Yupu Hu

Orcid: 0000-0002-1977-0959

According to our database1, Yupu Hu authored at least 161 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Towards Compact Identity-based Encryption on Ideal Lattices.
IACR Cryptol. ePrint Arch., 2024

2023
Improved integral cryptanalysis of SPNbox in digital rights management systems.
IET Inf. Secur., January, 2023

Multi-key Fully Homomorphic Encryption from Additive Homomorphism.
Comput. J., January, 2023

On the Invalidity of LV16/Lin17 Obfuscation Schemes Revisited.
IACR Cryptol. ePrint Arch., 2023

On the Invalidity of LV16/Lin17 Obfuscation Schemes.
IACR Cryptol. ePrint Arch., 2023

2022
Privacy-preserving association rule mining based on electronic medical system.
Wirel. Networks, 2022

Module-LWE-Based Key Exchange Protocol Using Error Reconciliation Mechanism.
Secur. Commun. Networks, 2022

Updatable privacy-preserving itK-nearest neighbor query in location-based s-ervice.
Peer-to-Peer Netw. Appl., 2022

Verifier-local revocation group signatures with backward unlinkability from lattices.
Frontiers Inf. Technol. Electron. Eng., 2022

Privacy-preserving convolutional neural network prediction with low latency and lightweight users.
Int. J. Intell. Syst., 2022

Lattice-based hash-and-sign signatures using approximate trapdoor, revisited.
IET Inf. Secur., 2022

Notes on Reusable Garbling.
IACR Cryptol. ePrint Arch., 2022

Improved key-recovery attacks on reduced-round WEM-8.
Des. Codes Cryptogr., 2022

WARX: efficient white-box block cipher based on ARX primitives and random MDS matrix.
Sci. China Inf. Sci., 2022

Simplified Server-Aided Revocable Identity-Based Encryption from Lattices.
Proceedings of the Provable and Practical Security, 2022

2021
Efficient Private Information Retrieval Protocol with Homomorphically Computing Univariate Polynomials.
Secur. Commun. Networks, 2021

Novel efficient identity-based signature on lattices.
Frontiers Inf. Technol. Electron. Eng., 2021

Analysis on Aigis-Enc: Asymmetrical and symmetrical.
IET Inf. Secur., 2021

Lattice-based revocable attribute-based encryption with decryption key exposure resistance.
IET Inf. Secur., 2021

P/poly Invalidity of the Agr17 Functional Encryption Scheme.
IACR Cryptol. ePrint Arch., 2021

A Note on P/poly Validity of GVW15 Predicate Encryption Scheme.
IACR Cryptol. ePrint Arch., 2021

Size of IK00 Branching Program.
IACR Cryptol. ePrint Arch., 2021

Cryptanalysis of a Fully Anonymous Group Signature with Verifier-Local Revocation from ICICS 2018.
Proceedings of the Network and System Security - 15th International Conference, 2021

On the Analysis of the Outsourced Revocable Identity-Based Encryption from Lattices.
Proceedings of the Network and System Security - 15th International Conference, 2021

Cloud-Aided Scalable Revocable Identity-Based Encryption with Ciphertext Update from Lattices.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

Revocable Identity-Based Encryption with Server-Aided Ciphertext Evolution from Lattices.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

Cryptanalysis of a Lattice-Based Group Signature with Verifier-Local Revocation Achieving Full Security.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts.
Theor. Comput. Sci., 2020

Black-Box Accountable Authority Identity-Based Revocation System.
Comput. J., 2020

Cryptanalysis of Two Fully Anonymous Attribute-Based Group Signature Schemes with Verifier-Local Revocation from Lattices.
Proceedings of the Information Security Applications - 21st International Conference, 2020

2019
Lattice-based Threshold Ring Signature with Message Block Sharing.
KSII Trans. Internet Inf. Syst., 2019

Efficient fuzzy identity-based signature from lattices for identities in a small (or large) universe.
J. Inf. Secur. Appl., 2019

Accountable identity-based encryption with distributed private key generators.
Inf. Sci., 2019

Lattice-based deniable ring signatures.
Int. J. Inf. Sec., 2019

Algebraic Attacks Against Several Weak Variants of GVW'13 ABE.
Int. J. Found. Comput. Sci., 2019

Revisiting BGG<sup>+</sup>14 ABE with weakness analysis.
IET Inf. Secur., 2019

Faster Bootstrapping of FHE over the integers with large prime message space.
IACR Cryptol. ePrint Arch., 2019

Universally composable oblivious transfer from ideal lattice.
Frontiers Comput. Sci., 2019

A new Gaussian sampling for trapdoor lattices with arbitrary modulus.
Des. Codes Cryptogr., 2019

Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption.
IEEE Access, 2019

Smooth Hash Proof System Based on the Learning With Errors Problem With Multi-Bit Key Output.
IEEE Access, 2019

Collusion Trap Against GVW'13 ABE.
IEEE Access, 2019

On New Zero-Knowledge Proofs for Lattice-Based Group Signatures with Verifier-Local Revocation.
Proceedings of the Information Security - 22nd International Conference, 2019

Attribute-Based Signatures for Inner-Product Predicate from Lattices.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with Ease.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
Bootstrapping of FHE over the Integers with Large Message Space.
Secur. Commun. Networks, 2018

D-NTRU: More efficient and average-case IND-CPA secure NTRU variant.
Inf. Sci., 2018

Fully secure hierarchical inner product encryption for privacy preserving keyword searching in cloud.
Int. J. High Perform. Comput. Netw., 2018

Extensional schemes of multipartite non-interactive key exchange from multilinear maps and their applications.
Int. J. High Perform. Comput. Netw., 2018

2017
Quantum security analysis of a lattice-based oblivious transfer protocol.
Frontiers Inf. Technol. Electron. Eng., 2017

Equational Security of a Lattice-based Oblivious Transfer Protocol.
J. Netw. Intell., 2017

Revocable hierarchical identity-based encryption over lattice for pay-TV systems.
Int. J. Embed. Syst., 2017

Constructions of involutions with optimal minimum degree.
IET Inf. Secur., 2017

Improved identification protocol in the quantum random oracle model..
Int. Arab J. Inf. Technol., 2017

Cryptanalysis of multilinear maps from ideal lattices: revisited.
Des. Codes Cryptogr., 2017

2016
Efficient ring signature schemes over NTRU Lattices.
Secur. Commun. Networks, 2016

Multi-use unidirectional lattice-based proxy re-signatures in standard model.
Secur. Commun. Networks, 2016

Revocable and strongly unforgeable identity-based signature scheme in the standard model.
Secur. Commun. Networks, 2016

Efficient quantum dialogue using entangled states and entanglement swapping without information leakage.
Quantum Inf. Process., 2016

Efficient identity-based signature over NTRU lattice.
Frontiers Inf. Technol. Electron. Eng., 2016

Simpler Efficient Group Signature Scheme with Verifier-Local Revocation from Lattices.
KSII Trans. Internet Inf. Syst., 2016

Efficient Certificateless Signature Scheme on NTRU Lattice.
KSII Trans. Internet Inf. Syst., 2016

Chosen-ciphertext secure bidirectional proxy broadcast re-encryption schemes.
Int. J. Inf. Commun. Technol., 2016

New secondary constructions of Bent functions.
Appl. Algebra Eng. Commun. Comput., 2016

Identity-Based Blind Signature from Lattices in Standard Model.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
New method of key-dependent message security for asymmetric encryption.
Secur. Commun. Networks, 2015

Lattice-based multi-use unidirectional proxy re-encryption.
Secur. Commun. Networks, 2015

Revocable Identity-based Signcryption Scheme Without Random Oracles.
Int. J. Netw. Secur., 2015

An Additively Homomorphic Encryption over Large Message Space.
Int. J. Inf. Technol. Web Eng., 2015

An Optimization of Gu Map-1.
IACR Cryptol. ePrint Arch., 2015

A Comment on Gu Map-1.
IACR Cryptol. ePrint Arch., 2015

Cryptanalysis of GGH Map.
IACR Cryptol. ePrint Arch., 2015

Extensional Schemes of Multipartite Non-interactive Key Exchange from Multilinear Maps.
Proceedings of the 10th International Conference on P2P, 2015

An Additively Homomorphic Encryption from Ideal Lattices.
Proceedings of the 10th International Conference on P2P, 2015

2014
Indistinguishable against adaptive chosen ciphertext attack secure public key cryptosystem with double trapdoor decryption mechanism.
Secur. Commun. Networks, 2014

Signature Scheme Using the Root Extraction Problem on Quaternions.
J. Appl. Math., 2014

Secondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functions.
Inf. Sci., 2014

Improvement on a Knapsack-Based Probabilistic Encryption Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model.
Frontiers Comput. Sci., 2014

Lattice-based certificateless encryption scheme.
Frontiers Comput. Sci., 2014

Gaussian sampling of lattices for cryptographic applications.
Sci. China Inf. Sci., 2014

2013
IKE vulnerability discovery based on fuzzing.
Secur. Commun. Networks, 2013

Verifiable symmetric polynomial-based key distribution schemes.
Secur. Commun. Networks, 2013

Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model.
Secur. Commun. Networks, 2013

Sieve Method for Polynomial Linear Equivalence.
J. Appl. Math., 2013

New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2013

An Efficient Biometric Identity Based Signature Scheme.
KSII Trans. Internet Inf. Syst., 2013

Hard fault analysis of Trivium.
Inf. Sci., 2013

An efficient group key agreement scheme for mobile ad-hoc networks.
Int. Arab J. Inf. Technol., 2013

A key-policy attribute-based broadcast encryption.
Int. Arab J. Inf. Technol., 2013

Lattice-based linearly homomorphic signature scheme over binary field.
Sci. China Inf. Sci., 2013

The termination of the F5 algorithm revisited.
Proceedings of the International Symposium on Symbolic and Algebraic Computation, 2013

2012
Guess and Determine Attacks on Filter Generators - Revisited.
IEEE Trans. Inf. Theory, 2012

Constructions of 1-resilient Boolean functions on odd number of variables with a high nonlinearity.
Secur. Commun. Networks, 2012

Correlation power analysis of Trivium.
Secur. Commun. Networks, 2012

Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups.
Math. Comput. Model., 2012

Linear spans of optimal sets of frequency hopping sequences.
RAIRO Theor. Informatics Appl., 2012

New constructions of balanced Boolean functions with high nonlinearity and optimal algebraic degree.
Int. J. Comput. Math., 2012

An Attack on a Fully Homomorphic Encryption Scheme.
IACR Cryptol. ePrint Arch., 2012

Fault analysis of Trivium.
Des. Codes Cryptogr., 2012

Secondary Constructions of Bent Functions and Highly Nonlinear Resilient Functions
CoRR, 2012

Secondary constructions of bent functions and their enforcement.
Adv. Math. Commun., 2012

Direct CCA Secure Identity-Based Broadcast Encryption.
Proceedings of the Network and System Security - 6th International Conference, 2012

2011
A New Correlation Attack on Nonlinear Combining Generators.
IEEE Trans. Inf. Theory, 2011

CCA2 secure biometric identity based encryption with constant-size ciphertext.
J. Zhejiang Univ. Sci. C, 2011

New Constructions of Short Signatures in the Standard Model.
J. Softw., 2011

Secure Identity-based Threshold Broadcast Encryption in the Standard Model.
J. Networks, 2011

New Constructions of Identity-based Broadcast Encryption without Random Oracles.
KSII Trans. Internet Inf. Syst., 2011

Lower Bounds on the Second Order nonlinearity of Boolean Functions.
Int. J. Found. Comput. Sci., 2011

A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions.
Frontiers Comput. Sci. China, 2011

Provably secure multi-proxy signature scheme with revocation in the standard model.
Comput. Commun., 2011

On the value distributions of Walsh spectrums of quadratic Plateaued functions.
Comput. Electr. Eng., 2011

New construction of identity-based encryption with wildcards.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2010
Identity-based Threshold Broadcast Encryption in the Standard Model.
KSII Trans. Internet Inf. Syst., 2010

Certificateless signcryption scheme in the standard model.
Inf. Sci., 2010

A Novel Combinatorial Public Key Cryptosystem.
Informatica, 2010

Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits.
IACR Cryptol. ePrint Arch., 2010

The Lower Bounds on the Second Order Nonlinearity of Cubic Boolean Functions.
IACR Cryptol. ePrint Arch., 2010

Quadratic compact knapsack public-key cryptosystem.
Comput. Math. Appl., 2010

Short Signature from the Bilinear Pairing.
Proceedings of the Information Computing and Applications - First International Conference, 2010

Constructions of Maiorana-McFarland's Bent Functions of Prescribed Degree.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Signature scheme based on the root extraction problem over braid groups.
IET Inf. Secur., 2009

Hard Fault Analysis of Trivium.
IACR Cryptol. ePrint Arch., 2009

Floating Fault analysis of Trivium under Weaker Assumptions.
IACR Cryptol. ePrint Arch., 2009

New Construction of Short Hierarchical ID-Based Signature in the Standard Model.
Fundam. Informaticae, 2009

New related-key rectangle attacks on reduced AES-192 and AES-256.
Sci. China Ser. F Inf. Sci., 2009

A New Knapsack Public-Key Cryptosystem.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Cryptanalysis of a Knapsack Public Key Cryptosystem.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

A Fast Correlation Attack via Parallel Computing.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
NTRUSign With a New Perturbation.
IEEE Trans. Inf. Theory, 2008

Fast S-box security mechanism research based on the polymorphic cipher.
Inf. Sci., 2008

ID-based threshold proxy signcryption scheme from bilinear pairings.
Int. J. Secur. Networks, 2008

Indentity-based broadcast signcryption.
Comput. Stand. Interfaces, 2008

Secure Proxy Multi-signature Scheme in the Standard Model.
Proceedings of the Provable Security, Second International Conference, 2008

An Identity-based Broadcast Encryption Protocol for Ad Hoc Networks.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Evolutionary Algorithm Based Immune Intrusion Analysis Engine.
Proceedings of the Fourth International Conference on Natural Computation, 2008

On the Computational Efficiency of XTR+.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

A Novel Generation Key Scheme Based on DNA.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
A knapsack-based probabilistic encryption scheme.
Inf. Sci., 2007

Key management in ad hoc networks using self-certified public key system.
Int. J. Mob. Commun., 2007

Security Analysis of the Pomykala-Barabasz Scheme.
Fundam. Informaticae, 2007

Impossible differential cryptanalysis of Advanced Encryption Standard.
Sci. China Ser. F Inf. Sci., 2007

Maximum Autocorrelation Analysis of Nonlinear Combining Functions in Stream Ciphers.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Dynamic Group Signature with Forward Security and Its Application.
Proceedings of the Grid and Cooperative Computing, 2007

BSADF: Blind Signature Based Anonymous Digital Fingerprint.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption.
Int. J. Netw. Secur., 2006

Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2006

ECGSC: Elliptic Curve Based Generalized Signcryption.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Computing the <i>k</i>-Error <i>N</i>-Adic Complexity of a Sequence of Period <i>p</i><sup><i>n</i></sup>.
Proceedings of the Sequences and Their Applications, 2006

Diophantine Approximation Attack on a Fast Public Key Cryptosystem.
Proceedings of the Information Security Practice and Experience, 2006

ID-Based ( <i>t</i> , <i>n</i> ) Threshold Proxy Signcryption for Multi-agent Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
A construction of resilient functions with satisfying synthetical cryptographic criteria.
Proceedings of the IEEE ITSOC Information Theory Workshop 2005 on Coding and Complexity, 2005

ID-Based Threshold Unsigncryption Scheme from Pairings.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

Stability of the Linear Complexity of the Generalized Self-shrinking Sequences.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Generalized self-shrinking generator.
IEEE Trans. Inf. Theory, 2004

Stream cipher based on GSS sequences.
Sci. China Ser. F Inf. Sci., 2004

Pseudo-randomness of the fourth class of GSS sequences.
Sci. China Ser. F Inf. Sci., 2004

New construction of resilient functions with satisfying multiple cryptographic criteria.
Proceedings of the 3rd International Conference on Information Security, 2004

Signcryption based on elliptic curve and its multi-party schemes.
Proceedings of the 3rd International Conference on Information Security, 2004

2003
Resilient functions over finite fields.
IEEE Trans. Inf. Theory, 2003


  Loading...