Yangguang Tian

Orcid: 0000-0002-6624-5380

According to our database1, Yangguang Tian authored at least 35 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Accountable Fine-Grained Blockchain Rewriting in the Permissionless Setting.
IEEE Trans. Inf. Forensics Secur., 2024

FEASE: Fast and Expressive Asymmetric Searchable Encryption.
IACR Cryptol. ePrint Arch., 2024

2023
Revocable Policy-Based Chameleon Hash for Blockchain Rewriting.
Comput. J., October, 2023

On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices.
Sensors, July, 2023

BAHS: A Blockchain-Aided Hash-Based Signature Scheme.
Proceedings of the Information Security Practice and Experience, 2023

2022
ISC-CPPA: Improverd-Security Certificateless Conditional Privacy-Preserving Authentication Scheme With Revocation.
IEEE Trans. Veh. Technol., 2022

Efficient Multi-Party Contact Tracing.
J. Inf. Process., 2022

Policy-Based Editing-Enabled Signatures: Authenticating Fine-Grained and Restricted Data Modification.
Comput. J., 2022

2021
A Secure Distance-Bounding Protocol with Mutual Authentication.
Secur. Commun. Networks, 2021

A Practical Forward-Secure DualRing.
IACR Cryptol. ePrint Arch., 2021

Unlinkable and Revocable Secret Handshake.
Comput. J., 2021

2020
Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2020

Leakage-resilient biometric-based remote user authentication with fuzzy extractors.
Theor. Comput. Sci., 2020

A new framework for privacy-preserving biometric-based remote user authentication.
J. Comput. Secur., 2020

Editing-Enabled Signatures: A New Tool for Editing Authenticated Data.
IEEE Internet Things J., 2020

A New Construction for Linkable Secret Handshake.
Comput. J., 2020

LiS: Lightweight Signature Schemes for Continuous Message Authentication in Cyber-Physical Systems.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
DABKE: Secure deniable attribute-based key exchange framework.
J. Comput. Secur., 2019

Efficient oblivious transfer with membership verification.
Int. J. Distributed Sens. Networks, 2019

Lattice-Based Remote User Authentication from Reusable Fuzzy Signature.
IACR Cryptol. ePrint Arch., 2019

Anonymous Asynchronous Payment Channel from k-Time Accountable Assertion.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
Strong Identity-Based Proxy Signature Schemes, Revisited.
Wirel. Commun. Mob. Comput., 2018

Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice.
J. Netw. Comput. Appl., 2018

Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience.
Proceedings of the Security and Privacy in Communication Networks, 2018

DSH: Deniable Secret Handshake Framework.
Proceedings of the Information Security Practice and Experience, 2018

Efficient Traceable Oblivious Transfer and Its Applications.
Proceedings of the Information Security Practice and Experience, 2018

MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

PriBioAuth: Privacy-Preserving Biometric-Based Remote User Authentication.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Privacy-Preserving Remote User Authentication with k-Times Untraceability.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting.
Wirel. Pers. Commun., 2017

One-Round Attribute-Based Key Exchange in the Multi-Party Setting.
Int. J. Found. Comput. Sci., 2017

Privacy-Preserving k-time Authenticated Secret Handshakes.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Privacy-preserving grouping proof with key exchange in the multiple-party setting.
Secur. Commun. Networks, 2016

One-Round Attribute-Based Key Exchange in the Multi-party Setting.
Proceedings of the Provable Security, 2016


  Loading...