BibTeX records: Rongmao Chen

download as .bib file

@article{DBLP:journals/isci/JinQCYW24,
  author       = {Renjie Jin and
                  Longjiang Qu and
                  Rongmao Chen and
                  Zhichao Yang and
                  Yi Wang},
  title        = {A lattice-based forward secure {IBE} scheme for Internet of things},
  journal      = {Inf. Sci.},
  volume       = {660},
  pages        = {120083},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2023.120083},
  doi          = {10.1016/J.INS.2023.120083},
  timestamp    = {Thu, 14 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/JinQCYW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BemmannBC24,
  author       = {Pascal Bemmann and
                  Sebastian Berndt and
                  Rongmao Chen},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Subversion-Resilient Signatures Without Random Oracles},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  pages        = {351--375},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6\_14},
  doi          = {10.1007/978-3-031-54770-6\_14},
  timestamp    = {Mon, 11 Mar 2024 15:20:49 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/BemmannBC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/LiuSLCHKF23,
  author       = {Lin Liu and
                  Jinshu Su and
                  Ximeng Liu and
                  Rongmao Chen and
                  Xinyi Huang and
                  Guang Kou and
                  Shaojing Fu},
  title        = {Towards Strong Privacy Protection for Association Rule Mining and
                  Query in the Cloud},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {3},
  pages        = {3211--3225},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2023.3269510},
  doi          = {10.1109/TCC.2023.3269510},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcc/LiuSLCHKF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/WangCHY23,
  author       = {Yi Wang and
                  Rongmao Chen and
                  Xinyi Huang and
                  Moti Yung},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic
                  Constructions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {VI}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14443},
  pages        = {135--167},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8736-8\_5},
  doi          = {10.1007/978-981-99-8736-8\_5},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/WangCHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/YangCWWP23,
  author       = {Hang Yang and
                  Rongmao Chen and
                  Qiong Wang and
                  Zixuan Wu and
                  Wei Peng},
  editor       = {Chunpeng Ge and
                  Moti Yung},
  title        = {Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-Kyber},
  booktitle    = {Information Security and Cryptology - 19th International Conference,
                  Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected
                  Papers, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14527},
  pages        = {111--129},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-0945-8\_7},
  doi          = {10.1007/978-981-97-0945-8\_7},
  timestamp    = {Mon, 11 Mar 2024 15:20:47 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/YangCWWP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SongLCPW23,
  author       = {Shang Song and
                  Lin Liu and
                  Rongmao Chen and
                  Wei Peng and
                  Yi Wang},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Secure Approximate Nearest Neighbor Search with Locality-Sensitive
                  Hashing},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {411--430},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_21},
  doi          = {10.1007/978-3-031-51479-1\_21},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/SongLCPW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BemmannBC23,
  author       = {Pascal Bemmann and
                  Sebastian Berndt and
                  Rongmao Chen},
  title        = {Subversion-Resilient Signatures without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1491},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1491},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BemmannBC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangCHY23,
  author       = {Yi Wang and
                  Rongmao Chen and
                  Xinyi Huang and
                  Moti Yung},
  title        = {Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic
                  Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1828},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1828},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WangCHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/WangCLWW22,
  author       = {Yi Wang and
                  Rongmao Chen and
                  Chi Liu and
                  Baosheng Wang and
                  Yongjun Wang},
  title        = {Asymmetric subversion attacks on signature and identification schemes},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {26},
  number       = {3},
  pages        = {849--862},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00779-018-01193-x},
  doi          = {10.1007/S00779-018-01193-X},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/WangCLWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChenLCPH22,
  author       = {Jinrong Chen and
                  Lin Liu and
                  Rongmao Chen and
                  Wei Peng and
                  Xinyi Huang},
  title        = {SecRec: {A} Privacy-Preserving Method for the Context-Aware Recommendation
                  System},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {5},
  pages        = {3168--3182},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3085562},
  doi          = {10.1109/TDSC.2021.3085562},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChenLCPH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangCHW22,
  author       = {Yi Wang and
                  Rongmao Chen and
                  Xinyi Huang and
                  Baosheng Wang},
  title        = {Secure Anonymous Communication on Corrupted Machines With Reverse
                  Firewalls},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {6},
  pages        = {3837--3854},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3107463},
  doi          = {10.1109/TDSC.2021.3107463},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangCHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/LiuYSTCL22,
  author       = {Xueqiao Liu and
                  Guomin Yang and
                  Willy Susilo and
                  Joseph Tonien and
                  Rongmao Chen and
                  Xixiang Lv},
  title        = {Message-Locked Searchable Encryption: {A} New Versatile Tool for Secure
                  Cloud Storage},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {15},
  number       = {3},
  pages        = {1664--1677},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSC.2020.3006532},
  doi          = {10.1109/TSC.2020.3006532},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/LiuYSTCL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/LinCWWL22,
  author       = {Yuliang Lin and
                  Rongmao Chen and
                  Yi Wang and
                  Baosheng Wang and
                  Lin Liu},
  editor       = {Xiaofeng Chen and
                  Jian Shen and
                  Willy Susilo},
  title        = {Substitution Attacks Against Sigma Protocols},
  booktitle    = {Cyberspace Safety and Security - 14th International Symposium, {CSS}
                  2022, Xi'an, China, October 16-18, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13547},
  pages        = {192--208},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-18067-5\_14},
  doi          = {10.1007/978-3-031-18067-5\_14},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/css/LinCWWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XiaCSZ21,
  author       = {Yusheng Xia and
                  Rongmao Chen and
                  Jinshu Su and
                  Hongcheng Zou},
  title        = {Balancing anonymity and resilience in anonymous communication networks},
  journal      = {Comput. Secur.},
  volume       = {101},
  pages        = {102106},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102106},
  doi          = {10.1016/J.COSE.2020.102106},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XiaCSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiaSCH21,
  author       = {Yusheng Xia and
                  Jinshu Su and
                  Rongmao Chen and
                  Xinyi Huang},
  title        = {{APGS:} An Efficient Source-Accountable and Metadata-Private Protocol
                  in the Network Layer},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {1245--1260},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2020.3032294},
  doi          = {10.1109/TIFS.2020.3032294},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XiaSCH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/WangCHNWY21,
  author       = {Yi Wang and
                  Rongmao Chen and
                  Xinyi Huang and
                  Jianting Ning and
                  Baosheng Wang and
                  Moti Yung},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Identity-Based Encryption for Fair Anonymity Applications: Defining,
                  Implementing, and Applying Rerandomizable RCCA-Secure {IBE}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13091},
  pages        = {427--455},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92075-3\_15},
  doi          = {10.1007/978-3-030-92075-3\_15},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/WangCHNWY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WangCYHWY21,
  author       = {Yi Wang and
                  Rongmao Chen and
                  Guomin Yang and
                  Xinyi Huang and
                  Baosheng Wang and
                  Moti Yung},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {270--300},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_10},
  doi          = {10.1007/978-3-030-84259-8\_10},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/WangCYHWY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BemmannCJ21,
  author       = {Pascal Bemmann and
                  Rongmao Chen and
                  Tibor Jager},
  editor       = {Juan A. Garay},
  title        = {Subversion-Resilient Public Key Encryption with Practical Watchdogs},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {627--658},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_23},
  doi          = {10.1007/978-3-030-75245-3\_23},
  timestamp    = {Fri, 07 May 2021 15:40:46 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BemmannCJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BemmannCJ21,
  author       = {Pascal Bemmann and
                  Rongmao Chen and
                  Tibor Jager},
  title        = {Subversion-Resilient Public Key Encryption with Practical Watchdogs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {230},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/230},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BemmannCJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangCYHWY21,
  author       = {Yi Wang and
                  Rongmao Chen and
                  Guomin Yang and
                  Xinyi Huang and
                  Baosheng Wang and
                  Moti Yung},
  title        = {Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {862},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/862},
  timestamp    = {Mon, 15 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangCYHWY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangCHNWY21,
  author       = {Yi Wang and
                  Rongmao Chen and
                  Xinyi Huang and
                  Jianting Ning and
                  Baosheng Wang and
                  Moti Yung},
  title        = {Identity-Based Encryption for Fair Anonymity Applications: Defining,
                  Implementing, and Applying Rerandomizable RCCA-secure {IBE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1261},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1261},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WangCHNWY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YangCLQY20,
  author       = {Zhichao Yang and
                  Rongmao Chen and
                  Chao Li and
                  Longjiang Qu and
                  Guomin Yang},
  title        = {On the Security of {LWE} Cryptosystem against Subversion Attacks},
  journal      = {Comput. J.},
  volume       = {63},
  number       = {4},
  pages        = {495--507},
  year         = {2020},
  url          = {https://doi.org/10.1093/comjnl/bxz084},
  doi          = {10.1093/COMJNL/BXZ084},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/YangCLQY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YangDSYLC20,
  author       = {Zhichao Yang and
                  Dung Hoang Duong and
                  Willy Susilo and
                  Guomin Yang and
                  Chao Li and
                  Rongmao Chen},
  title        = {Hierarchical Identity-Based Signature in Polynomial Rings},
  journal      = {Comput. J.},
  volume       = {63},
  number       = {10},
  pages        = {1490--1499},
  year         = {2020},
  url          = {https://doi.org/10.1093/comjnl/bxaa033},
  doi          = {10.1093/COMJNL/BXAA033},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/YangDSYLC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/LvWSCW20,
  author       = {Jiaxian Lv and
                  Yi Wang and
                  Jinshu Su and
                  Rongmao Chen and
                  Wenjun Wu},
  title        = {Security of Auditing Protocols Against Subversion Attacks},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {31},
  number       = {2},
  pages        = {193--206},
  year         = {2020},
  url          = {https://doi.org/10.1142/S0129054120500033},
  doi          = {10.1142/S0129054120500033},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/LvWSCW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiCSHW20,
  author       = {Jie Li and
                  Rongmao Chen and
                  Jinshu Su and
                  Xinyi Huang and
                  Xiaofeng Wang},
  title        = {{ME-TLS:} Middlebox-Enhanced {TLS} for Internet-of-Things Devices},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {2},
  pages        = {1216--1229},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2019.2953715},
  doi          = {10.1109/JIOT.2019.2953715},
  timestamp    = {Thu, 24 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/LiCSHW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WuYMCX20,
  author       = {Tong Wu and
                  Guomin Yang and
                  Yi Mu and
                  Rongmao Chen and
                  Shengmin Xu},
  title        = {Privacy-enhanced remote data integrity checking with updatable timestamp},
  journal      = {Inf. Sci.},
  volume       = {527},
  pages        = {210--226},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ins.2020.03.057},
  doi          = {10.1016/J.INS.2020.03.057},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/WuYMCX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuCLSQ20,
  author       = {Lin Liu and
                  Rongmao Chen and
                  Ximeng Liu and
                  Jinshu Su and
                  Linbo Qiao},
  title        = {Towards Practical Privacy-Preserving Decision Tree Training and Evaluation
                  in the Cloud},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2914--2929},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2980192},
  doi          = {10.1109/TIFS.2020.2980192},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuCLSQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenLCP20,
  author       = {Jinrong Chen and
                  Lin Liu and
                  Rongmao Chen and
                  Wei Peng},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {{SHOSVD:} Secure Outsourcing of High-Order Singular Value Decomposition},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {309--329},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_16},
  doi          = {10.1007/978-3-030-55304-3\_16},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenLCP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChenHY20,
  author       = {Rongmao Chen and
                  Xinyi Huang and
                  Moti Yung},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Subvert {KEM} to Break {DEM:} Practical Algorithm-Substitution Attacks
                  on Public-Key Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12492},
  pages        = {98--128},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64834-3\_4},
  doi          = {10.1007/978-3-030-64834-3\_4},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChenHY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/XiaCSPS20,
  author       = {Yusheng Xia and
                  Rongmao Chen and
                  Jinshu Su and
                  Chen Pan and
                  Han Su},
  title        = {Hybrid Routing: Towards Resilient Routing in Anonymous Communication
                  Networks},
  booktitle    = {2020 {IEEE} International Conference on Communications, {ICC} 2020,
                  Dublin, Ireland, June 7-11, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICC40277.2020.9149166},
  doi          = {10.1109/ICC40277.2020.9149166},
  timestamp    = {Tue, 04 Aug 2020 10:37:23 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/XiaCSPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenHY20,
  author       = {Rongmao Chen and
                  Xinyi Huang and
                  Moti Yung},
  title        = {Subvert {KEM} to Break {DEM:} Practical Algorithm-Substitution Attacks
                  on Public-Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1079},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1079},
  timestamp    = {Mon, 15 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenHY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/LiSCWC19,
  author       = {Jie Li and
                  Jinshu Su and
                  Rongmao Chen and
                  Xiaofeng Wang and
                  Shuhui Chen},
  title        = {Practical privacy-preserving deep packet inspection outsourcing},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {31},
  number       = {22},
  year         = {2019},
  url          = {https://doi.org/10.1002/cpe.4435},
  doi          = {10.1002/CPE.4435},
  timestamp    = {Fri, 13 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/LiSCWC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YangCMSGL19,
  author       = {Guomin Yang and
                  Rongmao Chen and
                  Yi Mu and
                  Willy Susilo and
                  Fuchun Guo and
                  Jie Li},
  title        = {Strongly leakage resilient authenticated key exchange, revisited},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {12},
  pages        = {2885--2911},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00656-3},
  doi          = {10.1007/S10623-019-00656-3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/YangCMSGL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiuSLCHDW19,
  author       = {Lin Liu and
                  Jinshu Su and
                  Ximeng Liu and
                  Rongmao Chen and
                  Kai Huang and
                  Robert H. Deng and
                  Xiaofeng Wang},
  title        = {Toward Highly Secure Yet Efficient {KNN} Classification Scheme on
                  Outsourced Cloud Data},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {6},
  pages        = {9841--9852},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2019.2932444},
  doi          = {10.1109/JIOT.2019.2932444},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/LiuSLCHDW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/JiangLGSAYMC19,
  author       = {Peng Jiang and
                  Jianchang Lai and
                  Fuchun Guo and
                  Willy Susilo and
                  Man Ho Au and
                  Guomin Yang and
                  Yi Mu and
                  Rongmao Chen},
  title        = {Identity-based revocation system: Enhanced security model and scalable
                  bounded {IBRS} construction with short parameters},
  journal      = {Inf. Sci.},
  volume       = {472},
  pages        = {35--52},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2018.09.020},
  doi          = {10.1016/J.INS.2018.09.020},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/JiangLGSAYMC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangWC19,
  author       = {Baosheng Wang and
                  Yi Wang and
                  Rongmao Chen},
  title        = {A Practical Authentication Framework for VANETs},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {4752612:1--4752612:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4752612},
  doi          = {10.1155/2019/4752612},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangWC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/LiuSCCSL19,
  author       = {Lin Liu and
                  Jinshu Su and
                  Rongmao Chen and
                  Jinrong Chen and
                  Guangliang Sun and
                  Jie Li},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {361--377},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_26},
  doi          = {10.1007/978-3-030-30619-9\_26},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ml4cs/LiuSCCSL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/LaiMGCM18,
  author       = {Jianchang Lai and
                  Yi Mu and
                  Fuchun Guo and
                  Rongmao Chen and
                  Sha Ma},
  title        = {Efficient \emph{k}-out-of-\emph{n} oblivious transfer scheme with
                  the ideal communication cost},
  journal      = {Theor. Comput. Sci.},
  volume       = {714},
  pages        = {15--26},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.tcs.2017.12.019},
  doi          = {10.1016/J.TCS.2017.12.019},
  timestamp    = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/LaiMGCM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuCWW18,
  author       = {Chi Liu and
                  Rongmao Chen and
                  Yi Wang and
                  Yongjun Wang},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Asymmetric Subversion Attacks on Signature Schemes},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {376--395},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_22},
  doi          = {10.1007/978-3-319-93638-3\_22},
  timestamp    = {Thu, 21 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuCWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuSCLWCL18,
  author       = {Lin Liu and
                  Jinshu Su and
                  Rongmao Chen and
                  Ximeng Liu and
                  Xiaofeng Wang and
                  Shuhui Chen and
                  Ho{-}fung Leung},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Privacy-Preserving Mining of Association Rule on Outsourced Cloud
                  Data from Multiple Parties},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {431--451},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_25},
  doi          = {10.1007/978-3-319-93638-3\_25},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuSCLWCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/XiaSCLC18,
  author       = {Yusheng Xia and
                  Jinshu Su and
                  Rongmao Chen and
                  Yaping Liu and
                  Shuhui Chen},
  title        = {A Real-Time Aware Routing Strategy in Smart City Environments},
  booktitle    = {2018 {IEEE} International Conference on Sensing, Communication and
                  Networking, {SECON} Workshops 2018, Hong Kong, Hong Kong, June 11,
                  2018},
  pages        = {9--14},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SECONW.2018.8396343},
  doi          = {10.1109/SECONW.2018.8396343},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secon/XiaSCLC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/TianLCLLCY18,
  author       = {Yangguang Tian and
                  Yingjiu Li and
                  Rongmao Chen and
                  Nan Li and
                  Ximeng Liu and
                  Bing Chang and
                  Xingjie Yu},
  editor       = {Raheem Beyah and
                  Bing Chang and
                  Yingjiu Li and
                  Sencun Zhu},
  title        = {Privacy-Preserving Biometric-Based Remote User Authentication with
                  Leakage Resilience},
  booktitle    = {Security and Privacy in Communication Networks - 14th International
                  Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {254},
  pages        = {112--132},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01701-9\_7},
  doi          = {10.1007/978-3-030-01701-9\_7},
  timestamp    = {Mon, 21 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/TianLCLLCY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LaiMGC17,
  author       = {Jianchang Lai and
                  Yi Mu and
                  Fuchun Guo and
                  Rongmao Chen},
  title        = {Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization},
  journal      = {Comput. J.},
  volume       = {60},
  number       = {12},
  pages        = {1809--1821},
  year         = {2017},
  url          = {https://doi.org/10.1093/comjnl/bxx060},
  doi          = {10.1093/COMJNL/BXX060},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LaiMGC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/WangMC17,
  author       = {Xiaofen Wang and
                  Yi Mu and
                  Rongmao Chen},
  title        = {Privacy-preserving data search and sharing protocol for social networks
                  through wireless applications},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {29},
  number       = {7},
  year         = {2017},
  url          = {https://doi.org/10.1002/cpe.3870},
  doi          = {10.1002/CPE.3870},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/WangMC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenMYSG17,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Guomin Yang and
                  Willy Susilo and
                  Fuchun Guo},
  title        = {Strong authenticated key exchange with auxiliary inputs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {1},
  pages        = {145--173},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0295-3},
  doi          = {10.1007/S10623-016-0295-3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenMYSG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenMYSGZ17,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Guomin Yang and
                  Willy Susilo and
                  Fuchun Guo and
                  Zheng Yang},
  title        = {A note on the strong authenticated key exchange with auxiliary inputs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {1},
  pages        = {175--178},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-017-0386-9},
  doi          = {10.1007/S10623-017-0386-9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenMYSGZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/LaiMGSC17,
  author       = {Jianchang Lai and
                  Yi Mu and
                  Fuchun Guo and
                  Willy Susilo and
                  Rongmao Chen},
  title        = {Fully privacy-preserving and revocable ID-based broadcast encryption
                  for data access control in smart city},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {21},
  number       = {5},
  pages        = {855--868},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00779-017-1045-x},
  doi          = {10.1007/S00779-017-1045-X},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/LaiMGSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/WangMC17,
  author       = {Xiaofen Wang and
                  Yi Mu and
                  Rongmao Chen},
  title        = {Privacy-Preserving Data Packet Filtering Protocol with Source {IP}
                  Authentication},
  journal      = {Wirel. Pers. Commun.},
  volume       = {95},
  number       = {4},
  pages        = {3509--3537},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11277-017-4010-0},
  doi          = {10.1007/S11277-017-4010-0},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/WangMC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunSWCLH17,
  author       = {Hao Sun and
                  Jinshu Su and
                  Xiaofeng Wang and
                  Rongmao Chen and
                  Yujing Liu and
                  Qiaolin Hu},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {PriMal: Cloud-Based Privacy-Preserving Malware Detection},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {153--172},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_9},
  doi          = {10.1007/978-3-319-59870-3\_9},
  timestamp    = {Sun, 02 Jun 2019 21:26:44 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SunSWCLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GuoCSLYM17,
  author       = {Fuchun Guo and
                  Rongmao Chen and
                  Willy Susilo and
                  Jianchang Lai and
                  Guomin Yang and
                  Yi Mu},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities
                  with a Counterexample},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {517--547},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_18},
  doi          = {10.1007/978-3-319-63715-0\_18},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GuoCSLYM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/GrittiCSP17,
  author       = {Cl{\'{e}}mentine Gritti and
                  Rongmao Chen and
                  Willy Susilo and
                  Thomas Plantard},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Dynamic Provable Data Possession Protocols with Public Verifiability
                  and Data Privacy},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {485--505},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_29},
  doi          = {10.1007/978-3-319-72359-4\_29},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/GrittiCSP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-08434,
  author       = {Cl{\'{e}}mentine Gritti and
                  Rongmao Chen and
                  Willy Susilo and
                  Thomas Plantard},
  title        = {Dynamic Provable Data Possession Protocols with Public Verifiability
                  and Data Privacy},
  journal      = {CoRR},
  volume       = {abs/1709.08434},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.08434},
  eprinttype    = {arXiv},
  eprint       = {1709.08434},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-08434.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenMYSG17,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Guomin Yang and
                  Willy Susilo and
                  Fuchun Guo},
  title        = {Strong Authenticated Key Exchange with Auxiliary Inputs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {418},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/418},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenMYSG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoCSLYM17,
  author       = {Fuchun Guo and
                  Rongmao Chen and
                  Willy Susilo and
                  Jianchang Lai and
                  Guomin Yang and
                  Yi Mu},
  title        = {Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities
                  with {A} Counterexample},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {499},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/499},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoCSLYM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/WangMCZ16,
  author       = {Xiaofen Wang and
                  Yi Mu and
                  Rongmao Chen and
                  Xiaosong Zhang},
  title        = {Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer
                  Group},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {31},
  number       = {5},
  pages        = {1012--1027},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11390-016-1676-9},
  doi          = {10.1007/S11390-016-1676-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/WangMCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangMC16,
  author       = {Xiaofen Wang and
                  Yi Mu and
                  Rongmao Chen},
  title        = {An efficient privacy-preserving aggregation and billing protocol for
                  smart grid},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {17},
  pages        = {4536--4547},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1645},
  doi          = {10.1002/SEC.1645},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangMC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenMYGW16,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Guomin Yang and
                  Fuchun Guo and
                  Xiaofen Wang},
  title        = {Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud
                  Storage},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {4},
  pages        = {789--798},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2510822},
  doi          = {10.1109/TIFS.2015.2510822},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenMYGW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangMC16,
  author       = {Xiaofen Wang and
                  Yi Mu and
                  Rongmao Chen},
  title        = {One-Round Privacy-Preserving Meeting Location Determination for Smartphone
                  Applications},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {8},
  pages        = {1712--1721},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2549508},
  doi          = {10.1109/TIFS.2016.2549508},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangMC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenMYGHWW16,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Guomin Yang and
                  Fuchun Guo and
                  Xinyi Huang and
                  Xiaofen Wang and
                  Yongjun Wang},
  title        = {Server-Aided Public Key Encryption With Keyword Search},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {12},
  pages        = {2833--2842},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2599293},
  doi          = {10.1109/TIFS.2016.2599293},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenMYGHWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenMSYGZ16,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Willy Susilo and
                  Guomin Yang and
                  Fuchun Guo and
                  Mingwu Zhang},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {One-Round Strong Oblivious Signature-Based Envelope},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_1},
  doi          = {10.1007/978-3-319-40367-0\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenMSYGZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LaiMGSC16,
  author       = {Jianchang Lai and
                  Yi Mu and
                  Fuchun Guo and
                  Willy Susilo and
                  Rongmao Chen},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Anonymous Identity-Based Broadcast Encryption with Revocation for
                  File Sharing},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {223--239},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_14},
  doi          = {10.1007/978-3-319-40367-0\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LaiMGSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GuoSMCLY16,
  author       = {Fuchun Guo and
                  Willy Susilo and
                  Yi Mu and
                  Rongmao Chen and
                  Jianchang Lai and
                  Guomin Yang},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Iterated Random Oracle: {A} Universal Approach for Finding Loss in
                  Security Reduction},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10032},
  pages        = {745--776},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53890-6\_25},
  doi          = {10.1007/978-3-662-53890-6\_25},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GuoSMCLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChenMYSGZ16,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Guomin Yang and
                  Willy Susilo and
                  Fuchun Guo and
                  Mingwu Zhang},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Cryptographic Reverse Firewall via Malleable Smooth Projective Hash
                  Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {844--876},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6\_31},
  doi          = {10.1007/978-3-662-53887-6\_31},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChenMYSGZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SusiloCGYMC16,
  author       = {Willy Susilo and
                  Rongmao Chen and
                  Fuchun Guo and
                  Guomin Yang and
                  Yi Mu and
                  Yang{-}Wai Chow},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke
                  Some Recipients in {IBBE} without Knowledge of the Plaintext},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {201--210},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897848},
  doi          = {10.1145/2897845.2897848},
  timestamp    = {Mon, 25 Apr 2022 08:42:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SusiloCGYMC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ChenMYSG16,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Guomin Yang and
                  Willy Susilo and
                  Fuchun Guo},
  editor       = {Kazue Sako},
  title        = {Strongly Leakage-Resilient Authenticated Key Exchange},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
                  the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
                  4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9610},
  pages        = {19--36},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29485-8\_2},
  doi          = {10.1007/978-3-319-29485-8\_2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/ChenMYSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/JiangWLGC16,
  author       = {Peng Jiang and
                  Xiaofen Wang and
                  Jianchang Lai and
                  Fuchun Guo and
                  Rongmao Chen},
  editor       = {Liqun Chen and
                  Jinguang Han},
  title        = {Oblivious Keyword Search with Authorization},
  booktitle    = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing,
                  China, November 10-11, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10005},
  pages        = {173--190},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47422-9\_10},
  doi          = {10.1007/978-3-319-47422-9\_10},
  timestamp    = {Wed, 14 Jul 2021 15:56:25 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/JiangWLGC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenMYSG16,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Guomin Yang and
                  Willy Susilo and
                  Fuchun Guo},
  title        = {Strongly Leakage-Resilient Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {308},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/308},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenMYSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoSMCLY16,
  author       = {Fuchun Guo and
                  Willy Susilo and
                  Yi Mu and
                  Rongmao Chen and
                  Jianchang Lai and
                  Guomin Yang},
  title        = {Iterated Random Oracle: {A} Universal Approach for Finding Loss in
                  Security Reduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {872},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/872},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoSMCLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenMYSGZ16,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Guomin Yang and
                  Willy Susilo and
                  Fuchun Guo and
                  Mingwu Zhang},
  title        = {Cryptographic Reverse Firewall via Malleable Smooth Projective Hash
                  Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {873},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/873},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenMYSGZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenMYG15,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Guomin Yang and
                  Fuchun Guo},
  title        = {{BL-MLE:} Block-Level Message-Locked Encryption for Secure Large File
                  Deduplication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {12},
  pages        = {2643--2652},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2470221},
  doi          = {10.1109/TIFS.2015.2470221},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenMYG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenMYGW15,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Guomin Yang and
                  Fuchun Guo and
                  Xiaofen Wang},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {A New General Framework for Secure Public Key Encryption with Keyword
                  Search},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {59--76},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_4},
  doi          = {10.1007/978-3-319-19962-7\_4},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenMYGW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics