default search action
Xiaoyuan Yang 0002
Person information
- affiliation: Engineering University of Chinese Armed Police Force (CAPF), Xi'an, China
Other persons with the same name
- Xiaoyuan Yang — disambiguation page
- Xiaoyuan Yang 0001 — Telefonica I+D, Barcelona, Spain (and 1 more)
- Xiaoyuan Yang 0003 — Beihang University, Department of Mathematics and Systems Science, Key Laboratory of Mathematics, Informatics, and Behavioral Semantics, Beijing, China (and 1 more)
- Xiaoyuan Yang 0004 — Boston University, MA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j75]Guangsheng Tu, Wenchao Liu, Tanping Zhou, Xiaoyuan Yang, Fan Zhang:
Concise and Efficient Multi-Identity Fully Homomorphic Encryption Scheme. IEEE Access 12: 49640-49652 (2024) - [j74]Wenchao Liu, Tanping Zhou, Long Chen, Hongjian Yang, Jiang Han, Xiaoyuan Yang:
Round efficient privacy-preserving federated learning based on MKFHE. Comput. Stand. Interfaces 87: 103773 (2024) - [j73]Jun Li, Minqing Zhang, Ke Niu, Yingnan Zhang, Xiaoyuan Yang:
Motion vector-domain video steganalysis exploiting skipped macroblocks. IET Image Process. 18(5): 1132-1144 (2024) - [j72]Yangping Lin, Peng Luo, Zhuo Zhang, Jia Liu, Xiaoyuan Yang:
AI-generated video steganography based on semantic segmentation. IET Image Process. 18(11): 3042-3054 (2024) - [j71]Dong Chen, Tanping Zhou, Wenchao Liu, Ruifeng Li, Liqiang Wu, Xiaoyuan Yang:
MDA-FLH: Multidimensional Data Aggregation Scheme With Fine-Grained Linear Homomorphism for Smart Grid. IEEE Internet Things J. 11(2): 3524-3538 (2024) - [j70]Yuan Tian, Tanping Zhou, Xuan Zhou, Weidong Zhong, Xiaoyuan Yang:
Attribute-based linear homomorphic signature scheme based on key policy for mobile crowdsensing. J. King Saud Univ. Comput. Inf. Sci. 36(6): 102114 (2024) - [j69]Xuan Zhou, Yuan Tian, Weidong Zhong, Tanping Zhou, Xiaoyuan Yang:
A structure-preserving linearly homomorphic signature scheme with designated combiner. PeerJ Comput. Sci. 10: e1978 (2024) - [i27]Yangping Lin, Yan Ke, Ke Niu, Jia Liu, Xiaoyuan Yang:
NeR-VCP: A Video Content Protection Method Based on Implicit Neural Representation. CoRR abs/2408.15281 (2024) - 2023
- [j68]Zichao Song, Tanping Zhou, Weidong Zhong, Dong Chen, Longfei Liu, Xiaoyuan Yang:
Fault-Tolerant Data Aggregation Scheme Supporting Fine-Grained Linear Operation in Smart Grid. IEEE Access 11: 68525-68537 (2023) - [j67]Jun Li, Minqing Zhang, Ke Niu, Xiaoyuan Yang:
Investigation on principles for cost assignment in motion vector-based video steganography. J. Inf. Secur. Appl. 73: 103439 (2023) - [j66]Xiaoliang Che, Longfei Liu, Baocang Wang, Yiliang Han, Xu An Wang, Xiaoyuan Yang, Tanping Zhou:
Multi-key homomorphic encryption with tightened RGSW ciphertexts without relinearization for ciphertexts product. J. King Saud Univ. Comput. Inf. Sci. 35(10): 101794 (2023) - [j65]Xiuguang Li, Zhengge Yi, Ruifeng Li, Xu-An Wang, Hui Li, Xiaoyuan Yang:
SM2-Based Offline/Online Efficient Data Integrity Verification Scheme for Multiple Application Scenarios. Sensors 23(9): 4307 (2023) - [j64]Yao Liu, Tanping Zhou, Zelun Yue, Wenchao Liu, Yiliang Han, Qi Li, Xiaoyuan Yang:
Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing. IEEE Trans. Cloud Comput. 11(1): 564-578 (2023) - [j63]Tanping Zhou, Dong Chen, Wenchao Liu, Xiaoyuan Yang:
Attacks and Improvement of Unlinkability of Biometric Template Protection Scheme Based on Bloom Filters. IEEE Trans. Cloud Comput. 11(3): 3251-3261 (2023) - [c46]Dong Chen, Tanping Zhou, Wenchao Liu, Zichen Zhou, Yujie Ding, Xiaoyuan Yang:
Construction of a Fully Homomorphic Encryption Scheme with Shorter Ciphertext and Its Implementation on the CUDA Platform. EIDWT 2023: 141-151 - [i26]Yan Ke, Minqing Zhang, Jia Liu, Xiaoyuan Yang:
The Realizations of Steganography in Encrypted Domain. CoRR abs/2304.02614 (2023) - [i25]Jun Li, Minqing Zhang, Ke Niu, Yingnan Zhang, Xiaoyuan Yang:
A One-dimensional HEVC video steganalysis method using the Optimality of Predicted Motion Vectors. CoRR abs/2308.06464 (2023) - [i24]Jun Li, Minqing Zhang, Ke Niu, Yingnan Zhang, Xiaoyuan Yang:
Motion Vector-Domain Video Steganalysis Exploiting Skipped Macroblocks. CoRR abs/2310.07121 (2023) - [i23]Xu An Wang, Lunhai Pan, Hao Liu, Xiaoyuan Yang:
Traitor Tracing Revisited: New Attackers, Stronger Security Model and New Construction. IACR Cryptol. ePrint Arch. 2023: 1692 (2023) - 2022
- [j62]Liqiang Wu, Xiaoyuan Yang, Minqing Zhang, Xu An Wang:
IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability. J. Ambient Intell. Humaniz. Comput. 13(1): 469-482 (2022) - [j61]Ruifeng Li, Xu An Wang, Haibin Yang, Ke Niu, Dianhua Tang, Xiaoyuan Yang:
Efficient certificateless public integrity auditing of cloud data with designated verifier for batch audit. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8079-8089 (2022) - [j60]Liqiang Wu, Yiliang Han, Xiaoyuan Yang, Minqing Zhang:
Identity-based threshold proxy re-encryption scheme from lattices and its applications. Frontiers Inf. Technol. Electron. Eng. 23(2): 258-277 (2022) - [j59]Weidong Du, Min Li, Xiaoyuan Yang, Liqiang Wu, Tanping Zhou:
VCFL: A verifiable and collusion attack resistant privacy preserving framework for cross-silo federated learning. Pervasive Mob. Comput. 86: 101697 (2022) - [j58]Yan Ke, Minqing Zhang, Xinpeng Zhang, Jia Liu, Tingting Su, Xiaoyuan Yang:
A Reversible Data Hiding Scheme in Encrypted Domain for Secret Image Sharing Based on Chinese Remainder Theorem. IEEE Trans. Circuits Syst. Video Technol. 32(4): 2469-2481 (2022) - [c45]Wenyong Yuan, Ruifeng Li, Zhengge Yi, Pei Chen, Haibin Yang, Xiaoyuan Yang:
Secure Cloud Data Storage with Selecting Auditors. NaNA 2022: 157-162 - [i22]Jun Li, Minqing Zhang, Ke Niu, Xiaoyuan Yang:
Investigation on Principles for Cost Assignment in Motion Vector-based Video Steganography. CoRR abs/2209.01744 (2022) - 2021
- [j57]Tanping Zhou, Ningbo Li, Qiqi Lai, Xiaoyuan Yang, Yiliang Han, Wenchao Liu:
Efficient multi-key fully homomorphic encryption over prime cyclotomic rings with fewer relinearisations. IET Inf. Secur. 15(6): 472-486 (2021) - [j56]Haibin Yang, Zhengge Yi, Ruifeng Li, Zheng Tu, Xu An Wang, Yuanyou Cui, Xiaoyuan Yang:
Improved Outsourced Provable Data Possession for Secure Cloud Storage. Secur. Commun. Networks 2021: 1805615:1-1805615:12 (2021) - [j55]Xinliang Bi, Xiaoyuan Yang, Chao Wang, Jia Liu:
High-Capacity Image Steganography Algorithm Based on Image Style Transfer. Secur. Commun. Networks 2021: 4179340:1-4179340:14 (2021) - [j54]Haibin Yang, Zhengge Yi, Xu An Wang, Yunxuan Su, Zheng Tu, Xiaoyuan Yang:
Improved Lightweight Cloud Storage Auditing Protocol for Shared Medical Data. Wirel. Commun. Mob. Comput. 2021: 8886763:1-8886763:13 (2021) - [c44]Kun Han, Ke Niu, Shuai Yang, Xiaoyuan Yang:
Research on Adaptive Video Steganography Algorithm for Clustering and Dispersing DCT Coefficient Difference Histogram. NCTCS 2021: 3-14 - [i21]Tanping Zhou, Zhenfeng Zhang, Long Chen, Xiaoliang Che, Wenchao Liu, Xiaoyuan Yang:
Multi-key Fully Homomorphic Encryption Scheme with Compact Ciphertext. IACR Cryptol. ePrint Arch. 2021: 1131 (2021) - 2020
- [j53]Jia Liu, Yan Ke, Zhuo Zhang, Yu Lei, Jun Li, Minqing Zhang, Xiaoyuan Yang:
Recent Advances of Image Steganography With Generative Adversarial Networks. IEEE Access 8: 60575-60597 (2020) - [j52]Jiasen Liu, Xu An Wang, Zhiquan Liu, Han Wang, Xiaoyuan Yang:
Privacy-Preserving Public Cloud Audit Scheme Supporting Dynamic Data for Unmanned Aerial Vehicles. IEEE Access 8: 79428-79439 (2020) - [j51]Yan Ke, Min-Qing Zhang, Jia Liu, Tingting Su, Xiaoyuan Yang:
Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain. IEEE Trans. Circuits Syst. Video Technol. 30(8): 2353-2365 (2020) - [c43]Shuaishuai Zhu, Yiliang Han, Xiaoyuan Yang, Xuguang Wu:
Efficient and Evolvable Key Reconciliation Mechanism in Multi-party Networks Based on Automatic Learning Structure. SPDE 2020: 91-99 - [i20]Yan Ke, Minqing Zhang, Xinpeng Zhang, Jia Liu, Tingting Su, Xiaoyuan Yang:
A Reversible Data hiding Scheme in Encrypted Domain for Secret Image Sharing based on Chinese Remainder Theorem. CoRR abs/2010.08502 (2020)
2010 – 2019
- 2019
- [j50]Ningbo Li, Tanping Zhou, Xiaoyuan Yang, Yiliang Han, Wenchao Liu, Guangsheng Tu:
Efficient Multi-Key FHE With Short Extended Ciphertexts and Directed Decryption Protocol. IEEE Access 7: 56724-56732 (2019) - [j49]Ke Niu, Jun Li, Xiaoyuan Yang, Shuo Zhang, Bo Wang:
Hybrid Adaptive Video Steganography Scheme Under Game Model. IEEE Access 7: 61523-61533 (2019) - [j48]Zhuo Zhang, Jia Liu, Yan Ke, Yu Lei, Jun Li, Minqing Zhang, Xiaoyuan Yang:
Generative Steganography by Sampling. IEEE Access 7: 118586-118597 (2019) - [j47]Zhen Liu, Yiliang Han, Xiaoyuan Yang:
A compressive sensing-based adaptable secure data collection scheme for distributed wireless sensor networks. Int. J. Distributed Sens. Networks 15(6) (2019) - [j46]Xiangxin Liu, Xiaoyuan Yang, Yiliang Han, Xu An Wang:
A Secure and Efficient Code-Based Signature Scheme. Int. J. Found. Comput. Sci. 30(4): 635-645 (2019) - [j45]Xu An Wang, Jian Weng, Jianfeng Ma, Xiaoyuan Yang:
Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification. Inf. Sci. 488: 13-18 (2019) - [j44]Dong Li, Yingnan Zhang, XinChao Li, Ke Niu, Xiaoyuan Yang, YuJuan Sun:
Two-dimensional histogram modification based reversible data hiding using motion vector for H.264. Multim. Tools Appl. 78(7): 8167-8181 (2019) - [j43]Yan Ke, Min-Qing Zhang, Jia Liu, Tingting Su, Xiaoyuan Yang:
Generative steganography with Kerckhoffs' principle. Multim. Tools Appl. 78(10): 13805-13818 (2019) - [j42]JingJing Wang, Yiliang Han, Xiaoyuan Yang, Tanping Zhou, Jiayong Chen:
A New Group Location Privacy-Preserving Method Based on Distributed Architecture in LBS. Secur. Commun. Networks 2019: 2414687:1-2414687:14 (2019) - [j41]Shuaiwei Zhang, Xiaoyuan Yang, Lin Chen, Weidong Zhong:
A Highly Effective Data Preprocessing in Side-Channel Attack Using Empirical Mode Decomposition. Secur. Commun. Networks 2019: 6124165:1-6124165:10 (2019) - [i19]Yan Ke, Min-Qing Zhang, Jia Liu, Tingting Su, Xiaoyuan Yang:
Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data hiding in Encrypted Domain. CoRR abs/1904.12792 (2019) - [i18]Jia Liu, Yan Ke, Yu Lei, Zhuo Zhang, Jun Li, Peng Luo, Minqing Zhang, Xiaoyuan Yang:
Recent Advances of Image Steganography with Generative Adversarial Networks. CoRR abs/1907.01886 (2019) - 2018
- [j40]Tanping Zhou, Xiaoyuan Yang, Longfei Liu, Wei Zhang, Ningbo Li:
Faster Bootstrapping With Multiple Addends. IEEE Access 6: 49868-49876 (2018) - [j39]Yan Ke, Jia Liu, Min-Qing Zhang, Tingting Su, Xiaoyuan Yang:
Steganography Security: Principle and Practice. IEEE Access 6: 73009-73022 (2018) - [j38]Xu An Wang, Xiaoyuan Yang, Cong Li, Yudong Liu, Yong Ding:
Improved functional proxy re-encryption schemes for secure cloud data sharing. Comput. Sci. Inf. Syst. 15(3): 585-614 (2018) - [j37]Xiaoyuan Yang, Xiaoshuang Luo, Xu An Wang, Shuaiwei Zhang:
Improved outsourced private set intersection protocol based on polynomial interpolation. Concurr. Comput. Pract. Exp. 30(1) (2018) - [j36]Xu An Wang, Yudong Liu, Jindan Zhang, Xiaoyuan Yang, Minqing Zhang:
Improved group-oriented proofs of cloud storage in IoT setting. Concurr. Comput. Pract. Exp. 30(21) (2018) - [j35]Cong Li, Xiaoyuan Yang, Yudong Liu, Yunfei Cao:
Functional encryption with efficient verifiable outsourced decryption for secure data access control in social network. Int. J. High Perform. Syst. Archit. 8(1/2): 59-70 (2018) - [j34]Longfei Liu, Xiaoyuan Yang, Bin Wei, Liqiang Wu:
A new class of quaternary generalized cyclotomic sequences of order 2d and length 2pm with high linear complexity. Int. J. Wavelets Multiresolution Inf. Process. 16(1): 1850006:1-1850006:11 (2018) - [j33]Yan Ke, Minqing Zhang, Jia Liu, Tingting Su, Xiaoyuan Yang:
A multilevel reversible data hiding scheme in encrypted domain based on LWE. J. Vis. Commun. Image Represent. 54: 133-144 (2018) - [j32]Fuqiang Di, Fangjun Huang, Minqing Zhang, Jia Liu, Xiaoyuan Yang:
Reversible data hiding in encrypted images with high capacity by bitplane operations and adaptive embedding. Multim. Tools Appl. 77(16): 20917-20935 (2018) - [j31]Tanping Zhou, Ningbo Li, Xiaoyuan Yang, Liqun Lv, Yitao Ding, Xu An Wang:
Secure Testing for Genetic Diseases on Encrypted Genomes with Homomorphic Encryption Scheme. Secur. Commun. Networks 2018: 4635715:1-4635715:12 (2018) - [c42]Dong Li, Yingnan Zhang, Ke Niu, Xiaoyuan Yang:
Reversible Data Hiding for Video. ICCCS (4) 2018: 382-391 - [c41]Mingming Liu, Minqing Zhang, Jia Liu, Xiaoyuan Yang:
Generative Steganography Based on GANs. ICCCS (6) 2018: 537-549 - [c40]Cong Li, Xiaoyuan Yang, Yazhou Liu, Xu An Wang:
The CP-ABE with Full Verifiability Outsourced Decryption and White-Box Traceability. ICCCS (3) 2018: 707-719 - [c39]Yudong Liu, Xu An Wang, Yunfei Cao, Dianhua Tang, Xiaoyuan Yang:
Improved Provable Data Transfer from Provable Data Possession and Deletion in Cloud Storage. INCoS 2018: 445-452 - [i17]Jia Liu, Tanping Zhou, Zhuo Zhang, Yan Ke, Yu Lei, Minqing Zhang, Xiaoyuan Yang:
Digital Cardan Grille: A Modern Approach for Information Hiding. CoRR abs/1803.09219 (2018) - [i16]Jia Liu, Yan Ke, Yu Lei, Yaojie Wang, Yiliang Han, Minqing Zhang, Xiaoyuan Yang:
The Reincarnation of Grille Cipher. CoRR abs/1804.06514 (2018) - [i15]Jia Liu, Yu Lei, Yan Ke, Jun Li, Minqing Zhang, Xiaoyuan Yang:
Generative Steganography by Sampling. CoRR abs/1804.10531 (2018) - [i14]Yan Ke, Jia Liu, Minqing Zhang, Tingting Su, Xiaoyuan Yang:
Steganography Security: Principle and Practice. CoRR abs/1806.03618 (2018) - [i13]Tanping Zhou, Ningbo Li, Xiaoyuan Yang, Yiliang Han, Wenchao Liu:
Efficient Multi-key FHE with short extended ciphertexts and less public parameters. IACR Cryptol. ePrint Arch. 2018: 1054 (2018) - [i12]Ningbo Li, Tanping Zhou, Xiaoyuan Yang, Yiliang Han, Longfei Liu, Wenchao Liu:
Two round multiparty computation via Multi-key fully homomorphic encryption with faster homomorphic evaluations. IACR Cryptol. ePrint Arch. 2018: 1249 (2018) - 2017
- [j30]Shuai Xue, Wen-Feng Qi, Xiaoyuan Yang:
On the best linear approximation of addition modulo 2 n. Cryptogr. Commun. 9(5): 563-580 (2017) - [j29]Jun Li, Xiaoyuan Yang, Xin Liao, Feng Pan, Minqing Zhang:
A game-theoretic method for designing distortion function in spatial steganography. Multim. Tools Appl. 76(10): 12417-12431 (2017) - [c38]Xiaoshuang Luo, Xiaoyuan Yang, Xiangzhou Niu:
An Efficient and Secure Outsourcing Algorithm for Bilinear Pairing Computation. EIDWT 2017: 328-339 - [c37]Liqun Lv, Wenjun Sun, Xiaoyuan Yang, Xu An Wang:
Key Encapsulation Mechanism from Multilinear Maps. EIDWT 2017: 349-357 - [c36]Xu An Wang, Xiaoshuang Luo, Jindan Zhang, Xiaoyuan Yang:
On the Security of a Cloud Data Storage Auditing Protocol IPAD. EIDWT 2017: 611-617 - [i11]Tanping Zhou, Xiaoyuan Yang, Longfei Liu, Wei Zhang, Yitao Ding:
Faster Bootstrapping with Multiple Addends. IACR Cryptol. ePrint Arch. 2017: 735 (2017) - 2016
- [j28]Longfei Liu, Xiaoyuan Yang, Xiaoni Du, Bin Wei:
On the k-error linear complexity of generalised cyclotomic sequences. Int. J. High Perform. Comput. Netw. 9(5/6): 394-400 (2016) - [j27]Tanping Zhou, Xiaoyuan Yang, Wei Zhang, Liqiang Wu:
Efficient fully homomorphic encryption with circularly secure key switching process. Int. J. High Perform. Comput. Netw. 9(5/6): 417-422 (2016) - [j26]Jing-Jing Wang, Jiayong Chen, Xiaoyuan Yang:
Research on generating good key sequence based on chaos. Int. J. High Perform. Comput. Netw. 9(5/6): 480-488 (2016) - [j25]Minqing Zhang, Liqiang Wu, Xu An Wang, Xiaoyuan Yang:
Unidirectional IBPRE scheme from lattice for cloud computation. J. Ambient Intell. Humaniz. Comput. 7(5): 623-631 (2016) - [c35]Fei Chen, Yiliang Han, Di Jiang, Xiaoce Li, Xiaoyuan Yang:
Outsourcing the Unsigncryption of Compact Attribute-Based Signcryption for General Circuits. ICYCSEE (1) 2016: 533-545 - [c34]Tanping Zhou, Xiaoyuan Yang, Xu An Wang, Yiliang Han:
Some Practical Properties of AP14. INCoS 2016: 527-531 - [c33]Xi Lin, Yiliang Han, Yan Ke, Xiaoyuan Yang:
Location Privacy Preserving Scheme Based on Attribute Encryption. SpaCCS 2016: 164-177 - 2015
- [j24]Zhen Liu, Xiaoyuan Yang, Feng Pan, Yuechuan Wei:
CCA-secure publicly verifiable public key encryption scheme without pairings. Int. J. Grid Util. Comput. 6(2): 74-82 (2015) - [j23]Shuaishuai Zhu, Xiaoyuan Yang:
Protecting data in cloud environment with attribute-based encryption. Int. J. Grid Util. Comput. 6(2): 91-97 (2015) - [j22]Wei Zhang, Shuguang Liu, Weidong Zhong, Xiaoyuan Yang:
How to build a faster private information retrieval protocol? J. Ambient Intell. Humaniz. Comput. 6(5): 549-555 (2015) - [j21]Xu An Wang, Jianfeng Ma, Xiaoyuan Yang:
A new proxy re-encryption scheme for protecting critical information systems. J. Ambient Intell. Humaniz. Comput. 6(6): 699-711 (2015) - [j20]Minqing Zhang, Xu An Wang, Xiaoyuan Yang, Weihua Li:
New Construction of PVPKE Scheme and Its Application in Information Systems and Mobile Communication. Mob. Inf. Syst. 2015: 430797:1-430797:10 (2015) - [j19]Xu An Wang, Jianfeng Ma, Xiaoyuan Yang, Yuechuan Wei:
Security Analysis of Two Identity Based Proxy Re-encryption Schemes in Multi-user Networks. Trans. Comput. Collect. Intell. 19: 69-88 (2015) - [c32]Yiliang Han, Yincheng Bai, Dingyi Fang, Xiaoyuan Yang:
The New Attribute-Based Generalized Signcryption Scheme. ICYCSEE 2015: 353-360 - [c31]Xu An Wang, Jianfeng Ma, Xiaoyuan Yang:
New Compact CCA Secure Elgamal Scheme in the Random Oracle Model. INCoS 2015: 379-383 - [c30]Yiliang Han, Di Jiang, Xiaoyuan Yang:
The Revocable Attribute Based Encryption Scheme for Social Networks. SocialSec 2015: 44-51 - [i10]Tanping Zhou, Xiaoyuan Yang, Wei Zhang, Liqiang Wu:
Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process. IACR Cryptol. ePrint Arch. 2015: 466 (2015) - [i9]Tanping Zhou, Longfei Liu, Xiaoyuan Yang, Yiliang Han:
Extend FHEW to General Case. IACR Cryptol. ePrint Arch. 2015: 1232 (2015) - 2014
- [j18]Yuechuan Wei, Xiaoyuan Yang, Chao Li:
Impossible differential cryptanalysis on cipher E2. Concurr. Comput. Pract. Exp. 26(8): 1477-1489 (2014) - 2013
- [j17]Xiaoyuan Yang, Liqiang Wu, Minqing Zhang, Xiaofeng Chen:
An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption. Comput. Math. Appl. 65(9): 1254-1263 (2013) - [j16]Jindan Zhang, Xu An Wang, Yi Ding, Xiaoyuan Yang:
On the security of two multi-use CCA-secure proxy re-encryption schemes. Int. J. Intell. Inf. Database Syst. 7(5): 422-440 (2013) - [j15]Jindan Zhang, Xu An Wang, Xiaoyuan Yang:
Identity Based Proxy Re-encryption Based on BB2 and SK IBE with the Help of PKG. J. Comput. 8(5): 1230-1239 (2013) - [j14]Jindan Zhang, Xu An Wang, Xiaoyuan Yang:
Identity Based Proxy Re-encryption From BB1 IBE. J. Comput. 8(6): 1618-1626 (2013) - [j13]Jindan Zhang, Xu An Wang, Xiaoyuan Yang:
Hybrid Proxy Re-encryption Between IBE And CBE. J. Comput. 8(7): 1873-1881 (2013) - [j12]Minqing Zhang, Xu An Wang, Weihua Li, Xiaoyuan Yang:
CCA Secure Publicly Verifiable Public Key Encryption Without Pairings Nor Random Oracle and Its Applications. J. Comput. 8(8): 1987-1994 (2013) - [j11]Jindan Zhang, Xu An Wang, Xiaoyuan Yang:
Analysis and Improvements of Several (H)IBS/IBSC/PRBE Schemes. J. Comput. 8(9): 2304-2312 (2013) - [j10]Shuaishuai Zhu, Xiaoyuan Yang:
Proxy Re-encryption Scheme based on New Multivariate Quadratic Assumptions. J. Comput. 8(12): 3238-3242 (2013) - [j9]Jindan Zhang, Xu An Wang, Xiaoyuan Yang:
DDos Attack against Proxy in PRE and PRS. J. Softw. 8(3): 617-626 (2013) - [c29]Shuaishuai Zhu, Xiaoyuan Yang, Xuguang Wu:
Secure Cloud File System with Attribute Based Encryption. INCoS 2013: 99-102 - [c28]Minqing Zhang, Xu An Wang, Xiaoyuan Yang, Weiyi Cai:
Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption. INCoS 2013: 438-442 - [c27]Xiaoyuan Yang, Weidong Du, Xu An Wang, Liqiang Wang:
Fully Secure Attribute-Based Encryption with Non-monotonic Access Structures. INCoS 2013: 521-527 - [c26]Wei Zhang, Shuguang Liu, Xiaoyuan Yang:
RLWE-Based Homomorphic Encryption and Private Information Retrieval. INCoS 2013: 535-540 - [c25]Zhen Liu, Xiaoyuan Yang:
Public Verifiable Key Encapsulation Mechanism under Factoring. INCoS 2013: 586-590 - [c24]Yiliang Han, Wanyi Lu, Xiaoyuan Yang:
Attribute-Based Signcryption Scheme with Non-monotonic Access Structure. INCoS 2013: 796-802 - [i8]Wei Zhang, Shuguang Liu, Xiaoyuan Yang:
Multi-bit homomorphic encryption based on learning with errors over rings. IACR Cryptol. ePrint Arch. 2013: 138 (2013) - 2012
- [j8]Xu An Wang, Xiaoyuan Yang, Minqing Zhang, Yong Yu:
Cryptanalysis of a Fuzzy Identity Based Encryption Scheme in the Standard Model. Informatica 23(2): 299-314 (2012) - [j7]Xu An Wang, Xinyi Huang, Xiaoyuan Yang, Longfei Liu, Xuguang Wu:
Further observation on proxy re-encryption with keyword search. J. Syst. Softw. 85(3): 643-654 (2012) - [c23]Yuechuan Wei, Xiaoyuan Yang, Chao Li, Weidong Du:
Impossible Differential Cryptanalysis on Tweaked E2. NSS 2012: 392-404 - [i7]Xu An Wang, Xiaoyuan Yang:
New Identity Based Encryption And Its Proxy Re-encryption. IACR Cryptol. ePrint Arch. 2012: 250 (2012) - 2011
- [j6]Xu An Wang, Xiaoyuan Yang, Minqing Zhang:
Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model. Fundam. Informaticae 109(2): 189-200 (2011) - [j5]Xu An Wang, Jian Weng, Xiaoyuan Yang, Yanjiang Yang:
Cryptanalysis of an identity based broadcast encryption scheme without random oracles. Inf. Process. Lett. 111(10): 461-464 (2011) - [j4]Yiliang Han, Xiaolin Gui, Xuguang Wu, Xiaoyuan Yang:
Proxy encryption based secure multicast in wireless mesh networks. J. Netw. Comput. Appl. 34(2): 469-477 (2011) - [j3]Xu An Wang, Jian Weng, Xiaoyuan Yang, Minqing Zhang:
Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme. J. Syst. Softw. 84(2): 219-225 (2011) - [i6]Xu An Wang, Liqiang Wu, Xiaoyuan Yang, Huaqun Wang:
Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme. IACR Cryptol. ePrint Arch. 2011: 224 (2011) - 2010
- [j2]Xu An Wang, Xiaoyuan Yang:
On the Insecurity of an Identity Based Proxy Re-encryption Scheme. Fundam. Informaticae 98(2-3): 277-281 (2010) - [j1]Xu An Wang, Xiaoyuan Yang, Jindan Zhang:
Provable Secure Generalized Signcryption. J. Comput. 5(5): 807-814 (2010) - [c22]Ping Wei, Xu An Wang, Xiaoyuan Yang:
Proxy Re-encryption from CLE to CBE. CIS 2010: 339-342 - [c21]Ping Wei, Xu An Wang, Xiaoyuan Yang:
Proxy Re-Encryption Schemes with Proxy Having Its Own Public/Private Keys. DBTA 2010: 1-4 - [c20]Jia Liu, Weidong Zhong, Min-Qing Zhang, Xiaoyuan Yang:
Recognizing human actions using bag-of-features and Intersection Kernel Support Vector Machines. NCM 2010: 290-293 - [i5]Xu An Wang, Xiaoyuan Yang:
Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model. IACR Cryptol. ePrint Arch. 2010: 113 (2010)
2000 – 2009
- 2009
- [c19]Xu An Wang, Xiaoyuan Yang:
On DDos Attack against Proxy in Proxy Re-encryption and Proxy Re-signature. CIT (2) 2009: 213-218 - [c18]Xiaoyuan Yang, Yao Guo, Ke Niu, Xiang Wu:
An Authenticating Algorithm with Multi-compression Compatible in DCT Domain. IAS 2009: 11-14 - [c17]Xiaoyuan Yang, Xiang Wu, Minqing Zhang:
Audio Digital Signature Algorithm with Tamper Detection. IAS 2009: 15-18 - [c16]Xu An Wang, Xiaoyuan Yang, Qingquan Peng:
On Security Notions for Verifiably Encrypted Signature. IAS 2009: 37-40 - [c15]Xiaoyuan Yang, Zhen Liu, Wei Zhang, Dun-Tao Guo:
A High-efficiency Data Distribution Algorithm in Distributed Storage. IAS 2009: 627-630 - [c14]Xiaoyuan Yang, Shifeng Wang, Jia Liu:
Universal Steganalysis to Images with WBMC Model. IAS 2009: 627-630 - [c13]Xiaoyuan Yang, Zhongyin Liang, Ping Wei, Junwei Shen:
A Provably Secure Certificateless Blind Signature Scheme. IAS 2009: 643-646 - [c12]Xu An Wang, Xiaoyuan Yang:
Proxy Re-encryption Scheme Based on SK Identity Based Encryption. IAS 2009: 657-660 - [c11]Min-Qing Zhang, Bin Dong, Xiaoyuan Yang:
A New Self-Updating Hash Chain Structure Scheme. CIS (2) 2009: 315-318 - [c10]Xu An Wang, Xiaoyuan Yang, Minqing Zhang:
Proxy Re-encryption Scheme from IBE to CBE. DBTA 2009: 99-102 - 2008
- [c9]Xu An Wang, Xinyi Huang, Xiaoyuan Yang:
Further Observations on Certificateless Public Key Encryption. Inscrypt 2008: 217-239 - [c8]Xiaoyuan Yang, Maotang Li, Lixian Wei, Yiliang Han:
New ECDSA-Verifiable Multi-receiver Generalization Signcryption. HPCC 2008: 1042-1047 - [c7]Xuanwu Zhou, Xiaoyuan Yang, Ping Wei, Yupu Hu:
Evolutionary Algorithm Based Immune Intrusion Analysis Engine. ICNC (7) 2008: 138-142 - [i4]Xu An Wang, Xiaoyuan Yang, Yiliang Han:
On Security Notions for Verifiable Encrypted Signature. IACR Cryptol. ePrint Arch. 2008: 98 (2008) - [i3]Xu An Wang, Xiaoyuan Yang, Fagen Li:
On the Role of PKG for Proxy Re-encryption in Identity Based Setting. IACR Cryptol. ePrint Arch. 2008: 410 (2008) - 2007
- [c6]Xuanwu Zhou, Xiaoyuan Yang, Ping Wei, Yupu Hu:
BSADF: Blind Signature Based Anonymous Digital Fingerprint. FSKD (4) 2007: 426-430 - [c5]Xuanwu Zhou, Xiaoyuan Yang, Ping Wei, Yupu Hu:
Dynamic Group Signature with Forward Security and Its Application. GCC 2007: 473-480 - [c4]Xiaoyuan Yang, Jia Liu, Min-Qing Zhang, Ke Niu:
A New Multi-class SVM Algorithm Based on One-Class SVM. International Conference on Computational Science (3) 2007: 677-684 - [i2]Xu An Wang, Xiaoyuan Yang, Yiliang Han:
Provable Secure Generalized Signcryption. IACR Cryptol. ePrint Arch. 2007: 173 (2007) - 2006
- [c3]Yiliang Han, Xiaoyuan Yang, Ping Wei, Yuming Wang, Yupu Hu:
ECGSC: Elliptic Curve Based Generalized Signcryption. UIC 2006: 956-965 - [i1]Yiliang Han, Xiaoyuan Yang:
ECGSC: Elliptic Curve based Generalized Signcryption Scheme. IACR Cryptol. ePrint Arch. 2006: 126 (2006) - 2004
- [c2]Yiliang Han, Xiaoyuan Yang, Yupu Hu:
Signcryption based on elliptic curve and its multi-party schemes. InfoSecu 2004: 216-217 - [c1]Xiaoyuan Yang, Xu An Wang, Wei Zhang:
New multi-signature and proxy multi-signature schemes from the Weil pairings. InfoSecu 2004: 240-241
Coauthor Index
aka: Min-Qing Zhang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint