default search action
Rupeng Yang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j9]Jiaming Wen, Willy Susilo, Rupeng Yang, Zuoxia Yu, Huanguo Zhang:
Revocable ring signatures with CCA-anonymity from standard lattices. Comput. Stand. Interfaces 91: 103893 (2025) - 2024
- [c16]Borui Gong, Wang Fat Lau, Man Ho Au, Rupeng Yang, Haiyang Xue, Lichun Li:
Efficient Zero-Knowledge Arguments For Paillier Cryptosystem. SP 2024: 1813-1831 - [i12]Borui Gong, Wang Fat Lau, Man Ho Au, Rupeng Yang, Haiyang Xue, Lichun Li:
Efficient Zero-Knowledge Arguments for Paillier Cryptosystem. IACR Cryptol. ePrint Arch. 2024: 1303 (2024) - 2023
- [c15]Rupeng Yang:
Privately Puncturing PRFs from Lattices: Adaptive Security and Collusion Resistant Pseudorandomness. EUROCRYPT (3) 2023: 163-193 - [i11]Rupeng Yang:
Privately Puncturing PRFs from Lattices: Adaptive Security and Collusion Resistant Pseudorandomness. IACR Cryptol. ePrint Arch. 2023: 234 (2023) - 2022
- [c14]Rupeng Yang, Zuoxia Yu, Man Ho Au, Willy Susilo:
Public-Key Watermarking Schemes for Pseudorandom Functions. CRYPTO (2) 2022: 637-667 - [i10]Rupeng Yang, Zuoxia Yu, Man Ho Au, Willy Susilo:
Public-Key Watermarking Schemes for Pseudorandom Functions. IACR Cryptol. ePrint Arch. 2022: 768 (2022) - 2021
- [j8]Chengyu Hu, Zhen Li, Pengtao Liu, Rupeng Yang, Shanqing Guo, Hailong Zhang:
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks. Mob. Networks Appl. 26(6): 2490-2500 (2021) - [c13]Junzuo Lai, Rupeng Yang, Zhengan Huang, Jian Weng:
Simulation-Based Bi-Selective Opening Security for Public Key Encryption. ASIACRYPT (2) 2021: 456-482 - [i9]Junzuo Lai, Rupeng Yang, Zhengan Huang, Jian Weng:
Simulation-Based Bi-Selective Opening Security for Public Key Encryption. IACR Cryptol. ePrint Arch. 2021: 1268 (2021) - 2020
- [c12]Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo:
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-challenge Setting. ASIACRYPT (1) 2020: 191-220 - [c11]Rupeng Yang, Man Ho Au, Zuoxia Yu, Qiuliang Xu:
Collusion Resistant Watermarkable PRFs from Standard Assumptions. CRYPTO (1) 2020: 590-620 - [i8]Rupeng Yang, Man Ho Au, Zuoxia Yu, Qiuliang Xu:
Collusion Resistant Watermarkable PRFs from Standard Assumptions. IACR Cryptol. ePrint Arch. 2020: 695 (2020) - [i7]Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo:
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting. IACR Cryptol. ePrint Arch. 2020: 1080 (2020) - [i6]Haiyang Xue, Man Ho Au, Rupeng Yang, Bei Liang, Haodong Jiang:
Compact Authenticated Key Exchange in the Quantum Random Oracle Model. IACR Cryptol. ePrint Arch. 2020: 1282 (2020)
2010 – 2019
- 2019
- [j7]Chengyu Hu, Pengtao Liu, Rupeng Yang, Yan Xu:
Public-Key Encryption With Keyword Search via Obfuscation. IEEE Access 7: 37394-37405 (2019) - [j6]Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu:
Decentralized blacklistable anonymous credentials with reputation. Comput. Secur. 85: 353-371 (2019) - [j5]Chengyu Hu, Rupeng Yang, Pengtao Liu, Tong Li, Fanyu Kong:
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience. J. Supercomput. 75(6): 3099-3122 (2019) - [c10]Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Collusion Resistant Watermarking Schemes for Cryptographic Functionalities. ASIACRYPT (1) 2019: 371-398 - [c9]Rupeng Yang, Man Ho Au, Zhenfei Zhang, Qiuliang Xu, Zuoxia Yu, William Whyte:
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications. CRYPTO (1) 2019: 147-175 - [c8]Zuoxia Yu, Man Ho Au, Jiangshan Yu, Rupeng Yang, Qiuliang Xu, Wang Fat Lau:
New Empirical Traceability Analysis of CryptoNote-Style Blockchains. Financial Cryptography 2019: 133-149 - [p1]Zuoxia Yu, Man Ho Au, Rupeng Yang:
Accountable Anonymous Credentials. Advances in Cyber Security 2019: 49-68 - [i5]Rupeng Yang, Man Ho Au, Zhenfei Zhang, Qiuliang Xu, Zuoxia Yu, William Whyte:
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications. IACR Cryptol. ePrint Arch. 2019: 747 (2019) - 2018
- [j4]Zuoxia Yu, Man Ho Au, Qiuliang Xu, Rupeng Yang, Jinguang Han:
Towards leakage-resilient fine-grained access control in fog computing. Future Gener. Comput. Syst. 78: 763-777 (2018) - [j3]Rupeng Yang, Qiuliang Xu, Man Ho Au, Zuoxia Yu, Hao Wang, Lu Zhou:
Position based cryptography with location privacy: A step for Fog Computing. Future Gener. Comput. Syst. 78: 799-806 (2018) - [c7]Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai, Qiuliang Xu:
Lattice-Based Universal Accumulator with Nonmembership Arguments. ACISP 2018: 502-519 - [c6]Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu:
Decentralized Blacklistable Anonymous Credentials with Reputation. ACISP 2018: 720-738 - [c5]Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai, Qiuliang Xu:
Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption. AsiaCCS 2018: 659-672 - [c4]Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Unforgeable Watermarking Schemes with Public Extraction. SCN 2018: 63-80 - 2017
- [c3]Kang Li, Rupeng Yang, Man Ho Au, Qiuliang Xu:
Practical Range Proof for Cryptocurrency Monero with Provable Security. ICICS 2017: 255-262 - [i4]Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu:
Decentralized Blacklistable Anonymous Credentials with Reputation. IACR Cryptol. ePrint Arch. 2017: 389 (2017) - [i3]Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak PRF with Efficient Protocols from LWR. IACR Cryptol. ePrint Arch. 2017: 781 (2017) - [i2]Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Collusion Resistant Watermarking Schemes for Cryptographic Functionalities. IACR Cryptol. ePrint Arch. 2017: 1201 (2017) - 2016
- [j2]Chengyu Hu, Rupeng Yang, Pengtao Liu, Zuoxia Yu, Yongbin Zhou, Qiuliang Xu:
Public-key encryption with keyword search secure against continual memory attacks. Secur. Commun. Networks 9(11): 1613-1629 (2016) - [c2]Zuoxia Yu, Man Ho Au, Qiuliang Xu, Rupeng Yang, Jinguang Han:
Leakage-Resilient Functional Encryption via Pair Encodings. ACISP (1) 2016: 443-460 - 2015
- [j1]Chengyu Hu, Zuoxia Yu, Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Qixia Yuan:
Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption. Int. J. Embed. Syst. 7(3/4): 216-229 (2015) - [c1]Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Rui Zhang, Chengyu Hu, Zuoxia Yu:
Updatable Hash Proof System and Its Applications. ESORICS (1) 2015: 266-285 - 2014
- [i1]Zuoxia Yu, Qiuliang Xu, Yongbin Zhou, Chengyu Hu, Rupeng Yang, Guangjun Fan:
Weak-Key Leakage Resilient Cryptography. IACR Cryptol. ePrint Arch. 2014: 159 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint