关注
Rupeng Yang
Rupeng Yang
在 uow.edu.au 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Efficient lattice-based zero-knowledge arguments with standard soundness: construction and applications
R Yang, MH Au, Z Zhang, Q Xu, Z Yu, W Whyte
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
1032019
Position based cryptography with location privacy: A step for fog computing
R Yang, Q Xu, MH Au, Z Yu, H Wang, L Zhou
Future Generation Computer Systems 78, 799-806, 2018
722018
Towards leakage-resilient fine-grained access control in fog computing
Z Yu, MH Au, Q Xu, R Yang, J Han
Future Generation Computer Systems 78, 763-777, 2018
612018
New empirical traceability analysis of CryptoNote-style blockchains
Z Yu, MH Au, J Yu, R Yang, Q Xu, WF Lau
International Conference on Financial Cryptography and Data Security, 133-149, 2019
522019
Decentralized blacklistable anonymous credentials with reputation
R Yang, MH Au, Q Xu, Z Yu
Computers & Security 85, 353-371, 2019
342019
Lattice-based techniques for accountable anonymity: composition of abstract stern’s protocols and weak PRF with efficient protocols from LWR
R Yang, MH Au, J Lai, Q Xu, Z Yu
Cryptology ePrint Archive, 2017
29*2017
Collusion resistant watermarking schemes for cryptographic functionalities
R Yang, MH Au, J Lai, Q Xu, Z Yu
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
262019
Updatable hash proof system and its applications
R Yang, Q Xu, Y Zhou, R Zhang, C Hu, Z Yu
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
222015
Collusion resistant watermarkable PRFs from standard assumptions
R Yang, MH Au, Z Yu, Q Xu
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
172020
Lattice-based universal accumulator with nonmembership arguments
Z Yu, MH Au, R Yang, J Lai, Q Xu
Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018
142018
Leakage-resilient functional encryption via pair encodings
Z Yu, MH Au, Q Xu, R Yang, J Han
Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016
132016
Practical range proof for cryptocurrency monero with provable security
K Li, R Yang, MH Au, Q Xu
Information and Communications Security: 19th International Conference …, 2018
122018
Unforgeable watermarking schemes with public extraction
R Yang, MH Au, J Lai, Q Xu, Z Yu
Security and Cryptography for Networks: 11th International Conference, SCN …, 2018
112018
Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting
R Yang, J Lai, Z Huang, MH Au, Q Xu, W Susilo
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
82020
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
C Hu, R Yang, P Liu, T Li, F Kong
The Journal of Supercomputing 75, 3099-3122, 2019
72019
Public-key encryption with keyword search via obfuscation
C Hu, P Liu, R Yang, Y Xu
IEEE Access 7, 37394-37405, 2019
62019
Public‐key encryption with keyword search secure against continual memory attacks
C Hu, R Yang, P Liu, Z Yu, Y Zhou, Q Xu
Security and Communication Networks 9 (11), 1613-1629, 2016
62016
Simulation-based bi-selective opening security for public key encryption
J Lai, R Yang, Z Huang, J Weng
International Conference on the Theory and Application of Cryptology and …, 2021
52021
Accountable anonymous credentials
Z Yu, MH Au, R Yang
Advances in Cyber Security: Principles, Techniques, and Applications, 49-68, 2019
52019
Verifiable public-key encryption with keyword search secure against continual memory attacks
C Hu, Z Li, P Liu, R Yang, S Guo, H Zhang
Mobile Networks and Applications, 1-11, 2021
42021
系统目前无法执行此操作,请稍后再试。
文章 1–20