Ziyi Li

Orcid: 0000-0002-3822-5120

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, Key Laboratory of Cyberspace Security Defense, Beijing, China
  • University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China


According to our database1, Ziyi Li authored at least 10 papers between 2021 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Indifferentiability Separations in Ideal Public Key Encryption: Explicit vs. Implicit Rejection.
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025

Ideal Transformations for Public Key Encryption.
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025

2024
Key derivable signature and its application in blockchain stealth address.
Cybersecur., December, 2024

Post-quantum κ-to-1 trapdoor claw-free functions from extrapolated dihedral cosets.
Quantum Inf. Process., May, 2024

ROM Reduction Failures: Reasons and Solutions.
Proceedings of the Provable and Practical Security, 2024

Ideal Public Key Encryption, Revisited.
Proceedings of the Provable and Practical Security, 2024

Revisiting Anonymity in Post-quantum Public Key Encryption.
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024

From Signature with Re-randomizable Keys: Generic Construction of PDPKS.
Proceedings of the Information Security and Cryptology - 20th International Conference, 2024

2023
Power of Randomness Recovery: Tighter CCA-Secure KEM in the QROM.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2021
Survey of Wiretap Channel Security Model.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021


  Loading...