Yong Yu

Orcid: 0000-0002-0187-2439

Affiliations:
  • Shaanxi Normal University, School of Computer Science, Xi'an, China
  • University of Electronic Science and Technology of China, School of Computer Science and Engineering, Chengdu, China (former)
  • University of Wollongong, School of Computer Science and Software Engineering, NSW, Australia (former)
  • Xidian University, Xi'an, China (PhD 2008)


According to our database1, Yong Yu authored at least 154 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Self-tallying e-voting with public traceability based on blockchain.
Comput. Stand. Interfaces, March, 2024

A regulated anonymous cryptocurrency with batch linkability.
Comput. Stand. Interfaces, January, 2024

2023
Cross-Channel: Scalable Off-Chain Channels Supporting Fair and Atomic Cross-Chain Operations.
IEEE Trans. Computers, November, 2023

Multi-stage finite element modeling of the deformation behavior during ultrasonic-assisted incremental sheet forming.
J. Comput. Sci., September, 2023

A post quantum secure multi-party collaborative signature with deterability in the Industrial Internet of Things.
Future Gener. Comput. Syst., April, 2023

HyperMaze: Towards Privacy-Preserving and Scalable Permissioned Blockchain.
IEEE Trans. Dependable Secur. Comput., 2023

Trustworthy sealed-bid auction with low communication cost atop blockchain.
Inf. Sci., 2023

Privacy-Preserving Cross-Silo Federated Learning Atop Blockchain for IoT.
IEEE Internet Things J., 2023

2022
Privacy protection in social applications: A ciphertext policy attribute-based encryption with keyword search.
Int. J. Intell. Syst., December, 2022

Outsourced Data Integrity Checking with Practical Key Update in Edge-Cloud Resilient Networks.
IEEE Wirel. Commun., 2022

Identity-Based Provable Data Possession From RSA Assumption for Secure Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2022

A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT.
IEEE Trans. Dependable Secur. Comput., 2022

Lattice-Based Self-Enhancement Authorized Accessible Privacy Authentication for Cyber-Physical Systems.
Secur. Commun. Networks, 2022

Accountable and Verifiable Secure Aggregation for Federated Learning in IoT Networks.
IEEE Netw., 2022

Toward Data Security in 6G Networks: A Public-Key Searchable Encryption Approach.
IEEE Netw., 2022

Blockchain-Based Auditable Privacy-Preserving Data Classification for Internet of Things.
IEEE Internet Things J., 2022

Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model.
IACR Cryptol. ePrint Arch., 2022

Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection.
Digit. Commun. Networks, 2022

Accountable outsourcing data storage atop blockchain.
Comput. Stand. Interfaces, 2022

Post quantum secure fair data trading with deterability based on machine learning.
Sci. China Inf. Sci., 2022

Your Breath Doesn't Lie: Multi-user Authentication by Sensing Respiration Using mmWave Radar.
Proceedings of the 19th Annual IEEE International Conference on Sensing, 2022

2021
PrivCrowd: A Secure Blockchain-Based Crowdsourcing Framework with Fine-Grained Worker Selection.
Wirel. Commun. Mob. Comput., 2021

Security and Privacy for Edge Intelligence in 5G and Beyond Networks: Challenges and Solutions.
IEEE Wirel. Commun., 2021

A Blockchain-Based Traceable Self-Tallying E-Voting Protocol in AI Era.
IEEE Trans. Netw. Sci. Eng., 2021

Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability.
IEEE Trans. Dependable Secur. Comput., 2021

Toward Transparent and Accountable Privacy-Preserving Data Classification.
IEEE Netw., 2021

Toward Decentralized Fair Data Trading Based on Blockchain.
IEEE Netw., 2021

DRBFT: Delegated randomization Byzantine fault tolerance consensus protocol for blockchains.
Inf. Sci., 2021

Post-Quantum Secure Ring Signatures for Security and Privacy in the Cybertwin-Driven 6G.
IEEE Internet Things J., 2021

Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family.
Int. J. Found. Comput. Sci., 2021

Blockchain-based privacy-preserving valet parking for self-driving vehicles.
Trans. Emerg. Telecommun. Technol., 2021

Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Concise Mercurial Subvector Commitments: Definitions and Constructions.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Advances of Security and Privacy Techniques in Emerging Wireless Networks.
IEEE Wirel. Commun., 2020

Blockchain-Based Anonymous Authentication With Selective Revocation for Smart Industrial Applications.
IEEE Trans. Ind. Informatics, 2020

Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage.
IEEE Trans. Emerg. Top. Comput., 2020

Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing.
IEEE Trans. Dependable Secur. Comput., 2020

Toward Assured Data Deletion in Cloud Storage.
IEEE Netw., 2020

Decentralized Public Key Infrastructures atop Blockchain.
IEEE Netw., 2020

Blockchain-Based Self-Tallying Voting System with Software Updates in Decentralized IoT.
IEEE Netw., 2020

Key-Policy Attribute-Based Encryption With Keyword Search in Virtualized Environments.
IEEE J. Sel. Areas Commun., 2020

IntegrityChain: Provable Data Possession for Decentralized Storage.
IEEE J. Sel. Areas Commun., 2020

Improved Security of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks.
IEEE Internet Things J., 2020

Blockchain-Based Dynamic Provable Data Possession for Smart Cities.
IEEE Internet Things J., 2020

2019
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems.
IEEE Trans. Dependable Secur. Comput., 2019

An alternative approach to public cloud data auditing supporting data dynamics.
Soft Comput., 2019

An Approach Enabling Various Queries on Encrypted Industrial Data Stream.
Secur. Commun. Networks, 2019

Enabling Secure Intelligent Network with Cloud-Assisted Privacy-Preserving Machine Learning.
IEEE Netw., 2019

Toward Data Security in Edge Intelligent IIoT.
IEEE Netw., 2019

Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies.
IEEE Netw., 2019

Advances of Provable Security Techniques.
J. Univers. Comput. Sci., 2019

Blockchain based privacy-preserving software updates with proof-of-delivery for Internet of Things.
J. Parallel Distributed Comput., 2019

Machine learning based privacy-preserving fair data trading in big data market.
Inf. Sci., 2019

Efficient attribute-based encryption with attribute revocation for assured data deletion.
Inf. Sci., 2019

LRCoin: Leakage-Resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT.
IEEE Internet Things J., 2019

Secure Your Voice: An Oral Airflow-Based Continuous Liveness Detection for Voice Assistants.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

Preface: Special Issue Cryptography and Provable Security.
Int. J. Found. Comput. Sci., 2019

An efficient linkable group signature for payer tracing in anonymous cryptocurrencies.
Future Gener. Comput. Syst., 2019

Blockchain based Privacy-Preserving Software Updates with Proof-of-Delivery for Internet of Things.
CoRR, 2019

A Blockchain-based Self-tallying Voting Scheme in Decentralized IoT.
CoRR, 2019

An Efficient Linkable Group Signature for Payer Tracing in Anonymous Cryptocurrencies.
CoRR, 2019

Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications.
Comput. J., 2019

Parallel Runtime Verification Approach for Alternate Execution of Multiple Threads.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2019

Lattice Based Verifiably Encrypted Double Authentication Preventing Signatures.
Proceedings of the Network and System Security - 13th International Conference, 2019

Leakage-Resilient Certificateless Signcryption Scheme.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Anonymous Asynchronous Payment Channel from k-Time Accountable Assertion.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
Blockchain-Based Solutions to Security and Privacy Issues in the Internet of Things.
IEEE Wirel. Commun., 2018

Privacy-Preserving Smart Parking Navigation Supporting Efficient Driving Guidance Retrieval.
IEEE Trans. Veh. Technol., 2018

Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications.
IEEE Trans. Ind. Informatics, 2018

Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes.
J. Comput. Sci. Technol., 2018

Data integrity checking with reliable data transfer for secure cloud storage.
Int. J. Web Grid Serv., 2018

Privacy preserving cloud data auditing with efficient key update.
Future Gener. Comput. Syst., 2018

LRCoin: Leakage-resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT.
CoRR, 2018

Content Protection in Named Data Networking: Challenges and Potential Solutions.
IEEE Commun. Mag., 2018

Exploring New Authentication Protocols for Sensitive Data Protection on Smartphones.
IEEE Commun. Mag., 2018

Structural Key Recovery of Simple Matrix Encryption Scheme Family.
Comput. J., 2018

Novel Smooth Hash Proof Systems Based on Lattices.
Comput. J., 2018

Secure Pub-Sub: Blockchain-Based Fair Payment With Reputation for Reliable Cyber Physical Systems.
IEEE Access, 2018

An Efficient Privacy Preserving Batch Authentication Scheme with Deterable Function for VANETs.
Proceedings of the Network and System Security - 12th International Conference, 2018

DSH: Deniable Secret Handshake Framework.
Proceedings of the Information Security Practice and Experience, 2018

A Bignum Network Coding Scheme for Multipath Transmission in Vehicular Networks.
Proceedings of the IEEE Global Communications Conference, 2018

An Efficient Anonymous Authentication Scheme Based on Double Authentication Preventing Signature for Mobile Healthcare Crowd Sensing.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2017

EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2017

Efficient E-coupon systems with strong user privacy.
Telecommun. Syst., 2017

Improved dynamic remote data auditing protocol for smart city security.
Pers. Ubiquitous Comput., 2017

One-Round Attribute-Based Key Exchange in the Multi-Party Setting.
Int. J. Found. Comput. Sci., 2017

Cloud computing security and privacy: Standards and regulations.
Comput. Stand. Interfaces, 2017

Identity-based provable data possession revisited: Security analysis and generic construction.
Comput. Stand. Interfaces, 2017

Achieving public verifiability and data dynamics for cloud data in the standard model.
Clust. Comput., 2017

Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption.
Proceedings of the Information Security Practice and Experience, 2017

Privacy-Preserving k-time Authenticated Secret Handshakes.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Comments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification".
IEEE Trans. Inf. Forensics Secur., 2016

Survey on key revocation mechanisms in wireless sensor networks.
J. Netw. Comput. Appl., 2016

Cloud data integrity checking with an identity-based auditing mechanism from RSA.
Future Gener. Comput. Syst., 2016

Provable multiple replication data possession with full dynamics for secure cloud storage.
Concurr. Comput. Pract. Exp., 2016

SDIVIP<sup>2</sup>: shared data integrity verification with identity privacy preserving in mobile clouds.
Concurr. Comput. Pract. Exp., 2016

Recent advances in security and privacy in large-scale networks.
Concurr. Comput. Pract. Exp., 2016

Cloud-Based Privacy-Preserving Parking Navigation Through Vehicular Communications.
Proceedings of the Security and Privacy in Communication Networks, 2016

One-Round Attribute-Based Key Exchange in the Multi-party Setting.
Proceedings of the Provable Security, 2016

Device-invisible two-factor authenticated key agreement protocol for BYOD.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

Secure outsourced data transfer with integrity verification in cloud storage.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

Secure and Deduplicated Spatial Crowdsourcing: A Fog-Based Approach.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Comments on a Public Auditing Mechanism for Shared Cloud Data Service.
IEEE Trans. Serv. Comput., 2015

Recent Advances in Security and Privacy in Big Data.
J. Univers. Comput. Sci., 2015

Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage.
Int. J. Inf. Sec., 2015

Advanced security analysis of a signature scheme with message recovery.
Int. J. Inf. Comput. Secur., 2015

Remote data possession checking with enhanced security for cloud storage.
Future Gener. Comput. Syst., 2015

A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing.
Future Gener. Comput. Syst., 2015

Secure Delegation of Signing Power from Factorization.
Comput. J., 2015

On Indistinguishability in Remote Data Integrity Checking.
Comput. J., 2015

Provably Secure Identity Based Provable Data Possession.
Proceedings of the Provable Security, 2015

Provable Data Possession Supporting Secure Data Transfer for Cloud Storage.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

2014
On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage.
IEEE Trans. Parallel Distributed Syst., 2014

Efficient public key encryption with revocable keyword search.
Secur. Commun. Networks, 2014

An Efficient Provable Secure Public Auditing Scheme for Cloud Storage.
KSII Trans. Internet Inf. Syst., 2014

Security pitfalls of an efficient threshold proxy signature scheme for mobile agents.
Inf. Process. Lett., 2014

Short computational Diffie-Hellman-based proxy signature scheme in the standard model.
Int. J. Commun. Syst., 2014

On the security of auditing mechanisms for secure cloud storage.
Future Gener. Comput. Syst., 2014

Improved security of a dynamic remote data possession checking protocol for cloud storage.
Expert Syst. Appl., 2014

Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage.
Proceedings of the Network and System Security - 8th International Conference, 2014

Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures.
Proceedings of the Information Security Practice and Experience, 2014

An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing.
Proceedings of the Information Security Practice and Experience, 2014

New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
A Secure Scalar Product Protocol Against Malicious Adversaries.
J. Comput. Sci. Technol., 2013

A Secure Scalar Product Protocol and Its Applications to Computational Geometry.
J. Comput., 2013

Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks.
IEICE Trans. Inf. Syst., 2013

On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

A novel construction of SDVS with secure disavowability.
Clust. Comput., 2013

A Secure and Efficient E-Cheque Protocol from Chameleon Hash Function.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Private Set Intersection via Public Key Encryption with Multiple Keywords Search.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

A New Construction of Proxy Signature Using Chameleon Hash Function.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
Provably secure proxy signature scheme from factorization.
Math. Comput. Model., 2012

Cryptanalysis of a Fuzzy Identity Based Encryption Scheme in the Standard Model.
Informatica, 2012

Improved certificateless signature scheme provably secure in the standard model.
IET Inf. Secur., 2012

Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme.
IEICE Trans. Inf. Syst., 2012

A Strong Designated Verifier Signature Scheme with Secure Disavowability.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Further Cryptanalysis of a Signature Scheme with Message Recovery.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
Strongly unforgeable proxy signature scheme secure in the standard model.
J. Syst. Softw., 2011

Improvement of a proxy multi-signature scheme without random oracles.
Comput. Commun., 2011

Cryptanalysis of an Off-Line Electronic Cash Scheme Based on Proxy Blind Signature.
Comput. J., 2011

2009
Identity based signcryption scheme without random oracles.
Comput. Stand. Interfaces, 2009

An efficient anonymous proxy signature scheme with provable security.
Comput. Stand. Interfaces, 2009

Designated verifier proxy signature scheme without random oracles.
Comput. Math. Appl., 2009

Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Identity Based Multi-proxy Multi-signcryption Scheme for Electronic Commerce.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Identity-Based Authenticated Key Agreement Protocols without Bilinear Pairings.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2008

2007
A provably secure ID-based mediated signcryption scheme.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

ID-based threshold signature and mediated signature schemes.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Efficient Identity-Based Signcryption Scheme for Multiple Receivers.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Provably Secure Identity-Based Threshold Unsigncryption Scheme.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007


  Loading...