Yang Lu

According to our database1, Yang Lu
  • authored at least 31 papers between 2008 and 2018.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Provably secure certificate-based encryption with leakage resilience.
Theor. Comput. Sci., 2018

On Security of a Secure Channel Free Public Key Encryption with Conjunctive Field Keyword Search Scheme.
ITC, 2018

2017
New Construction of Short Certificate-Based Signature against Existential Forgery Attacks.
TIIS, 2017

An Efficient Certificate-Based Authenticated Key Agreement Protocol without Bilinear Pairing.
ITC, 2017

Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model.
Comput. J., 2017

Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model.
Adv. in Math. of Comm., 2017

Efficient designated server identity-based encryption with conjunctive keyword search.
Annales des Télécommunications, 2017

2016
Provably secure certificateless proxy signature scheme in the standard model.
Theor. Comput. Sci., 2016

Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage.
Security and Communication Networks, 2016

Enhanced Certificate-Based Encryption Scheme without Bilinear Pairings", KSII Transactions on Internet and Information Systems.
TIIS, 2016

Comment on a certificateless one-pass and two-party authenticated key agreement protocol.
Inf. Sci., 2016

A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model.
Inf. Sci., 2016

Continuous leakage-resilient certificate-based encryption.
Inf. Sci., 2016

Improved certificate-based signature scheme without random oracles.
IET Information Security, 2016

A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds.
Future Generation Comp. Syst., 2016

2015
Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction.
IACR Cryptology ePrint Archive, 2015

An improved certificateless strong key-insulated signature scheme in the standard model.
Adv. in Math. of Comm., 2015

2014
Efficient Certificate-Based Encryption Scheme Secure Against Key Replacement Attacks in the Standard Model.
J. Inf. Sci. Eng., 2014

Provably Secure Certificate-Based Signcryption Scheme without Pairings.
TIIS, 2014

Efficient constructions of certificate-based key encapsulation mechanism.
IJIPT, 2014

2013
New forward-secure public-key encryption without random oracles.
Int. J. Comput. Math., 2013

2012
Generic Construction of Forward-Secure Identity-Based Encryption.
JCP, 2012

2011
A Practical Forward-Secure Public-Key Encryption Scheme.
JNW, 2011

Certificate-Based Signcryption: Security Model and Efficient Construction.
IACR Cryptology ePrint Archive, 2011

2010
Forward-Secure Certificate-Based Encryption and its Generic Construction.
JNW, 2010

2009
Threshold Certificate-based Encryption.
JSW, 2009

Constructing Efficient Certificate-based Encryption with Paring.
JCP, 2009

Forward-Secure Certificate-Based Encryption.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Generic Construction of Certificate-Based Encryption.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A General and Secure Certification-based Encryption Construction.
Proceedings of the Third ChinaGrid Annual Conference, ChinaGrid 2008, Dunhuang, Gansu, 2008


  Loading...