Yu Long

Orcid: 0000-0002-6575-4458

Affiliations:
  • Shanghai Jiao Tong University, Department of Computer Science and Engineering, China


According to our database1, Yu Long authored at least 50 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Security-Enhanced Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme for Vehicular Ad-Hoc Networks.
IEEE Internet Things J., April, 2024

2023
DPB-MA: Low-Latency Message Authentication Scheme Based on Distributed Verification and Priority in Vehicular Ad Hoc Network.
IEEE Trans. Veh. Technol., April, 2023

Magma: Robust and Flexible Multi-Party Payment Channel.
IEEE Trans. Dependable Secur. Comput., 2023

FaBFT: Flexible Asynchronous BFT Protocol Using DAG.
IACR Cryptol. ePrint Arch., 2023

Accio: Variable-Amount, Optimized-Unlinkable and NIZK-Free Off-Chain Payments via Hubs.
IACR Cryptol. ePrint Arch., 2023

2022
A blockchain-based dynamic and traceable data integrity verification scheme for smart homes.
J. Syst. Archit., 2022

Shaduf++: Non-Cycle and Privacy-Preserving Payment Channel Rebalancing.
IACR Cryptol. ePrint Arch., 2022

MixCT: Mixing Confidential Transactions from Homomorphic Commitment.
IACR Cryptol. ePrint Arch., 2022

Shaduf: Non-Cycle Payment Channel Rebalancing.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

UCC: Universal and Committee-based Cross-chain Framework.
Proceedings of the Information Security Practice and Experience, 2022

Grape: Efficient Hybrid Consensus Protocol Using DAG.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022

DeChain: A Blockchain Framework Enhancing Decentralization via Sharding.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2019
Fork-free hybrid consensus with flexible Proof-of-Activity.
Future Gener. Comput. Syst., 2019

A new VRSA-based pairing-free certificateless signature scheme for fog computing.
Concurr. Comput. Pract. Exp., 2019

A Secure and Practical Blockchain Scheme for IoT.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Making Monero Hard-to-Trace and More Efficient.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Towards a Multi-chain Future of Proof-of-Space.
Proceedings of the Security and Privacy in Communication Networks, 2019

TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-Invisibility.
Proceedings of the Provable Security, 2019

A Practical Dynamic Enhanced BFT Protocol.
Proceedings of the Network and System Security - 13th International Conference, 2019

Gnocchi: Multiplexed Payment Channels for Cryptocurrencies.
Proceedings of the Network and System Security - 13th International Conference, 2019

2018
A new randomized message-locked encryption in the standard model.
Peer-to-Peer Netw. Appl., 2018

Access control encryption with efficient verifiable sanitized decryption.
Inf. Sci., 2018

Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol.
IACR Cryptol. ePrint Arch., 2018

Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain.
Proceedings of the Network and System Security - 12th International Conference, 2018

Dynamic Practical Byzantine Fault Tolerance.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Z-Channel: Scalable and Efficient Scheme in Zerocash.
IACR Cryptol. ePrint Arch., 2017

Forking-Free Hybrid Consensus with Generalized Proof-of-Activity.
IACR Cryptol. ePrint Arch., 2017

An efficient pairing-free certificateless signature scheme for resource-limited systems.
Sci. China Inf. Sci., 2017

An Efficient and Provably Secure Pairing-Free Certificateless Signature Scheme Based on Variant of RSA.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

On member search engine selection using artificial neural network in meta search engine.
Proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science, 2017

2016
Fuzzy certificateless signature.
Secur. Commun. Networks, 2016

Cryptanalysis of a certificateless aggregate signature scheme.
Secur. Commun. Networks, 2016

2015
A Modified Efficient Certificateless Signature Scheme without Bilinear Pairings.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

2014
Attribute-based key-insulated signature and its applications.
Inf. Sci., 2014

On the Security of a Lattice-Based Multi-party Concurrent Signature Scheme.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

2012
Identity-Based Key-Insulated Signcryption.
Informatica, 2012

Accountable authority key policy attribute-based encryption.
Sci. China Inf. Sci., 2012

2011
Restrictive partially blind signature for resource-constrained information systems.
Knowl. Inf. Syst., 2011

Key updating technique in identity-based encryption.
Inf. Sci., 2011

2010
An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks.
Wirel. Sens. Netw., 2010

Practical Certificateless Aggregate Signatures from Bilinear Maps.
J. Inf. Sci. Eng., 2010

Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism.
Inf. Sci., 2010

2009
Provably Secure Identity-based Threshold Key Escrow from Pairing.
Int. J. Netw. Secur., 2009

2007
Certificateless threshold cryptosystem secure against chosen-ciphertext attack.
Inf. Sci., 2007

ID-based threshold decryption secure against adaptive chosen-ciphertext attack.
Comput. Electr. Eng., 2007

Two Certificateless Aggregate Signatures From Bilinear Maps.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Efficient Partially Blind Signature from LFSR.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

2006
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing.
Informatica, 2006

Construction of Dynamic Threshold Decryption Scheme from Pairing.
Int. J. Netw. Secur., 2006

2005
A dynamic threshold commercial key escrow scheme based on conic.
Appl. Math. Comput., 2005


  Loading...