Guomin Yang

According to our database1, Guomin Yang authored at least 151 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Building Redactable Consortium Blockchain for Industrial Internet-of-Things.
IEEE Trans. Industrial Informatics, 2019

DABKE: Secure deniable attribute-based key exchange framework.
Journal of Computer Security, 2019

Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation.
Inf. Sci., 2019

Designated-server identity-based authenticated encryption with keyword search for encrypted emails.
Inf. Sci., 2019

Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters.
Inf. Sci., 2019

Preface: Special Issue Cryptography and Provable Security.
Int. J. Found. Comput. Sci., 2019

Lattice-Based Remote User Authentication from Reusable Fuzzy Signature.
IACR Cryptology ePrint Archive, 2019

DDH-based Multisignatures with Public Key Aggregation.
IACR Cryptology ePrint Archive, 2019

A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance.
Future Generation Comp. Syst., 2019

A Blockchain-based Self-tallying Voting Scheme in Decentralized IoT.
CoRR, 2019

Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification.
Comput. J., 2019

Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search.
Proceedings of the Provable Security, 2019

Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Puncturable Proxy Re-Encryption Supporting to Group Messaging Service.
Proceedings of the Computer Security - ESORICS 2019, 2019

A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses.
Proceedings of the Computer Security - ESORICS 2019, 2019

The Wiener Attack on RSA Revisited: A Quest for the Exact Bound.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

Location Based Encryption.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Strong Identity-Based Proxy Signature Schemes, Revisited.
Wireless Communications and Mobile Computing, 2018

Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud.
IEEE Trans. Information Forensics and Security, 2018

Cooperative Secret Sharing Using QR Codes and Symmetric Keys.
Symmetry, 2018

A New Revocable and Re-Delegable Proxy Signature and Its Application.
J. Comput. Sci. Technol., 2018

Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes.
Inf. Sci., 2018

Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.
IACR Cryptology ePrint Archive, 2018

Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification.
IACR Cryptology ePrint Archive, 2018

Exploring relationship between indistinguishability-based and unpredictability-based RFID privacy models.
Future Generation Comp. Syst., 2018

Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server.
Cluster Computing, 2018

Criteria-Based Encryption.
Comput. J., 2018

Authorized Function Homomorphic Signature.
Comput. J., 2018

A Privacy-Preserving Fog Computing Framework for Vehicular Crowdsensing Networks.
IEEE Access, 2018

Efficient Attribute-Based Encryption with Blackbox Traceability.
Proceedings of the Provable Security, 2018

DSH: Deniable Secret Handshake Framework.
Proceedings of the Information Security Practice and Experience, 2018

Efficient Traceable Oblivious Transfer and Its Applications.
Proceedings of the Information Security Practice and Experience, 2018

Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls - Secure and Efficient Fine-Grained Access Control on Corrupted Machines.
Proceedings of the Computer Security, 2018

Outsourced Ciphertext-Policy Attribute-Based Encryption with Equality Test.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Designated Verifier Proxy Re-signature for Deniable and Anonymous Wireless Communications.
Wireless Personal Communications, 2017

Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting.
Wireless Personal Communications, 2017

EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud.
IEEE Trans. Information Forensics and Security, 2017

Efficient E-coupon systems with strong user privacy.
Telecommunication Systems, 2017

RFID Ownership Transfer with Positive Secrecy Capacity Channels.
Sensors, 2017

Sequence aware functional encryption and its application in searchable encryption.
J. Inf. Sec. Appl., 2017

One-Round Attribute-Based Key Exchange in the Multi-Party Setting.
Int. J. Found. Comput. Sci., 2017

A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange.
Int. J. Comput. Math., 2017

A new public remote integrity checking scheme with user and data privacy.
IJACT, 2017

Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample.
IACR Cryptology ePrint Archive, 2017

Strong Authenticated Key Exchange with Auxiliary Inputs.
IACR Cryptology ePrint Archive, 2017

A note on the strong authenticated key exchange with auxiliary inputs.
Des. Codes Cryptogr., 2017

Strong authenticated key exchange with auxiliary inputs.
Des. Codes Cryptogr., 2017

Deniable Ring Authentication Based on Projective Hash Functions.
Proceedings of the Provable Security, 2017

Group-Based Source-Destination Verifiable Encryption with Blacklist Checking.
Proceedings of the Information Security Practice and Experience, 2017

Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Cooperative Learning in Information Security Education: Teaching Secret Sharing Concepts.
Proceedings of the Cooperative Design, Visualization, and Engineering, 2017

Hierarchical Functional Encryption for Linear Transformations.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

Mergeable and Revocable Identity-Based Encryption.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

Privacy-Preserving k-time Authenticated Secret Handshakes.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Comments on "Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks".
IEEE Trans. Wireless Communications, 2016

Authenticated Key Exchange Protocols for Parallel Network File Systems.
IEEE Trans. Parallel Distrib. Syst., 2016

Comments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification".
IEEE Trans. Information Forensics and Security, 2016

Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions.
IEEE Trans. Information Forensics and Security, 2016

Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage.
IEEE Trans. Information Forensics and Security, 2016

Server-Aided Public Key Encryption With Keyword Search.
IEEE Trans. Information Forensics and Security, 2016

Privacy-preserving grouping proof with key exchange in the multiple-party setting.
Security and Communication Networks, 2016

Message from the Guest Editors.
Int. J. Inf. Sec., 2016

Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction.
IACR Cryptology ePrint Archive, 2016

Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
IACR Cryptology ePrint Archive, 2016

Strongly Leakage-Resilient Authenticated Key Exchange.
IACR Cryptology ePrint Archive, 2016

Anonymous Proxy Signature with Hierarchical Traceability.
Comput. J., 2016

Authentication and Transaction Verification Using QR Codes with a Mobile Device.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

One-Round Attribute-Based Key Exchange in the Multi-party Setting.
Proceedings of the Provable Security, 2016

A Privacy Preserving Source Verifiable Encryption Scheme.
Proceedings of the Information Security Practice and Experience, 2016

Strongly Leakage-Resilient Authenticated Key Exchange.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

Achieving IND-CCA Security for Functional Encryption for Inner Products.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Linear Encryption with Keyword Search.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Proxy Signature with Revocation.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Edit Distance Based Encryption and Its Application.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

One-Round Strong Oblivious Signature-Based Envelope.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Analysis and Improvement on a Biometric-Based Remote User Authentication Scheme Using Smart Cards.
Wireless Personal Communications, 2015

BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication.
IEEE Trans. Information Forensics and Security, 2015

Ambiguous optimistic fair exchange: Definition and constructions.
Theor. Comput. Sci., 2015

A Summary of the Special Issue "Cybersecurity and Cryptography".
Information, 2015

A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing.
Future Generation Comp. Syst., 2015

On Indistinguishability in Remote Data Integrity Checking.
Comput. J., 2015

Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key.
Proceedings of the Computer Security - ESORICS 2015, 2015

Threshold Broadcast Encryption with Keyword Search.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

A New Public Remote Integrity Checking Scheme with User Privacy.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

A New General Framework for Secure Public Key Encryption with Keyword Search.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
Cross-Domain Password-Based Authenticated Key Exchange Revisited.
ACM Trans. Inf. Syst. Secur., 2014

A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
IEEE Trans. Information Forensics and Security, 2014

Identity based identification from algebraic coding theory.
Theor. Comput. Sci., 2014

A robust smart card-based anonymous user authentication protocol for wireless communications.
Security and Communication Networks, 2014

Efficient Hidden Vector Encryption with Constant-Size Ciphertext.
IACR Cryptology ePrint Archive, 2014

On the security of auditing mechanisms for secure cloud storage.
Future Generation Comp. Syst., 2014

(Strong) multidesignated verifiers signatures secure against rogue key attack.
Concurrency and Computation: Practice and Experience, 2014

Anonymous Proxy Signature with Restricted Traceability.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Attribute-Based Signing Right Delegation.
Proceedings of the Network and System Security - 8th International Conference, 2014

An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing.
Proceedings of the Information Security Practice and Experience, 2014

Efficient Hidden Vector Encryption with Constant-Size Ciphertext.
Proceedings of the Computer Security - ESORICS 2014, 2014

An Efficient Privacy-Preserving E-coupon System.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

POSTER: Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear Assumption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks.
Wireless Personal Communications, 2013

Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model.
IACR Cryptology ePrint Archive, 2013

k-time Proxy Signature: Formal Definition and Efficient Construction.
Proceedings of the Provable Security - 7th International Conference, 2013

A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation.
Proceedings of the Network and System Security - 7th International Conference, 2013

A New Unpredictability-Based RFID Privacy Model.
Proceedings of the Network and System Security - 7th International Conference, 2013

Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model.
Proceedings of the Information Security Practice and Experience, 2013

Cross-domain password-based authenticated key exchange revisited.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
A new efficient optimistic fair exchange protocol without random oracles.
Int. J. Inf. Sec., 2012

Cross-Domain Password-Based Authenticated Key Exchange Revisited.
IACR Cryptology ePrint Archive, 2012

(Strong) Multi-Designated Verifiers Signatures Secure against Rogue Key Attack.
Proceedings of the Network and System Security - 6th International Conference, 2012

2011
Comments on "An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks".
IEEE Trans. Wireless Communications, 2011

Certificateless cryptography with KGC trust level 3.
Theor. Comput. Sci., 2011

Certificateless public key encryption: A new generic construction and two pairing-free schemes.
Theor. Comput. Sci., 2011

Identity-based strong designated verifier signature revisited.
Journal of Systems and Software, 2011

Efficient strong designated verifier signature schemes without random oracle or with non-delegatability.
Int. J. Inf. Sec., 2011

Authenticated Key Exchange under Bad Randomness.
IACR Cryptology ePrint Archive, 2011

Heterogeneous Signcryption with Key Privacy.
Comput. J., 2011

Authenticated Key Exchange under Bad Randomness.
Proceedings of the Financial Cryptography and Data Security, 2011

Strongly secure certificateless key exchange without pairing.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Universal authentication protocols for anonymous wireless communications.
IEEE Trans. Wireless Communications, 2010

Comments on "Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting".
IEEE Trans. Information Theory, 2010

An efficient signcryption scheme with key privacy and its extension to ring signcryption.
Journal of Computer Security, 2010

Probabilistic Public Key Encryption with Equality Test.
Proceedings of the Topics in Cryptology, 2010

Dynamic Group Key Exchange Revisited.
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010

2009
Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability.
IACR Cryptology ePrint Archive, 2009

Efficient Non-interactive Range Proof.
Proceedings of the Computing and Combinatorics, 15th Annual International Conference, 2009

2008
A new framework for the design and analysis of identity-based identification schemes.
Theor. Comput. Sci., 2008

Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension.
J. UCS, 2008

Two-factor mutual authentication based on smart cards and passwords.
J. Comput. Syst. Sci., 2008

Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles.
Proceedings of the Topics in Cryptology, 2008

Ambiguous Optimistic Fair Exchange.
Proceedings of the Advances in Cryptology, 2008

Traceable and Retrievable Identity-Based Encryption.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Anonymous and Authenticated Key Exchange for Roaming Networks.
IEEE Trans. Wireless Communications, 2007

An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices.
Theor. Comput. Sci., 2007

Wideband 3/4 Elliptical Ring Patch for Millimeter-Wave Communication.
IEICE Transactions, 2007

A New Security Definition for Public Key Encryption Schemes and Its Applications.
IACR Cryptology ePrint Archive, 2007

Time Capsule Signature: Efficient and Provably Secure Constructions.
IACR Cryptology ePrint Archive, 2007

An Efficient Signcryption Scheme with Key Privacy.
Proceedings of the Public Key Infrastructure, 2007

Time Capsule Signature: Efficient and Provably Secure Constructions.
Proceedings of the Public Key Infrastructure, 2007

A More Natural Way to Construct Identity-Based Identification Schemes.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Formal Analysis and Systematic Construction of Two-factor Authentication Scheme.
IACR Cryptology ePrint Archive, 2006

Malicious KGC Attacks in Certificateless Cryptography.
IACR Cryptology ePrint Archive, 2006

Anonymous Signature Schemes.
Proceedings of the Public Key Cryptography, 2006

Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006

2005
Anonymous Signature Schemes.
IACR Cryptology ePrint Archive, 2005

An Efficient Identity-Based Key Exchange Protocol with KGS Forward Secrecy for Low-Power Devices.
Proceedings of the Internet and Network Economics, First International Workshop, 2005

Analysis and Improvement of a Signcryption Scheme with Key Privacy.
Proceedings of the Information Security, 8th International Conference, 2005

Efficient Anonymous Roaming and Its Security Analysis.
Proceedings of the Applied Cryptography and Network Security, 2005

Deposit-Case Attack Against Secure Roaming.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005


  Loading...