Rupeng Yang

According to our database1, Rupeng Yang authored at least 28 papers between 2014 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Revocable ring signatures with CCA-anonymity from standard lattices.
Comput. Stand. Interfaces, 2025

2024
Efficient Zero-Knowledge Arguments for Paillier Cryptosystem.
IACR Cryptol. ePrint Arch., 2024

2023
Privately Puncturing PRFs from Lattices: Adaptive Security and Collusion Resistant Pseudorandomness.
IACR Cryptol. ePrint Arch., 2023

2022
Public-Key Watermarking Schemes for Pseudorandom Functions.
IACR Cryptol. ePrint Arch., 2022

2021
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks.
Mob. Networks Appl., 2021

Simulation-Based Bi-Selective Opening Security for Public Key Encryption.
IACR Cryptol. ePrint Arch., 2021

2020
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting.
IACR Cryptol. ePrint Arch., 2020

Collusion Resistant Watermarkable PRFs from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2020

Compact Authenticated Key Exchange in the Quantum Random Oracle Model.
IACR Cryptol. ePrint Arch., 2020

2019
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience.
J. Supercomput., 2019

Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications.
IACR Cryptol. ePrint Arch., 2019

Decentralized blacklistable anonymous credentials with reputation.
Comput. Secur., 2019

Public-Key Encryption With Keyword Search via Obfuscation.
IEEE Access, 2019

New Empirical Traceability Analysis of CryptoNote-Style Blockchains.
Proceedings of the Financial Cryptography and Data Security, 2019

Accountable Anonymous Credentials.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2018
Towards leakage-resilient fine-grained access control in fog computing.
Future Gener. Comput. Syst., 2018

Position based cryptography with location privacy: A step for Fog Computing.
Future Gener. Comput. Syst., 2018

Unforgeable Watermarking Schemes with Public Extraction.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Lattice-Based Universal Accumulator with Nonmembership Arguments.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Collusion Resistant Watermarking Schemes for Cryptographic Functionalities.
IACR Cryptol. ePrint Arch., 2017

Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak PRF with Efficient Protocols from LWR.
IACR Cryptol. ePrint Arch., 2017

Practical Range Proof for Cryptocurrency Monero with Provable Security.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
Public-key encryption with keyword search secure against continual memory attacks.
Secur. Commun. Networks, 2016

Leakage-Resilient Functional Encryption via Pair Encodings.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption.
Int. J. Embed. Syst., 2015

Updatable Hash Proof System and Its Applications.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Weak-Key Leakage Resilient Cryptography.
IACR Cryptol. ePrint Arch., 2014


  Loading...