Yunlei Zhao

Orcid: 0000-0002-2623-9170

According to our database1, Yunlei Zhao authored at least 112 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Generalized splitting-ring number theoretic transform.
Frontiers Comput. Sci., August, 2024

cuXCMP: CUDA-Accelerated Private Comparison Based on Homomorphic Encryption.
IEEE Trans. Inf. Forensics Secur., 2024

2023
CARM: CUDA-Accelerated RNS Multiplication in Word-Wise Homomorphic Encryption Schemes for Internet of Things.
IEEE Trans. Computers, July, 2023

Efficient and Strong Symmetric Password Authenticated Key Exchange With Identity Privacy for IoT.
IEEE Internet Things J., 2023

XNET: A Real-Time Unified Secure Inference Framework Using Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023

Implementing and Benchmarking Word-Wise Homomorphic Encryption Schemes on GPU.
IACR Cryptol. ePrint Arch., 2023

cuML-DSA: Optimized Signing Procedure and Server-Oriented GPU Design for ML-DSA.
IACR Cryptol. ePrint Arch., 2023

Leveraging GPU in Homomorphic Encryption: Framework Design and Analysis of BFV Variants.
IACR Cryptol. ePrint Arch., 2023

Optimized Vectorization Implementation of CRYSTALS-Dilithium.
CoRR, 2023

Efficient NTTRU Implementation on ARMv8.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

2022
A Traitor-Resistant and Dynamic Anonymous Communication Service for Cloud-Based VANETs.
IEEE Trans. Serv. Comput., 2022

Compact and Flexible KEM From Ideal Lattice.
IEEE Trans. Inf. Theory, 2022

Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET.
IEEE Trans. Inf. Forensics Secur., 2022

Fine-Grained and Controllably Editable Data Sharing With Accountability in Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2022

Identity-based authenticated encryption with identity confidentiality.
Theor. Comput. Sci., 2022

cuXCMP: CUDA-Accelerated Private Comparison Based on Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2022

CUDA-Accelerated RNS Multiplication in Word-Wise Homomorphic Encryption Schemes.
IACR Cryptol. ePrint Arch., 2022

Tighter Post-quantum Proof for Plain FDH, PFDH and GPV-IBE.
IACR Cryptol. ePrint Arch., 2022

Compact and Efficient NTRU-based KEM with Scalable Ciphertext Compression.
IACR Cryptol. ePrint Arch., 2022

Tight Analysis of Decrypton Failure Probability of Kyber in Reality.
IACR Cryptol. ePrint Arch., 2022

Half-Aggregation of Schnorr Signatures with Tight Reductions.
IACR Cryptol. ePrint Arch., 2022

Number Theoretic Transform and Its Applications in Lattice-based Cryptosystems: A Survey.
CoRR, 2022

High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature.
CoRR, 2022

Tight Analysis of Decryption Failure Probability of Kyber in Reality.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

Parallel Small Polynomial Multiplication for Dilithium: A Faster Design and Implementation.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Fine-Grained and Controllably Redactable Blockchain with Harmful Data Forced Removal.
Secur. Commun. Networks, 2021

Order-Revealing Encryption: File-Injection Attack and Forward Security.
J. Comput. Sci. Technol., 2021

OSKR/OKAI: Systematic Optimization of Key Encapsulation Mechanisms from Module Lattice.
CoRR, 2021

Efficient SSE With Forward ID-Privacy and Authentication in the Multi-Data-Owner Settings.
IEEE Access, 2021

Identity-Based Identity-Concealed Authenticated Key Exchange.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Practical CCA-Secure Functional Encryptions for Deterministic Functions.
Secur. Commun. Networks, 2020

Functional encryption with application to machine learning: simple conversions from generic functions to quadratic functions.
Peer-to-Peer Netw. Appl., 2020

AKCN-E8: Compact and Flexible KEM from Ideal Lattice.
IACR Cryptol. ePrint Arch., 2020

Cryptanalysis of Aggregate Γ-Signature and Practical Countermeasures in Application to Bitcoin.
IACR Cryptol. ePrint Arch., 2020

Identity-Based Authenticated Encryption with Identity Confidentiality.
Proceedings of the Computer Security - ESORICS 2020, 2020

Number Theoretic Transform: Generalization, Optimization, Concrete Analysis and Applications.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

SKCN: Practical and Flexible Digital Signature from Module Lattice.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
AP-PRE: Autonomous Path Proxy Re-Encryption and Its Applications.
IEEE Trans. Dependable Secur. Comput., 2019

Functional broadcast encryption with applications to data sharing for cloud storage.
Inf. Sci., 2019

Identity-Based Higncryption.
IACR Cryptol. ePrint Arch., 2019

Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

Practical Aggregate Signature from General Elliptic Curves, and Applications to Blockchain.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Delegatable Order-Revealing Encryption.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Generic and Practical Key Establishment from Lattice.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Practical Constant-Size Ring Signature.
J. Comput. Sci. Technol., 2018

Identity-Concealed Authenticated Encryption and Key Exchange.
IACR Cryptol. ePrint Arch., 2018

Aggregation of Gamma-Signatures and Applications to Bitcoin.
IACR Cryptol. ePrint Arch., 2018

Lattice-Based Signature from Key Consensus.
IACR Cryptol. ePrint Arch., 2018

Order-Revealing Encryption: File-Injection Attack and Forward Security.
Proceedings of the Computer Security, 2018

Revisiting OAKE in the eCK Security Model.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Compact lossy and all-but-one trapdoor functions from lattice.
EAI Endorsed Trans. Security Safety, 2017

File-injection Attack and Forward Security for Order-revealing Encryption.
IACR Cryptol. ePrint Arch., 2017

Optimal Key Consensus in Presence of Noise.
IACR Cryptol. ePrint Arch., 2017

Socialized policy administration.
Comput. Secur., 2017

Cryptanalysis of RLWE-Based One-Pass Authenticated Key Exchange.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

2016
Concurrent Knowledge Extraction in Public-Key Models.
J. Cryptol., 2016

Small Field Attack, and Revisiting RLWE-Based Authenticated Key Exchange from Eurocrypt'15.
IACR Cryptol. ePrint Arch., 2016

Efficient Tag Path Authentication Protocol with Less Tag Memory.
Proceedings of the Information Security Practice and Experience, 2016

Practical Signature Scheme from \varGamma Γ -Protocol.
Proceedings of the Information Security Practice and Experience, 2016

Secure Dynamic SSE via Access Indistinguishable Storage.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
A note on the security of KHL scheme.
Theor. Comput. Sci., 2015

Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack.
IACR Cryptol. ePrint Arch., 2015

Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model.
Proceedings of the Provable Security, 2015

2014
Privacy-Preserving Authenticated Key-Exchange Over Internet.
IEEE Trans. Inf. Forensics Secur., 2014

All-but-One Dual Projective Hashing and Its Applications.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Online/Offline Signatures for Low-Power Devices.
IEEE Trans. Inf. Forensics Secur., 2013

Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

Accountable Authority Identity-Based Encryption with Public Traceability.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

Security Model and Analysis of FHMQV, Revisited.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

OAKE: a new family of implicitly authenticated diffie-hellman protocols.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Privacy-preserving smart metering with regional statistics and personal enquiry services.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
A Survey on Privacy Frameworks for RFID Authentication.
IEICE Trans. Inf. Syst., 2012

Computationally-Fair Group and Identity-Based Key-Exchange.
IACR Cryptol. ePrint Arch., 2012

Digital Signatures from Challenge-Divided Sigma-Protocols.
IACR Cryptol. ePrint Arch., 2012

Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains.
Proceedings of the Information Security and Privacy Research, 2012

Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

A New Framework for Privacy of RFID Path Authentication.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
A zero-knowledge based framework for RFID privacy.
J. Comput. Secur., 2011

A New Family of Practical Non-Malleable Protocols.
IACR Cryptol. ePrint Arch., 2011

Direct Constructions of Bidirectional Proxy Re-Encryption with Alleviated Trust in Proxy.
IACR Cryptol. ePrint Arch., 2011

Designated Confirmer Signatures With Unified Verification.
IACR Cryptol. ePrint Arch., 2011

Adaptive Security of Concurrent Non-Malleable Zero-Knowledge.
IACR Cryptol. ePrint Arch., 2011

A New Family of Practical Non-Malleable Diffie-Hellman Protocols
CoRR, 2011

Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage.
Proceedings of the Provable Security - 5th International Conference, 2011

On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Hierarchical Identity-Based Chameleon Hash and Its Applications.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Adaptive Concurrent Non-Malleability with Bare Public-Keys.
IACR Cryptol. ePrint Arch., 2010

Concurrent Knowledge Extraction in the Public-Key Model.
IACR Cryptol. ePrint Arch., 2010

On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010.
IACR Cryptol. ePrint Arch., 2010

A New Framework for RFID Privacy.
IACR Cryptol. ePrint Arch., 2010

A New Framework for RFID Privacy.
Proceedings of the Computer Security, 2010

Deniable Internet Key Exchange.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
A note on universal composable zero-knowledge in the common reference string model.
Theor. Comput. Sci., 2009

A note on the feasibility of generalised universal composability.
Math. Struct. Comput. Sci., 2009

2007
Deniable Internet Key-Exchange.
IACR Cryptol. ePrint Arch., 2007

Concurrent Knowledge-Extraction in the Public-Key Model.
Electron. Colloquium Comput. Complex., 2007

A Note on the Feasibility of Generalized Universal Composability.
Proceedings of the Theory and Applications of Models of Computation, 2007

Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model.
Proceedings of the Advances in Cryptology, 2007

2006
A note on the Dwork-Naor timed deniable authentication.
Inf. Process. Lett., 2006

Interactive Zero-Knowledge with Restricted Random Oracles.
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006

2005
Generic yet Practical ZK Arguments from any Public-Coin HVZK
Electron. Colloquium Comput. Complex., 2005

Constant-Round Concurrently-Secure rZK in the (Real) Bare Public-Key Model
Electron. Colloquium Comput. Complex., 2005

Practical Zero-Knowledge Arguments from Sigma-Protocols.
Proceedings of the Internet and Network Economics, First International Workshop, 2005

A Note on the Cramer-Damgård Identification Scheme.
Proceedings of the Internet and Network Economics, First International Workshop, 2005

2004
Universally Composable Blind Signature Functionality.
Int. J. Inf. Technol. Decis. Mak., 2004

(2+f(n))-SAT and its properties.
Discret. Appl. Math., 2004

Some Observations on Zap and Its Applications.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Concurrent/Resettable Zero-Knowledge With Concurrent Soundness in the Bare Public-Key Model and Its Applications.
IACR Cryptol. ePrint Arch., 2003

Resettable Zero-Knowledge in the Weak Public-Key Model.
Proceedings of the Advances in Cryptology, 2003

2002
Reduction Zero-Knowledge.
Proceedings of the Security in Communication Networks, Third International Conference, 2002

A New Notion of Soundness in Bare Public-Key Model.
Proceedings of the Security in Communication Networks, Third International Conference, 2002

2001
New Notions of Soundness and Simultaneous Resettability in the Public-Key Model.
IACR Cryptol. ePrint Arch., 2001


  Loading...