceab...

    Shengmin Xu, Guomin Yang, Yi Mu, **meng Liu in Provable Security (2018)

  12. No Access

    Chapter and Conference Paper

    An Efficient and Provably Secure Private Polynomial Evaluation Scheme

    Private Polynomial Evaluation (PPE) allows the service provider to outsource the computation of a polynomial to some third party (e.g. the Cloud) in a verifiable way. And meanwhile, the polynomial remains hidd...

    Zhe **a, Bo Yang, Mingwu Zhang, Yi Mu in Information Security Practice and Experience (2018)

  13. No Access

    Article

    A note on the strong authenticated key exchange with auxiliary inputs

    Recently, Chen et al. proposed a framework for authenticated key exchange (AKE) protocols (referred to as CMYSG scheme) in Designs, Codes and Cryptography (available at http://springer.longhoe.net...

    Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo in Designs, Codes and Cryptography (2017)

  14. No Access

    Article

    Strong authenticated key exchange with auxiliary inputs

    Leakage attacks, including various kinds of side-channel attacks, allow an attacker to learn partial information about the internal secrets such as the secret key and the randomness of a cryptographic system. ...

    Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo in Designs, Codes and Cryptography (2017)

  15. No Access

    Article

    Efficient identity-based online/offline encryption and signcryption with short ciphertext

    The technique of online/offline is regarded as a promising approach to speed up the computation of encryption, because the most part of computation, such as pairing over points on elliptic curve and exponentia...

    Jianchang Lai, Yi Mu, Fuchun Guo in International Journal of Information Security (2017)

  16. No Access

    Chapter and Conference Paper

    Group-Based Source-Destination Verifiable Encryption with Blacklist Checking

    We consider user conditional privacy preservation in the context of public key encryption. Unlike the full privacy preservation, our conditional one ensures that the message sender’s as well as the intended re...

    Zhongyuan Yao, Yi Mu, Guomin Yang in Information Security Practice and Experience (2017)

  17. No Access

    Chapter and Conference Paper

    Achieving IND-CCA Security for Functional Encryption for Inner Products

    Functional encryption allows the authorised parties to reveal partial information of the plaintext hidden in a ciphertext while in conventional encryption decryption is all-or-nothing. Focusing on the function...

    Shiwei Zhang, Yi Mu, Guomin Yang in Information Security and Cryptology (2017)

  18. No Access

    Chapter and Conference Paper

    ID-Based Encryption with Equality Test Against Insider Attack

    Testing if two ciphertexts contain the same plaintext is an interesting cryptographic primitive. It is usually referred to as equality test of encrypted data or equality test. One of attractive applications of...

    Tong Wu, Sha Ma, Yi Mu, Shengke Zeng in Information Security and Privacy (2017)

  19. No Access

    Chapter and Conference Paper

    Privacy-Preserving k-time Authenticated Secret Handshakes

    Secret handshake allows a group of authorized users to establish a shared secret key and at the same time authenticate each other anonymously. A straightforward approach to design an unlinkable secret handshak...

    Yangguang Tian, Shiwei Zhang, Guomin Yang, Yi Mu in Information Security and Privacy (2017)

  20. No Access

    Chapter and Conference Paper

    Provably Secure Homomorphic Signcryption

    Signcryption has shown many useful applications, in particular for the environment where the computation and communication resources are constrained, for instance, for applications on lightweight devices. Howe...

    Fatemeh Rezaeibagha, Yi Mu, Shiwei Zhang, **aofen Wang in Provable Security (2017)

previous disabled Page of 10