Bo Yang

Orcid: 0000-0002-0419-1209

Affiliations:
  • Shaanxi Normal University, School of Computer Science, Xi'an, China
  • Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China
  • South China Argicultural University, Guangzhou, China (former)
  • Xidian University, National Key Laboratory of ISN at Xi'an, China (PhD 1999)


According to our database1, Bo Yang authored at least 155 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Anonymous and Efficient Certificate-Based Identity Authentication Protocol for VANET.
IEEE Internet Things J., April, 2024

An Efficient and Secure Lightweight Certificateless Hybrid Signcryption Scheme.
IEEE Internet Things J., April, 2024

An efficient identity authentication protocol with revocation, tracking and fine-grained access control for electronic medical system.
Comput. Stand. Interfaces, March, 2024

An efficient and secure certificateless aggregate signature scheme.
J. Syst. Archit., February, 2024

A Lightweight and Robust Multidimensional Data Aggregation Scheme for IoT.
IEEE Internet Things J., January, 2024

Lightweight and Decentralized Cross-Cloud Auditing With Data Recovery.
IEEE Trans. Serv. Comput., 2024

Efficient Revocable Attribute-Based Encryption with Data Integrity and Key Escrow-Free.
Inf., 2024

2023
An Efficient Certificateless Signature Scheme With Provably Security and Its Applications.
IEEE Syst. J., December, 2023

Leakage-resilient identity-based cryptography from minimal assumptions.
Des. Codes Cryptogr., November, 2023

A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks.
Comput. J., November, 2023

A redesigned secure and efficient data transaction protocol for mobile payment system.
J. Syst. Archit., October, 2023

An Efficient and Provably Secure Identity Authentication Scheme for VANET.
IEEE Internet Things J., October, 2023

An Efficient Identity Authentication Scheme With Dynamic Anonymity for VANETs.
IEEE Internet Things J., June, 2023

Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption.
Comput. J., April, 2023

An Efficient Identity Authentication Scheme With Provable Security and Anonymity for Mobile Edge Computing.
IEEE Syst. J., March, 2023

An Efficient Certificate-Based Aggregate Signature Scheme With Provable Security for Industrial Internet of Things.
IEEE Syst. J., March, 2023

ABCrowdMed: A Fine-Grained Worker Selection Scheme for Crowdsourcing Healthcare With Privacy-Preserving.
IEEE Trans. Serv. Comput., 2023

Multitask-Oriented Collaborative Crowdsensing Based on Reinforcement Learning and Blockchain for Intelligent Transportation System.
IEEE Trans. Ind. Informatics, 2023

Algebraic Signature-Based Public Data Integrity Batch Verification for Cloud-IoT.
IEEE Trans. Cloud Comput., 2023

Public-key encryption scheme with optimal continuous leakage resilience.
Inf. Process. Lett., 2023

An Anonymous and Efficient Multimessage and Multireceiver Certificateless Signcryption Scheme for VANET.
IEEE Internet Things J., 2023

An Anonymous and Revocable Authentication Protocol for Vehicle-to-Vehicle Communications.
IEEE Internet Things J., 2023

A direct construction of continuous leakage-resilient (H)IBE scheme with CCA security from dual system encryption.
Comput. Stand. Interfaces, 2023

Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing.
Comput. Stand. Interfaces, 2023

A Certificateless Aggregate Signature Scheme with Better Security.
Proceedings of the Provable and Practical Security, 2023

2022
Decentralized Self-Auditing Scheme With Errors Localization for Multi-Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2022

Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things.
IEEE Syst. J., 2022

Constructions of non-basic totally disjoint spectra plateaued functions for cryptographic applications.
J. Inf. Secur. Appl., 2022

An Efficient Verifiable Searchable Encryption Scheme With Aggregating Authorization for Blockchain-Enabled IoT.
IEEE Internet Things J., 2022

Practical algorithm substitution attack on extractable signatures.
Des. Codes Cryptogr., 2022

Constructing totally disjoint spectra plateaued functions and searching five-value spectrum functions in odd variables.
Discret. Appl. Math., 2022

Modular-based secret image sharing in Internet of Things: A global progressive-enabled approach.
Concurr. Comput. Pract. Exp., 2022

Continuous Leakage-Amplified Public-Key Encryption With CCA Security.
Comput. J., 2022

Continual Leakage-Resilient Hedged Public-Key Encryption.
Comput. J., 2022

Lightweight integrity auditing of edge data for distributed edge computing scenarios.
Ad Hoc Networks, 2022

Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing.
Proceedings of the Information Security - 25th International Conference, 2022

2021
PrivCrowd: A Secure Blockchain-Based Crowdsourcing Framework with Fine-Grained Worker Selection.
Wirel. Commun. Mob. Comput., 2021

Direct Anonymous Attestation With Optimal TPM Signing Efficiency.
IEEE Trans. Inf. Forensics Secur., 2021

Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing.
Theor. Comput. Sci., 2021

Blockchain-based searchable encryption with efficient result verification and fair payment.
J. Inf. Secur. Appl., 2021

A privacy-preserving public integrity check scheme for outsourced EHRs.
Inf. Sci., 2021

Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family.
Int. J. Found. Comput. Sci., 2021

Novel generic construction of leakage-resilient PKE scheme with CCA security.
Des. Codes Cryptogr., 2021

Robust and auditable distributed data storage with scalability in edge computing.
Ad Hoc Networks, 2021

2020
Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage.
IEEE Trans. Emerg. Top. Comput., 2020

Identity-based encryption with leakage-amplified chosen-ciphertext attacks security.
Theor. Comput. Sci., 2020

Novel updatable identity-based hash proof system and its applications.
Theor. Comput. Sci., 2020

Fully secure wicked identity-based encryption resilient to continual auxiliary- inputs leakage.
J. Inf. Secur. Appl., 2020

A generic construction of CCA-secure deterministic encryption.
Inf. Process. Lett., 2020

Practical continuous leakage-resilient CCA secure identity-based encryption.
Frontiers Comput. Sci., 2020

A construction of highly nonlinear Boolean functions with optimal algebraic immunity and low hardware implementation cost.
Discret. Appl. Math., 2020

Privacy preserving search services against online attack.
Comput. Secur., 2020

Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings.
Comput. J., 2020

Updatable Lossy Trapdoor Functions Under Consecutive Leakage.
Comput. J., 2020

Improvement of Attribute-Based Encryption Using Blakley Secret Sharing.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
The generic construction of continuous leakage-resilient identity-based cryptosystems.
Theor. Comput. Sci., 2019

An alternative approach to public cloud data auditing supporting data dynamics.
Soft Comput., 2019

Anonymous and Updatable Identity-Based Hash Proof System.
IEEE Syst. J., 2019

CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs.
Secur. Commun. Networks, 2019

An Approach Enabling Various Queries on Encrypted Industrial Data Stream.
Secur. Commun. Networks, 2019

A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage.
Frontiers Inf. Technol. Electron. Eng., 2019

CCA-Secure Deterministic Identity-Based Encryption Scheme.
J. Univers. Comput. Sci., 2019

Efficient attribute-based encryption with attribute revocation for assured data deletion.
Inf. Sci., 2019

Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model.
Int. J. Found. Comput. Sci., 2019

Identity-based encryption resilient to continuous key leakage.
IET Inf. Secur., 2019

Continuous leakage-resilient identity-based encryption with leakage amplification.
Des. Codes Cryptogr., 2019

Continuous Leakage-Resilient Identity-Based Encryption with Tight Security.
Comput. J., 2019

Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications.
Comput. J., 2019

Provably Secure Proactive Secret Sharing Without the Adjacent Assumption.
Proceedings of the Provable Security, 2019

Provably Secure Group Authentication in the Asynchronous Communication Model.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

2018
Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications.
IEEE Trans. Ind. Informatics, 2018

A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing.
Secur. Commun. Networks, 2018

Aleakage-resilient certificateless public key encryption scheme with CCA2 security.
Frontiers Inf. Technol. Electron. Eng., 2018

Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes.
J. Comput. Sci. Technol., 2018

Witness-based searchable encryption.
Inf. Sci., 2018

Secure rational numbers equivalence test based on threshold cryptosystem with rational numbers.
Inf. Sci., 2018

Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing.
Inf. Process. Lett., 2018

Direct Anonymous Attestation with Optimal TPM Signing Efficiency.
IACR Cryptol. ePrint Arch., 2018

Privacy preserving cloud data auditing with efficient key update.
Future Gener. Comput. Syst., 2018

Content Protection in Named Data Networking: Challenges and Potential Solutions.
IEEE Commun. Mag., 2018

Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles.
Comput. J., 2018

Structural Key Recovery of Simple Matrix Encryption Scheme Family.
Comput. J., 2018

Novel Smooth Hash Proof Systems Based on Lattices.
Comput. J., 2018

Continuous leakage-resilient access control for wireless sensor networks.
Ad Hoc Networks, 2018

Secure Pub-Sub: Blockchain-Based Fair Payment With Reputation for Reliable Cyber Physical Systems.
IEEE Access, 2018

An Efficient and Provably Secure Private Polynomial Evaluation Scheme.
Proceedings of the Information Security Practice and Experience, 2018

Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Continuous leakage-resilient certificateless public key encryption with CCA security.
Knowl. Based Syst., 2017

Low-computation certificateless hybrid signcryption scheme.
Frontiers Inf. Technol. Electron. Eng., 2017

Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security.
Comput. J., 2017

Pairing-Free and Secure Certificateless Signcryption Scheme.
Comput. J., 2017

Direct constructions and proofs for CCA secure (LR)IBE with dual system encryption.
Sci. China Inf. Sci., 2017

2016
CCA2 secure public-key encryption scheme tolerating continual leakage attacks.
Secur. Commun. Networks, 2016

Continual key leakage tolerant encryption from extensible set delegation.
Secur. Commun. Networks, 2016

AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version).
IACR Cryptol. ePrint Arch., 2016

Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing.
Discret. Appl. Math., 2016

An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing.
Concurr. Comput. Pract. Exp., 2016

AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash.
Proceedings of the Information Security - 19th International Conference, 2016

2015
Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization.
IEEE Trans. Inf. Forensics Secur., 2015

Private set intersection via public key encryption with keywords search.
Secur. Commun. Networks, 2015

On security against the server in designated tester public key encryption with keyword search.
Inf. Process. Lett., 2015

Provably Secure Partially Blind Signature Scheme Based on Quadratic Residue.
Int. J. Netw. Secur., 2015

Proof of retrievability with efficient verification.
Int. J. Embed. Syst., 2015

DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone.
IACR Cryptol. ePrint Arch., 2015

Public Key Encryption with Delegated Equality Test in a Multi-User Setting.
Comput. J., 2015

2014
Unbounded anonymous hierarchical IBE with continual-key-leakage tolerance.
Secur. Commun. Networks, 2014

PPGJ: A privacy-preserving general join for outsourced encrypted database.
Secur. Commun. Networks, 2014

Effective Error-Tolerant Keyword Search for Secure Cloud Computing.
J. Comput. Sci. Technol., 2014

Anonymous spatial encryption under affine space delegation functionality with full security.
Inf. Sci., 2014

CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction.
Int. J. Netw. Secur., 2014

Fully secure constructions of spatial encryption with vector privacy.
Int. J. Commun. Syst., 2014

Anonymous encryption with partial-order subset delegation and its application in privacy email systems.
IET Inf. Secur., 2014

2013
Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures.
IEEE Trans. Computers, 2013

Efficient and adaptively secure broadcast encryption systems.
Secur. Commun. Networks, 2013

A Secure Scalar Product Protocol Against Malicious Adversaries.
J. Comput. Sci. Technol., 2013

A Secure Scalar Product Protocol and Its Applications to Computational Geometry.
J. Comput., 2013

A novel construction of SDVS with secure disavowability.
Clust. Comput., 2013

Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate.
Comput. J., 2013

Private Set Intersection via Public Key Encryption with Multiple Keywords Search.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
Reconciling and improving of multi-receiver signcryption protocols with threshold decryption.
Secur. Commun. Networks, 2012

Improved certificateless signature scheme provably secure in the standard model.
IET Inf. Secur., 2012

Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-delegatability and Non-transferability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

LR-UESDE: A Continual-Leakage Resilient Encryption with Unbounded Extensible Set Delegation.
Proceedings of the Provable Security - 6th International Conference, 2012

Multi-Committer Threshold Commitment Scheme from Lattice.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012

A Strong Designated Verifier Signature Scheme with Secure Disavowability.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Privacy-Preserving Noisy Keyword Search in Cloud Computing.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
Group-oriented setting's multisigncryption scheme with threshold designcryption.
Inf. Sci., 2011

Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor.
Int. J. Netw. Secur., 2011

Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings.
Int. J. Netw. Secur., 2011

Efficient Multicast Key Distribution Using HOWF-based Access Control Structures.
IACR Cryptol. ePrint Arch., 2011

Improvement of a proxy multi-signature scheme without random oracles.
Comput. Commun., 2011

Anonymous Encryption with Partial-Order Subset Delegation Functionality.
Proceedings of the Provable Security - 5th International Conference, 2011

Dual-Verifiers DVS with Message Recovery for Tolerant Routing in Wireless Sensor Networks.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011

An Efficient Construction of Time-Selective Convertible Undeniable Signatures.
Proceedings of the Information Security, 14th International Conference, 2011

2010
A Classified Credential Selection Scheme with Disclosure-minimizing Privacy.
J. Digit. Content Technol. its Appl., 2010

Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010

Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010

2009
Ordered Semiring-based Trust Establish Model with Risk Evaluating.
Int. J. Netw. Secur., 2009

Analysis and Enhance of Anonymous Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2009

Identity based signcryption scheme without random oracles.
Comput. Stand. Interfaces, 2009

Analysis and Improvement of an ID-Based Anonymous Signcryption Model.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009

Fuzzy Identity Based Encryption Scheme with Some Assigned Attributes.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem.
Proceedings of the Provable Security, Second International Conference, 2008

Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy.
Proceedings of the Intelligence and Security Informatics, 2008

Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

2007
A Traitor Tracing Scheme Based on the RSA System.
Int. J. Netw. Secur., 2007

Using Trust Metric to Detect Malicious Behaviors in WSNs.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A provably secure ID-based mediated signcryption scheme.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

ID-based threshold signature and mediated signature schemes.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Trust-based Distributed Authentication Middleware in Ubiquitous Mobile Environments.
Proceedings of the Third International Conference on Natural Computation, 2007

Efficient Identity-Based Signcryption Scheme for Multiple Receivers.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Provably Secure Identity-Based Threshold Unsigncryption Scheme.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
An Efficient Anonymous Fingerprinting Protocol.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2003
Anonymous and dynamic conference-key distribution system.
Proceedings of the IEEE 14th International Symposium on Personal, 2003


  Loading...