Efficient lattice-based zero-knowledge arguments with standard soundness: construction and applications R Yang, MH Au, Z Zhang, Q Xu, Z Yu, W Whyte Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 103 | 2019 |
Position based cryptography with location privacy: A step for fog computing R Yang, Q Xu, MH Au, Z Yu, H Wang, L Zhou Future Generation Computer Systems 78, 799-806, 2018 | 72 | 2018 |
Towards leakage-resilient fine-grained access control in fog computing Z Yu, MH Au, Q Xu, R Yang, J Han Future Generation Computer Systems 78, 763-777, 2018 | 61 | 2018 |
New empirical traceability analysis of CryptoNote-style blockchains Z Yu, MH Au, J Yu, R Yang, Q Xu, WF Lau International Conference on Financial Cryptography and Data Security, 133-149, 2019 | 52 | 2019 |
Decentralized blacklistable anonymous credentials with reputation R Yang, MH Au, Q Xu, Z Yu Computers & Security 85, 353-371, 2019 | 34 | 2019 |
Lattice-based techniques for accountable anonymity: composition of abstract stern’s protocols and weak PRF with efficient protocols from LWR R Yang, MH Au, J Lai, Q Xu, Z Yu Cryptology ePrint Archive, 2017 | 29* | 2017 |
Collusion resistant watermarking schemes for cryptographic functionalities R Yang, MH Au, J Lai, Q Xu, Z Yu Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019 | 26 | 2019 |
Updatable hash proof system and its applications R Yang, Q Xu, Y Zhou, R Zhang, C Hu, Z Yu Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 22 | 2015 |
Collusion resistant watermarkable PRFs from standard assumptions R Yang, MH Au, Z Yu, Q Xu Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 17 | 2020 |
Lattice-based universal accumulator with nonmembership arguments Z Yu, MH Au, R Yang, J Lai, Q Xu Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018 | 14 | 2018 |
Leakage-resilient functional encryption via pair encodings Z Yu, MH Au, Q Xu, R Yang, J Han Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016 | 13 | 2016 |
Practical range proof for cryptocurrency monero with provable security K Li, R Yang, MH Au, Q Xu Information and Communications Security: 19th International Conference …, 2018 | 12 | 2018 |
Unforgeable watermarking schemes with public extraction R Yang, MH Au, J Lai, Q Xu, Z Yu Security and Cryptography for Networks: 11th International Conference, SCN …, 2018 | 11 | 2018 |
Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting R Yang, J Lai, Z Huang, MH Au, Q Xu, W Susilo Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020 | 8 | 2020 |
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience C Hu, R Yang, P Liu, T Li, F Kong The Journal of Supercomputing 75, 3099-3122, 2019 | 7 | 2019 |
Public-key encryption with keyword search via obfuscation C Hu, P Liu, R Yang, Y Xu IEEE Access 7, 37394-37405, 2019 | 6 | 2019 |
Public‐key encryption with keyword search secure against continual memory attacks C Hu, R Yang, P Liu, Z Yu, Y Zhou, Q Xu Security and Communication Networks 9 (11), 1613-1629, 2016 | 6 | 2016 |
Simulation-based bi-selective opening security for public key encryption J Lai, R Yang, Z Huang, J Weng International Conference on the Theory and Application of Cryptology and …, 2021 | 5 | 2021 |
Accountable anonymous credentials Z Yu, MH Au, R Yang Advances in Cyber Security: Principles, Techniques, and Applications, 49-68, 2019 | 5 | 2019 |
Verifiable public-key encryption with keyword search secure against continual memory attacks C Hu, Z Li, P Liu, R Yang, S Guo, H Zhang Mobile Networks and Applications, 1-11, 2021 | 4 | 2021 |