Yang Tao

Affiliations:
  • Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China


According to our database1, Yang Tao authored at least 17 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Faster threshold-SM2 with identifiable abort and non-interactive online signing.
Cybersecur., December, 2025

Cocoon: certificateless blockchain wallet supporting both stealth address and revocation.
Cybersecur., December, 2025

2024
Atomic cross-chain swap based on private key exchange.
Cybersecur., December, 2024

Threshold ring signature: generic construction and logarithmic size instantiation.
Cybersecur., December, 2024

Designated confirmer threshold signature and its applications in blockchains.
Cybersecur., December, 2024

2023
Forward Security of Fiat-Shamir Lattice Signatures.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
(Full) Leakage resilience of Fiat-Shamir signatures over lattices.
Frontiers Comput. Sci., October, 2022

Generic, efficient and isochronous Gaussian sampling over the integers.
Cybersecur., 2022

Generalizing Lyubashevsky-Wichs trapdoor sampler for NTRU lattices.
Sci. China Inf. Sci., 2022

Fast Fourier Orthogonalization over NTRU Lattices.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

2021
More Efficient Construction of Anonymous Signatures.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
Rényi divergence on learning with errors.
Sci. China Inf. Sci., 2020

Short Zero-Knowledge Proof of Knowledge for Lattice-Based Commitment.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020

An Efficient CCA-Secure Access Control Encryption for Any Policy.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

Distributed Key Generation for SM9-Based Systems.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2018
Key Dependent Message Security for Revocable Identity-Based Encryption and Identity-Based Encryption.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2017
Access Control Encryption Based on LWE.
Proceedings of the 4th ACM International Workshop on ASIA Public-Key Cryptography, 2017


  Loading...