Chen, Yanbo; Zhao, Yunlei Half-aggregation of Schnorr signatures with tight reductions. (English) Zbl 1524.94078 Atluri, Vijayalakshmi (ed.) et al., Computer security – ESORICS 2022. 27th European symposium on research in computer security, Copenhagen, Denmark, September 26–30, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13555, 385-404 (2022). MSC: 94A62 PDFBibTeX XMLCite \textit{Y. Chen} and \textit{Y. Zhao}, Lect. Notes Comput. Sci. 13555, 385--404 (2022; Zbl 1524.94078) Full Text: DOI
Wang, Huige; Zhang, Yuan; Chen, Kefei; Sui, Guangye; Zhao, Yunlei; Huang, Xinyi Functional broadcast encryption with applications to data sharing for cloud storage. (English) Zbl 1453.68069 Inf. Sci. 502, 109-124 (2019). MSC: 68P25 68M11 68P20 PDFBibTeX XMLCite \textit{H. Wang} et al., Inf. Sci. 502, 109--124 (2019; Zbl 1453.68069) Full Text: DOI
Yao, Andrew Chi-Chih; Yung, Moti; Zhao, Yunlei Concurrent knowledge extraction in public-key models. (English) Zbl 1351.94072 J. Cryptology 29, No. 1, 156-219 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{A. C. C. Yao} et al., J. Cryptology 29, No. 1, 156--219 (2016; Zbl 1351.94072) Full Text: DOI
Weng, Jian; Zhao, Yunlei; Deng, Robert H.; Liu, Shengli; Yang, Yanjiang; Sakurai, Kouichi A note on the security of KHL scheme. (English) Zbl 1336.94075 Theor. Comput. Sci. 602, 1-6 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Weng} et al., Theor. Comput. Sci. 602, 1--6 (2015; Zbl 1336.94075) Full Text: DOI
Hanaoka, Goichiro; Kawai, Yutaka; Kunihiro, Noboru; Matsuda, Takahiro; Weng, Jian; Zhang, Rui; Zhao, Yunlei Generic construction of chosen ciphertext secure proxy re-encryption. (English) Zbl 1292.94072 Dunkelman, Orr (ed.), Topics in cryptology – CT-RSA 2012. The cryptographers’ track at the RSA conference 2012, San Francisco, CA, USA, February 27–March 2, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27953-9/pbk). Lecture Notes in Computer Science 7178, 349-364 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{G. Hanaoka} et al., Lect. Notes Comput. Sci. 7178, 349--364 (2012; Zbl 1292.94072) Full Text: DOI
Wang, Guilin; Xia, Fubiao; Zhao, Yunlei Designated confirmer signatures with unified verification. (English) Zbl 1291.94201 Chen, Liqun (ed.), Cryptography and coding. 13th IMA international conference, IMACC 2011, Oxford, UK, December 12–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25515-1/pbk). Lecture Notes in Computer Science 7089, 469-495 (2011). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{G. Wang} et al., Lect. Notes Comput. Sci. 7089, 469--495 (2011; Zbl 1291.94201) Full Text: DOI
Yao, Andrew C. C.; Yao, Frances F.; Zhao, Yunlei A note on universal composable zero-knowledge in the common reference string model. (English) Zbl 1169.94011 Theor. Comput. Sci. 410, No. 11, 1099-1108 (2009). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{A. C. C. Yao} et al., Theor. Comput. Sci. 410, No. 11, 1099--1108 (2009; Zbl 1169.94011) Full Text: DOI
Zhao, Yunlei; Deng, Xiaotie; Lee, C. H.; Zhu, Hong (2+\(f\)(\(n\)))-SAT and its properties. (English) Zbl 1159.68467 Discrete Appl. Math. 136, No. 1, 3-11 (2004). MSC: 68Q15 PDFBibTeX XMLCite \textit{Y. Zhao} et al., Discrete Appl. Math. 136, No. 1, 3--11 (2004; Zbl 1159.68467) Full Text: DOI