Yuyu Wang

Orcid: 0000-0002-1198-1903

Affiliations:
  • University of Electronic Science and Technology of China, Chengdu, China
  • Tokyo Institute of Technology, Department of Mathematical and Computing Sciences, Japan (former)
  • National Institute of Advanced Industrial Science and Technology (AIST), Tokyo, Japan (former)


According to our database1, Yuyu Wang authored at least 20 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Fine-Grained Secure Attribute-Based Encryption.
J. Cryptol., October, 2023

Fine-Grained Secure Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2023

Unconditionally Secure NIZK in the Fine-Grained Setting.
IACR Cryptol. ePrint Arch., 2023

A Simple and Efficient Framework of Proof Systems for NP.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security.
IACR Cryptol. ePrint Arch., 2022

2021
Fine-Grained Cryptography Revisited.
J. Cryptol., 2021

Hierarchical Integrated Signature and Encryption.
IACR Cryptol. ePrint Arch., 2021

Hierarchical Integrated Signature and Encryption - (or: Key Separation vs. Key Reuse: Enjoy the Best of both Worlds).
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2019
Shorter QA-NIZK and SPS with Tighter Security.
IACR Cryptol. ePrint Arch., 2019

2018
Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties.
IACR Cryptol. ePrint Arch., 2018

Memory Lower Bounds of Reductions Revisited.
IACR Cryptol. ePrint Arch., 2018

Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation.
IACR Cryptol. ePrint Arch., 2018

2017
Generic Transformation for Signatures in the Continual Leakage Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

How to Strengthen the Security of Signature Schemes in the Leakage Models: A Survey.
Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017

2016
Generic transformations for existentially unforgeable signature schemes in the bounded leakage model.
Secur. Commun. Networks, 2016

Strongly simulation-extractable leakage-resilient NIZK.
Int. J. Inf. Sec., 2016

How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones.
IACR Cryptol. ePrint Arch., 2016

Signatures Resilient to Uninvertible Leakage.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

2015
Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency.
Proceedings of the Provable Security - 8th International Conference, 2014


  Loading...