Yiliang Han

Orcid: 0000-0002-2116-5408

According to our database1, Yiliang Han authored at least 53 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Multi-key homomorphic encryption with tightened RGSW ciphertexts without relinearization for ciphertexts product.
J. King Saud Univ. Comput. Inf. Sci., December, 2023

A Two-Stage Voting-Boosting Technique for Ensemble Learning in Social Network Sentiment Classification.
Entropy, April, 2023

Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing.
IEEE Trans. Cloud Comput., 2023

2022
Identity-based threshold proxy re-encryption scheme from lattices and its applications.
Frontiers Inf. Technol. Electron. Eng., 2022

Reversible Data hiding in Encrypted Domain with Public Key Embedding Mechanism.
CoRR, 2022

Information dissemination model of recommendation platform based on network community.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2021
Efficient multi-key fully homomorphic encryption over prime cyclotomic rings with fewer relinearisations.
IET Inf. Secur., 2021

Hierarchical Identity-Based Conditional Proxy Re-encryption Scheme Based RLWE and NTRU Variant.
Proceedings of the Data Science, 2021

An Improved LeNet-5 Model Based on Encrypted Data.
Proceedings of the Data Science, 2021

Research on Plaintext Resilient Encrypted Communication Based on Generative Adversarial Network.
Proceedings of the Data Science, 2021

Research on COVID-19 Internet Derived Public Opinions Prediction Based on the Event Evolution Graph.
Proceedings of the Data Science, 2021

2020
An Improved Method to Evaluate the Synchronization in Neural Key Exchange Protocol.
Secur. Commun. Networks, 2020

Analysis Toward RLWE-Based Key Exchange Protocol Based on Automatic Learning Structure.
Proceedings of the Security and Privacy in Digital Economy, 2020

Efficient and Evolvable Key Reconciliation Mechanism in Multi-party Networks Based on Automatic Learning Structure.
Proceedings of the Security and Privacy in Digital Economy, 2020

Application of Polar Code-Based Scheme in Cloud Secure Storage.
Proceedings of the Data Science, 2020

2019
Attribute-based encryption with adaptive policy.
Soft Comput., 2019

A New Group Location Privacy-Preserving Method Based on Distributed Architecture in LBS.
Secur. Commun. Networks, 2019

A Secure and Efficient Code-Based Signature Scheme.
Int. J. Found. Comput. Sci., 2019

A compressive sensing-based adaptable secure data collection scheme for distributed wireless sensor networks.
Int. J. Distributed Sens. Networks, 2019

Efficient Multi-Key FHE With Short Extended Ciphertexts and Directed Decryption Protocol.
IEEE Access, 2019

A Signcryption Scheme Based Learning with Errors over Rings Without Trapdoor.
Proceedings of the Theoretical Computer Science - 37th National Conference, 2019

Anti-quantum Cryptography Scheme Based on the Improvement of Cubic Simple Matrix and LRPC Code.
Proceedings of the Data Science, 2019

2018
Secure data outsourcing scheme in cloud computing with attribute-based encryption.
Int. J. High Perform. Comput. Netw., 2018

Efficient Multi-key FHE with short extended ciphertexts and less public parameters.
IACR Cryptol. ePrint Arch., 2018

Two round multiparty computation via Multi-key fully homomorphic encryption with faster homomorphic evaluations.
IACR Cryptol. ePrint Arch., 2018

The Reincarnation of Grille Cipher.
CoRR, 2018

Dynamic Detection Method of Micro-blog Topic Based on Time Series.
Proceedings of the Data Science, 2018

An Evaluation Algorithm for Importance of Dynamic Nodes in Social Networks Based on Three-Dimensional Grey Relational Degree.
Proceedings of the Data Science, 2018

2017
Hierarchical Access Control Scheme of Private Data Based on Attribute Encryption.
Proceedings of the Data Science, 2017

Parallel Long Messages Encryption Scheme Based on Certificateless Cryptosystem for Big Data.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
适用于移动网络的属性基在线/离线签密方案 (Attribute-based Online/Offline Signcryption for Mobile Network).
计算机科学, 2016

Location Privacy Preserving Scheme Based on Attribute Encryption.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

The Encryption Scheme with Data Compression Based on QC-LDPC.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Some Practical Properties of AP14.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Outsourcing the Unsigncryption of Compact Attribute-Based Signcryption for General Circuits.
Proceedings of the Social Computing, 2016

2015
Extend FHEW to General Case.
IACR Cryptol. ePrint Arch., 2015

The Revocable Attribute Based Encryption Scheme for Social Networks.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

The New Attribute-Based Generalized Signcryption Scheme.
Proceedings of the Intelligent Computation in Big Data Era, 2015

The Multilinear Maps Based Certificateless Aggregate Signcryption Scheme.
Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015

2014
SCHAP: The Aggregate SignCryption Based Hybrid Authentication Protocol for VANET.
Proceedings of the Internet of Vehicles - Technologies and Services, 2014

2013
Attribute-Based Signcryption Scheme with Non-monotonic Access Structure.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2011
Proxy encryption based secure multicast in wireless mesh networks.
J. Netw. Comput. Appl., 2011

2009
Adaptive secure multicast in wireless networks.
Int. J. Commun. Syst., 2009

BPGSC: Bilinear Paring Based Genearlized SignCryption Scheme.
Proceedings of the Eighth International Conference on Grid and Cooperative Computing, 2009

2008
On Security Notions for Verifiable Encrypted Signature.
IACR Cryptol. ePrint Arch., 2008

Multi-Recipient Signcryption for Secure Wireless Group Communication.
IACR Cryptol. ePrint Arch., 2008

New ECDSA-Verifiable Multi-receiver Generalization Signcryption.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

2007
Generalization of signcryption for resources-constrained environments.
Wirel. Commun. Mob. Comput., 2007

Provable Secure Generalized Signcryption.
IACR Cryptol. ePrint Arch., 2007

2006
ECGSC: Elliptic Curve based Generalized Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2006

ECGSC: Elliptic Curve Based Generalized Signcryption.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

2004
Signcryption based on elliptic curve and its multi-party schemes.
Proceedings of the 3rd International Conference on Information Security, 2004


  Loading...