Kewei Lv

Orcid: 0000-0002-8733-2870

According to our database1, Kewei Lv authored at least 28 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
New Results on the Remote Set Problem and Its Applications in Complexity Study.
Theory Comput. Syst., April, 2024

2023
Efficient Multiparty Fully Homomorphic Encryption With Computation Fairness and Error Detection in Privacy Preserving Multisource Data Mining.
IEEE Trans. Reliab., December, 2023

Reusable Group Fuzzy Extractor and Group-Shared Bitcoin Wallet.
Comput. J., March, 2023

Ciphertext-policy attribute-based delay encryption.
Int. J. Inf. Comput. Secur., 2023

General Constructions of Fuzzy Extractors for Continuous Sources.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
Constant-round auction with insulated bidders.
Sci. China Inf. Sci., 2022

Privacy-Preserving Closest Point Determination Based on Ciphertext Comparison.
Proceedings of the IEEE International Performance, 2022

Secure Sketch and Fuzzy Extractor with Imperfect Randomness: An Information-Theoretic Study.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

2021
Threshold reusable fuzzy extractor and an application to joint access control via biometric information.
Inf. Sci., 2021

BSA: Enabling Biometric-Based Storage and Authorization on Blockchain.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Three-Party Integer Comparison and Applications.
Proceedings of the IEEE International Performance, 2021

2020
Computing Interval Discrete Logarithm Problem with Restricted Jump Method.
Fundam. Informaticae, 2020

Zero-pole cancellation for identity-based aggregators: a constant-size designated verifier-set signature.
Frontiers Comput. Sci., 2020

2019
Using Equivalent Class to Solve Interval Discrete Logarithm Problem.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Fully private auctions for the highest bid.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2017
The Reductions for the Approximating Covering Radius Problem.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Solving Discrete Logarithm Problem in an Interval Using Periodic Iterates.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Rounding Technique's Application in Schnorr Signature Algorithm: Known Partially Most Significant Bits of Nonce.
Proceedings of the Applications and Techniques in Information Security, 2017

2016
Improved Security Proof for Modular Exponentiation Bits.
Proceedings of the Network and System Security - 10th International Conference, 2016

The Variant of Remote Set Problem on Lattices.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

The Security of Individual Bit for XTR.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

2015
Ciphertext-Auditable Identity-Based Encryption.
Int. J. Netw. Secur., 2015

The Security of Polynomial Information of Diffie-Hellman Key.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

On Promise Problem of the Generalized Shortest Vector Problem.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2011
Paillier's trapdoor function hides Θ(<i>n</i>) bits.
Sci. China Inf. Sci., 2011

2009
A New Hard-Core Predicate of Paillier's Trapdoor Function.
Proceedings of the Progress in Cryptology, 2009

Security Analysis of Poker-Resembled Protocol Based on Hidden Number Problem.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

2005
Revised Fischlin's (Blind) Signature Schemes.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...