Suivre
Rupeng Yang
Rupeng Yang
Adresse e-mail validée de uow.edu.au - Page d'accueil
Titre
Citée par
Citée par
Année
Efficient lattice-based zero-knowledge arguments with standard soundness: construction and applications
R Yang, MH Au, Z Zhang, Q Xu, Z Yu, W Whyte
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
1052019
Position based cryptography with location privacy: A step for fog computing
R Yang, Q Xu, MH Au, Z Yu, H Wang, L Zhou
Future Generation Computer Systems 78, 799-806, 2018
712018
Towards leakage-resilient fine-grained access control in fog computing
Z Yu, MH Au, Q Xu, R Yang, J Han
Future Generation Computer Systems 78, 763-777, 2018
592018
New empirical traceability analysis of CryptoNote-style blockchains
Z Yu, MH Au, J Yu, R Yang, Q Xu, WF Lau
International Conference on Financial Cryptography and Data Security, 133-149, 2019
522019
Decentralized blacklistable anonymous credentials with reputation
R Yang, MH Au, Q Xu, Z Yu
Computers & Security 85, 353-371, 2019
332019
Lattice-based techniques for accountable anonymity: composition of abstract stern’s protocols and weak PRF with efficient protocols from LWR
R Yang, MH Au, J Lai, Q Xu, Z Yu
Cryptology ePrint Archive, 2017
29*2017
Collusion resistant watermarking schemes for cryptographic functionalities
R Yang, MH Au, J Lai, Q Xu, Z Yu
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
242019
Updatable hash proof system and its applications
R Yang, Q Xu, Y Zhou, R Zhang, C Hu, Z Yu
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
222015
Collusion resistant watermarkable PRFs from standard assumptions
R Yang, MH Au, Z Yu, Q Xu
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
162020
Lattice-based universal accumulator with nonmembership arguments
Z Yu, MH Au, R Yang, J Lai, Q Xu
Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018
122018
Practical range proof for cryptocurrency monero with provable security
K Li, R Yang, MH Au, Q Xu
Information and Communications Security: 19th International Conference …, 2018
122018
Leakage-resilient functional encryption via pair encodings
Z Yu, MH Au, Q Xu, R Yang, J Han
Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016
122016
Unforgeable watermarking schemes with public extraction
R Yang, MH Au, J Lai, Q Xu, Z Yu
Security and Cryptography for Networks: 11th International Conference, SCN …, 2018
112018
Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting
R Yang, J Lai, Z Huang, MH Au, Q Xu, W Susilo
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
92020
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
C Hu, R Yang, P Liu, T Li, F Kong
The Journal of Supercomputing 75, 3099-3122, 2019
72019
Public-key encryption with keyword search via obfuscation
C Hu, P Liu, R Yang, Y Xu
IEEE Access 7, 37394-37405, 2019
62019
Public‐key encryption with keyword search secure against continual memory attacks
C Hu, R Yang, P Liu, Z Yu, Y Zhou, Q Xu
Security and Communication Networks 9 (11), 1613-1629, 2016
62016
Accountable anonymous credentials
Z Yu, MH Au, R Yang
Advances in Cyber Security: Principles, Techniques, and Applications, 49-68, 2019
52019
Simulation-based bi-selective opening security for public key encryption
J Lai, R Yang, Z Huang, J Weng
International Conference on the Theory and Application of Cryptology and …, 2021
42021
Verifiable public-key encryption with keyword search secure against continual memory attacks
C Hu, Z Li, P Liu, R Yang, S Guo, H Zhang
Mobile Networks and Applications, 1-11, 2021
42021
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20