admin管理员组

文章数量:1794759

oracle forensics,个人主页

oracle forensics,个人主页

​代表性学术论文:

(1)Privacy-Preserving and Standard-Compatible AKA Protocol, The 30th USENIX Security Symposium(USENIX Security,四大安全顶会), 2021,通讯作者

(2)Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication, ACM CCS(四大安全顶会), 2016,第1作者(3)Strong Authentication without Temper-Resistant Hardware and Application to Federated Identities, Network and Distributed System Security Symposium (NDSS,四大安全顶会), 2020,第1作者

(4)Multiple Handshakes Security of TLS 1.3 Candidates, IEEE Symposium on Security & Privacy(四大安全顶会), 2016,通讯作者(5)Dumbo: Faster Asynchronous BFT Protocols, ACM Conference on Computer and Communications Security (CCS,四大安全顶会), 2020,第5作者

(6)IND-CCA-secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited, Advances in Cryptology - CRYPTO(三大密码顶会), 2018,通讯作者

(7)On the Hardness of the Computational Ring-LWR Problem and Its Applications, Advances in Cryptology - ASIACRYPT(三大密码顶会), 2018,通讯作者

(8)Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes, Advances in Cryptology - CRYPTO 2016,Lecture Notes in Computer Science 9816(三大密码顶会), 2016,通讯作者

(9)Authenticated Key Exchange from Ideal Lattices, Advances in Cryptology - EUROCRYPT 2015(三大密码顶会), 2015,通讯作者

(10)Black-box Separations for One-More (Static) CDH and Its Generalization, Advances in Cryptology - ASIACRYPT 2014(三大密码顶会), 2014,通讯作者

(11)Batched Multi-hop Multi-key FHE from Ring-LWE with Compact Ciphertext Extension, Theory of Cryptography Conference(TCC,CCF-B), 2017,通讯作者

(12)Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes, Public-Key Cryptography (PKC, CCF-B), 2020,通讯作者

(13)Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model, Public Key Cryptography (CCF-B), 2019,通讯作者

(14)Simpler Efficient Group Signatures from Lattices, PKC 2015,Lecture Notes in Computer Science 9020, 2015,通讯作者

(15)Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks, Security Standardisation Research - SSR 2015, 2015,第1作者

(16)Accountable Proxy Re-encryption for Secure Data Sharing, IEEE Transactions on Dependable and Secure Computing (CCF-A), 2021,通讯作者

(17)Puncturable Signatures and Applications in_Proof-of-Stake Blockchain Protocols, IEEE Transactions on Information Forensics and Security (CCF-A), 2020,第5作者

(18)Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3, IEEE Transactions on Dependable and Secure Computing(CCF-A), 2017,第3作者​

(19)Towards Secure Data Distribution Systems in Mobile Cloud Computing, IEEE Transactions on Mobile Computing(CCF-A), 2017,第2作者

(20)Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme, IEEE Trans. Parallel Distrib. Syst.(CCF-A), 2013,

(21)UC-secure Two-Server Password-Based Authentication Protocol and Its Applications, ASIACCS(CACR-B), 2016,第2作者

(22)Ciphertext Policy Attribute-Based Encryption from Lattices , ASIACCS(CACR-B), 2012,通讯作者

(23)Generic Traceable Proxy Re-encryption and Accountable Extension in Consensus Network, European Symposium on Research in Computer Security (ESORICS, CCF-B), 2019,第2作者

(24)Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model, Post-quantum Cryptography (CACR-B), 2019,通讯作者

(25)Modular Security Analysis of OAuth 2.0 in the Three-Party Setting, IEEE European Symposium on Security and Privacy, 2020,第3作者

(26)PRE: Stronger Security Notions and Efficient Construction with Non-interactive Opening, Theoretical Computer Science(CCF-B), 2014,通讯作者

(27)Optiwords: A new password policy for creating memorable and strong passwords, Computers & Security (CCF-B), 2019,通讯作者

(28)Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications, Computers & Security (CCF-B), 2019,第2作者

(29)Non-transferable Proxy Re-encryption, The Computer Journal (CCF-B), 2019,通讯作者

(30)LPSE: Lightweight password-strength estimation for password meters, Computers & Security(CCF-B), 2018,第2作者

(31)Attribute-based signature scheme with constant size signature in the standard model, IET Information Security(CACR-B), 2012,第3作者

(32)Certificateless signature: a new security model and an improved generic construction, Des. Codes Cryptography(CCF-B), 2007,第3作者

(33)Certificateless Public-Key Signature: Security Model and Efficient Construction, ACNS, 2006,第1作者

本文标签: oracle forensics个人主页