
Yunlei Zhao
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j19]Huige Wang, Guangye Sui
, Yunlei Zhao, Kefei Chen
:
Efficient SSE With Forward ID-Privacy and Authentication in the Multi-Data-Owner Settings. IEEE Access 9: 10443-10459 (2021) - 2020
- [j18]Huige Wang, Kefei Chen, Yuan Zhang, Yunlei Zhao:
Functional encryption with application to machine learning: simple conversions from generic functions to quadratic functions. Peer Peer Netw. Appl. 13(6): 2334-2341 (2020) - [j17]Huige Wang, Kefei Chen, Tianyu Pan, Yunlei Zhao:
Practical CCA-Secure Functional Encryptions for Deterministic Functions. Secur. Commun. Networks 2020: 8823788:1-8823788:14 (2020) - [c45]Boru Gong, Leixiao Cheng, Yunlei Zhao:
SKCN: Practical and Flexible Digital Signature from Module Lattice. ACISP 2020: 62-81 - [c44]Zhichuang Liang, Shiyu Shen, Yuantao Shi, Dongni Sun, Chongxuan Zhang, Guoyun Zhang, Yunlei Zhao, Zhixiang Zhao:
Number Theoretic Transform: Generalization, Optimization, Concrete Analysis and Applications. Inscrypt 2020: 415-432 - [c43]Yunlei Zhao:
Identity-Based Authenticated Encryption with Identity Confidentiality. ESORICS (2) 2020: 633-653 - [i30]Zhengzhong Jin, Yunlei Zhao:
AKCN-E8: Compact and Flexible KEM from Ideal Lattice. IACR Cryptol. ePrint Arch. 2020: 56 (2020) - [i29]Goichiro Hanaoka, Kazuo Ohta, Yusuke Sakai, Bagus Santoso, Kaoru Takemure, Yunlei Zhao:
Cryptanalysis of Aggregate Γ-Signature and Practical Countermeasures in Application to Bitcoin. IACR Cryptol. ePrint Arch. 2020: 1484 (2020)
2010 – 2019
- 2019
- [j16]Huige Wang
, Yuan Zhang
, Kefei Chen, Guangye Sui, Yunlei Zhao, Xinyi Huang:
Functional broadcast encryption with applications to data sharing for cloud storage. Inf. Sci. 502: 109-124 (2019) - [j15]Zhenfu Cao, Hongbing Wang
, Yunlei Zhao:
AP-PRE: Autonomous Path Proxy Re-Encryption and Its Applications. IEEE Trans. Dependable Secur. Comput. 16(5): 833-842 (2019) - [c42]Zhengzhong Jin, Yunlei Zhao:
Generic and Practical Key Establishment from Lattice. ACNS 2019: 302-322 - [c41]Yuan Li, Hongbing Wang, Yunlei Zhao:
Delegatable Order-Revealing Encryption. AsiaCCS 2019: 134-147 - [c40]Yunlei Zhao:
Practical Aggregate Signature from General Elliptic Curves, and Applications to Blockchain. AsiaCCS 2019: 529-538 - [c39]Chuang Li, Chunxiang Xu, Yunlei Zhao, Kefei Chen, Xiaojun Zhang:
Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC. Inscrypt 2019: 397-415 - [i28]Hongbing Wang, Yunlei Zhao:
Identity-Based Higncryption. IACR Cryptol. ePrint Arch. 2019: 106 (2019) - 2018
- [j14]Meng-Jun Qin, Yunlei Zhao, Zhoujun Ma:
Practical Constant-Size Ring Signature. J. Comput. Sci. Technol. 33(3): 533-541 (2018) - [c38]Guangye Sui, Yunlei Zhao:
Revisiting OAKE in the eCK Security Model. CNS 2018: 9 - [c37]Xingchen Wang
, Yunlei Zhao
:
Order-Revealing Encryption: File-Injection Attack and Forward Security. ESORICS (2) 2018: 101-121 - [i27]Yunlei Zhao:
Aggregation of Gamma-Signatures and Applications to Bitcoin. IACR Cryptol. ePrint Arch. 2018: 414 (2018) - [i26]Yunlei Zhao:
Identity-Concealed Authenticated Encryption and Key Exchange. IACR Cryptol. ePrint Arch. 2018: 1165 (2018) - [i25]Leixiao Cheng, Boru Gong, Yunlei Zhao:
Lattice-Based Signature from Key Consensus. IACR Cryptol. ePrint Arch. 2018: 1180 (2018) - 2017
- [j13]Zeqing Guo
, Weili Han, Liangxing Liu, Wenyuan Xu, Minyue Ni, Yunlei Zhao, Xiaoyang Sean Wang:
Socialized policy administration. Comput. Secur. 67: 232-243 (2017) - [j12]Leixiao Cheng, Quanshui Wu, Yunlei Zhao:
Compact lossy and all-but-one trapdoor functions from lattice. EAI Endorsed Trans. Security Safety 4(12): e4 (2017) - [c36]Leixiao Cheng, Quanshui Wu, Yunlei Zhao:
Compact Lossy and All-but-One Trapdoor Functions from Lattice. ISPEC 2017: 279-296 - [c35]Boru Gong, Yunlei Zhao:
Cryptanalysis of RLWE-Based One-Pass Authenticated Key Exchange. PQCrypto 2017: 163-183 - [i24]Zhengzhong Jin, Yunlei Zhao:
Optimal Key Consensus in Presence of Noise. IACR Cryptol. ePrint Arch. 2017: 1058 (2017) - [i23]Xingchen Wang, Yunlei Zhao:
File-injection Attack and Forward Security for Order-revealing Encryption. IACR Cryptol. ePrint Arch. 2017: 1086 (2017) - 2016
- [j11]Andrew Chi-Chih Yao, Moti Yung, Yunlei Zhao:
Concurrent Knowledge Extraction in Public-Key Models. J. Cryptol. 29(1): 156-219 (2016) - [c34]Tianhao Wang, Yunlei Zhao:
Secure Dynamic SSE via Access Indistinguishable Storage. AsiaCCS 2016: 535-546 - [c33]Yunlei Zhao:
Identity-Concealed Authenticated Encryption and Key Exchange. CCS 2016: 1464-1479 - [c32]Zhoujun Ma, Li Yang, Yunlei Zhao:
Practical Signature Scheme from \varGamma Γ -Protocol. ISPEC 2016: 94-109 - [c31]Hongbing Wang, Yingjiu Li, Zongyang Zhang, Yunlei Zhao:
Efficient Tag Path Authentication Protocol with Less Tag Memory. ISPEC 2016: 255-270 - [i22]Zhengzhong Jin, Yunlei Zhao:
Optimal Key Consensus in Presence of Noise. CoRR abs/1611.06150 (2016) - [i21]Boru Gong, Yunlei Zhao:
Small Field Attack, and Revisiting RLWE-Based Authenticated Key Exchange from Eurocrypt'15. IACR Cryptol. ePrint Arch. 2016: 913 (2016) - 2015
- [j10]Jian Weng
, Yunlei Zhao, Robert H. Deng
, Shengli Liu, Yanjiang Yang, Kouichi Sakurai:
A note on the security of KHL scheme. Theor. Comput. Sci. 602: 1-6 (2015) - [c30]Zongyang Zhang, Yu Chen, Sherman S. M. Chow
, Goichiro Hanaoka
, Zhenfu Cao, Yunlei Zhao:
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model. ProvSec 2015: 435-454 - [i20]Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao:
Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack. IACR Cryptol. ePrint Arch. 2015: 297 (2015) - 2014
- [j9]Andrew Chi-Chih Yao, Yunlei Zhao:
Privacy-Preserving Authenticated Key-Exchange Over Internet. IEEE Trans. Inf. Forensics Secur. 9(1): 125-140 (2014) - [c29]Zongyang Zhang, Yu Chen, Sherman S. M. Chow
, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao:
All-but-One Dual Projective Hashing and Its Applications. ACNS 2014: 181-198 - [c28]Junzuo Lai, Robert H. Deng
, Shengli Liu, Jian Weng, Yunlei Zhao:
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack. EUROCRYPT 2014: 77-92 - [e2]Keita Emura, Goichiro Hanaoka, Yunlei Zhao:
ASIAPKC'14, Proceedings of the 2nd ACM Wookshop on ASIA Public-Key Cryptography, June 3, 2014, Kyoto, Japan. ACM 2014, ISBN 978-1-4503-2801-2 [contents] - 2013
- [j8]Andrew Chi-Chih Yao, Yunlei Zhao:
Online/Offline Signatures for Low-Power Devices. IEEE Trans. Inf. Forensics Secur. 8(2): 283-294 (2013) - [c27]Cheng-Kang Chu, Joseph K. Liu
, Jun Wen Wong, Yunlei Zhao, Jianying Zhou
:
Privacy-preserving smart metering with regional statistics and personal enquiry services. AsiaCCS 2013: 369-380 - [c26]Andrew Chi-Chih Yao, Yunlei Zhao:
OAKE: a new family of implicitly authenticated diffie-hellman protocols. CCS 2013: 1113-1128 - [c25]Shengli Liu, Kouichi Sakurai, Jian Weng, Fangguo Zhang, Yunlei Zhao:
Security Model and Analysis of FHMQV, Revisited. Inscrypt 2013: 255-269 - [c24]Shengli Liu, Jian Weng, Yunlei Zhao:
Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks. CT-RSA 2013: 84-100 - [c23]Junzuo Lai, Robert H. Deng
, Yunlei Zhao, Jian Weng:
Accountable Authority Identity-Based Encryption with Public Traceability. CT-RSA 2013: 326-342 - [e1]Kefei Chen, Qi Xie, Weidong Qiu, Shouhuai Xu, Yunlei Zhao:
Proceedings of the first ACM workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013. ACM 2013, ISBN 978-1-4503-2069-6 [contents] - 2012
- [j7]Chunhua Su, Yingjiu Li, Yunlei Zhao, Robert H. Deng
, Yiming Zhao, Jianying Zhou
:
A Survey on Privacy Frameworks for RFID Authentication. IEICE Trans. Inf. Syst. 95-D(1): 2-11 (2012) - [c22]Shaoying Cai, Robert H. Deng
, Yingjiu Li, Yunlei Zhao:
A New Framework for Privacy of RFID Path Authentication. ACNS 2012: 473-488 - [c21]Goichiro Hanaoka, Yutaka Kawai, Noboru Kunihiro
, Takahiro Matsuda, Jian Weng, Rui Zhang, Yunlei Zhao:
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption. CT-RSA 2012: 349-364 - [c20]Shaoying Cai, Yingjiu Li, Yunlei Zhao:
Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains. SEC 2012: 501-512 - [c19]Andrew C. Yao, Yunlei Zhao:
Computationally-Fair Group and Identity-Based Key-Exchange. TAMC 2012: 237-247 - [i19]Andrew C. Yao, Yunlei Zhao:
Digital Signatures from Challenge-Divided Sigma-Protocols. IACR Cryptol. ePrint Arch. 2012: 1 (2012) - [i18]Andrew C. Yao, Yunlei Zhao:
Computationally-Fair Group and Identity-Based Key-Exchange. IACR Cryptol. ePrint Arch. 2012: 287 (2012) - 2011
- [j6]Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao:
A zero-knowledge based framework for RFID privacy. J. Comput. Secur. 19(6): 1109-1146 (2011) - [c18]Feng Bao, Robert H. Deng
, Xuhua Ding
, Junzuo Lai, Yunlei Zhao:
Hierarchical Identity-Based Chameleon Hash and Its Applications. ACNS 2011: 201-219 - [c17]Guilin Wang, Fubiao Xia, Yunlei Zhao:
Designated Confirmer Signatures with Unified Verification. IMACC 2011: 469-495 - [c16]Jian Weng, Yunlei Zhao, Goichiro Hanaoka:
On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010. Public Key Cryptography 2011: 284-295 - [c15]Kazuki Yoneyama, Yunlei Zhao:
Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage. ProvSec 2011: 348-365 - [i17]Andrew C. Yao, Yunlei Zhao:
A New Family of Practical Non-Malleable Diffie-Hellman Protocols. CoRR abs/1105.1071 (2011) - [i16]Andrew C. Yao, Yunlei Zhao:
A New Family of Practical Non-Malleable Protocols. IACR Cryptol. ePrint Arch. 2011: 35 (2011) - [i15]Guilin Wang, Fubiao Xia, Yunlei Zhao:
Designated Confirmer Signatures With Unified Verification. IACR Cryptol. ePrint Arch. 2011: 182 (2011) - [i14]Jian Weng, Yunlei Zhao:
Direct Constructions of Bidirectional Proxy Re-Encryption with Alleviated Trust in Proxy. IACR Cryptol. ePrint Arch. 2011: 208 (2011) - [i13]Zhenfu Cao, Zongyang Zhang, Yunlei Zhao:
Adaptive Security of Concurrent Non-Malleable Zero-Knowledge. IACR Cryptol. ePrint Arch. 2011: 621 (2011) - 2010
- [c14]Andrew Chi-Chih Yao, Yunlei Zhao:
Deniable Internet Key Exchange. ACNS 2010: 329-348 - [c13]Robert H. Deng
, Yingjiu Li, Moti Yung, Yunlei Zhao:
A New Framework for RFID Privacy. ESORICS 2010: 1-18 - [c12]Andrew Chi-Chih Yao, Moti Yung, Yunlei Zhao:
Concurrent Knowledge Extraction in the Public-Key Model. ICALP (1) 2010: 702-714 - [i12]Robert H. Deng, Yingjiu Li, Andrew C. Yao, Moti Yung, Yunlei Zhao:
A New Framework for RFID Privacy. IACR Cryptol. ePrint Arch. 2010: 59 (2010) - [i11]Andrew C. Yao, Moti Yung, Yunlei Zhao:
Concurrent Knowledge Extraction in the Public-Key Model. IACR Cryptol. ePrint Arch. 2010: 74 (2010) - [i10]Andrew C. Yao, Moti Yung, Yunlei Zhao:
Adaptive Concurrent Non-Malleability with Bare Public-Keys. IACR Cryptol. ePrint Arch. 2010: 107 (2010) - [i9]Jian Weng, Yunlei Zhao:
On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010. IACR Cryptol. ePrint Arch. 2010: 319 (2010)
2000 – 2009
- 2009
- [j5]Andrew Chi-Chih Yao, Frances F. Yao, Yunlei Zhao:
A note on the feasibility of generalised universal composability. Math. Struct. Comput. Sci. 19(1): 193-205 (2009) - [j4]Andrew Chi-Chih Yao, Frances F. Yao, Yunlei Zhao:
A note on universal composable zero-knowledge in the common reference string model. Theor. Comput. Sci. 410(11): 1099-1108 (2009) - [i8]Andrew Chi-Chih Yao, Moti Yung, Yunlei Zhao:
Concurrent Knowledge-Extraction in the Public-Key Model. CoRR abs/0908.2476 (2009) - [i7]Andrew Chi-Chih Yao, Moti Yung, Yunlei Zhao:
Adaptive Concurrent Non-Malleability with Bare Public-Keys. CoRR abs/0910.3282 (2009) - 2007
- [c11]Moti Yung, Yunlei Zhao:
Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model. EUROCRYPT 2007: 129-147 - [c10]Andrew Chi-Chih Yao, Frances F. Yao, Yunlei Zhao:
A Note on Universal Composable Zero Knowledge in Common Reference String Model. TAMC 2007: 462-473 - [c9]Andrew Chi-Chih Yao, Frances F. Yao, Yunlei Zhao:
A Note on the Feasibility of Generalized Universal Composability. TAMC 2007: 474-485 - [i6]Moti Yung, Yunlei Zhao:
Concurrent Knowledge-Extraction in the Public-Key Model. Electron. Colloquium Comput. Complex. 14(002) (2007) - [i5]Andrew Chi-Chih Yao, Frances F. Yao, Yunlei Zhao, Bin B. Zhu:
Deniable Internet Key-Exchange. IACR Cryptol. ePrint Arch. 2007: 191 (2007) - 2006
- [j3]Yunlei Zhao:
A note on the Dwork-Naor timed deniable authentication. Inf. Process. Lett. 100(1): 1-7 (2006) - [c8]Moti Yung, Yunlei Zhao:
Interactive Zero-Knowledge with Restricted Random Oracles. TCC 2006: 21-40 - 2005
- [c7]Yunlei Zhao, Robert H. Deng, Binyu Zang, Yiming Zhao:
Practical Zero-Knowledge Arguments from Sigma-Protocols. WINE 2005: 288-298 - [c6]Yunlei Zhao, Shirley H. C. Cheung, Binyu Zang, Bin B. Zhu:
A Note on the Cramer-Damgård Identification Scheme. WINE 2005: 385-390 - [i4]Moti Yung, Yunlei Zhao:
Constant-Round Concurrently-Secure rZK in the (Real) Bare Public-Key Model. Electron. Colloquium Comput. Complex.(048) (2005) - [i3]Yunlei Zhao, Jesper Buus Nielsen, Robert H. Deng, Dengguo Feng:
Generic yet Practical ZK Arguments from any Public-Coin HVZK. Electron. Colloquium Comput. Complex.(162) (2005) - 2004
- [j2]Yunlei Zhao, Xiaotie Deng
, Chan H. Lee, Hong Zhu:
(2+f(n))-SAT and its properties. Discret. Appl. Math. 136(1): 3-11 (2004) - [j1]Shirley H. C. Cheung, Chan H. Lee, Yunlei Zhao:
Universally Composable Blind Signature Functionality. Int. J. Inf. Technol. Decis. Mak. 3(4): 673-684 (2004) - [c5]Yunlei Zhao, Chan H. Lee, Yiming Zhao, Hong Zhu:
Some Observations on Zap and Its Applications. ACNS 2004: 180-193 - 2003
- [c4]Yunlei Zhao, Xiaotie Deng, Chan H. Lee, Hong Zhu:
Resettable Zero-Knowledge in the Weak Public-Key Model. EUROCRYPT 2003: 123-139 - [i2]Yunlei Zhao:
Concurrent/Resettable Zero-Knowledge With Concurrent Soundness in the Bare Public-Key Model and Its Applications. IACR Cryptol. ePrint Arch. 2003: 265 (2003) - 2002
- [c3]Xiaotie Deng, Chan H. Lee, Yunlei Zhao, Hong Zhu:
(2+ f(n))-SAT and Its Properties. COCOON 2002: 28-36 - [c2]Xiaotie Deng, Chan H. Lee, Yunlei Zhao, Hong Zhu:
Reduction Zero-Knowledge. SCN 2002: 303-317 - [c1]Shirley H. C. Cheung, Xiaotie Deng, Chan H. Lee, Yunlei Zhao:
A New Notion of Soundness in Bare Public-Key Model. SCN 2002: 318-325 - 2001
- [i1]Yunlei Zhao:
New Notions of Soundness and Simultaneous Resettability in the Public-Key Model. IACR Cryptol. ePrint Arch. 2001: 109 (2001)
Coauthor Index
aka: Andrew C. Yao

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-04-11 00:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint