BibTeX records: Zuoxia Yu

download as .bib file

@inproceedings{DBLP:conf/crypto/YangYAS22,
  author       = {Rupeng Yang and
                  Zuoxia Yu and
                  Man Ho Au and
                  Willy Susilo},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Public-Key Watermarking Schemes for Pseudorandom Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {637--667},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_22},
  doi          = {10.1007/978-3-031-15979-4\_22},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/YangYAS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangYAS22,
  author       = {Rupeng Yang and
                  Zuoxia Yu and
                  Man Ho Au and
                  Willy Susilo},
  title        = {Public-Key Watermarking Schemes for Pseudorandom Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {768},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/768},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangYAS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/YangAYX20,
  author       = {Rupeng Yang and
                  Man Ho Au and
                  Zuoxia Yu and
                  Qiuliang Xu},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Collusion Resistant Watermarkable PRFs from Standard Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {590--620},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_20},
  doi          = {10.1007/978-3-030-56784-2\_20},
  timestamp    = {Wed, 12 Aug 2020 14:16:56 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/YangAYX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangAYX20,
  author       = {Rupeng Yang and
                  Man Ho Au and
                  Zuoxia Yu and
                  Qiuliang Xu},
  title        = {Collusion Resistant Watermarkable PRFs from Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {695},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/695},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangAYX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangAXY19,
  author       = {Rupeng Yang and
                  Man Ho Au and
                  Qiuliang Xu and
                  Zuoxia Yu},
  title        = {Decentralized blacklistable anonymous credentials with reputation},
  journal      = {Comput. Secur.},
  volume       = {85},
  pages        = {353--371},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2019.05.009},
  doi          = {10.1016/J.COSE.2019.05.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangAXY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/YangALXY19,
  author       = {Rupeng Yang and
                  Man Ho Au and
                  Junzuo Lai and
                  Qiuliang Xu and
                  Zuoxia Yu},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Collusion Resistant Watermarking Schemes for Cryptographic Functionalities},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11921},
  pages        = {371--398},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34578-5\_14},
  doi          = {10.1007/978-3-030-34578-5\_14},
  timestamp    = {Tue, 26 Nov 2019 14:11:51 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/YangALXY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/YangAZXYW19,
  author       = {Rupeng Yang and
                  Man Ho Au and
                  Zhenfei Zhang and
                  Qiuliang Xu and
                  Zuoxia Yu and
                  William Whyte},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness:
                  Construction and Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {147--175},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_6},
  doi          = {10.1007/978-3-030-26948-7\_6},
  timestamp    = {Fri, 09 Aug 2019 14:20:22 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/YangAZXYW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/YuAYYXL19,
  author       = {Zuoxia Yu and
                  Man Ho Au and
                  Jiangshan Yu and
                  Rupeng Yang and
                  Qiuliang Xu and
                  Wang Fat Lau},
  editor       = {Ian Goldberg and
                  Tyler Moore},
  title        = {New Empirical Traceability Analysis of CryptoNote-Style Blockchains},
  booktitle    = {Financial Cryptography and Data Security - 23rd International Conference,
                  {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11598},
  pages        = {133--149},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32101-7\_9},
  doi          = {10.1007/978-3-030-32101-7\_9},
  timestamp    = {Wed, 12 Aug 2020 17:59:02 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/YuAYYXL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/18/YuAY19,
  author       = {Zuoxia Yu and
                  Man Ho Au and
                  Rupeng Yang},
  editor       = {Kuan{-}Ching Li and
                  Xiaofeng Chen and
                  Willy Susilo},
  title        = {Accountable Anonymous Credentials},
  booktitle    = {Advances in Cyber Security: Principles, Techniques, and Applications},
  pages        = {49--68},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-13-1483-4\_3},
  doi          = {10.1007/978-981-13-1483-4\_3},
  timestamp    = {Thu, 14 Oct 2021 08:45:55 +0200},
  biburl       = {https://dblp.org/rec/books/sp/18/YuAY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangAZXYW19,
  author       = {Rupeng Yang and
                  Man Ho Au and
                  Zhenfei Zhang and
                  Qiuliang Xu and
                  Zuoxia Yu and
                  William Whyte},
  title        = {Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness:
                  Construction and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {747},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/747},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangAZXYW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/YuAXYH18,
  author       = {Zuoxia Yu and
                  Man Ho Au and
                  Qiuliang Xu and
                  Rupeng Yang and
                  Jinguang Han},
  title        = {Towards leakage-resilient fine-grained access control in fog computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {78},
  pages        = {763--777},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.01.025},
  doi          = {10.1016/J.FUTURE.2017.01.025},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/YuAXYH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/YangXAYWZ18,
  author       = {Rupeng Yang and
                  Qiuliang Xu and
                  Man Ho Au and
                  Zuoxia Yu and
                  Hao Wang and
                  Lu Zhou},
  title        = {Position based cryptography with location privacy: {A} step for Fog
                  Computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {78},
  pages        = {799--806},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.05.035},
  doi          = {10.1016/J.FUTURE.2017.05.035},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/YangXAYWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YuAYLX18,
  author       = {Zuoxia Yu and
                  Man Ho Au and
                  Rupeng Yang and
                  Junzuo Lai and
                  Qiuliang Xu},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Lattice-Based Universal Accumulator with Nonmembership Arguments},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {502--519},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_29},
  doi          = {10.1007/978-3-319-93638-3\_29},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YuAYLX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YangAXY18,
  author       = {Rupeng Yang and
                  Man Ho Au and
                  Qiuliang Xu and
                  Zuoxia Yu},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Decentralized Blacklistable Anonymous Credentials with Reputation},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {720--738},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_41},
  doi          = {10.1007/978-3-319-93638-3\_41},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YangAXY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YuAYLX18,
  author       = {Zuoxia Yu and
                  Man Ho Au and
                  Rupeng Yang and
                  Junzuo Lai and
                  Qiuliang Xu},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Achieving Flexibility for {ABE} with Outsourcing via Proxy Re-Encryption},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {659--672},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196557},
  doi          = {10.1145/3196494.3196557},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YuAYLX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/MengWWLYLZC18,
  author       = {Weizhi Meng and
                  Jianfeng Wang and
                  Xianmin Wang and
                  Joseph K. Liu and
                  Zuoxia Yu and
                  Jin Li and
                  Yongjun Zhao and
                  Sherman S. M. Chow},
  editor       = {Man Ho Au and
                  Siu{-}Ming Yiu and
                  Jin Li and
                  Xiapu Luo and
                  Cong Wang and
                  Aniello Castiglione and
                  Kamil Kluczniak},
  title        = {Position Paper on Blockchain Technology: Smart Contract and Applications},
  booktitle    = {Network and System Security - 12th International Conference, {NSS}
                  2018, Hong Kong, China, August 27-29, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11058},
  pages        = {474--483},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-02744-5\_35},
  doi          = {10.1007/978-3-030-02744-5\_35},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/MengWWLYLZC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/YangALXY18,
  author       = {Rupeng Yang and
                  Man Ho Au and
                  Junzuo Lai and
                  Qiuliang Xu and
                  Zuoxia Yu},
  editor       = {Dario Catalano and
                  Roberto De Prisco},
  title        = {Unforgeable Watermarking Schemes with Public Extraction},
  booktitle    = {Security and Cryptography for Networks - 11th International Conference,
                  {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11035},
  pages        = {63--80},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98113-0\_4},
  doi          = {10.1007/978-3-319-98113-0\_4},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/YangALXY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangAXY17,
  author       = {Rupeng Yang and
                  Man Ho Au and
                  Qiuliang Xu and
                  Zuoxia Yu},
  title        = {Decentralized Blacklistable Anonymous Credentials with Reputation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {389},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/389},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangAXY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangALXY17,
  author       = {Rupeng Yang and
                  Man Ho Au and
                  Junzuo Lai and
                  Qiuliang Xu and
                  Zuoxia Yu},
  title        = {Lattice-Based Techniques for Accountable Anonymity: Composition of
                  Abstract Stern's Protocols and Weak {PRF} with Efficient Protocols
                  from {LWR}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {781},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/781},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangALXY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangALXY17a,
  author       = {Rupeng Yang and
                  Man Ho Au and
                  Junzuo Lai and
                  Qiuliang Xu and
                  Zuoxia Yu},
  title        = {Collusion Resistant Watermarking Schemes for Cryptographic Functionalities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1201},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1201},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangALXY17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HuYLYZX16,
  author       = {Chengyu Hu and
                  Rupeng Yang and
                  Pengtao Liu and
                  Zuoxia Yu and
                  Yongbin Zhou and
                  Qiuliang Xu},
  title        = {Public-key encryption with keyword search secure against continual
                  memory attacks},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {11},
  pages        = {1613--1629},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1451},
  doi          = {10.1002/SEC.1451},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HuYLYZX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YuAXYH16,
  author       = {Zuoxia Yu and
                  Man Ho Au and
                  Qiuliang Xu and
                  Rupeng Yang and
                  Jinguang Han},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Leakage-Resilient Functional Encryption via Pair Encodings},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {443--460},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_27},
  doi          = {10.1007/978-3-319-40253-6\_27},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YuAXYH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/HuYYXZY15,
  author       = {Chengyu Hu and
                  Zuoxia Yu and
                  Rupeng Yang and
                  Qiuliang Xu and
                  Yongbin Zhou and
                  Qixia Yuan},
  title        = {Weak leakage resilient extractable hash proof system and construction
                  for weak leakage resilient CCA-secure public-key encryption},
  journal      = {Int. J. Embed. Syst.},
  volume       = {7},
  number       = {3/4},
  pages        = {216--229},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJES.2015.072367},
  doi          = {10.1504/IJES.2015.072367},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/HuYYXZY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/YangXZZHY15,
  author       = {Rupeng Yang and
                  Qiuliang Xu and
                  Yongbin Zhou and
                  Rui Zhang and
                  Chengyu Hu and
                  Zuoxia Yu},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Updatable Hash Proof System and Its Applications},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9326},
  pages        = {266--285},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24174-6\_14},
  doi          = {10.1007/978-3-319-24174-6\_14},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/YangXZZHY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuXZHYF14,
  author       = {Zuoxia Yu and
                  Qiuliang Xu and
                  Yongbin Zhou and
                  Chengyu Hu and
                  Rupeng Yang and
                  Guangjun Fan},
  title        = {Weak-Key Leakage Resilient Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {159},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/159},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuXZHYF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics