Efficient lattice-based zero-knowledge arguments with standard soundness: construction and applications R Yang, MH Au, Z Zhang, Q Xu, Z Yu, W Whyte Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 113 | 2019 |
Position based cryptography with location privacy: A step for fog computing R Yang, Q Xu, MH Au, Z Yu, H Wang, L Zhou Future Generation Computer Systems 78, 799-806, 2018 | 76 | 2018 |
Towards leakage-resilient fine-grained access control in fog computing Z Yu, MH Au, Q Xu, R Yang, J Han Future Generation Computer Systems 78, 763-777, 2018 | 61 | 2018 |
New empirical traceability analysis of CryptoNote-style blockchains Z Yu, MH Au, J Yu, R Yang, Q Xu, WF Lau International Conference on Financial Cryptography and Data Security, 133-149, 2019 | 53 | 2019 |
Decentralized blacklistable anonymous credentials with reputation R Yang, MH Au, Q Xu, Z Yu Computers & Security 85, 353-371, 2019 | 36 | 2019 |
Position paper on blockchain technology: Smart contract and applications W Meng, J Wang, X Wang, J Liu, Z Yu, J Li, Y Zhao, SSM Chow Network and System Security: 12th International Conference, NSS 2018, Hong …, 2018 | 36 | 2018 |
Collusion resistant watermarking schemes for cryptographic functionalities R Yang, MH Au, J Lai, Q Xu, Z Yu Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019 | 27 | 2019 |
Lattice-based techniques for accountable anonymity: composition of abstract stern’s protocols and weak PRF with efficient protocols from LWR R Yang, MH Au, J Lai, Q Xu, Z Yu Cryptology ePrint Archive, 2017 | 26 | 2017 |
Updatable hash proof system and its applications R Yang, Q Xu, Y Zhou, R Zhang, C Hu, Z Yu Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 22 | 2015 |
Collusion resistant watermarkable PRFs from standard assumptions R Yang, MH Au, Z Yu, Q Xu Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 18 | 2020 |
Lattice-based universal accumulator with nonmembership arguments Z Yu, MH Au, R Yang, J Lai, Q Xu Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018 | 15 | 2018 |
Leakage-resilient functional encryption via pair encodings Z Yu, MH Au, Q Xu, R Yang, J Han Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016 | 13 | 2016 |
Unforgeable watermarking schemes with public extraction R Yang, MH Au, J Lai, Q Xu, Z Yu Security and Cryptography for Networks: 11th International Conference, SCN …, 2018 | 11 | 2018 |
Public‐key encryption with keyword search secure against continual memory attacks C Hu, R Yang, P Liu, Z Yu, Y Zhou, Q Xu Security and Communication Networks 9 (11), 1613-1629, 2016 | 6 | 2016 |
Accountable anonymous credentials Z Yu, MH Au, R Yang Advances in Cyber Security: Principles, Techniques, and Applications, 49-68, 2019 | 5 | 2019 |
Achieving flexibility for ABE with outsourcing via proxy re-encryption Z Yu, MH Au, R Yang, J Lai, Q Xu Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 3 | 2018 |
Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption C Hu, Z Yu, R Yang, Q Xu, Y Zhou, Q Yuan International Journal of Embedded Systems 7 (3-4), 216-229, 2015 | 2 | 2015 |
Public-key watermarking schemes for pseudorandom functions R Yang, Z Yu, MH Au, W Susilo Annual International Cryptology Conference, 637-667, 2022 | 1 | 2022 |
Weak-key leakage resilient cryptography Z Yu, Q Xu, Y Zhou, C Hu, R Yang, G Fan Cryptology ePrint Archive, 2014 | 1 | 2014 |
Revocable ring signatures with CCA-anonymity from standard lattices J Wen, W Susilo, R Yang, Z Yu, H Zhang Computer Standards & Interfaces 91, 103893, 2025 | | 2025 |