Guomin Yang

Orcid: 0000-0002-4949-7738

According to our database1, Guomin Yang authored at least 191 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
OpenSE: Efficient Verifiable Searchable Encryption With Access and Search Pattern Hidden for Cloud-IoT.
IEEE Internet Things J., April, 2024

Toward Fine-Grained Task Allocation With Bilateral Access Control for Intelligent Transportation Systems.
IEEE Internet Things J., April, 2024

Blockchain-Based Dynamic Time-Encapsulated Data Auditing for Outsourcing Storage.
IEEE Trans. Inf. Forensics Secur., 2024

STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area Network.
IEEE Trans. Inf. Forensics Secur., 2024

2023
PPDF: A Privacy-Preserving Cloud-Based Data Distribution System With Filtering.
IEEE Trans. Serv. Comput., 2023

Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits.
IEEE Trans. Inf. Forensics Secur., 2023

Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devices.
IEEE Trans. Dependable Secur. Comput., 2023

Balancing Privacy and Flexibility of Cloud-Based Personal Health Records Sharing System.
IEEE Trans. Cloud Comput., 2023

A Survey of Secure Computation Using Trusted Execution Environments.
CoRR, 2023

A Tightly Secure ID-Based Signature Scheme Under DL Assumption in AGM.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
Message-Locked Searchable Encryption: A New Versatile Tool for Secure Cloud Storage.
IEEE Trans. Serv. Comput., 2022

Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics.
IEEE Trans. Dependable Secur. Comput., 2022

Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers.
IEEE Trans. Dependable Secur. Comput., 2022

Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key.
IEEE Trans. Dependable Secur. Comput., 2022

A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT.
IEEE Trans. Dependable Secur. Comput., 2022

Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts.
Inf. Sci., 2022

Secure Hierarchical Deterministic Wallet Supporting Stealth Address.
IACR Cryptol. ePrint Arch., 2022

Multimodal Private Signatures.
IACR Cryptol. ePrint Arch., 2022

Generic server-aided secure multi-party computation in cloud computing.
Comput. Stand. Interfaces, 2022

Efficient maliciously secure two-party mixed-protocol framework for data-driven computation tasks.
Comput. Stand. Interfaces, 2022

Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security.
Comput. Stand. Interfaces, 2022

2021
Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2021

An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-Things.
IEEE Trans. Ind. Informatics, 2021

Privacy-Preserving Proof of Storage for the Pay-As-You-Go Business Model.
IEEE Trans. Dependable Secur. Comput., 2021

Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2021

Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability.
IEEE Trans. Dependable Secur. Comput., 2021

Privacy-preserving voluntary-tallying leader election for internet of things.
Inf. Sci., 2021

Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved.
IACR Cryptol. ePrint Arch., 2021

Divide and capture: An improved cryptanalysis of the encryption standard algorithm RSA.
Comput. Stand. Interfaces, 2021

Unlinkable and Revocable Secret Handshake.
Comput. J., 2021

Functional signatures: new definition and constructions.
Sci. China Inf. Sci., 2021

Public Key Encryption with Fuzzy Matching.
Proceedings of the Provable and Practical Security, 2021

SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments.
Proceedings of the Computer Security - ESORICS 2021, 2021

Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Broadcast Authenticated Encryption with Keyword Search.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

Concise Mercurial Subvector Commitments: Definitions and Constructions.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Energy-Efficient Distance-Bounding with Residual Charge Computation.
IEEE Trans. Emerg. Top. Comput., 2020

Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage.
IEEE Trans. Emerg. Top. Comput., 2020

Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices.
IEEE Trans. Dependable Secur. Comput., 2020

Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2020

HUCDO: A Hybrid User-centric Data Outsourcing Scheme.
ACM Trans. Cyber Phys. Syst., 2020

A generalised bound for the Wiener attack on RSA.
J. Inf. Secur. Appl., 2020

Privacy-enhanced remote data integrity checking with updatable timestamp.
Inf. Sci., 2020

Hierarchical Identity-Based Signature in Polynomial Rings.
Comput. J., 2020

On the Security of LWE Cryptosystem against Subversion Attacks.
Comput. J., 2020

A New Construction for Linkable Secret Handshake.
Comput. J., 2020

Attribute-Based Equality Test Over Encrypted Data Without Random Oracles.
IEEE Access, 2020

A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Building Redactable Consortium Blockchain for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2019

Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies.
IEEE Netw., 2019

DABKE: Secure deniable attribute-based key exchange framework.
J. Comput. Secur., 2019

Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation.
Inf. Sci., 2019

Designated-server identity-based authenticated encryption with keyword search for encrypted emails.
Inf. Sci., 2019

Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters.
Inf. Sci., 2019

ESDRA: An Efficient and Secure Distributed Remote Attestation Scheme for IoT Swarms.
IEEE Internet Things J., 2019

Preface: Special Issue Cryptography and Provable Security.
Int. J. Found. Comput. Sci., 2019

Lattice-Based Remote User Authentication from Reusable Fuzzy Signature.
IACR Cryptol. ePrint Arch., 2019

Puncturable Proxy Re-Encryption supporting to Group Messaging Service.
IACR Cryptol. ePrint Arch., 2019

DDH-based Multisignatures with Public Key Aggregation.
IACR Cryptol. ePrint Arch., 2019

A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance.
Future Gener. Comput. Syst., 2019

Strongly leakage resilient authenticated key exchange, revisited.
Des. Codes Cryptogr., 2019

A Blockchain-based Self-tallying Voting Scheme in Decentralized IoT.
CoRR, 2019

Public Key Authenticated Encryption With Designated Equality Test and its Applications in Diagnostic Related Groups.
IEEE Access, 2019

Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy.
Proceedings of the Security and Privacy in Communication Networks, 2019

A New Multisignature Scheme with Public Key Aggregation for Blockchain.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search.
Proceedings of the Provable Security, 2019

A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses.
Proceedings of the Computer Security - ESORICS 2019, 2019

The Wiener Attack on RSA Revisited: A Quest for the Exact Bound.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

Location Based Encryption.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Strong Identity-Based Proxy Signature Schemes, Revisited.
Wirel. Commun. Mob. Comput., 2018

Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2018

Cooperative Secret Sharing Using QR Codes and Symmetric Keys.
Symmetry, 2018

A New Revocable and Re-Delegable Proxy Signature and Its Application.
J. Comput. Sci. Technol., 2018

Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes.
Inf. Sci., 2018

Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.
IACR Cryptol. ePrint Arch., 2018

Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification.
IACR Cryptol. ePrint Arch., 2018

Exploring relationship between indistinguishability-based and unpredictability-based RFID privacy models.
Future Gener. Comput. Syst., 2018

Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server.
Clust. Comput., 2018

Criteria-Based Encryption.
Comput. J., 2018

Authorized Function Homomorphic Signature.
Comput. J., 2018

A Privacy-Preserving Fog Computing Framework for Vehicular Crowdsensing Networks.
IEEE Access, 2018

Efficient Attribute-Based Encryption with Blackbox Traceability.
Proceedings of the Provable Security, 2018

DSH: Deniable Secret Handshake Framework.
Proceedings of the Information Security Practice and Experience, 2018

Efficient Traceable Oblivious Transfer and Its Applications.
Proceedings of the Information Security Practice and Experience, 2018

Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls - Secure and Efficient Fine-Grained Access Control on Corrupted Machines.
Proceedings of the Computer Security, 2018

Outsourced Ciphertext-Policy Attribute-Based Encryption with Equality Test.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Designated Verifier Proxy Re-signature for Deniable and Anonymous Wireless Communications.
Wirel. Pers. Commun., 2017

Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting.
Wirel. Pers. Commun., 2017

EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2017

Efficient E-coupon systems with strong user privacy.
Telecommun. Syst., 2017

RFID Ownership Transfer with Positive Secrecy Capacity Channels.
Sensors, 2017

Sequence aware functional encryption and its application in searchable encryption.
J. Inf. Secur. Appl., 2017

One-Round Attribute-Based Key Exchange in the Multi-Party Setting.
Int. J. Found. Comput. Sci., 2017

A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange.
Int. J. Comput. Math., 2017

A new public remote integrity checking scheme with user and data privacy.
Int. J. Appl. Cryptogr., 2017

Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample.
IACR Cryptol. ePrint Arch., 2017

A note on the strong authenticated key exchange with auxiliary inputs.
Des. Codes Cryptogr., 2017

Strong authenticated key exchange with auxiliary inputs.
Des. Codes Cryptogr., 2017

Deniable Ring Authentication Based on Projective Hash Functions.
Proceedings of the Provable Security, 2017

Group-Based Source-Destination Verifiable Encryption with Blacklist Checking.
Proceedings of the Information Security Practice and Experience, 2017

Cooperative Learning in Information Security Education: Teaching Secret Sharing Concepts.
Proceedings of the Cooperative Design, Visualization, and Engineering, 2017

Hierarchical Functional Encryption for Linear Transformations.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

Mergeable and Revocable Identity-Based Encryption.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

Privacy-Preserving k-time Authenticated Secret Handshakes.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Comments on "Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks".
IEEE Trans. Wirel. Commun., 2016

Authenticated Key Exchange Protocols for Parallel Network File Systems.
IEEE Trans. Parallel Distributed Syst., 2016

Comments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification".
IEEE Trans. Inf. Forensics Secur., 2016

Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions.
IEEE Trans. Inf. Forensics Secur., 2016

Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2016

Server-Aided Public Key Encryption With Keyword Search.
IEEE Trans. Inf. Forensics Secur., 2016

Privacy-preserving grouping proof with key exchange in the multiple-party setting.
Secur. Commun. Networks, 2016

Message from the Guest Editors.
Int. J. Inf. Sec., 2016

Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction.
IACR Cryptol. ePrint Arch., 2016

Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
IACR Cryptol. ePrint Arch., 2016

Strongly Leakage-Resilient Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2016

Anonymous Proxy Signature with Hierarchical Traceability.
Comput. J., 2016

Authentication and Transaction Verification Using QR Codes with a Mobile Device.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

One-Round Attribute-Based Key Exchange in the Multi-party Setting.
Proceedings of the Provable Security, 2016

A Privacy Preserving Source Verifiable Encryption Scheme.
Proceedings of the Information Security Practice and Experience, 2016

Achieving IND-CCA Security for Functional Encryption for Inner Products.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Linear Encryption with Keyword Search.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Proxy Signature with Revocation.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Edit Distance Based Encryption and Its Application.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

One-Round Strong Oblivious Signature-Based Envelope.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Analysis and Improvement on a Biometric-Based Remote User Authentication Scheme Using Smart Cards.
Wirel. Pers. Commun., 2015

BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication.
IEEE Trans. Inf. Forensics Secur., 2015

Ambiguous optimistic fair exchange: Definition and constructions.
Theor. Comput. Sci., 2015

A Summary of the Special Issue "Cybersecurity and Cryptography".
Inf., 2015

A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing.
Future Gener. Comput. Syst., 2015

On Indistinguishability in Remote Data Integrity Checking.
Comput. J., 2015

Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key.
Proceedings of the Computer Security - ESORICS 2015, 2015

Threshold Broadcast Encryption with Keyword Search.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

A New Public Remote Integrity Checking Scheme with User Privacy.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

A New General Framework for Secure Public Key Encryption with Keyword Search.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
Cross-Domain Password-Based Authenticated Key Exchange Revisited.
ACM Trans. Inf. Syst. Secur., 2014

A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
IEEE Trans. Inf. Forensics Secur., 2014

Identity based identification from algebraic coding theory.
Theor. Comput. Sci., 2014

A robust smart card-based anonymous user authentication protocol for wireless communications.
Secur. Commun. Networks, 2014

Efficient Hidden Vector Encryption with Constant-Size Ciphertext.
IACR Cryptol. ePrint Arch., 2014

On the security of auditing mechanisms for secure cloud storage.
Future Gener. Comput. Syst., 2014

(Strong) multidesignated verifiers signatures secure against rogue key attack.
Concurr. Comput. Pract. Exp., 2014

Anonymous Proxy Signature with Restricted Traceability.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Attribute-Based Signing Right Delegation.
Proceedings of the Network and System Security - 8th International Conference, 2014

An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing.
Proceedings of the Information Security Practice and Experience, 2014

An Efficient Privacy-Preserving E-coupon System.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

POSTER: Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear Assumption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2013

Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model.
IACR Cryptol. ePrint Arch., 2013

k-time Proxy Signature: Formal Definition and Efficient Construction.
Proceedings of the Provable Security - 7th International Conference, 2013

A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation.
Proceedings of the Network and System Security - 7th International Conference, 2013

A New Unpredictability-Based RFID Privacy Model.
Proceedings of the Network and System Security - 7th International Conference, 2013

Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model.
Proceedings of the Information Security Practice and Experience, 2013

2012
A new efficient optimistic fair exchange protocol without random oracles.
Int. J. Inf. Sec., 2012

(Strong) Multi-Designated Verifiers Signatures Secure against Rogue Key Attack.
Proceedings of the Network and System Security - 6th International Conference, 2012

2011
Comments on "An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks".
IEEE Trans. Wirel. Commun., 2011

Certificateless cryptography with KGC trust level 3.
Theor. Comput. Sci., 2011

Certificateless public key encryption: A new generic construction and two pairing-free schemes.
Theor. Comput. Sci., 2011

Identity-based strong designated verifier signature revisited.
J. Syst. Softw., 2011

Efficient strong designated verifier signature schemes without random oracle or with non-delegatability.
Int. J. Inf. Sec., 2011

Authenticated Key Exchange under Bad Randomness.
IACR Cryptol. ePrint Arch., 2011

Heterogeneous Signcryption with Key Privacy.
Comput. J., 2011

Strongly secure certificateless key exchange without pairing.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Universal authentication protocols for anonymous wireless communications.
IEEE Trans. Wirel. Commun., 2010

Comments on "Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting".
IEEE Trans. Inf. Theory, 2010

An efficient signcryption scheme with key privacy and its extension to ring signcryption.
J. Comput. Secur., 2010

Probabilistic Public Key Encryption with Equality Test.
Proceedings of the Topics in Cryptology, 2010

Dynamic Group Key Exchange Revisited.
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010

2009
Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability.
IACR Cryptol. ePrint Arch., 2009

Efficient Non-interactive Range Proof.
Proceedings of the Computing and Combinatorics, 15th Annual International Conference, 2009

2008
A new framework for the design and analysis of identity-based identification schemes.
Theor. Comput. Sci., 2008

Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension.
J. Univers. Comput. Sci., 2008

Two-factor mutual authentication based on smart cards and passwords.
J. Comput. Syst. Sci., 2008

Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles.
Proceedings of the Topics in Cryptology, 2008

Ambiguous Optimistic Fair Exchange.
Proceedings of the Advances in Cryptology, 2008

Traceable and Retrievable Identity-Based Encryption.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Anonymous and Authenticated Key Exchange for Roaming Networks.
IEEE Trans. Wirel. Commun., 2007

An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices.
Theor. Comput. Sci., 2007

Wideband 3/4 Elliptical Ring Patch for Millimeter-Wave Communication.
IEICE Trans. Commun., 2007

A New Security Definition for Public Key Encryption Schemes and Its Applications.
IACR Cryptol. ePrint Arch., 2007

Time Capsule Signature: Efficient and Provably Secure Constructions.
IACR Cryptol. ePrint Arch., 2007

An Efficient Signcryption Scheme with Key Privacy.
Proceedings of the Public Key Infrastructure, 2007

A More Natural Way to Construct Identity-Based Identification Schemes.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Formal Analysis and Systematic Construction of Two-factor Authentication Scheme.
IACR Cryptol. ePrint Arch., 2006

Malicious KGC Attacks in Certificateless Cryptography.
IACR Cryptol. ePrint Arch., 2006

Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006

2005
Anonymous Signature Schemes.
IACR Cryptol. ePrint Arch., 2005

Analysis and Improvement of a Signcryption Scheme with Key Privacy.
Proceedings of the Information Security, 8th International Conference, 2005

Efficient Anonymous Roaming and Its Security Analysis.
Proceedings of the Applied Cryptography and Network Security, 2005

Deposit-Case Attack Against Secure Roaming.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005


  Loading...