Yu Chen

Orcid: 0000-0003-2553-1281

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
  • Peking University, Beijing, China


According to our database1, Yu Chen authored at least 56 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Fast two-party signature for upgrading ECDSA to two-party scenario easily.
Theor. Comput. Sci., February, 2024

2023
Fine-Grained Secure Attribute-Based Encryption.
J. Cryptol., October, 2023

Fast Unbalanced Private Computing on (Labeled) Set Intersection with Cardinality.
IACR Cryptol. ePrint Arch., 2023

Linear Private Set Union from Multi-Query Reverse Private Membership Test.
Proceedings of the 32nd USENIX Security Symposium, 2023

Sigma Protocols from Verifiable Secret Sharing and Their Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

A Simple and Efficient Framework of Proof Systems for NP.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Non-Malleable Functions and their Applications.
J. Cryptol., 2022

You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature.
IACR Cryptol. ePrint Arch., 2022

Optimal Private Set Union from Multi-Query Reverse Private Membership Test.
IACR Cryptol. ePrint Arch., 2022

Fast Unbalanced Private Set Union from Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2022

Temporal-Spatial dependencies ENhanced deep learning model (TSEN) for household leverage series forecasting.
CoRR, 2022

2021
MPC-in-Multi-Heads: A Multi-Prover Zero-Knowledge Proof System - (or: How to Jointly Prove Any NP Statements in ZK).
Proceedings of the Computer Security - ESORICS 2021, 2021

Hierarchical Integrated Signature and Encryption - (or: Key Separation vs. Key Reuse: Enjoy the Best of both Worlds).
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Public-key authenticated encryption with keyword search revisited: Security model and constructions.
Inf. Sci., 2020

Threshold trapdoor functions and their applications.
IET Inf. Secur., 2020

2019
KDM security for identity-based encryption: Constructions and separations.
Inf. Sci., 2019

Adding Linkability to Ring Signatures with One-Time Signatures.
Proceedings of the Information Security - 22nd International Conference, 2019

2018
Regular lossy functions and their applications in leakage-resilient cryptography.
Theor. Comput. Sci., 2018

Two-message Key Exchange with Strong Security from Ideal Lattices.
IACR Cryptol. ePrint Arch., 2018

Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation.
IACR Cryptol. ePrint Arch., 2018

Regularly Lossy Functions and Their Applications.
IACR Cryptol. ePrint Arch., 2018

Threshold and Revocation Encryptions via Threshold Trapdoor Function.
CoRR, 2018

On the Security of Classic Protocols for Unique Witness Relations.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Regularly Lossy Functions and Applications.
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018

2017
On Instance Compression, Schnorr/Guillou-Quisquater, and the Security of Classic Protocols for Unique Witness Relations.
IACR Cryptol. ePrint Arch., 2017

From Attack on Feige-Shamir to Construction of Oblivious Transfer.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
Generalized (identity-based) hash proof system and its applications.
Secur. Commun. Networks, 2016

Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange revisited and more.
Int. J. Inf. Sec., 2016

Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes.
IACR Cryptol. ePrint Arch., 2016

Generic constructions of integrated PKE and PEKS.
Des. Codes Cryptogr., 2016

How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model.
Proceedings of the Provable Security, 2015

2014
PRE: Stronger security notions and efficient construction with non-interactive opening.
Theor. Comput. Sci., 2014

Publicly Evaluable Pseudorandom Functions and Their Applications.
IACR Cryptol. ePrint Arch., 2014

Sakai-Ohgishi-Kasahara Non-Interactive Identity-Based Key Exchange Scheme, Revisited.
IACR Cryptol. ePrint Arch., 2014

CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof System.
Comput. J., 2014

Black-Box Separations for One-More (Static) CDH and Its Generalization.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

All-but-One Dual Projective Hashing and Its Applications.
Proceedings of the Applied Cryptography and Network Security, 2014

Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof Systems.
IACR Cryptol. ePrint Arch., 2013

2012
The n-Diffie-Hellman problem and multiple-key encryption.
Int. J. Inf. Sec., 2012

PRE - Stronger Security Notion and Efficient Construction with New Property.
IACR Cryptol. ePrint Arch., 2012

Integrated PKE and PEKS - Stronger Security Notions and New Constructions.
IACR Cryptol. ePrint Arch., 2012

Anonymous Identity-Based Hash Proof System and Its Applications.
Proceedings of the Provable Security - 6th International Conference, 2012

Identity-Based Extractable Hash Proofs and Their Applications.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model.
IACR Cryptol. ePrint Arch., 2011

Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes.
IACR Cryptol. ePrint Arch., 2011

The n-Diffie-Hellman Problem and its Applications.
IACR Cryptol. ePrint Arch., 2011

New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts.
Proceedings of the Information Security Practice and Experience, 2011

A Variant of Boyen-Waters Anonymous IBE Scheme.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

A Novel Commutative Blinding Identity Based Encryption Scheme.
Proceedings of the Foundations and Practice of Security, 2011

A New Leakage-Resilient IBE Scheme in the Relative Leakage Model.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

2010
The Twin Bilinear Diffie-Hellman Inversion Problem and Applications.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

When ABE Meets RSS.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

Identity-based encryption based on DHIES.
Proceedings of the 5th ACM Symposium on Information, 2010

2008
How to Optimize the Cryptographic Symmetric Primitives on Loongson-2E Microprocessor.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008


  Loading...