Follow
Zuoxia Yu
Zuoxia Yu
Verified email at uow.edu.au
Title
Cited by
Cited by
Year
Efficient lattice-based zero-knowledge arguments with standard soundness: construction and applications
R Yang, MH Au, Z Zhang, Q Xu, Z Yu, W Whyte
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
1132019
Position based cryptography with location privacy: A step for fog computing
R Yang, Q Xu, MH Au, Z Yu, H Wang, L Zhou
Future Generation Computer Systems 78, 799-806, 2018
762018
Towards leakage-resilient fine-grained access control in fog computing
Z Yu, MH Au, Q Xu, R Yang, J Han
Future Generation Computer Systems 78, 763-777, 2018
612018
New empirical traceability analysis of CryptoNote-style blockchains
Z Yu, MH Au, J Yu, R Yang, Q Xu, WF Lau
International Conference on Financial Cryptography and Data Security, 133-149, 2019
532019
Decentralized blacklistable anonymous credentials with reputation
R Yang, MH Au, Q Xu, Z Yu
Computers & Security 85, 353-371, 2019
362019
Position paper on blockchain technology: Smart contract and applications
W Meng, J Wang, X Wang, J Liu, Z Yu, J Li, Y Zhao, SSM Chow
Network and System Security: 12th International Conference, NSS 2018, Hong …, 2018
362018
Collusion resistant watermarking schemes for cryptographic functionalities
R Yang, MH Au, J Lai, Q Xu, Z Yu
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
272019
Lattice-based techniques for accountable anonymity: composition of abstract stern’s protocols and weak PRF with efficient protocols from LWR
R Yang, MH Au, J Lai, Q Xu, Z Yu
Cryptology ePrint Archive, 2017
262017
Updatable hash proof system and its applications
R Yang, Q Xu, Y Zhou, R Zhang, C Hu, Z Yu
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
222015
Collusion resistant watermarkable PRFs from standard assumptions
R Yang, MH Au, Z Yu, Q Xu
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
182020
Lattice-based universal accumulator with nonmembership arguments
Z Yu, MH Au, R Yang, J Lai, Q Xu
Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018
152018
Leakage-resilient functional encryption via pair encodings
Z Yu, MH Au, Q Xu, R Yang, J Han
Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016
132016
Unforgeable watermarking schemes with public extraction
R Yang, MH Au, J Lai, Q Xu, Z Yu
Security and Cryptography for Networks: 11th International Conference, SCN …, 2018
112018
Public‐key encryption with keyword search secure against continual memory attacks
C Hu, R Yang, P Liu, Z Yu, Y Zhou, Q Xu
Security and Communication Networks 9 (11), 1613-1629, 2016
62016
Accountable anonymous credentials
Z Yu, MH Au, R Yang
Advances in Cyber Security: Principles, Techniques, and Applications, 49-68, 2019
52019
Achieving flexibility for ABE with outsourcing via proxy re-encryption
Z Yu, MH Au, R Yang, J Lai, Q Xu
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
32018
Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption
C Hu, Z Yu, R Yang, Q Xu, Y Zhou, Q Yuan
International Journal of Embedded Systems 7 (3-4), 216-229, 2015
22015
Public-key watermarking schemes for pseudorandom functions
R Yang, Z Yu, MH Au, W Susilo
Annual International Cryptology Conference, 637-667, 2022
12022
Weak-key leakage resilient cryptography
Z Yu, Q Xu, Y Zhou, C Hu, R Yang, G Fan
Cryptology ePrint Archive, 2014
12014
Revocable ring signatures with CCA-anonymity from standard lattices
J Wen, W Susilo, R Yang, Z Yu, H Zhang
Computer Standards & Interfaces 91, 103893, 2025
2025
The system can't perform the operation now. Try again later.
Articles 1–20