


default search action
Yunlei Zhao
Person information
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j37]Yanbo Chen
, Yunlei Zhao:
Sign-then-encrypt with security enhancement and compressed ciphertext. Theor. Comput. Sci. 1027: 115006 (2025) - [i52]Wenqian Li, Hanyu Wei, Shiyu Shen, Hao Yang, Wangchen Dai, Yunlei Zhao:
cuFalcon: An Adaptive Parallel GPU Implementation for High-Performance Falcon Acceleration. IACR Cryptol. ePrint Arch. 2025: 249 (2025) - 2024
- [j36]Zhichuang Liang
, Boyue Fang
, Jieyu Zheng
, Yunlei Zhao:
Compact and efficient KEMs over NTRU lattices. Comput. Stand. Interfaces 89: 103828 (2024) - [j35]Zhichuang Liang, Yunlei Zhao, Zhenfeng Zhang:
Generalized splitting-ring number theoretic transform. Frontiers Comput. Sci. 18(4): 184818 (2024) - [j34]Shiyu Shen
, Hao Yang
, Wangchen Dai
, Lu Zhou
, Zhe Liu
, Yunlei Zhao
:
Leveraging GPU in Homomorphic Encryption: Framework Design and Analysis of BFV Variants. IEEE Trans. Computers 73(12): 2817-2829 (2024) - [j33]Zhaoman Liu
, Yanbo Chen, Jianting Ning, Yunlei Zhao:
Fully anonymous identity-based broadcast signcryption with public verification. Theor. Comput. Sci. 992: 114464 (2024) - [j32]Hao Yang
, Shiyu Shen
, Wangchen Dai
, Lu Zhou
, Zhe Liu
, Yunlei Zhao
:
Phantom: A CUDA-Accelerated Word-Wise Homomorphic Encryption Library. IEEE Trans. Dependable Secur. Comput. 21(5): 4895-4906 (2024) - [j31]Hao Yang
, Shiyu Shen
, Zhe Liu
, Yunlei Zhao
:
cuXCMP: CUDA-Accelerated Private Comparison Based on Homomorphic Encryption. IEEE Trans. Inf. Forensics Secur. 19: 3581-3592 (2024) - [j30]Yafang Yang
, Lei Zhang
, Yunlei Zhao
, Kim-Kwang Raymond Choo
, Yan Zhang
:
Rebuttal to "On the Unforgeability of 'Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET"'. IEEE Trans. Inf. Forensics Secur. 19: 10373-10374 (2024) - [j29]Shiyu Shen
, Hao Yang
, Wangchen Dai
, Hong Zhang, Zhe Liu
, Yunlei Zhao
:
High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature. IEEE Trans. Parallel Distributed Syst. 35(11): 1964-1976 (2024) - [c52]Biming Zhou, Haodong Jiang, Yunlei Zhao:
CPA-Secure KEMs are also Sufficient for Post-quantum TLS 1.3. ASIACRYPT (3) 2024: 433-464 - [c51]Jieyu Zheng, Haoliang Zhu, Yifan Dong, Zhenyu Song, Zhenhao Zhang, Yafang Yang, Yunlei Zhao:
Faster Post-quantum TLS 1.3 Based on ML-KEM: Implementation and Assessment. ESORICS (2) 2024: 123-143 - [i51]Jieyu Zheng, Hong Zhang, Le Tian, Zhuo Zhang, Hanyu Wei, Zhiwei Chu, Yafang Yang, Yunlei Zhao:
ESPM-D: Efficient Sparse Polynomial Multiplication for Dilithium on ARM Cortex-M4 and Apple M2. CoRR abs/2404.12675 (2024) - [i50]Jieyu Zheng, Haoliang Zhu, Yifan Dong, Zhenyu Song, Zhenhao Zhang, Yafang Yang, Yunlei Zhao:
Faster Post-Quantum TLS 1.3 Based on ML-KEM: Implementation and Assessment. CoRR abs/2404.13544 (2024) - [i49]Zhaoman Liu, Jianting Ning, Huiying Hou, Yunlei Zhao:
Sanitizable and Accountable Endorsement for Dynamic Transactions in Fabric. IACR Cryptol. ePrint Arch. 2024: 1184 (2024) - [i48]Biming Zhou, Haodong Jiang, Yunlei Zhao:
CPA-secure KEMs are also sufficient for Post-Quantum TLS 1.3. IACR Cryptol. ePrint Arch. 2024: 1360 (2024) - [i47]Shiyu Shen, Hao Yang, Wangchen Dai, Hong Zhang, Zhe Liu, Yunlei Zhao:
High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature. IACR Cryptol. ePrint Arch. 2024: 1365 (2024) - [i46]Kaizhan Lin, Weize Wang, Chang-An Zhao, Yunlei Zhao:
Π-signHD: A New Structure for the SQIsign Family with Flexible Applicability. IACR Cryptol. ePrint Arch. 2024: 1404 (2024) - 2023
- [j28]Huanhuan Lian
, Yafang Yang
, Yunlei Zhao
:
Efficient and Strong Symmetric Password Authenticated Key Exchange With Identity Privacy for IoT. IEEE Internet Things J. 10(6, March 15): 4725-4734 (2023) - [j27]Shiyu Shen
, Hao Yang
, Yu Liu, Zhe Liu
, Yunlei Zhao
:
CARM: CUDA-Accelerated RNS Multiplication in Word-Wise Homomorphic Encryption Schemes for Internet of Things. IEEE Trans. Computers 72(7): 1999-2010 (2023) - [c50]Zhuo Zhang
, Jieyu Zheng, Yunlei Zhao:
Efficient NTTRU Implementation on ARMv8. ICPADS 2023: 2793-2794 - [i45]Jieyu Zheng, Haoliang Zhu, Zhenyu Song, Zheng Wang, Yunlei Zhao:
Optimized Vectorization Implementation of CRYSTALS-Dilithium. CoRR abs/2306.01989 (2023) - [i44]Hao Yang, Shiyu Shen, Wangchen Dai, Lu Zhou, Zhe Liu, Yunlei Zhao:
Implementing and Benchmarking Word-Wise Homomorphic Encryption Schemes on GPU. IACR Cryptol. ePrint Arch. 2023: 49 (2023) - [i43]Hao Yang, Shiyu Shen, Siyang Jiang, Lu Zhou, Wangchen Dai, Yunlei Zhao:
XNET: A Real-Time Unified Secure Inference Framework Using Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2023: 1428 (2023) - [i42]Shiyu Shen, Hao Yang, Wangchen Dai, Lu Zhou, Zhe Liu, Yunlei Zhao:
Leveraging GPU in Homomorphic Encryption: Framework Design and Analysis of BFV Variants. IACR Cryptol. ePrint Arch. 2023: 1429 (2023) - [i41]Shiyu Shen, Hao Yang, Wenqian Li, Yunlei Zhao:
cuML-DSA: Optimized Signing Procedure and Server-Oriented GPU Design for ML-DSA. IACR Cryptol. ePrint Arch. 2023: 1522 (2023) - 2022
- [j26]Shiyu Shen
, Hongbing Wang, Yunlei Zhao:
Identity-based authenticated encryption with identity confidentiality. Theor. Comput. Sci. 901: 1-18 (2022) - [j25]Huiying Hou
, Jianting Ning
, Yunlei Zhao
, Robert H. Deng
:
Fine-Grained and Controllably Editable Data Sharing With Accountability in Cloud Storage. IEEE Trans. Dependable Secur. Comput. 19(5): 3448-3463 (2022) - [j24]Yafang Yang
, Lei Zhang
, Yunlei Zhao
, Kim-Kwang Raymond Choo
, Yan Zhang
:
Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET. IEEE Trans. Inf. Forensics Secur. 17: 317-331 (2022) - [j23]Zhengzhong Jin, Shiyu Shen
, Yunlei Zhao
:
Compact and Flexible KEM From Ideal Lattice. IEEE Trans. Inf. Theory 68(6): 3829-3840 (2022) - [j22]Huiying Hou
, Jianting Ning
, Yunlei Zhao
, Robert H. Deng
:
A Traitor-Resistant and Dynamic Anonymous Communication Service for Cloud-Based VANETs. IEEE Trans. Serv. Comput. 15(5): 2551-2564 (2022) - [c49]Jieyu Zheng
, Feng He
, Shiyu Shen
, Chenxi Xue
, Yunlei Zhao
:
Parallel Small Polynomial Multiplication for Dilithium: A Faster Design and Implementation. ACSAC 2022: 304-317 - [c48]Yanbo Chen, Yunlei Zhao:
Half-Aggregation of Schnorr Signatures with Tight Reductions. ESORICS (2) 2022: 385-404 - [c47]Boyue Fang, Weize Wang, Yunlei Zhao:
Tight Analysis of Decryption Failure Probability of Kyber in Reality. ICICS 2022: 148-160 - [i40]Zhichuang Liang, Boyue Fang, Jieyu Zheng, Yunlei Zhao:
Compact and Efficient NTRU-based KEM with Scalable Ciphertext Compression. CoRR abs/2205.05413 (2022) - [i39]Shiyu Shen, Hao Yang, Wangchen Dai, Zhe Liu, Yunlei Zhao:
High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature. CoRR abs/2211.12265 (2022) - [i38]Zhichuang Liang, Yunlei Zhao:
Number Theoretic Transform and Its Applications in Lattice-based Cryptosystems: A Survey. CoRR abs/2211.13546 (2022) - [i37]Boyue Fang, Weize Wang, Yunlei Zhao:
Tight Analysis of Decrypton Failure Probability of Kyber in Reality. IACR Cryptol. ePrint Arch. 2022: 212 (2022) - [i36]Yanbo Chen, Yunlei Zhao:
Half-Aggregation of Schnorr Signatures with Tight Reductions. IACR Cryptol. ePrint Arch. 2022: 222 (2022) - [i35]Zhichuang Liang, Boyue Fang, Jieyu Zheng, Yunlei Zhao:
Compact and Efficient NTRU-based KEM with Scalable Ciphertext Compression. IACR Cryptol. ePrint Arch. 2022: 579 (2022) - [i34]Shiyu Shen, Hao Yang, Yu Liu, Zhe Liu, Yunlei Zhao:
CUDA-Accelerated RNS Multiplication in Word-Wise Homomorphic Encryption Schemes. IACR Cryptol. ePrint Arch. 2022: 633 (2022) - [i33]Yu Liu, Haodong Jiang, Yunlei Zhao:
Tighter Post-quantum Proof for Plain FDH, PFDH and GPV-IBE. IACR Cryptol. ePrint Arch. 2022: 1441 (2022) - [i32]Hao Yang, Shiyu Shen, Zhe Liu, Yunlei Zhao:
cuXCMP: CUDA-Accelerated Private Comparison Based on Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2022: 1621 (2022) - 2021
- [j21]Huige Wang, Guangye Sui
, Yunlei Zhao, Kefei Chen
:
Efficient SSE With Forward ID-Privacy and Authentication in the Multi-Data-Owner Settings. IEEE Access 9: 10443-10459 (2021) - [j20]Yuan Li, Xing-Chen Wang, Lin Huang, Yunlei Zhao:
Order-Revealing Encryption: File-Injection Attack and Forward Security. J. Comput. Sci. Technol. 36(4): 877-895 (2021) - [j19]Huiying Hou
, Shidi Hao, Jiaming Yuan
, Shengmin Xu, Yunlei Zhao
:
Fine-Grained and Controllably Redactable Blockchain with Harmful Data Forced Removal. Secur. Commun. Networks 2021: 3680359:1-3680359:20 (2021) - [c46]Huanhuan Lian
, Tianyu Pan, Huige Wang, Yunlei Zhao:
Identity-Based Identity-Concealed Authenticated Key Exchange. ESORICS (2) 2021: 651-675 - [i31]Shiyu Shen, Feng He, Zhichuang Liang, Yang Wang, Yunlei Zhao:
OSKR/OKAI: Systematic Optimization of Key Encapsulation Mechanisms from Module Lattice. CoRR abs/2109.02893 (2021) - 2020
- [j18]Huige Wang, Kefei Chen, Yuan Zhang, Yunlei Zhao:
Functional encryption with application to machine learning: simple conversions from generic functions to quadratic functions. Peer-to-Peer Netw. Appl. 13(6): 2334-2341 (2020) - [j17]Huige Wang
, Kefei Chen, Tianyu Pan, Yunlei Zhao:
Practical CCA-Secure Functional Encryptions for Deterministic Functions. Secur. Commun. Networks 2020: 8823788:1-8823788:14 (2020) - [c45]Boru Gong, Leixiao Cheng, Yunlei Zhao:
SKCN: Practical and Flexible Digital Signature from Module Lattice. ACISP 2020: 62-81 - [c44]Zhichuang Liang, Shiyu Shen, Yuantao Shi, Dongni Sun, Chongxuan Zhang, Guoyun Zhang, Yunlei Zhao, Zhixiang Zhao:
Number Theoretic Transform: Generalization, Optimization, Concrete Analysis and Applications. Inscrypt 2020: 415-432 - [c43]Yunlei Zhao:
Identity-Based Authenticated Encryption with Identity Confidentiality. ESORICS (2) 2020: 633-653 - [i30]Zhengzhong Jin, Yunlei Zhao:
AKCN-E8: Compact and Flexible KEM from Ideal Lattice. IACR Cryptol. ePrint Arch. 2020: 56 (2020) - [i29]Goichiro Hanaoka, Kazuo Ohta, Yusuke Sakai, Bagus Santoso, Kaoru Takemure, Yunlei Zhao:
Cryptanalysis of Aggregate Γ-Signature and Practical Countermeasures in Application to Bitcoin. IACR Cryptol. ePrint Arch. 2020: 1484 (2020)
2010 – 2019
- 2019
- [j16]Huige Wang
, Yuan Zhang
, Kefei Chen, Guangye Sui, Yunlei Zhao, Xinyi Huang:
Functional broadcast encryption with applications to data sharing for cloud storage. Inf. Sci. 502: 109-124 (2019) - [j15]Zhenfu Cao, Hongbing Wang
, Yunlei Zhao:
AP-PRE: Autonomous Path Proxy Re-Encryption and Its Applications. IEEE Trans. Dependable Secur. Comput. 16(5): 833-842 (2019) - [c42]Zhengzhong Jin, Yunlei Zhao:
Generic and Practical Key Establishment from Lattice. ACNS 2019: 302-322 - [c41]Yuan Li, Hongbing Wang, Yunlei Zhao:
Delegatable Order-Revealing Encryption. AsiaCCS 2019: 134-147 - [c40]Yunlei Zhao:
Practical Aggregate Signature from General Elliptic Curves, and Applications to Blockchain. AsiaCCS 2019: 529-538 - [c39]Chuang Li, Chunxiang Xu, Yunlei Zhao, Kefei Chen, Xiaojun Zhang:
Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC. Inscrypt 2019: 397-415 - [i28]Hongbing Wang, Yunlei Zhao:
Identity-Based Higncryption. IACR Cryptol. ePrint Arch. 2019: 106 (2019) - 2018
- [j14]Meng-Jun Qin, Yunlei Zhao, Zhoujun Ma:
Practical Constant-Size Ring Signature. J. Comput. Sci. Technol. 33(3): 533-541 (2018) - [c38]Guangye Sui, Yunlei Zhao:
Revisiting OAKE in the eCK Security Model. CNS 2018: 9 - [c37]Xingchen Wang
, Yunlei Zhao
:
Order-Revealing Encryption: File-Injection Attack and Forward Security. ESORICS (2) 2018: 101-121 - [i27]Yunlei Zhao:
Aggregation of Gamma-Signatures and Applications to Bitcoin. IACR Cryptol. ePrint Arch. 2018: 414 (2018) - [i26]Yunlei Zhao:
Identity-Concealed Authenticated Encryption and Key Exchange. IACR Cryptol. ePrint Arch. 2018: 1165 (2018) - [i25]Leixiao Cheng, Boru Gong, Yunlei Zhao:
Lattice-Based Signature from Key Consensus. IACR Cryptol. ePrint Arch. 2018: 1180 (2018) - 2017
- [j13]Zeqing Guo
, Weili Han, Liangxing Liu, Wenyuan Xu, Minyue Ni, Yunlei Zhao, Xiaoyang Sean Wang:
Socialized policy administration. Comput. Secur. 67: 232-243 (2017) - [j12]Leixiao Cheng, Quanshui Wu, Yunlei Zhao:
Compact lossy and all-but-one trapdoor functions from lattice. EAI Endorsed Trans. Security Safety 4(12): e4 (2017) - [c36]Leixiao Cheng, Quanshui Wu, Yunlei Zhao:
Compact Lossy and All-but-One Trapdoor Functions from Lattice. ISPEC 2017: 279-296 - [c35]Boru Gong, Yunlei Zhao:
Cryptanalysis of RLWE-Based One-Pass Authenticated Key Exchange. PQCrypto 2017: 163-183 - [i24]Zhengzhong Jin, Yunlei Zhao:
Optimal Key Consensus in Presence of Noise. IACR Cryptol. ePrint Arch. 2017: 1058 (2017) - [i23]Xingchen Wang, Yunlei Zhao:
File-injection Attack and Forward Security for Order-revealing Encryption. IACR Cryptol. ePrint Arch. 2017: 1086 (2017) - 2016
- [j11]Andrew Chi-Chih Yao, Moti Yung, Yunlei Zhao:
Concurrent Knowledge Extraction in Public-Key Models. J. Cryptol. 29(1): 156-219 (2016) - [c34]Tianhao Wang
, Yunlei Zhao:
Secure Dynamic SSE via Access Indistinguishable Storage. AsiaCCS 2016: 535-546 - [c33]Yunlei Zhao:
Identity-Concealed Authenticated Encryption and Key Exchange. CCS 2016: 1464-1479 - [c32]Zhoujun Ma, Li Yang, Yunlei Zhao:
Practical Signature Scheme from \varGamma Γ -Protocol. ISPEC 2016: 94-109 - [c31]Hongbing Wang, Yingjiu Li, Zongyang Zhang, Yunlei Zhao:
Efficient Tag Path Authentication Protocol with Less Tag Memory. ISPEC 2016: 255-270 - [i22]Zhengzhong Jin, Yunlei Zhao:
Optimal Key Consensus in Presence of Noise. CoRR abs/1611.06150 (2016) - [i21]Boru Gong, Yunlei Zhao:
Small Field Attack, and Revisiting RLWE-Based Authenticated Key Exchange from Eurocrypt'15. IACR Cryptol. ePrint Arch. 2016: 913 (2016) - 2015
- [j10]Jian Weng
, Yunlei Zhao, Robert H. Deng
, Shengli Liu, Yanjiang Yang, Kouichi Sakurai:
A note on the security of KHL scheme. Theor. Comput. Sci. 602: 1-6 (2015) - [c30]Zongyang Zhang, Yu Chen, Sherman S. M. Chow
, Goichiro Hanaoka
, Zhenfu Cao
, Yunlei Zhao:
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model. ProvSec 2015: 435-454 - [i20]Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao:
Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack. IACR Cryptol. ePrint Arch. 2015: 297 (2015) - 2014
- [j9]Andrew Chi-Chih Yao, Yunlei Zhao:
Privacy-Preserving Authenticated Key-Exchange Over Internet. IEEE Trans. Inf. Forensics Secur. 9(1): 125-140 (2014) - [c29]Zongyang Zhang, Yu Chen, Sherman S. M. Chow
, Goichiro Hanaoka, Zhenfu Cao
, Yunlei Zhao:
All-but-One Dual Projective Hashing and Its Applications. ACNS 2014: 181-198 - [c28]Junzuo Lai, Robert H. Deng
, Shengli Liu, Jian Weng
, Yunlei Zhao:
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack. EUROCRYPT 2014: 77-92 - [e2]Keita Emura, Goichiro Hanaoka, Yunlei Zhao:
ASIAPKC'14, Proceedings of the 2nd ACM Wookshop on ASIA Public-Key Cryptography, June 3, 2014, Kyoto, Japan. ACM 2014, ISBN 978-1-4503-2801-2 [contents] - 2013
- [j8]Andrew Chi-Chih Yao, Yunlei Zhao:
Online/Offline Signatures for Low-Power Devices. IEEE Trans. Inf. Forensics Secur. 8(2): 283-294 (2013) - [c27]Cheng-Kang Chu, Joseph K. Liu
, Jun Wen Wong, Yunlei Zhao, Jianying Zhou
:
Privacy-preserving smart metering with regional statistics and personal enquiry services. AsiaCCS 2013: 369-380 - [c26]Andrew Chi-Chih Yao, Yunlei Zhao:
OAKE: a new family of implicitly authenticated diffie-hellman protocols. CCS 2013: 1113-1128 - [c25]Shengli Liu, Kouichi Sakurai, Jian Weng
, Fangguo Zhang
, Yunlei Zhao:
Security Model and Analysis of FHMQV, Revisited. Inscrypt 2013: 255-269 - [c24]Shengli Liu, Jian Weng
, Yunlei Zhao:
Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks. CT-RSA 2013: 84-100 - [c23]Junzuo Lai, Robert H. Deng
, Yunlei Zhao, Jian Weng
:
Accountable Authority Identity-Based Encryption with Public Traceability. CT-RSA 2013: 326-342 - [e1]Kefei Chen, Qi Xie, Weidong Qiu, Shouhuai Xu, Yunlei Zhao:
Proceedings of the first ACM workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013. ACM 2013, ISBN 978-1-4503-2069-6 [contents] - 2012
- [j7]Chunhua Su, Yingjiu Li, Yunlei Zhao, Robert H. Deng
, Yiming Zhao, Jianying Zhou
:
A Survey on Privacy Frameworks for RFID Authentication. IEICE Trans. Inf. Syst. 95-D(1): 2-11 (2012) - [c22]Shaoying Cai, Robert H. Deng
, Yingjiu Li, Yunlei Zhao:
A New Framework for Privacy of RFID Path Authentication. ACNS 2012: 473-488 - [c21]Goichiro Hanaoka, Yutaka Kawai, Noboru Kunihiro
, Takahiro Matsuda, Jian Weng
, Rui Zhang, Yunlei Zhao:
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption. CT-RSA 2012: 349-364 - [c20]Shaoying Cai, Yingjiu Li, Yunlei Zhao:
Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains. SEC 2012: 501-512 - [c19]Andrew C. Yao, Yunlei Zhao:
Computationally-Fair Group and Identity-Based Key-Exchange. TAMC 2012: 237-247 - [i19]Andrew C. Yao, Yunlei Zhao:
Digital Signatures from Challenge-Divided Sigma-Protocols. IACR Cryptol. ePrint Arch. 2012: 1 (2012) - [i18]Andrew C. Yao, Yunlei Zhao:
Computationally-Fair Group and Identity-Based Key-Exchange. IACR Cryptol. ePrint Arch. 2012: 287 (2012) - 2011
- [j6]Robert H. Deng
, Yingjiu Li, Moti Yung, Yunlei Zhao:
A zero-knowledge based framework for RFID privacy. J. Comput. Secur. 19(6): 1109-1146 (2011) - [c18]Feng Bao, Robert H. Deng
, Xuhua Ding
, Junzuo Lai, Yunlei Zhao:
Hierarchical Identity-Based Chameleon Hash and Its Applications. ACNS 2011: 201-219 - [c17]Guilin Wang, Fubiao Xia, Yunlei Zhao:
Designated Confirmer Signatures with Unified Verification. IMACC 2011: 469-495 - [c16]Jian Weng
, Yunlei Zhao, Goichiro Hanaoka:
On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010. Public Key Cryptography 2011: 284-295 - [c15]Kazuki Yoneyama, Yunlei Zhao:
Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage. ProvSec 2011: 348-365 - [i17]Andrew C. Yao, Yunlei Zhao:
A New Family of Practical Non-Malleable Diffie-Hellman Protocols. CoRR abs/1105.1071 (2011) - [i16]Andrew C. Yao, Yunlei Zhao:
A New Family of Practical Non-Malleable Protocols. IACR Cryptol. ePrint Arch. 2011: 35 (2011) - [i15]Guilin Wang, Fubiao Xia, Yunlei Zhao:
Designated Confirmer Signatures With Unified Verification. IACR Cryptol. ePrint Arch. 2011: 182 (2011) - [i14]Jian Weng, Yunlei Zhao:
Direct Constructions of Bidirectional Proxy Re-Encryption with Alleviated Trust in Proxy. IACR Cryptol. ePrint Arch. 2011: 208 (2011) - [i13]Zhenfu Cao, Zongyang Zhang, Yunlei Zhao:
Adaptive Security of Concurrent Non-Malleable Zero-Knowledge. IACR Cryptol. ePrint Arch. 2011: 621 (2011) - 2010
- [c14]Andrew Chi-Chih Yao, Yunlei Zhao:
Deniable Internet Key Exchange. ACNS 2010: 329-348 - [c13]Robert H. Deng
, Yingjiu Li, Moti Yung, Yunlei Zhao:
A New Framework for RFID Privacy. ESORICS 2010: 1-18 - [c12]Andrew Chi-Chih Yao, Moti Yung, Yunlei Zhao:
Concurrent Knowledge Extraction in the Public-Key Model. ICALP (1) 2010: 702-714 - [i12]Robert H. Deng, Yingjiu Li, Andrew C. Yao, Moti Yung, Yunlei Zhao:
A New Framework for RFID Privacy. IACR Cryptol. ePrint Arch. 2010: 59 (2010) - [i11]Andrew C. Yao, Moti Yung, Yunlei Zhao:
Concurrent Knowledge Extraction in the Public-Key Model. IACR Cryptol. ePrint Arch. 2010: 74 (2010) - [i10]Andrew C. Yao, Moti Yung, Yunlei Zhao:
Adaptive Concurrent Non-Malleability with Bare Public-Keys. IACR Cryptol. ePrint Arch. 2010: 107 (2010) - [i9]Jian Weng, Yunlei Zhao:
On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010. IACR Cryptol. ePrint Arch. 2010: 319 (2010)
2000 – 2009
- 2009
- [j5]Andrew Chi-Chih Yao, Frances F. Yao, Yunlei Zhao:
A note on the feasibility of generalised universal composability. Math. Struct. Comput. Sci. 19(1): 193-205 (2009) - [j4]Andrew Chi-Chih Yao, Frances F. Yao, Yunlei Zhao:
A note on universal composable zero-knowledge in the common reference string model. Theor. Comput. Sci. 410(11): 1099-1108 (2009) - [i8]Andrew Chi-Chih Yao, Moti Yung, Yunlei Zhao:
Concurrent Knowledge-Extraction in the Public-Key Model. CoRR abs/0908.2476 (2009) - [i7]Andrew Chi-Chih Yao, Moti Yung, Yunlei Zhao:
Adaptive Concurrent Non-Malleability with Bare Public-Keys. CoRR abs/0910.3282 (2009) - 2007
- [c11]Moti Yung, Yunlei Zhao:
Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model. EUROCRYPT 2007: 129-147 - [c10]Andrew Chi-Chih Yao, Frances F. Yao, Yunlei Zhao:
A Note on Universal Composable Zero Knowledge in Common Reference String Model. TAMC 2007: 462-473 - [c9]Andrew Chi-Chih Yao, Frances F. Yao, Yunlei Zhao:
A Note on the Feasibility of Generalized Universal Composability. TAMC 2007: 474-485 - [i6]Moti Yung, Yunlei Zhao:
Concurrent Knowledge-Extraction in the Public-Key Model. Electron. Colloquium Comput. Complex. TR07 (2007) - [i5]Andrew Chi-Chih Yao, Frances F. Yao, Yunlei Zhao, Bin B. Zhu:
Deniable Internet Key-Exchange. IACR Cryptol. ePrint Arch. 2007: 191 (2007) - 2006
- [j3]Yunlei Zhao:
A note on the Dwork-Naor timed deniable authentication. Inf. Process. Lett. 100(1): 1-7 (2006) - [c8]Moti Yung, Yunlei Zhao:
Interactive Zero-Knowledge with Restricted Random Oracles. TCC 2006: 21-40 - 2005
- [c7]Yunlei Zhao, Robert H. Deng
, Binyu Zang, Yiming Zhao:
Practical Zero-Knowledge Arguments from Sigma-Protocols. WINE 2005: 288-298 - [c6]Yunlei Zhao, Shirley H. C. Cheung, Binyu Zang, Bin B. Zhu:
A Note on the Cramer-Damgård Identification Scheme. WINE 2005: 385-390 - [i4]Moti Yung, Yunlei Zhao:
Constant-Round Concurrently-Secure rZK in the (Real) Bare Public-Key Model. Electron. Colloquium Comput. Complex. TR05 (2005) - [i3]Yunlei Zhao, Jesper Buus Nielsen, Robert H. Deng, Dengguo Feng:
Generic yet Practical ZK Arguments from any Public-Coin HVZK. Electron. Colloquium Comput. Complex. TR05 (2005) - 2004
- [j2]Yunlei Zhao, Xiaotie Deng
, Chan H. Lee, Hong Zhu:
(2+f(n))-SAT and its properties. Discret. Appl. Math. 136(1): 3-11 (2004) - [j1]Shirley H. C. Cheung, Chan H. Lee, Yunlei Zhao:
Universally Composable Blind Signature Functionality. Int. J. Inf. Technol. Decis. Mak. 3(4): 673-684 (2004) - [c5]Yunlei Zhao, Chan H. Lee, Yiming Zhao, Hong Zhu:
Some Observations on Zap and Its Applications. ACNS 2004: 180-193 - 2003
- [c4]Yunlei Zhao, Xiaotie Deng, Chan H. Lee, Hong Zhu:
Resettable Zero-Knowledge in the Weak Public-Key Model. EUROCRYPT 2003: 123-139 - [i2]Yunlei Zhao:
Concurrent/Resettable Zero-Knowledge With Concurrent Soundness in the Bare Public-Key Model and Its Applications. IACR Cryptol. ePrint Arch. 2003: 265 (2003) - 2002
- [c3]Xiaotie Deng, Chan H. Lee, Yunlei Zhao, Hong Zhu:
(2+ f(n))-SAT and Its Properties. COCOON 2002: 28-36 - [c2]Xiaotie Deng, Chan H. Lee, Yunlei Zhao, Hong Zhu:
Reduction Zero-Knowledge. SCN 2002: 303-317 - [c1]Shirley H. C. Cheung, Xiaotie Deng, Chan H. Lee, Yunlei Zhao:
A New Notion of Soundness in Bare Public-Key Model. SCN 2002: 318-325 - 2001
- [i1]Yunlei Zhao:
New Notions of Soundness and Simultaneous Resettability in the Public-Key Model. IACR Cryptol. ePrint Arch. 2001: 109 (2001)
Coauthor Index
aka: Andrew C. Yao

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-18 21:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint