default search action
Yin Li 0001
Person information
- affiliation: Dongguan University of Technology, School of Cyberspace Security, China
- affiliation: Xinyang Normal University, School of Computer and Information Technology, China
- affiliation (PhD 2011): Shanghai Jiao Tong University, China
Other persons with the same name
- Yin Li — disambiguation page
- Yin Li 0002 — Shenzhen University, College of Electronics and Information Engineering, China (and 1 more)
- Yin Li 0003 — University of Wisconsin-Madison, Biostatistics & Medical Informatics, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Shantanu Sharma, Yin Li, Sharad Mehrotra, Nisha Panwar, Peeyush Gupta, Dhrubajyoti Ghosh:
Prism: Privacy-Preserving and Verifiable Set Computation Over Multi-Owner Secret Shared Outsourced Databases. IEEE Trans. Dependable Secur. Comput. 21(3): 1355-1371 (2024) - 2023
- [j29]Shlomi Dolev, Yin Li:
Secret-shared RAM indefinite private and secure RAM execution of perfectly unrevealed programs. Acta Informatica 60(1): 59-78 (2023) - [j28]Shantanu Sharma, Yin Li, Sharad Mehrotra, Nisha Panwar, Komal Kumari, Swagnik Roychoudhury:
Information-Theoretically Secure and Highly Efficient Search and Row Retrieval. Proc. VLDB Endow. 16(10): 2391-2403 (2023) - [i11]Shantanu Sharma, Yin Li, Sharad Mehrotra, Nisha Panwar, Dhrubajyoti Ghosh, Peeyush Gupta:
Prism: Private Set Intersection and Union with Aggregation over Multi-Owner Outsourced Data. IACR Cryptol. ePrint Arch. 2023: 133 (2023) - 2022
- [j27]Wei He, Yu Zhang, Yin Li:
Fast, Searchable, Symmetric Encryption Scheme Supporting Ranked Search. Symmetry 14(5): 1029 (2022) - [j26]Yin Li, Xinyuan Cui, Yu Zhang:
An Efficient CRT-Based Bit-Parallel Multiplier for Special Pentanomials. IEEE Trans. Computers 71(3): 736-742 (2022) - [j25]Peeyush Gupta, Yin Li, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Sumaya Almanee:
Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data. IEEE Trans. Knowl. Data Eng. 34(2): 843-864 (2022) - 2021
- [j24]Yu Zhang, Yin Li:
Efficient Hybrid GF(2m) Multiplier for All-One Polynomial Using Varied Karatsuba Algorithm. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(3): 636-639 (2021) - [j23]Shlomi Dolev, Peeyush Gupta, Yin Li, Sharad Mehrotra, Shantanu Sharma:
Privacy-Preserving Secret Shared Computations Using MapReduce. IEEE Trans. Dependable Secur. Comput. 18(4): 1645-1666 (2021) - [c5]Yin Li, Dhrubajyoti Ghosh, Peeyush Gupta, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma:
PRISM: Private Verifiable Set Computation over Multi-Owner Outsourced Databases. SIGMOD Conference 2021: 1116-1128 - [i10]Yin Li, Dhrubajyoti Ghosh, Peeyush Gupta, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma:
Prism: Private Verifiable Set Computation over Multi-Owner Outsourced Databases. CoRR abs/2104.03354 (2021) - 2020
- [j22]Yu Zhang, Yansong Zhao, Yifan Wang, Yin Li:
Searchable Public Key Encryption Supporting Simple Boolean Keywords Search. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 114-124 (2020) - [j21]Yu Zhang, Wei He, Yin Li:
Efficient Boolean Keywords Search over Encrypted Cloud Data in Public Key Setting. Mob. Inf. Syst. 2020: 2904861:1-2904861:15 (2020) - [j20]Yu Zhang, Yin Li, Yifan Wang:
Efficient Searchable Symmetric Encryption Supporting Dynamic Multikeyword Ranked Search. Secur. Commun. Networks 2020: 7298518:1-7298518:16 (2020) - [j19]Yin Li, Shantanu Sharma, Yu Zhang, Xingpo Ma, Chuanda Qi:
On the Complexity of Hybrid n-Term Karatsuba Multiplier for Trinomials. IEEE Trans. Circuits Syst. I Regul. Pap. 67-I(3): 852-865 (2020) - [j18]Yin Li, Yu Zhang, Wei He:
Fast Hybrid Karatsuba Multiplier for Type II Pentanomials. IEEE Trans. Very Large Scale Integr. Syst. 28(11): 2459-2463 (2020) - [c4]Peeyush Gupta, Yin Li, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma:
Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries. CODASPY 2020: 165-167 - [i9]Peeyush Gupta, Yin Li, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Sumaya Almanee:
Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data - Full Version. CoRR abs/2004.13115 (2020) - [i8]Yin Li, Yu Zhang, Wei He:
Fast hybrid Karatsuba multiplier for Type II pentanomials. IACR Cryptol. ePrint Arch. 2020: 438 (2020) - [i7]Yin Li, Yu Zhang:
An Efficient CRT-based Bit-parallel Multiplier for Special Pentanomials. IACR Cryptol. ePrint Arch. 2020: 696 (2020)
2010 – 2019
- 2019
- [j17]Yu Zhang, Yin Li, Qing Chen:
Fast Asymptotic Square Root for Two Types of Special Pentanomials. IEEE Access 7: 50255-50264 (2019) - [j16]Yu Zhang, Yifan Wang, Yin Li:
Searchable Public Key Encryption Supporting Semantic Multi-Keywords Search. IEEE Access 7: 122078-122090 (2019) - [j15]Yin Li, Yu Zhang, Xiaoli Guo:
Fast Montgomery-Like Square Root Computation for All Trinomials. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(1): 307-309 (2019) - [j14]Xingpo Ma, Junbin Liang, Sijia Yang, Yanling Li, Yin Li, Wenpeng Ma, Tian Wang:
SLS-STQ: A Novel Scheme for Securing Spatial-Temporal Top-k Queries in TWSNs-Based Edge Computing Systems. IEEE Internet Things J. 6(6): 10093-10104 (2019) - [j13]Peeyush Gupta, Yin Li, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Sumaya Almanee:
Obscure: Information-Theoretic Oblivious and Verifiable Aggregation Queries. Proc. VLDB Endow. 12(9): 1030-1043 (2019) - [j12]Yu Zhang, Yin Li, Yifan Wang:
Secure and Efficient Searchable Public Key Encryption for Resource Constrained Environment Based on Pairings under Prime Order Group. Secur. Commun. Networks 2019: 5280806:1-5280806:14 (2019) - [i6]Yin Li, Yu Zhang, Xingpo Ma, Chuanda Qi:
On the Complexity of non-recursive n-term Karatsuba Multiplier for Trinomials. IACR Cryptol. ePrint Arch. 2019: 111 (2019) - 2018
- [j11]Yin Li, Xingpo Ma, Qing Chen, Chuanda Qi:
Efficient Square-Based Montgomery Multiplier for All Type C.1 Pentanomials. IEEE Access 6: 16755-16769 (2018) - [j10]Yin Li, Yu Zhang, Xiaoli Guo, Chuanda Qi:
N-Term Karatsuba Algorithm and its Application to Multiplier Designs for Special Trinomials. IEEE Access 6: 43056-43069 (2018) - [j9]Xingpo Ma, Junbin Liang, Jianxin Wang, Sheng Wen, Tian Wang, Yin Li, Wenpeng Ma, Chuanda Qi:
Secure fine-grained spatio-temporal Top-k queries in TMWSNs. Future Gener. Comput. Syst. 86: 174-184 (2018) - [j8]Yu Zhang, Yin Li, Yifan Wang:
Efficient Public Key Encryption with Disjunctive Keywords Search Using the New Keywords Conversion Method. Inf. 9(11): 272 (2018) - [j7]Yu Zhang, Yin Li, Yifan Wang:
Conjunctive and Disjunctive Keyword Search over Encrypted Mobile Cloud Data in Public Key System. Mob. Inf. Syst. 2018: 3839254:1-3839254:11 (2018) - [j6]Xingpo Ma, Junbin Liang, Ren Ping Liu, Wei Ni, Yin Li, Ran Li, Wenpeng Ma, Chuanda Qi:
A Survey on Data Storage and Information Discovery in the WSANs-Based Edge Computing Systems. Sensors 18(2): 546 (2018) - [j5]Xingpo Ma, Xingjian Liu, Junbin Liang, Yin Li, Ran Li, Wenpeng Ma, Chuanda Qi:
A Comparative Study on Two Typical Schemes for Securing Spatial-Temporal Top-k Queries in Two-Tiered Mobile Wireless Sensor Networks. Sensors 18(3): 871 (2018) - [j4]Yin Li, Yu Zhang, Xiaoli Guo:
Efficient Nonrecursive Bit-Parallel Karatsuba Multiplier for a Special Class of Trinomials. VLSI Design 2018: 9269157:1-9269157:7 (2018) - [j3]Xingpo Ma, Yin Li, Tian Wang, Junbin Liang:
Achieve Adaptive Data Storage and Retrieval Using Mobile Sinks in Wireless Sensor Networks. Wirel. Pers. Commun. 101(3): 1731-1747 (2018) - [i5]Shlomi Dolev, Yin Li, Shantanu Sharma:
Privacy-Preserving Secret Shared Computations using MapReduce. CoRR abs/1801.10323 (2018) - [i4]Yin Li, Yu Zhang, Xiaoli Guo, Chuanda Qi:
N-term Karatsuba Algorithm and its Application to Multiplier designs for Special Trinomials. IACR Cryptol. ePrint Arch. 2018: 605 (2018) - 2017
- [j2]Yin Li, Xingpo Ma, Yu Zhang, Chuanda Qi:
Mastrovito Form of Non-Recursive Karatsuba Multiplier for All Trinomials. IEEE Trans. Computers 66(9): 1573-1584 (2017) - [i3]Yin Li, Yu Zhang:
Fast Montgomery-like Square Root Computation for All Trinomials. IACR Cryptol. ePrint Arch. 2017: 64 (2017) - 2016
- [j1]Shlomi Dolev, Ephraim Korach, Ximing Li, Yin Li, Galit Uzan:
Magnifying computing gaps: Establishing encrypted communication over unidirectional channels. Theor. Comput. Sci. 636: 17-26 (2016) - [c3]Shlomi Dolev, Yin Li, Shantanu Sharma:
Private and Secure Secret Shared MapReduce (Extended Abstract) - (Extended Abstract). DBSec 2016: 151-160 - [i2]Yin Li, Xingpo Ma, Yu Zhang, Chuanda Qi:
Mastrovito form of Karatsuba Multiplier for All Trinomials. IACR Cryptol. ePrint Arch. 2016: 694 (2016) - 2015
- [c2]Shlomi Dolev, Yin Li:
Secret Shared Random Access Machine. ALGOCLOUD 2015: 19-34 - [c1]Alexander Binun, Shlomi Dolev, Yin Li:
Archiving Programs for the Future. SKY 2015: 53-57 - [i1]Shlomi Dolev, Yin Li:
Secret Shared Random Access Machine. IACR Cryptol. ePrint Arch. 2015: 292 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-03 21:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint