Zuoxia Yu

According to our database1, Zuoxia Yu authored at least 19 papers between 2014 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Public-Key Watermarking Schemes for Pseudorandom Functions.
IACR Cryptol. ePrint Arch., 2022

2020
Collusion Resistant Watermarkable PRFs from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2020

2019
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications.
IACR Cryptol. ePrint Arch., 2019

New Empirical Traceability Analysis of CryptoNote-Style Blockchains.
Proceedings of the Financial Cryptography and Data Security, 2019

Accountable Anonymous Credentials.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2018
Towards leakage-resilient fine-grained access control in fog computing.
Future Gener. Comput. Syst., 2018

Position based cryptography with location privacy: A step for Fog Computing.
Future Gener. Comput. Syst., 2018

Unforgeable Watermarking Schemes with Public Extraction.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Position Paper on Blockchain Technology: Smart Contract and Applications.
Proceedings of the Network and System Security - 12th International Conference, 2018

Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Lattice-Based Universal Accumulator with Nonmembership Arguments.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Decentralized Blacklistable Anonymous Credentials with Reputation.
IACR Cryptol. ePrint Arch., 2017

Collusion Resistant Watermarking Schemes for Cryptographic Functionalities.
IACR Cryptol. ePrint Arch., 2017

Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak PRF with Efficient Protocols from LWR.
IACR Cryptol. ePrint Arch., 2017

2016
Public-key encryption with keyword search secure against continual memory attacks.
Secur. Commun. Networks, 2016

Leakage-Resilient Functional Encryption via Pair Encodings.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption.
Int. J. Embed. Syst., 2015

Updatable Hash Proof System and Its Applications.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Weak-Key Leakage Resilient Cryptography.
IACR Cryptol. ePrint Arch., 2014


  Loading...