According to our database1, Yang Lu
Legend:Book In proceedings Article PhD thesis Other
Provably secure certificate-based encryption with leakage resilience.
Theor. Comput. Sci., 2018
On Security of a Secure Channel Free Public Key Encryption with Conjunctive Field Keyword Search Scheme.
New Construction of Short Certificate-Based Signature against Existential Forgery Attacks.
An Efficient Certificate-Based Authenticated Key Agreement Protocol without Bilinear Pairing.
Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model.
Comput. J., 2017
Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model.
Adv. in Math. of Comm., 2017
Efficient designated server identity-based encryption with conjunctive keyword search.
Annales des Télécommunications, 2017
Provably secure certificateless proxy signature scheme in the standard model.
Theor. Comput. Sci., 2016
Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage.
Security and Communication Networks, 2016
Enhanced Certificate-Based Encryption Scheme without Bilinear Pairings", KSII Transactions on Internet and Information Systems.
Comment on a certificateless one-pass and two-party authenticated key agreement protocol.
Inf. Sci., 2016
A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model.
Inf. Sci., 2016
Continuous leakage-resilient certificate-based encryption.
Inf. Sci., 2016
Improved certificate-based signature scheme without random oracles.
IET Information Security, 2016
A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds.
Future Generation Comp. Syst., 2016
Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction.
IACR Cryptology ePrint Archive, 2015
An improved certificateless strong key-insulated signature scheme in the standard model.
Adv. in Math. of Comm., 2015
Efficient Certificate-Based Encryption Scheme Secure Against Key Replacement Attacks in the Standard Model.
J. Inf. Sci. Eng., 2014
Provably Secure Certificate-Based Signcryption Scheme without Pairings.
Efficient constructions of certificate-based key encapsulation mechanism.
New forward-secure public-key encryption without random oracles.
Int. J. Comput. Math., 2013
Generic Construction of Forward-Secure Identity-Based Encryption.
A Practical Forward-Secure Public-Key Encryption Scheme.
Certificate-Based Signcryption: Security Model and Efficient Construction.
IACR Cryptology ePrint Archive, 2011
Forward-Secure Certificate-Based Encryption and its Generic Construction.
Threshold Certificate-based Encryption.
Constructing Efficient Certificate-based Encryption with Paring.
Forward-Secure Certificate-Based Encryption.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
Generic Construction of Certificate-Based Encryption.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
A General and Secure Certification-based Encryption Construction.
Proceedings of the Third ChinaGrid Annual Conference, ChinaGrid 2008, Dunhuang, Gansu, 2008