Yang Lu

Orcid: 0000-0003-4860-8384

Affiliations:
  • Hohai University, College of Computer and Information, Nanjing, China


According to our database1, Yang Lu authored at least 51 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Multiauthority Attribute-Based Encryption for Assuring Data Deletion.
IEEE Syst. J., June, 2023

Privacy-Preserving and Forward Public Key Encryption With Field-Free Multi-Keyword Search for Cloud Encrypted Data.
IEEE Trans. Cloud Comput., 2023

2022
Lightweight Public Key Authenticated Encryption With Keyword Search Against Adaptively-Chosen-Targets Adversaries for Mobile Devices.
IEEE Trans. Mob. Comput., 2022

Privacy-Preserving Key-Updatable Public Key Encryption with Keyword Search Supporting Ciphertext Sharing Function.
KSII Trans. Internet Inf. Syst., 2022

Key escrow-free attribute based encryption with user revocation.
Inf. Sci., 2022

2021
Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks.
IEEE Trans. Serv. Comput., 2021

Pairing-Free Certificate-Based Searchable Encryption Supporting Privacy-Preserving Keyword Search Function for IIoTs.
IEEE Trans. Ind. Informatics, 2021

ABKS-SKGA: Attribute-based keyword search secure against keyword guessing attack.
Comput. Stand. Interfaces, 2021

Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search Schemes.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

2020
Adaptively secure certificate-based broadcast encryption and its application to cloud storage service.
Inf. Sci., 2020

Privacy-Preserving and Pairing-Free Multirecipient Certificateless Encryption With Keyword Search for Cloud-Assisted IIoT.
IEEE Internet Things J., 2020

Expressive Public-Key Encryption With Keyword Search: Generic Construction From KP-ABE and an Efficient Scheme Over Prime-Order Groups.
IEEE Access, 2020

2019
Constructing pairing-free certificateless public key encryption with keyword search.
Frontiers Inf. Technol. Electron. Eng., 2019

A Forward-Secure Certificate-Based Signature Scheme with Enhanced Security in the Standard Model.
KSII Trans. Internet Inf. Syst., 2019

Keyword guessing attacks on a public key encryption with keyword search scheme without random oracle and its improvement.
Inf. Sci., 2019

Constructing designated server public key encryption with keyword search schemes withstanding keyword guessing attacks.
Int. J. Commun. Syst., 2019

A certificate-based AKA protocol secure against public key replacement attacks.
Int. Arab J. Inf. Technol., 2019

Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems.
Clust. Comput., 2019

SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search.
IEEE Access, 2019

2018
Provably secure certificate-based encryption with leakage resilience.
Theor. Comput. Sci., 2018

On Security of a Secure Channel Free Public Key Encryption with Conjunctive Field Keyword Search Scheme.
Inf. Technol. Control., 2018

Anonymous certificate-based broadcast encryption with constant decryption cost.
Inf. Sci., 2018

2017
New Construction of Short Certificate-Based Signature against Existential Forgery Attacks.
KSII Trans. Internet Inf. Syst., 2017

An Efficient Certificate-Based Authenticated Key Agreement Protocol without Bilinear Pairing.
Inf. Technol. Control., 2017

Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model.
Comput. J., 2017

Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model.
Adv. Math. Commun., 2017

Efficient designated server identity-based encryption with conjunctive keyword search.
Ann. des Télécommunications, 2017

2016
Provably secure certificateless proxy signature scheme in the standard model.
Theor. Comput. Sci., 2016

Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage.
Secur. Commun. Networks, 2016

Enhanced Certificate-Based Encryption Scheme without Bilinear Pairings", KSII Transactions on Internet and Information Systems.
KSII Trans. Internet Inf. Syst., 2016

Comment on a certificateless one-pass and two-party authenticated key agreement protocol.
Inf. Sci., 2016

A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model.
Inf. Sci., 2016

Continuous leakage-resilient certificate-based encryption.
Inf. Sci., 2016

Improved certificate-based signature scheme without random oracles.
IET Inf. Secur., 2016

A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds.
Future Gener. Comput. Syst., 2016

2015
Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction.
IACR Cryptol. ePrint Arch., 2015

An improved certificateless strong key-insulated signature scheme in the standard model.
Adv. Math. Commun., 2015

2014
Efficient Certificate-Based Encryption Scheme Secure Against Key Replacement Attacks in the Standard Model.
J. Inf. Sci. Eng., 2014

Provably Secure Certificate-Based Signcryption Scheme without Pairings.
KSII Trans. Internet Inf. Syst., 2014

Efficient constructions of certificate-based key encapsulation mechanism.
Int. J. Internet Protoc. Technol., 2014

2013
New forward-secure public-key encryption without random oracles.
Int. J. Comput. Math., 2013

2012
Generic Construction of Forward-Secure Identity-Based Encryption.
J. Comput., 2012

2011
A Practical Forward-Secure Public-Key Encryption Scheme.
J. Networks, 2011

Certificate-Based Signcryption: Security Model and Efficient Construction.
IACR Cryptol. ePrint Arch., 2011

2010
Forward-Secure Certificate-Based Encryption and its Generic Construction.
J. Networks, 2010

2009
Threshold Certificate-based Encryption.
J. Softw., 2009

Constructing Efficient Certificate-based Encryption with Paring.
J. Comput., 2009

Forward-Secure Certificate-Based Encryption.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Generic Construction of Certificate-Based Encryption.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A General and Secure Certification-based Encryption Construction.
Proceedings of the Third ChinaGrid Annual Conference, ChinaGrid 2008, Dunhuang, Gansu, 2008


  Loading...