


default search action
Xianhui Lu
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [i19]Zhihao Li, Xuan Shen, Xianhui Lu, Ruida Wang, Yuan Zhao, Zhiwei Wang, Benqiang Wei:
Leveled Functional Bootstrapping via External Product Tree. IACR Cryptol. ePrint Arch. 2025: 22 (2025) - 2024
- [j17]Jean-Philippe Bossuat, Rosario Cammarota, Ilaria Chillotti, Benjamin R. Curtis, Wei Dai, Huijing Gong, Erin Hales, Duhyeong Kim, Bryan Kumara, Changmin Lee, Xianhui Lu, Carsten Maple, Alberto Pedrouzo-Ulloa, Rachel Player, Yuriy Polyakov, Luis Antonio Ruiz Lopez, Yongsoo Song, Donggeon Yhee:
Security Guidelines for Implementing Homomorphic Encryption. IACR Commun. Cryptol. 1(4): 26 (2024) - [j16]Lingyun Li
, Xianhui Lu
, Kunpeng Wang
:
eBiBa: A Post-Quantum Hash-Based Signature With Small Signature Size in the Continuous Communication of Large-Scale Data. Comput. J. 67(4): 1405-1424 (2024) - [j15]Benqiang Wei
, Xianhui Lu:
Improved homomorphic evaluation for hash function based on TFHE. Cybersecur. 7(1): 14 (2024) - [j14]Chen An, Mengjie Huang, Xianhui Lu
, Lei Bi, Weijie Li:
Polar code-based secure transmission with higher message rate combining channel entropy and computational entropy. Cybersecur. 7(1): 36 (2024) - [j13]Ruida Wang
, Ziyi Li
, Xianhui Lu, Zhenfei Zhang, Kunpeng Wang:
Key derivable signature and its application in blockchain stealth address. Cybersecur. 7(1): 43 (2024) - [j12]Weijie Li
, Mengjie Huang, Xianhui Lu
:
Key Exchange for Two-Way Untrusted Relaying Systems Through Constellation Overlapping. IEEE Commun. Lett. 28(3): 478-482 (2024) - [j11]Zhihao Li, Ying Liu, Xianhui Lu, Ruida Wang, Benqiang Wei, Chunling Chen, Kunpeng Wang:
Faster Bootstrapping via Modulus Raising and Composite NTT. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 563-591 (2024) - [j10]Zhihao Li, Xianhui Lu, Zhiwei Wang, Ruida Wang, Ying Liu, Yinhang Zheng, Lutan Zhao, Kunpeng Wang, Rui Hou:
Faster NTRU-based Bootstrapping in less than 4 ms. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 418-451 (2024) - [j9]Benqiang Wei, Xianhui Lu, Ruida Wang, Kun Liu, Zhihao Li, Kunpeng Wang:
Thunderbird: Efficient Homomorphic Evaluation of Symmetric Ciphers in 3GPP by combining two modes of TFHE. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 530-573 (2024) - [j8]Kwok-Yan Lam
, Xianhui Lu
, Linru Zhang
, Xiangning Wang
, Huaxiong Wang
, Si Qi Goh
:
Efficient FHE-Based Privacy-Enhanced Neural Network for Trustworthy AI-as-a-Service. IEEE Trans. Dependable Secur. Comput. 21(5): 4451-4468 (2024) - [j7]Xiao Hu
, Zhihao Li
, Zhongfeng Wang
, Xianhui Lu
:
ALT: Area-Efficient and Low-Latency FPGA Design for Torus Fully Homomorphic Encryption. IEEE Trans. Very Large Scale Integr. Syst. 32(4): 645-657 (2024) - [c59]Ruida Wang
, Benqiang Wei
, Zhihao Li
, Xianhui Lu
, Kunpeng Wang
:
TFHE Bootstrapping: Faster, Smaller and Time-Space Trade-Offs. ACISP (1) 2024: 196-216 - [c58]Senlin Liu
, Tong Gao
, Yijian Liu
, Xianhui Lu
:
Physical-Layer Public Key Encryption Through Massive MIMO. AsiaCCS 2024 - [c57]Ruida Wang
, Yundi Wen
, Zhihao Li
, Xianhui Lu
, Benqiang Wei
, Kun Liu
, Kunpeng Wang
:
Circuit Bootstrapping: Faster and Smaller. EUROCRYPT (2) 2024: 342-372 - [c56]Ying Liu
, Zhihao Li
, Ruida Wang
, Xianhui Lu
, Kunpeng Wang
:
Efficient Blind Rotation in FHEW Using Refined Decomposition and NTT. ISC (1) 2024: 315-334 - [c55]Yao Cheng, Xianhui Lu, Ziyi Li
, Bao Li:
Revisiting Anonymity in Post-quantum Public Key Encryption. PQCrypto (2) 2024: 336-370 - [c54]Ziyi Li, Xianhui Lu, Yao Cheng:
ROM Reduction Failures: Reasons and Solutions. ProvSec (2) 2024: 23-42 - [c53]Yao Cheng, Xianhui Lu, Ziyi Li:
Ideal Public Key Encryption, Revisited. ProvSec (1) 2024: 148-167 - [i18]Ruida Wang, Yundi Wen, Zhihao Li, Xianhui Lu, Benqiang Wei, Kun Liu, Kunpeng Wang:
Circuit Bootstrapping: Faster and Smaller. IACR Cryptol. ePrint Arch. 2024: 323 (2024) - [i17]Jean-Philippe Bossuat, Rosario Cammarota, Jung Hee Cheon, Ilaria Chillotti, Benjamin R. Curtis, Wei Dai, Huijing Gong, Erin Hales, Duhyeong Kim, Bryan Kumara, Changmin Lee, Xianhui Lu, Carsten Maple, Alberto Pedrouzo-Ulloa, Rachel Player, Luis Antonio Ruiz Lopez, Yongsoo Song, Donggeon Yhee, Bahattin Yildiz:
Security Guidelines for Implementing Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2024: 463 (2024) - [i16]Chunling Chen, Xianhui Lu, Ruida Wang, Zhihao Li, Xuan Shen, Benqiang Wei:
Free-XOR Gate Bootstrapping. IACR Cryptol. ePrint Arch. 2024: 1703 (2024) - 2023
- [j6]Yu Wei, Lei Bi
, Xianhui Lu, Kunpeng Wang:
Security estimation of LWE via BKW algorithms. Cybersecur. 6(1): 24 (2023) - [c52]Zhihao Li, Benqiang Wei, Ruida Wang, Xianhui Lu, Kunpeng Wang:
Full Domain Functional Bootstrapping with Least Significant Bit Encoding. Inscrypt (1) 2023: 203-223 - [c51]Benqiang Wei, Xianhui Lu:
Improved Homomorphic Evaluation for Hash Function Based on TFHE. Inscrypt (2) 2023: 399-402 - [c50]Ziyi Li
, Xianhui Lu, Yao Cheng, Bao Li:
Power of Randomness Recovery: Tighter CCA-Secure KEM in the QROM. Inscrypt (2) 2023: 403-406 - [c49]Ruida Wang, Zhihao Li, Benqiang Wei, Chunling Chen, Xianhui Lu, Kunpeng Wang:
Revisiting Key Switching Techniques with Applications to Light-Key FHE. ICISC (1) 2023: 41-64 - [c48]Benqiang Wei
, Ruida Wang
, Zhihao Li
, Qinju Liu
, Xianhui Lu:
Fregata: Faster Homomorphic Evaluation of AES via TFHE. ISC 2023: 392-412 - [c47]Yu Wei
, Lei Bi, Kunpeng Wang, Xianhui Lu:
An Improved BKW Algorithm for Solving LWE with Small Secrets. ISC 2023: 578-595 - [c46]Tong Gao, Xianhui Lu:
Physical Layer Secure Communication based on MIMO Channel Constellation Flipping. TrustCom 2023: 1408-1415 - [i15]Li Sun, Xianhui Lu, Peng Liu, Jianjun Wu, Xiaohu You, Xiaofeng Tao:
Approaching Shannon's One-Time Pad: Metrics, Architectures, and Enabling Technologies. CoRR abs/2303.06359 (2023) - [i14]Kwok-Yan Lam, Xianhui Lu, Linru Zhang, Xiangning Wang, Huaxiong Wang, Si Qi Goh:
Efficient FHE-based Privacy-Enhanced Neural Network for AI-as-a-Service. IACR Cryptol. ePrint Arch. 2023: 647 (2023) - 2022
- [j5]Lingyun Li
, Xianhui Lu, Kunpeng Wang:
Hash-based signature revisited. Cybersecur. 5(1): 13 (2022) - [j4]Lei Bi
, Xianhui Lu, Junjie Luo, Kunpeng Wang, Zhenfei Zhang:
Hybrid dual attack on LWE with arbitrary secrets. Cybersecur. 5(1): 15 (2022) - [c45]Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang:
Hybrid Dual and Meet-LWE Attack. ACISP 2022: 168-188 - [c44]Zhao Chen, Xianhui Lu, Dingding Jia, Bao Li:
IND-CCA Security of Kyber in the Quantum Random Oracle Model, Revisited. Inscrypt 2022: 148-166 - [c43]Zhao Chen, Xianhui Lu, Dingding Jia
, Bao Li:
Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization. ISC 2022: 110-130 - [i13]Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang:
Hybrid Dual and Meet-LWE Attack. IACR Cryptol. ePrint Arch. 2022: 1330 (2022) - 2021
- [c42]Shuaigang Li, Shuqin Fan, Xianhui Lu:
Attacking ECDSA Leaking Discrete Bits with a More Efficient Lattice. Inscrypt 2021: 251-266 - [c41]Chen An, Ying Liu, Xianhui Lu:
Evolution of the Polar Code-Based Encryption Schemes. GLOBECOM (Workshops) 2021: 1-6 - [c40]Mengjie Huang, Ziyi Li
, Dingding Jia, Xianhui Lu:
Survey of Wiretap Channel Security Model. GLOBECOM (Workshops) 2021: 1-6 - [c39]Shuaigang Li, Xianhui Lu, Jiang Zhang, Bao Li, Lei Bi:
Predicting the Concrete Security of LWE Against the Dual Attack Using Binary Search. ICICS (2) 2021: 265-282 - [i12]Lei Bi
, Xianhui Lu, Junjie Luo, Kunpeng Wang, Zhenfei Zhang:
Hybrid Dual Attack on LWE with Arbitrary Secrets. IACR Cryptol. ePrint Arch. 2021: 152 (2021) - 2020
- [j3]Qinju Liu
, Xianhui Lu, Fucai Luo, Shuai Zhou, Jingnan He, Kunpeng Wang:
SecureBP from Homomorphic Encryption. Secur. Commun. Networks 2020: 5328059:1-5328059:9 (2020)
2010 – 2019
- 2019
- [j2]Daode Zhang, Jie Li, Bao Li, Xianhui Lu, Haiyang Xue
, Dingding Jia, Yamin Liu:
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy. Secur. Commun. Networks 2019: 1816393:1-1816393:12 (2019) - [i11]Daode Zhang, Jie Li, Bao Li, Xianhui Lu, Haiyang Xue, Dingding Jia, Yamin Liu:
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy. IACR Cryptol. ePrint Arch. 2019: 51 (2019) - 2018
- [c38]Daode Zhang, Kai Zhang
, Bao Li, Xianhui Lu, Haiyang Xue
, Jie Li:
Lattice-Based Dual Receiver Encryption and More. ACISP 2018: 520-538 - [c37]Haiyang Xue
, Xianhui Lu, Bao Li, Bei Liang
, Jingnan He:
Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism. ASIACRYPT (2) 2018: 158-189 - [c36]Shuai Zhou
, Haiyang Xue
, Daode Zhang, Kunpeng Wang, Xianhui Lu, Bao Li, Jingnan He:
Preprocess-then-NTT Technique and Its Applications to Kyber and NewHope. Inscrypt 2018: 117-137 - [i10]Daode Zhang, Kai Zhang, Bao Li, Xianhui Lu, Haiyang Xue, Jie Li:
Lattice-Based Dual Receiver Encryption and More. IACR Cryptol. ePrint Arch. 2018: 636 (2018) - [i9]Haiyang Xue, Xianhui Lu, Bao Li, Bei Liang, Jingnan He:
Understanding and Constructing AKE via Double-key Key Encapsulation Mechanism. IACR Cryptol. ePrint Arch. 2018: 817 (2018) - [i8]Shuai Zhou, Haiyang Xue, Daode Zhang, Kunpeng Wang, Xianhui Lu, Bao Li, Jingnan He:
Preprocess-then-NTT Technique and Its Applications to KYBER and NEWHOPE. IACR Cryptol. ePrint Arch. 2018: 995 (2018) - [i7]Xianhui Lu, Yamin Liu, Zhenfei Zhang, Dingding Jia, Haiyang Xue, Jingnan He, Bao Li:
LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus. IACR Cryptol. ePrint Arch. 2018: 1009 (2018) - 2017
- [c35]Jingnan He, Wenpan Jing, Bao Li, Xianhui Lu, Dingding Jia:
Dual-Mode Cryptosystem Based on the Learning with Errors Problem. ACISP (2) 2017: 443-451 - [c34]Ling Yang, Xianhui Lu:
An Efficient Dispersal Storage Scheme Based on Ring-LWE and NTT. AsiaJCIS 2017: 23-30 - [c33]Jingnan He, Bao Li, Xianhui Lu, Dingding Jia, Wenpan Jing:
KDM and Selective Opening Secure IBE Based on the LWE Problem. APKC@AsiaCCS 2017: 31-42 - [c32]Dingding Jia, Xianhui Lu, Bao Li:
Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks. CT-RSA 2017: 417-431 - [c31]Jie Li, Daode Zhang, Xianhui Lu, Kunpeng Wang:
Compact (Targeted Homomorphic) Inner Product Encryption from LWE. ICICS 2017: 132-140 - [c30]Daode Zhang, Bao Li, Yamin Liu, Haiyang Xue
, Xianhui Lu, Dingding Jia:
Towards Tightly Secure Deterministic Public Key Encryption. ICICS 2017: 154-161 - [c29]Haiyang Xue
, Bao Li, Xianhui Lu:
IND-PCA Secure KEM Is Enough for Password-Based Authenticated Key Exchange (Short Paper). IWSEC 2017: 231-241 - [i6]Ling Yang, Fuyang Fang, Xianhui Lu, Wen Tao Zhu, Qiongxiao Wang, Shen Yan, Shiran Pan:
A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem. IACR Cryptol. ePrint Arch. 2017: 105 (2017) - 2016
- [c28]Fuyang Fang, Bao Li, Xianhui Lu, Yamin Liu, Dingding Jia, Haiyang Xue
:
(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus. AsiaCCS 2016: 907-912 - [c27]Wenpan Jing, Xianhui Lu, Bao Li:
Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation. Inscrypt 2016: 291-308 - [c26]Yamin Liu, Xianhui Lu, Bao Li, Haiyang Xue
:
Lossy Key Encapsulation Mechanism and Its Applications. ICISC 2016: 126-144 - [c25]Yamin Liu, Xianhui Lu, Bao Li, Wenpan Jing, Fuyang Fang:
Approximate-Deterministic Public Key Encryption from Hard Learning Problems. INDOCRYPT 2016: 25-42 - [c24]Dingding Jia, Xianhui Lu, Bao Li:
Receiver Selective Opening Security from Indistinguishability Obfuscation. INDOCRYPT 2016: 393-410 - [c23]Ling Yang, Fuyang Fang, Xianhui Lu, Wen Tao Zhu, Qiongxiao Wang, Shen Yan, Shiran Pan:
A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem. SecureComm 2016: 392-411 - [i5]Dingding Jia, Xianhui Lu, Bao Li:
Constructions Secure against Receiver Selective Opening and Chosen Ciphertext Attacks. IACR Cryptol. ePrint Arch. 2016: 1083 (2016) - 2015
- [c22]Xiaochao Sun, Bao Li, Xianhui Lu, Fuyang Fang:
CCA Secure Public Key Encryption Scheme Based on LWE Without Gaussian Sampling. Inscrypt 2015: 361-378 - [c21]Xianhui Lu, Bao Li, Dingding Jia:
KDM-CCA Security from RKA Secure Authenticated Encryption. EUROCRYPT (1) 2015: 559-583 - [c20]Haiyang Xue
, Yamin Liu, Xianhui Lu, Bao Li:
Lossy Projective Hashing and Its Applications. INDOCRYPT 2015: 64-84 - [c19]Xiaochao Sun, Bao Li, Xianhui Lu:
Cramer-Shoup Like Chosen Ciphertext Security from LPN. ISPEC 2015: 79-95 - [c18]Jingnan He, Bao Li, Xianhui Lu, Dingding Jia, Haiyang Xue
, Xiaochao Sun:
Identity-Based Lossy Encryption from Learning with Errors. IWSEC 2015: 3-20 - [c17]Fuyang Fang, Bao Li, Xianhui Lu, Xiaochao Sun:
Improved Efficiency of MP12. IWSEC 2015: 193-210 - 2014
- [c16]Haiyang Xue
, Bao Li, Xianhui Lu, Kunpeng Wang, Yamin Liu:
On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP. CANS 2014: 34-49 - [c15]Xianhui Lu, Bao Li, Dingding Jia:
Related-Key Security for Hybrid Encryption. ISC 2014: 19-32 - [c14]Dingding Jia, Bao Li, Xianhui Lu, Qixiang Mei:
Related Key Secure PKE from Hash Proof Systems. IWSEC 2014: 250-265 - [c13]Haiyang Xue
, Xianhui Lu, Bao Li, Yamin Liu:
Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation. ProvSec 2014: 162-177 - 2013
- [c12]Haiyang Xue
, Bao Li, Xianhui Lu, Dingding Jia, Yamin Liu:
Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions. CANS 2013: 235-250 - [c11]Dingding Jia, Bao Li, Xianhui Lu, Yamin Liu:
RSA-OAEP is RKA Secure. Inscrypt 2013: 270-281 - [c10]Xianhui Lu, Bao Li, Yamin Liu:
How to Remove the Exponent GCD in HK09. ProvSec 2013: 239-248 - [c9]Dingding Jia, Xianhui Lu, Bao Li, Qixiang Mei:
RKA Secure PKE Based on the DDH and HR Assumptions. ProvSec 2013: 271-287 - 2012
- [c8]Xianhui Lu, Bao Li, Qixiang Mei, Yamin Liu:
Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring. ISPEC 2012: 34-45 - 2011
- [c7]Yamin Liu, Bao Li, Xianhui Lu, Dingding Jia:
Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key. ACISP 2011: 310-318 - [c6]Xianhui Lu, Bao Li, Qixiang Mei, Yamin Liu:
Improved Tradeoff between Encapsulation and Decapsulation of HK09. Inscrypt 2011: 131-141 - [c5]Yamin Liu, Bao Li, Xianhui Lu, Xiaoying Jia:
Encryption Simulatability Reconsidered. ISPEC 2011: 14-23 - [c4]Qixiang Mei, Bao Li, Xianhui Lu, Dingding Jia:
Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited. Public Key Cryptography 2011: 210-227 - [c3]Xianhui Lu, Bao Li, Qixiang Mei, Haixia Xu:
Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing. ProvSec 2011: 297-308 - 2010
- [c2]Yamin Liu, Bao Li, Xianhui Lu, Yazhe Zhang:
PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples. IWSEC 2010: 40-54 - [i4]Qixiang Mei, Bao Li, Xianhui Lu, Dingding Jia:
Chosen Ciphertext Secure Encryption over Semi-smooth Subgroup. IACR Cryptol. ePrint Arch. 2010: 172 (2010)
2000 – 2009
- 2009
- [j1]Xianhui Lu, Xuejia Lai, Dake He:
Improved efficiency of Kiltz07-KEM. Inf. Process. Lett. 109(18): 1093-1096 (2009) - 2008
- [i3]Yunfeng Li, Dake He, Xianhui Lu:
Accountability of Perfect Concurrent Signature. IACR Cryptol. ePrint Arch. 2008: 301 (2008) - [i2]Xianhui Lu, Xuejia Lai, Dake He:
Improved efficiency of Kiltz07-KEM. IACR Cryptol. ePrint Arch. 2008: 312 (2008) - 2007
- [c1]Li Kang, Xiaohu Tang, Xianhui Lu, Jia Fan:
A Tight Security Reduction Identity-Based Signature Scheme. CIS 2007: 730-734 - [i1]Xianhui Lu, Xuejia Lai, Dake He, Guomin Li:
Weak adaptive chosen ciphertext secure hybrid encryption scheme. IACR Cryptol. ePrint Arch. 2007: 447 (2007)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-21 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint