


Остановите войну!
for scientists:


default search action
Bo Yang 0003
Person information

- affiliation: Shaanxi Normal University, School of Computer Science, Xi'an, China
- affiliation: Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China
- affiliation (former): South China Argicultural University, Guangzhou, China
- affiliation (PhD 1999): Xidian University, National Key Laboratory of ISN at Xi'an, China
Other persons with the same name
- Bo Yang — disambiguation page
- Bo Yang 0001
— University of Jinan, Shandong Provincial Key Laboratory of Network Based Intelligent Computing, China
- Bo Yang 0002
— Jilin University, College of Computer Science and Technology, Key Laboratory of Symbolic Computation and Knowledge Engineering, Changchun, China
- Bo Yang 0004 — Synopsys, Inc., Mountain View, CA, USA (and 2 more)
- Bo Yang 0005 — Bowie State University
- Bo Yang 0006
— Shanghai Jiao Tong University, Department of Automation, Key Laboratory of System Control and Information Processing, Shanghai, China (and 1 more)
- Bo Yang 0007 — Beijing University of Posts and Telecommunications
- Bo Yang 0008 — Samsung (and 2 more)
- Bo Yang 0009 (aka: Tony Bo Yang) — University of Turku
- Bo Yang 0010 — NVIDIA (and 1 more)
- Bo Yang 0011
— University of Electronic Science and Technology of China, School of Computer Science and Engineering, Chengdu (and 1 more)
- Bo Yang 0012 — Chongqing University of Science and Technology, College of Electrical and Information Engineering, China
- Bo Yang 0013 — IBM China Research Laboratory (and 1 more)
- Bo Yang 0016 — Renmin University of China
- Bo Yang 0017 — Université Michel de Montaigne
- Bo Yang 0018 — Texas Tech University (and 1 more)
- Bo Yang 0019
— Southeast University, School of Instrument Science and Engineering, Nanjing, China (and 1 more)
- Bo Yang 0020
— University of Calgary, Department of Chemical and Petroleum Engineering, AB, Canada
- Bo Yang 0021
— Hunan University, National Supercomputing Center in Changsha, China
- Bo Yang 0022
— University of Electronic Science and Technology of China, School of Automation Engineering, Chengdu, China (and 1 more)
- Bo Yang 0023 — National University of Defense Technology, Department of Computer Sciences, Changsha, China
- Bo Yang 0024
— Nanjing Agricultural University, Department of Information Management, China
- Bo Yang 0025
— Southwest University, College of Electronic and Information Engineering, Chongqing, China
- Bo Yang 0026
— Chinese Academy of Sciences, Institute of Computing Technology, SKL Computer Architecture, Beijing, China (and 1 more)
- Bo Yang 0027
— The Hong Kong Polytechnic University, Department of Computing, HKSAR (and 2 more)
- Bo Yang 0028
— Beijing Forestry University, School of Information Science and Technology, China
- Bo Yang 0029
— Southeast University, Jiangsu Key Laboratory of Urban ITS, Nanjing, China
- Bo Yang 0030 — University of Paris-Sud, Orsay, France
- Bo Yang 0031
— Jiang Xi University of Finance and Economics, School of Information Management, Nanchang, China
- Bo Yang 0032
— Inner Mongolia University, College of Computer Science, Hohhot, China (and 1 more)
- Bo Yang 0033
— University of Central Florida, FL, USA (and 1 more)
- Bo Yang 0034
— Tongji University, Key Laboratory of Embedded System and Service Computing, Shanghai, China
- Bo Yang 0035
— Singapore University of Technology and Design, Engineering Product Development Pillar, Singapore (and 2 more)
- Bo Yang 0036
— Hunan Institute of Science and Technology, College of Information and Communication Engineering, Yueyang, China (and 1 more)
- Bo Yang 0038 — Harbin Engineering University, College of Automation, China
- Bo Yang 0039
— Xi'an Research Institute of High Technology, Department of Control Engineering, China
- Bo Yang 0040
— Beihang University, School of Electronic and Information Engineering, Beijing, China
- Bo Yang 0041
— Xi'an Polytechnic University, School of Computer Science, Shaanxi Key Laboratory of Clothing Intelligence, China (and 1 more)
- Bo Yang 0042
— Chongqing University, State Key Laboratory of Mechanical Transmission, China
- Bo Yang 0043 — Northwest Normal University, Institute of Computer Science and Engineering, Lanzhou, China
- Bo Yang 0044
— University of Tokyo, Institute of Industrial Science, Japan
- Bo Yang 0045 — Alibaba Group, Hangzhou, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j102]Yanwei Zhou, Zhaolong Wang, Zirui Qiao, Ying Wang, Bo Yang, Yi Mu, Mingwu Zhang:
Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption. Comput. J. 66(4): 924-940 (2023) - [j101]Yanwei Zhou
, Lei Cao, Bo Yang, Zhe Xia
, Chunxiang Gu, Mingwu Zhang:
A direct construction of continuous leakage-resilient (H)IBE scheme with CCA security from dual system encryption. Comput. Stand. Interfaces 83: 103668 (2023) - [j100]Shijin Chen, Willy Susilo
, Yudi Zhang, Bo Yang, Mingwu Zhang
:
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing. Comput. Stand. Interfaces 85: 103707 (2023) - [j99]Zhaolong Wang
, Yanwei Zhou
, Zirui Qiao
, Bo Yang
, Chunxiang Gu, Yuan Xu
, Mingwu Zhang
:
An Anonymous and Revocable Authentication Protocol for Vehicle-to-Vehicle Communications. IEEE Internet Things J. 10(6, March 15): 5114-5127 (2023) - [j98]Yanwei Zhou, Lei Cao, Zirui Qiao, Zhe Xia, Bo Yang, Mingwu Zhang, Wenzheng Zhang:
An Efficient Identity Authentication Scheme With Dynamic Anonymity for VANETs. IEEE Internet Things J. 10(11): 10052-10065 (2023) - [j97]Yanwei Zhou
, Ran Xu, Wenzheng Zhang, Zhe Xia
, Bo Yang, Chunxiang Gu, Meijuan Huang:
Public-key encryption scheme with optimal continuous leakage resilience. Inf. Process. Lett. 180: 106318 (2023) - [j96]Zirui Qiao
, Qiliang Yang, Yanwei Zhou
, Bo Yang
, Zhe Xia
, Mingwu Zhang
, Tao Wang:
An Efficient Certificate-Based Aggregate Signature Scheme With Provable Security for Industrial Internet of Things. IEEE Syst. J. 17(1): 72-82 (2023) - [j95]Yuan Xu
, Yanwei Zhou
, Bo Yang
, Zirui Qiao
, Zhaolong Wang
, Zhe Xia
, Mingwu Zhang
:
An Efficient Identity Authentication Scheme With Provable Security and Anonymity for Mobile Edge Computing. IEEE Syst. J. 17(1): 1012-1023 (2023) - 2022
- [j94]Liping Qiao, Yanping Li, Feng Wang, Bo Yang:
Lightweight integrity auditing of edge data for distributed edge computing scenarios. Ad Hoc Networks 133: 102906 (2022) - [j93]Meijuan Huang, Bo Yang, Yanwei Zhou, Xuewei Hu:
Continual Leakage-Resilient Hedged Public-Key Encryption. Comput. J. 65(6): 1574-1585 (2022) - [j92]Wenzheng Zhang, Zirui Qiao, Bo Yang, Yanwei Zhou, Mingwu Zhang:
Continuous Leakage-Amplified Public-Key Encryption With CCA Security. Comput. J. 65(7): 1760-1775 (2022) - [j91]Lina Zhang
, Xiangqin Zheng
, Keping Yu
, Wenjuan Li
, Tao Wang, Xuan Dang, Bo Yang:
Modular-based secret image sharing in Internet of Things: A global progressive-enabled approach. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j90]Xuewei Hu, Bo Yang, Jing Zhang, Meijuan Huang:
Constructing totally disjoint spectra plateaued functions and searching five-value spectrum functions in odd variables. Discret. Appl. Math. 311: 110-128 (2022) - [j89]Yi Zhao, Kaitai Liang, Yanqi Zhao, Bo Yang, Yang Ming, Emmanouil Panaousis:
Practical algorithm substitution attack on extractable signatures. Des. Codes Cryptogr. 90(4): 921-937 (2022) - [j88]Tao Wang
, Jingyi Wang
, Qiliang Yang
, Bo Yang, Haiyu Li, Fei Xu, Zirui Qiao
:
An Efficient Verifiable Searchable Encryption Scheme With Aggregating Authorization for Blockchain-Enabled IoT. IEEE Internet Things J. 9(20): 20666-20680 (2022) - [j87]Xuewei Hu, Bo Yang, Jing Zhang, Meijuan Huang:
Constructions of non-basic totally disjoint spectra plateaued functions for cryptographic applications. J. Inf. Secur. Appl. 71: 103380 (2022) - [j86]Zirui Qiao
, Yanwei Zhou
, Bo Yang
, Mingwu Zhang
, Tao Wang, Zhe Xia:
Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things. IEEE Syst. J. 16(3): 4719-4730 (2022) - [j85]Yuan Su, Yanping Li
, Bo Yang, Yong Ding
:
Decentralized Self-Auditing Scheme With Errors Localization for Multi-Cloud Storage. IEEE Trans. Dependable Secur. Comput. 19(4): 2838-2850 (2022) - [c32]Shijin Chen, Mingwu Zhang
, Bo Yang
:
Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing. ISC 2022: 473-490 - 2021
- [j84]Jiaojiao Wu, Yanping Li, Fang Ren, Bo Yang:
Robust and auditable distributed data storage with scalability in edge computing. Ad Hoc Networks 117: 102494 (2021) - [j83]Yanwei Zhou
, Bo Yang, Zhe Xia, Mingwu Zhang, Yi Mu:
Novel generic construction of leakage-resilient PKE scheme with CCA security. Des. Codes Cryptogr. 89(7): 1575-1614 (2021) - [j82]Jinhui Liu
, Yong Yu, Bo Yang, Jianwei Jia, Qiqi Lai:
Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family. Int. J. Found. Comput. Sci. 32(1): 73-91 (2021) - [j81]Yuan Su, Yanping Li
, Kai Zhang, Bo Yang:
A privacy-preserving public integrity check scheme for outsourced EHRs. Inf. Sci. 542: 112-130 (2021) - [j80]Haiyu Li
, Tao Wang
, Zirui Qiao, Bo Yang, Yueyang Gong, Jingyi Wang, Guoyong Qiu:
Blockchain-based searchable encryption with efficient result verification and fair payment. J. Inf. Secur. Appl. 58: 102791 (2021) - [j79]Yanwei Zhou, Yuan Xu, Zirui Qiao, Bo Yang, Mingwu Zhang:
Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing. Theor. Comput. Sci. 860: 1-22 (2021) - [j78]Kang Yang
, Liqun Chen
, Zhenfeng Zhang, Christopher J. P. Newton
, Bo Yang, Li Xi:
Direct Anonymous Attestation With Optimal TPM Signing Efficiency. IEEE Trans. Inf. Forensics Secur. 16: 2260-2275 (2021) - [j77]Qiliang Yang
, Tao Wang
, Wenbo Zhang
, Bo Yang
, Yong Yu
, Haiyu Li
, Jingyi Wang
, Zirui Qiao:
PrivCrowd: A Secure Blockchain-Based Crowdsourcing Framework with Fine-Grained Worker Selection. Wirel. Commun. Mob. Comput. 2021: 3758782:1-3758782:17 (2021) - 2020
- [j76]Yanwei Zhou, Bo Yang, Tao Wang, Zhe Xia, Hong-xia Hou:
Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings. Comput. J. 63(4): 508-524 (2020) - [j75]Meijuan Huang, Bo Yang, Mingwu Zhang, Lina Zhang, Hong-xia Hou:
Updatable Lossy Trapdoor Functions Under Consecutive Leakage. Comput. J. 63(4): 648-656 (2020) - [j74]Yi Zhao, Jianting Ning, Kaitai Liang, Yanqi Zhao, Liqun Chen, Bo Yang:
Privacy preserving search services against online attack. Comput. Secur. 95: 101836 (2020) - [j73]Xuewei Hu, Bo Yang, Meijuan Huang:
A construction of highly nonlinear Boolean functions with optimal algebraic immunity and low hardware implementation cost. Discret. Appl. Math. 285: 407-422 (2020) - [j72]Yanwei Zhou, Bo Yang:
Practical continuous leakage-resilient CCA secure identity-based encryption. Frontiers Comput. Sci. 14(4): 144804 (2020) - [j71]Meijuan Huang, Bo Yang, Yi Zhao, Xin Wang, Yanwei Zhou, Zhe Xia:
A generic construction of CCA-secure deterministic encryption. Inf. Process. Lett. 154 (2020) - [j70]Hong-xia Hou, Bo Yang, Mingrui Zhang, Yanwei Zhou, Meijuan Huang:
Fully secure wicked identity-based encryption resilient to continual auxiliary- inputs leakage. J. Inf. Secur. Appl. 53: 102521 (2020) - [j69]Yanwei Zhou, Bo Yang, Tao Wang, Yi Mu:
Novel updatable identity-based hash proof system and its applications. Theor. Comput. Sci. 804: 1-28 (2020) - [j68]Yanwei Zhou, Bo Yang, Zhe Xia, Mingwu Zhang, Yi Mu:
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security. Theor. Comput. Sci. 809: 277-295 (2020) - [j67]Yong Yu
, Yannan Li
, Bo Yang, Willy Susilo
, Guomin Yang
, Jian Bai
:
Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage. IEEE Trans. Emerg. Top. Comput. 8(2): 377-390 (2020) - [c31]Zhe Xia, Bo Yang, Yanwei Zhou, Mingwu Zhang, Yi Mu:
Improvement of Attribute-Based Encryption Using Blakley Secret Sharing. ACISP 2020: 631-641
2010 – 2019
- 2019
- [j66]Yi Zhao
, Yong Yu, Bo Yang:
Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications. Comput. J. 62(4): 631-640 (2019) - [j65]Yanwei Zhou
, Bo Yang, Hong-xia Hou, Lina Zhang, Tao Wang, Mingxiao Hu:
Continuous Leakage-Resilient Identity-Based Encryption with Tight Security. Comput. J. 62(8): 1092-1105 (2019) - [j64]Yanwei Zhou
, Bo Yang, Yi Mu:
Continuous leakage-resilient identity-based encryption with leakage amplification. Des. Codes Cryptogr. 87(9): 2061-2090 (2019) - [j63]Yanwei Zhou, Bo Yang, Yi Mu, Tao Wang, Xin Wang:
Identity-based encryption resilient to continuous key leakage. IET Inf. Secur. 13(5): 426-434 (2019) - [j62]Qiqi Lai, Bo Yang, Zhe Xia, Yannan Li
, Yuan Chen, Zhenlong Li:
Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model. Int. J. Found. Comput. Sci. 30(4): 589-606 (2019) - [j61]Liang Xue, Yong Yu
, Yannan Li
, Man Ho Au, Xiaojiang Du, Bo Yang:
Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf. Sci. 479: 640-650 (2019) - [j60]Meijuan Huang, Bo Yang, Yi Zhao, Kaitai Liang, Liang Xue, Xiaoyi Yang:
CCA-Secure Deterministic Identity-Based Encryption Scheme. J. Univers. Comput. Sci. 25(3): 245-269 (2019) - [j59]Xin Wang
, Bo Yang, Zhe Xia, Hong-xia Hou:
A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage. Frontiers Inf. Technol. Electron. Eng. 20(6): 787-800 (2019) - [j58]Tao Wang
, Bo Yang
, Guoyong Qiu, Lina Zhang
, Yong Yu, Yanwei Zhou
, Juncai Guo
:
An Approach Enabling Various Queries on Encrypted Industrial Data Stream. Secur. Commun. Networks 2019: 6293970:1-6293970:12 (2019) - [j57]Yi Zhao
, Kaitai Liang
, Bo Yang
, Liqun Chen
:
CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs. Secur. Commun. Networks 2019: 8357241:1-8357241:8 (2019) - [j56]Yanwei Zhou
, Bo Yang
, Zhe Xia, Yi Mu
, Tao Wang:
Anonymous and Updatable Identity-Based Hash Proof System. IEEE Syst. J. 13(3): 2818-2829 (2019) - [j55]Tao Wang
, Bo Yang, Hongyu Liu, Yong Yu, Guoyong Qiu, Zhe Xia:
An alternative approach to public cloud data auditing supporting data dynamics. Soft Comput. 23(13): 4939-4953 (2019) - [j54]Yanwei Zhou
, Bo Yang, Yi Mu
:
The generic construction of continuous leakage-resilient identity-based cryptosystems. Theor. Comput. Sci. 772: 1-45 (2019) - [c30]Zhe Xia, Lein Harn, Bo Yang, Mingwu Zhang, Yi Mu, Willy Susilo
, Weizhi Meng:
Provably Secure Group Authentication in the Asynchronous Communication Model. ICICS 2019: 324-340 - [c29]Zhe Xia, Bo Yang, Yanwei Zhou, Mingwu Zhang, Hua Shen, Yi Mu:
Provably Secure Proactive Secret Sharing Without the Adjacent Assumption. ProvSec 2019: 247-264 - 2018
- [j53]Yanqi Zhao, Yannan Li
, Qilin Mu, Bo Yang, Yong Yu:
Secure Pub-Sub: Blockchain-Based Fair Payment With Reputation for Reliable Cyber Physical Systems. IEEE Access 6: 12295-12303 (2018) - [j52]Yanwei Zhou
, Bo Yang, Yi Mu, Zhe Xia:
Continuous leakage-resilient access control for wireless sensor networks. Ad Hoc Networks 80: 41-53 (2018) - [j51]Qiqi Lai, Bo Yang, Yong Yu, Yuan Chen, Jian Bai:
Novel Smooth Hash Proof Systems Based on Lattices. Comput. J. 61(4): 561-574 (2018) - [j50]Yanwei Zhou
, Bo Yang, Yi Mu:
Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles. Comput. J. 61(4): 586-600 (2018) - [j49]Jinhui Liu, Yong Yu, Bo Yang, Jianwei Jia, Shijia Wang
, Houzhen Wang:
Structural Key Recovery of Simple Matrix Encryption Scheme Family. Comput. J. 61(12): 1880-1896 (2018) - [j48]Yong Yu, Yannan Li
, Xiaojiang Du, Ruonan Chen, Bo Yang:
Content Protection in Named Data Networking: Challenges and Potential Solutions. IEEE Commun. Mag. 56(11): 82-87 (2018) - [j47]Yannan Li
, Yong Yu, Bo Yang, Geyong Min, Huai Wu:
Privacy preserving cloud data auditing with efficient key update. Future Gener. Comput. Syst. 78: 789-798 (2018) - [j46]Yanwei Zhou
, Bo Yang:
Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing. Inf. Process. Lett. 130: 16-24 (2018) - [j45]Sha Ma
, Yi Mu, Willy Susilo
, Bo Yang:
Witness-based searchable encryption. Inf. Sci. 453: 364-378 (2018) - [j44]Linming Gong, Bo Yang, Tao Xue, Jinguang Chen, Wei Wang:
Secure rational numbers equivalence test based on threshold cryptosystem with rational numbers. Inf. Sci. 466: 44-54 (2018) - [j43]Qiqi Lai, Bo Yang, Yong Yu, Zhe Xia, Yanwei Zhou, Yuan Chen:
Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes. J. Comput. Sci. Technol. 33(6): 1243-1260 (2018) - [j42]Yanwei Zhou
, Bo Yang, Hao Cheng, Qing-long Wang:
Aleakage-resilient certificateless public key encryption scheme with CCA2 security. Frontiers Inf. Technol. Electron. Eng. 19(4): 481-493 (2018) - [j41]Xin Wang, Bo Yang
, Zhe Xia, Yanqi Zhao, Huifang Yu
:
A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing. Secur. Commun. Networks 2018: 6174830:1-6174830:13 (2018) - [j40]Yong Yu, Liang Xue
, Yannan Li
, Xiaojiang Du
, Mohsen Guizani
, Bo Yang:
Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications. IEEE Trans. Ind. Informatics 14(10): 4538-4547 (2018) - [c28]Zhe Xia, Liuying Sun, Bo Yang, Yanwei Zhou, Mingwu Zhang:
Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems. ACISP 2018: 83-100 - [c27]Qiqi Lai, Bo Yang, Yong Yu, Yuan Chen, Liju Dong:
Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model. ACISP 2018: 539-557 - [c26]Zhe Xia, Bo Yang, Mingwu Zhang, Yi Mu:
An Efficient and Provably Secure Private Polynomial Evaluation Scheme. ISPEC 2018: 595-609 - [i7]Yong Yu, Liang Xue, Yannan Li, Xiaojiang Du, Mohsen Guizani, Bo Yang:
Assured Data Deletion with Fine-grained Access Control for Fog-based Industrial Applications. CoRR abs/1804.02834 (2018) - [i6]Yong Yu, Yannan Li, Xiaojiang Du, Ruonan Chen, Bo Yang:
Content Protection in Named Data Networking: Challenges and Potential Solutions. CoRR abs/1810.11179 (2018) - [i5]Kang Yang, Liqun Chen, Zhenfeng Zhang, Chris Newton, Bo Yang, Li Xi:
Direct Anonymous Attestation with Optimal TPM Signing Efficiency. IACR Cryptol. ePrint Arch. 2018: 1128 (2018) - 2017
- [j39]Yi Zhao
, Bo Yang:
Direct constructions and proofs for CCA secure (LR)IBE with dual system encryption. Sci. China Inf. Sci. 60(11): 119104:1-119104:3 (2017) - [j38]Yanwei Zhou, Bo Yang:
Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security. Comput. J. 60(8): 1161-1172 (2017) - [j37]Huifang Yu, Bo Yang:
Pairing-Free and Secure Certificateless Signcryption Scheme. Comput. J. 60(8): 1187-1196 (2017) - [j36]Hui-fang Yu
, Bo Yang:
Low-computation certificateless hybrid signcryption scheme. Frontiers Inf. Technol. Electron. Eng. 18(7): 928-940 (2017) - [j35]Yanwei Zhou, Bo Yang:
Continuous leakage-resilient certificateless public key encryption with CCA security. Knowl. Based Syst. 136: 27-36 (2017) - 2016
- [j34]Bo Yang, Mingwu Zhang, Jun-Qiang Du:
An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing. Concurr. Comput. Pract. Exp. 28(4): 1083-1093 (2016) - [j33]Yanwei Zhou
, Bo Yang, Wenzheng Zhang:
Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing. Discret. Appl. Math. 204: 185-202 (2016) - [j32]Mingwu Zhang, Bo Yang:
Continual key leakage tolerant encryption from extensible set delegation. Secur. Commun. Networks 9(12): 1638-1649 (2016) - [j31]Yanwei Zhou, Bo Yang, Wenzheng Zhang, Yi Mu:
CCA2 secure public-key encryption scheme tolerating continual leakage attacks. Secur. Commun. Networks 9(17): 4505-4519 (2016) - [c25]Bo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin, Dengguo Feng:
AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash. ISC 2016: 130-146 - [i4]Bo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin, Dengguo Feng:
AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version). IACR Cryptol. ePrint Arch. 2016: 494 (2016) - 2015
- [j30]Sha Ma, Mingwu Zhang, Qiong Huang, Bo Yang:
Public Key Encryption with Delegated Equality Test in a Multi-User Setting. Comput. J. 58(4): 986-1002 (2015) - [j29]Zhi-Yi Shao, Bo Yang:
Proof of retrievability with efficient verification. Int. J. Embed. Syst. 7(3/4): 203-215 (2015) - [j28]Yi Zhao, Qiliang Yang, Bo Yang:
Provably Secure Partially Blind Signature Scheme Based on Quadratic Residue. Int. J. Netw. Secur. 17(2): 217-223 (2015) - [j27]Zhi-Yi Shao
, Bo Yang:
On security against the server in designated tester public key encryption with keyword search. Inf. Process. Lett. 115(12): 957-961 (2015) - [j26]Zhi-Yi Shao, Bo Yang:
Private set intersection via public key encryption with keywords search. Secur. Commun. Networks 8(3): 396-402 (2015) - [j25]Sha Ma, Qiong Huang, Mingwu Zhang, Bo Yang:
Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization. IEEE Trans. Inf. Forensics Secur. 10(3): 458-470 (2015) - [c24]Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng:
DAA-TZ: An Efficient DAA Scheme for Mobile Devices Using ARM TrustZone. TRUST 2015: 209-227 - [i3]Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng:
DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone. IACR Cryptol. ePrint Arch. 2015: 654 (2015) - 2014
- [j24]Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi:
Anonymous encryption with partial-order subset delegation and its application in privacy email systems. IET Inf. Secur. 8(4): 240-249 (2014) - [j23]Mingwu Zhang, Chunzhi Wang, Bo Yang, Tsuyoshi Takagi:
Fully secure constructions of spatial encryption with vector privacy. Int. J. Commun. Syst. 27(12): 4307-4327 (2014) - [j22]Min Zhou, Mingwu Zhang, Chunzhi Wang, Bo Yang:
CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction. Int. J. Netw. Secur. 16(2): 157-164 (2014) - [j21]Mingwu Zhang, Bo Yang, Tsuyoshi Takagi:
Anonymous spatial encryption under affine space delegation functionality with full security. Inf. Sci. 277: 715-730 (2014) - [j20]Bo Yang, Xiaoqiong Pang, Jun-Qiang Du, Dan Xie:
Effective Error-Tolerant Keyword Search for Secure Cloud Computing. J. Comput. Sci. Technol. 29(1): 81-89 (2014) - [j19]Sha Ma, Bo Yang, Mingwu Zhang:
PPGJ: A privacy-preserving general join for outsourced encrypted database. Secur. Commun. Networks 7(8): 1232-1244 (2014) - [j18]Mingwu Zhang, Bo Yang, Chunzhi Wang, Tsuyoshi Takagi:
Unbounded anonymous hierarchical IBE with continual-key-leakage tolerance. Secur. Commun. Networks 7(11): 1974-1987 (2014) - 2013
- [j17]Mingwu Zhang, Bo Yang, Tsuyoshi Takagi:
Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate. Comput. J. 56(4): 464-477 (2013) - [j16]Bo Yang, Yong Yu, Ying Sun:
A novel construction of SDVS with secure disavowability. Clust. Comput. 16(4): 807-815 (2013) - [j15]Bo Yang, Chung-Huang Yang, Yong Yu, Dan Xie:
A Secure Scalar Product Protocol and Its Applications to Computational Geometry. J. Comput. 8(8): 2018-2026 (2013) - [j14]Bo Yang, Yong Yu, Chung-Huang Yang:
A Secure Scalar Product Protocol Against Malicious Adversaries. J. Comput. Sci. Technol. 28(1): 152-158 (2013) - [j13]Mingwu Zhang, Bo Yang, Zhenhua Chen, Tsuyoshi Takagi:
Efficient and adaptively secure broadcast encryption systems. Secur. Commun. Networks 6(8): 1044-1052 (2013) - [j12]Jing Liu, Qiong Huang, Bo Yang, Yang Zhang:
Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures. IEEE Trans. Computers 62(8): 1656-1672 (2013) - [c23]Zhiyi Shao, Bo Yang, Yong Yu:
Private Set Intersection via Public Key Encryption with Multiple Keywords Search. INCoS 2013: 323-328 - 2012
- [j11]Mingwu Zhang, Tsuyoshi Takagi, Bo Yang, Fagen Li
:
Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-delegatability and Non-transferability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 259-262 (2012) - [j10]Yong Yu, Yi Mu, Guilin Wang, Qi Xia, Bo Yang:
Improved certificateless signature scheme provably secure in the standard model. IET Inf. Secur. 6(2): 102-110 (2012) - [j9]Mingwu Zhang, Bo Yang, Tsuyoshi Takagi:
Reconciling and improving of multi-receiver signcryption protocols with threshold decryption. Secur. Commun. Networks 5(12): 1430-1440 (2012) - [c22]