


default search action
Xiaoyuan Yang 0002
Person information
- affiliation: Engineering University of Chinese Armed Police Force (CAPF), Xi'an, China
Other persons with the same name
- Xiaoyuan Yang — disambiguation page
- Xiaoyuan Yang 0001 — Telefonica I+D, Barcelona, Spain (and 1 more)
- Xiaoyuan Yang 0003
— Beihang University, Department of Mathematics and Systems Science, Key Laboratory of Mathematics, Informatics, and Behavioral Semantics, Beijing, China (and 1 more)
- Xiaoyuan Yang 0004 — Boston University, MA, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j79]Guangsheng Tu
, Wenchao Liu
, Tanping Zhou
, Xiaoyuan Yang, Fan Zhang:
Concise and Efficient Multi-Identity Fully Homomorphic Encryption Scheme. IEEE Access 12: 49640-49652 (2024) - [j78]Wenchao Liu
, Tanping Zhou, Long Chen, Hongjian Yang, Jiang Han, Xiaoyuan Yang:
Round efficient privacy-preserving federated learning based on MKFHE. Comput. Stand. Interfaces 87: 103773 (2024) - [j77]Jun Li
, Minqing Zhang, Ke Niu, Yingnan Zhang, Xiaoyuan Yang:
Motion vector-domain video steganalysis exploiting skipped macroblocks. IET Image Process. 18(5): 1132-1144 (2024) - [j76]Yangping Lin
, Peng Luo, Zhuo Zhang, Jia Liu, Xiaoyuan Yang:
AI-generated video steganography based on semantic segmentation. IET Image Process. 18(11): 3042-3054 (2024) - [j75]Dong Chen
, Tanping Zhou
, Wenchao Liu, Ruifeng Li, Liqiang Wu
, Xiaoyuan Yang:
MDA-FLH: Multidimensional Data Aggregation Scheme With Fine-Grained Linear Homomorphism for Smart Grid. IEEE Internet Things J. 11(2): 3524-3538 (2024) - [j74]Tanping Zhou
, Shuo Chen
, Huiyu Xie
, Liqiang Wu
, Xiaoyuan Yang:
SFPDA: Secure Fault-Tolerant and Privacy-Enhanced Data Aggregation Scheme for Smart Grid Without TA. IEEE Internet Things J. 11(21): 35669-35680 (2024) - [j73]Xuan Zhou
, Tanping Zhou
, Yuan Tian
, Weidong Zhong
, Xiaoyuan Yang
:
Linearly Homomorphic Signature Scheme With High-Signature Efficiency and Its Application in IoT. IEEE Internet Things J. 11(23): 38126-38136 (2024) - [j72]Yuan Tian, Tanping Zhou, Xuan Zhou, Weidong Zhong, Xiaoyuan Yang:
Attribute-based linear homomorphic signature scheme based on key policy for mobile crowdsensing. J. King Saud Univ. Comput. Inf. Sci. 36(6): 102114 (2024) - [j71]Xuan Zhou, Yuan Tian
, Weidong Zhong, Tanping Zhou, Xiaoyuan Yang:
A structure-preserving linearly homomorphic signature scheme with designated combiner. PeerJ Comput. Sci. 10: e1978 (2024) - [i27]Yangping Lin, Yan Ke, Ke Niu, Jia Liu, Xiaoyuan Yang:
NeR-VCP: A Video Content Protection Method Based on Implicit Neural Representation. CoRR abs/2408.15281 (2024) - 2023
- [j70]Zichao Song
, Tanping Zhou
, Weidong Zhong
, Dong Chen
, Longfei Liu, Xiaoyuan Yang:
Fault-Tolerant Data Aggregation Scheme Supporting Fine-Grained Linear Operation in Smart Grid. IEEE Access 11: 68525-68537 (2023) - [j69]Jun Li
, Minqing Zhang, Ke Niu, Xiaoyuan Yang:
Investigation on principles for cost assignment in motion vector-based video steganography. J. Inf. Secur. Appl. 73: 103439 (2023) - [j68]Yangping Lin, Peng Luo, Zhuo Zhang, Jia Liu, Fuqiang Di, Xiaoyuan Yang:
Semi-generative video steganography based on digital Carden Grille. J. Electronic Imaging 32(5) (2023) - [j67]Xiaoliang Che
, Longfei Liu, Baocang Wang, Yiliang Han, Xu An Wang, Xiaoyuan Yang, Tanping Zhou:
Multi-key homomorphic encryption with tightened RGSW ciphertexts without relinearization for ciphertexts product. J. King Saud Univ. Comput. Inf. Sci. 35(10): 101794 (2023) - [j66]Xiuguang Li
, Zhengge Yi, Ruifeng Li, Xu-An Wang
, Hui Li, Xiaoyuan Yang:
SM2-Based Offline/Online Efficient Data Integrity Verification Scheme for Multiple Application Scenarios. Sensors 23(9): 4307 (2023) - [j65]Yao Liu
, Tanping Zhou
, Zelun Yue, Wenchao Liu, Yiliang Han, Qi Li
, Xiaoyuan Yang:
Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing. IEEE Trans. Cloud Comput. 11(1): 564-578 (2023) - [j64]Tanping Zhou
, Dong Chen
, Wenchao Liu
, Xiaoyuan Yang
:
Attacks and Improvement of Unlinkability of Biometric Template Protection Scheme Based on Bloom Filters. IEEE Trans. Cloud Comput. 11(3): 3251-3261 (2023) - [c46]Dong Chen, Tanping Zhou, Wenchao Liu, Zichen Zhou, Yujie Ding, Xiaoyuan Yang:
Construction of a Fully Homomorphic Encryption Scheme with Shorter Ciphertext and Its Implementation on the CUDA Platform. EIDWT 2023: 141-151 - [i26]Yan Ke, Minqing Zhang, Jia Liu, Xiaoyuan Yang:
The Realizations of Steganography in Encrypted Domain. CoRR abs/2304.02614 (2023) - [i25]Jun Li, Minqing Zhang, Ke Niu, Yingnan Zhang, Xiaoyuan Yang:
A One-dimensional HEVC video steganalysis method using the Optimality of Predicted Motion Vectors. CoRR abs/2308.06464 (2023) - [i24]Jun Li, Minqing Zhang, Ke Niu, Yingnan Zhang, Xiaoyuan Yang:
Motion Vector-Domain Video Steganalysis Exploiting Skipped Macroblocks. CoRR abs/2310.07121 (2023) - [i23]Xu An Wang, Lunhai Pan, Hao Liu, Xiaoyuan Yang:
Traitor Tracing Revisited: New Attackers, Stronger Security Model and New Construction. IACR Cryptol. ePrint Arch. 2023: 1692 (2023) - 2022
- [j63]Liqiang Wu, Xiaoyuan Yang, Minqing Zhang, Xu An Wang:
IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability. J. Ambient Intell. Humaniz. Comput. 13(1): 469-482 (2022) - [j62]Yangping Lin, Zhuo Zhang, Jia Liu, Pei Chen, Mingshu Zhang, Xiaoyuan Yang:
Robust video steganography framework based on channel-space attention. J. Electronic Imaging 31(4) (2022) - [j61]Ruifeng Li, Xu An Wang
, Haibin Yang, Ke Niu, Dianhua Tang, Xiaoyuan Yang:
Efficient certificateless public integrity auditing of cloud data with designated verifier for batch audit. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8079-8089 (2022) - [j60]Liqiang Wu
, Yiliang Han
, Xiaoyuan Yang, Minqing Zhang:
Identity-based threshold proxy re-encryption scheme from lattices and its applications. Frontiers Inf. Technol. Electron. Eng. 23(2): 258-277 (2022) - [j59]Weidong Du, Min Li, Xiaoyuan Yang, Liqiang Wu, Tanping Zhou:
VCFL: A verifiable and collusion attack resistant privacy preserving framework for cross-silo federated learning. Pervasive Mob. Comput. 86: 101697 (2022) - [j58]Yan Ke
, Minqing Zhang, Xinpeng Zhang, Jia Liu
, Tingting Su, Xiaoyuan Yang:
A Reversible Data Hiding Scheme in Encrypted Domain for Secret Image Sharing Based on Chinese Remainder Theorem. IEEE Trans. Circuits Syst. Video Technol. 32(4): 2469-2481 (2022) - [c45]Wenyong Yuan, Ruifeng Li, Zhengge Yi, Pei Chen, Haibin Yang, Xiaoyuan Yang:
Secure Cloud Data Storage with Selecting Auditors. NaNA 2022: 157-162 - [i22]Jun Li, Minqing Zhang, Ke Niu, Xiaoyuan Yang:
Investigation on Principles for Cost Assignment in Motion Vector-based Video Steganography. CoRR abs/2209.01744 (2022) - 2021
- [j57]Tanping Zhou
, Ningbo Li
, Qiqi Lai, Xiaoyuan Yang, Yiliang Han, Wenchao Liu:
Efficient multi-key fully homomorphic encryption over prime cyclotomic rings with fewer relinearisations. IET Inf. Secur. 15(6): 472-486 (2021) - [j56]Haibin Yang, Zhengge Yi
, Ruifeng Li, Zheng Tu, Xu An Wang
, Yuanyou Cui, Xiaoyuan Yang:
Improved Outsourced Provable Data Possession for Secure Cloud Storage. Secur. Commun. Networks 2021: 1805615:1-1805615:12 (2021) - [j55]Xinliang Bi
, Xiaoyuan Yang
, Chao Wang
, Jia Liu
:
High-Capacity Image Steganography Algorithm Based on Image Style Transfer. Secur. Commun. Networks 2021: 4179340:1-4179340:14 (2021) - [j54]Haibin Yang, Zhengge Yi
, Xu An Wang
, Yunxuan Su, Zheng Tu, Xiaoyuan Yang:
Improved Lightweight Cloud Storage Auditing Protocol for Shared Medical Data. Wirel. Commun. Mob. Comput. 2021: 8886763:1-8886763:13 (2021) - [c44]Kun Han, Ke Niu, Shuai Yang, Xiaoyuan Yang:
Research on Adaptive Video Steganography Algorithm for Clustering and Dispersing DCT Coefficient Difference Histogram. NCTCS 2021: 3-14 - [i21]Tanping Zhou, Zhenfeng Zhang, Long Chen, Xiaoliang Che, Wenchao Liu, Xiaoyuan Yang:
Multi-key Fully Homomorphic Encryption Scheme with Compact Ciphertext. IACR Cryptol. ePrint Arch. 2021: 1131 (2021) - 2020
- [j53]Jia Liu
, Yan Ke
, Zhuo Zhang, Yu Lei, Jun Li, Minqing Zhang, Xiaoyuan Yang:
Recent Advances of Image Steganography With Generative Adversarial Networks. IEEE Access 8: 60575-60597 (2020) - [j52]Jiasen Liu
, Xu An Wang
, Zhiquan Liu
, Han Wang
, Xiaoyuan Yang:
Privacy-Preserving Public Cloud Audit Scheme Supporting Dynamic Data for Unmanned Aerial Vehicles. IEEE Access 8: 79428-79439 (2020) - [j51]Yan Ke
, Min-Qing Zhang, Jia Liu, Tingting Su, Xiaoyuan Yang:
Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain. IEEE Trans. Circuits Syst. Video Technol. 30(8): 2353-2365 (2020) - [c43]Shuaishuai Zhu, Yiliang Han, Xiaoyuan Yang, Xuguang Wu:
Efficient and Evolvable Key Reconciliation Mechanism in Multi-party Networks Based on Automatic Learning Structure. SPDE 2020: 91-99 - [i20]Yan Ke, Minqing Zhang, Xinpeng Zhang, Jia Liu, Tingting Su, Xiaoyuan Yang:
A Reversible Data hiding Scheme in Encrypted Domain for Secret Image Sharing based on Chinese Remainder Theorem. CoRR abs/2010.08502 (2020)
2010 – 2019
- 2019
- [j50]Ningbo Li
, Tanping Zhou
, Xiaoyuan Yang, Yiliang Han, Wenchao Liu, Guangsheng Tu:
Efficient Multi-Key FHE With Short Extended Ciphertexts and Directed Decryption Protocol. IEEE Access 7: 56724-56732 (2019) - [j49]Ke Niu
, Jun Li, Xiaoyuan Yang, Shuo Zhang, Bo Wang:
Hybrid Adaptive Video Steganography Scheme Under Game Model. IEEE Access 7: 61523-61533 (2019) - [j48]Zhuo Zhang, Jia Liu
, Yan Ke
, Yu Lei, Jun Li, Minqing Zhang, Xiaoyuan Yang:
Generative Steganography by Sampling. IEEE Access 7: 118586-118597 (2019) - [j47]Zhen Liu
, Yiliang Han, Xiaoyuan Yang:
A compressive sensing-based adaptable secure data collection scheme for distributed wireless sensor networks. Int. J. Distributed Sens. Networks 15(6) (2019) - [j46]Xiangxin Liu, Xiaoyuan Yang, Yiliang Han, Xu An Wang
:
A Secure and Efficient Code-Based Signature Scheme. Int. J. Found. Comput. Sci. 30(4): 635-645 (2019) - [j45]Xu An Wang, Jian Weng
, Jianfeng Ma, Xiaoyuan Yang:
Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification. Inf. Sci. 488: 13-18 (2019) - [j44]Dong Li, Yingnan Zhang, XinChao Li, Ke Niu, Xiaoyuan Yang, YuJuan Sun:
Two-dimensional histogram modification based reversible data hiding using motion vector for H.264. Multim. Tools Appl. 78(7): 8167-8181 (2019) - [j43]Yan Ke, Min-Qing Zhang, Jia Liu, Tingting Su, Xiaoyuan Yang:
Generative steganography with Kerckhoffs' principle. Multim. Tools Appl. 78(10): 13805-13818 (2019) - [j42]JingJing Wang
, Yiliang Han
, Xiaoyuan Yang
, Tanping Zhou
, Jiayong Chen:
A New Group Location Privacy-Preserving Method Based on Distributed Architecture in LBS. Secur. Commun. Networks 2019: 2414687:1-2414687:14 (2019) - [j41]Shuaiwei Zhang
, Xiaoyuan Yang
, Lin Chen, Weidong Zhong:
A Highly Effective Data Preprocessing in Side-Channel Attack Using Empirical Mode Decomposition. Secur. Commun. Networks 2019: 6124165:1-6124165:10 (2019) - [i19]Yan Ke, Min-Qing Zhang, Jia Liu, Tingting Su, Xiaoyuan Yang:
Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data hiding in Encrypted Domain. CoRR abs/1904.12792 (2019) - [i18]Jia Liu, Yan Ke, Yu Lei, Zhuo Zhang, Jun Li, Peng Luo, Minqing Zhang, Xiaoyuan Yang:
Recent Advances of Image Steganography with Generative Adversarial Networks. CoRR abs/1907.01886 (2019) - 2018
- [j40]Tanping Zhou
, Xiaoyuan Yang, Longfei Liu, Wei Zhang, Ningbo Li:
Faster Bootstrapping With Multiple Addends. IEEE Access 6: 49868-49876 (2018) - [j39]Yan Ke
, Jia Liu, Min-Qing Zhang, Tingting Su, Xiaoyuan Yang:
Steganography Security: Principle and Practice. IEEE Access 6: 73009-73022 (2018) - [j38]Xu An Wang
, Xiaoyuan Yang, Cong Li, Yudong Liu, Yong Ding
:
Improved functional proxy re-encryption schemes for secure cloud data sharing. Comput. Sci. Inf. Syst. 15(3): 585-614 (2018) - [j37]Xiaoyuan Yang, Xiaoshuang Luo, Xu An Wang
, Shuaiwei Zhang:
Improved outsourced private set intersection protocol based on polynomial interpolation. Concurr. Comput. Pract. Exp. 30(1) (2018) - [j36]Xu An Wang
, Yudong Liu, Jindan Zhang, Xiaoyuan Yang, Minqing Zhang:
Improved group-oriented proofs of cloud storage in IoT setting. Concurr. Comput. Pract. Exp. 30(21) (2018) - [j35]Cong Li, Xiaoyuan Yang, Yudong Liu, Yunfei Cao:
Functional encryption with efficient verifiable outsourced decryption for secure data access control in social network. Int. J. High Perform. Syst. Archit. 8(1/2): 59-70 (2018) - [j34]Longfei Liu, Xiaoyuan Yang, Bin Wei, Liqiang Wu:
A new class of quaternary generalized cyclotomic sequences of order 2d and length 2pm with high linear complexity. Int. J. Wavelets Multiresolution Inf. Process. 16(1): 1850006:1-1850006:11 (2018) - [j33]Yan Ke, Minqing Zhang, Jia Liu, Tingting Su, Xiaoyuan Yang:
A multilevel reversible data hiding scheme in encrypted domain based on LWE. J. Vis. Commun. Image Represent. 54: 133-144 (2018) - [j32]Fuqiang Di, Fangjun Huang, Minqing Zhang, Jia Liu, Xiaoyuan Yang:
Reversible data hiding in encrypted images with high capacity by bitplane operations and adaptive embedding. Multim. Tools Appl. 77(16): 20917-20935 (2018) - [j31]Tanping Zhou
, Ningbo Li, Xiaoyuan Yang
, Liqun Lv, Yitao Ding, Xu An Wang
:
Secure Testing for Genetic Diseases on Encrypted Genomes with Homomorphic Encryption Scheme. Secur. Commun. Networks 2018: 4635715:1-4635715:12 (2018) - [c42]Dong Li, Yingnan Zhang, Ke Niu, Xiaoyuan Yang:
Reversible Data Hiding for Video. ICCCS (4) 2018: 382-391 - [c41]Mingming Liu, Minqing Zhang, Jia Liu, Xiaoyuan Yang:
Generative Steganography Based on GANs. ICCCS (6) 2018: 537-549 - [c40]Cong Li, Xiaoyuan Yang, Yazhou Liu, Xu An Wang:
The CP-ABE with Full Verifiability Outsourced Decryption and White-Box Traceability. ICCCS (3) 2018: 707-719 - [c39]Yudong Liu, Xu An Wang
, Yunfei Cao, Dianhua Tang, Xiaoyuan Yang:
Improved Provable Data Transfer from Provable Data Possession and Deletion in Cloud Storage. INCoS 2018: 445-452 - [i17]Jia Liu, Tanping Zhou, Zhuo Zhang, Yan Ke, Yu Lei, Minqing Zhang, Xiaoyuan Yang:
Digital Cardan Grille: A Modern Approach for Information Hiding. CoRR abs/1803.09219 (2018) - [i16]Jia Liu, Yan Ke, Yu Lei, Yaojie Wang, Yiliang Han, Minqing Zhang, Xiaoyuan Yang:
The Reincarnation of Grille Cipher. CoRR abs/1804.06514 (2018) - [i15]Jia Liu, Yu Lei, Yan Ke, Jun Li, Minqing Zhang, Xiaoyuan Yang:
Generative Steganography by Sampling. CoRR abs/1804.10531 (2018) - [i14]Yan Ke, Jia Liu, Minqing Zhang, Tingting Su, Xiaoyuan Yang:
Steganography Security: Principle and Practice. CoRR abs/1806.03618 (2018) - [i13]Tanping Zhou, Ningbo Li, Xiaoyuan Yang, Yiliang Han, Wenchao Liu:
Efficient Multi-key FHE with short extended ciphertexts and less public parameters. IACR Cryptol. ePrint Arch. 2018: 1054 (2018) - [i12]Ningbo Li, Tanping Zhou, Xiaoyuan Yang, Yiliang Han, Longfei Liu, Wenchao Liu:
Two round multiparty computation via Multi-key fully homomorphic encryption with faster homomorphic evaluations. IACR Cryptol. ePrint Arch. 2018: 1249 (2018) - 2017
- [j30]Shuai Xue
, Wen-Feng Qi, Xiaoyuan Yang:
On the best linear approximation of addition modulo 2 n. Cryptogr. Commun. 9(5): 563-580 (2017) - [j29]Jun Li, Xiaoyuan Yang, Xin Liao
, Feng Pan, Minqing Zhang:
A game-theoretic method for designing distortion function in spatial steganography. Multim. Tools Appl. 76(10): 12417-12431 (2017) - [c38]Xiaoshuang Luo, Xiaoyuan Yang, Xiangzhou Niu:
An Efficient and Secure Outsourcing Algorithm for Bilinear Pairing Computation. EIDWT 2017: 328-339 - [c37]Liqun Lv, Wenjun Sun, Xiaoyuan Yang, Xu An Wang:
Key Encapsulation Mechanism from Multilinear Maps. EIDWT 2017: 349-357 - [c36]Xu An Wang
, Xiaoshuang Luo, Jindan Zhang, Xiaoyuan Yang:
On the Security of a Cloud Data Storage Auditing Protocol IPAD. EIDWT 2017: 611-617 - [i11]Tanping Zhou, Xiaoyuan Yang, Longfei Liu, Wei Zhang, Yitao Ding:
Faster Bootstrapping with Multiple Addends. IACR Cryptol. ePrint Arch. 2017: 735 (2017) - 2016
- [j28]Longfei Liu, Xiaoyuan Yang, Xiaoni Du, Bin Wei:
On the k-error linear complexity of generalised cyclotomic sequences. Int. J. High Perform. Comput. Netw. 9(5/6): 394-400 (2016) - [j27]Tanping Zhou, Xiaoyuan Yang, Wei Zhang, Liqiang Wu:
Efficient fully homomorphic encryption with circularly secure key switching process. Int. J. High Perform. Comput. Netw. 9(5/6): 417-422 (2016) - [j26]Jing-Jing Wang, Jiayong Chen, Xiaoyuan Yang:
Research on generating good key sequence based on chaos. Int. J. High Perform. Comput. Netw. 9(5/6): 480-488 (2016) - [j25]Minqing Zhang, Liqiang Wu, Xu An Wang
, Xiaoyuan Yang:
Unidirectional IBPRE scheme from lattice for cloud computation. J. Ambient Intell. Humaniz. Comput. 7(5): 623-631 (2016) - [c35]Fei Chen, Yiliang Han, Di Jiang, Xiaoce Li, Xiaoyuan Yang:
Outsourcing the Unsigncryption of Compact Attribute-Based Signcryption for General Circuits. ICYCSEE (1) 2016: 533-545 - [c34]Tanping Zhou, Xiaoyuan Yang, Xu An Wang
, Yiliang Han:
Some Practical Properties of AP14. INCoS 2016: 527-531 - [c33]Xi Lin, Yiliang Han, Yan Ke, Xiaoyuan Yang:
Location Privacy Preserving Scheme Based on Attribute Encryption. SpaCCS 2016: 164-177 - 2015
- [j24]Zhen Liu, Xiaoyuan Yang, Feng Pan, Yuechuan Wei:
CCA-secure publicly verifiable public key encryption scheme without pairings. Int. J. Grid Util. Comput. 6(2): 74-82 (2015) - [j23]Shuaishuai Zhu, Xiaoyuan Yang:
Protecting data in cloud environment with attribute-based encryption. Int. J. Grid Util. Comput. 6(2): 91-97 (2015) - [j22]Wei Zhang, Shuguang Liu, Weidong Zhong, Xiaoyuan Yang:
How to build a faster private information retrieval protocol? J. Ambient Intell. Humaniz. Comput. 6(5): 549-555 (2015) - [j21]Xu An Wang
, Jianfeng Ma, Xiaoyuan Yang:
A new proxy re-encryption scheme for protecting critical information systems. J. Ambient Intell. Humaniz. Comput. 6(6): 699-711 (2015) - [j20]Minqing Zhang, Xu An Wang
, Xiaoyuan Yang, Weihua Li:
New Construction of PVPKE Scheme and Its Application in Information Systems and Mobile Communication. Mob. Inf. Syst. 2015: 430797:1-430797:10 (2015) - [j19]Xu An Wang
, Jianfeng Ma, Xiaoyuan Yang, Yuechuan Wei:
Security Analysis of Two Identity Based Proxy Re-encryption Schemes in Multi-user Networks. Trans. Comput. Collect. Intell. 19: 69-88 (2015) - [c32]Yiliang Han, Yincheng Bai, Dingyi Fang, Xiaoyuan Yang:
The New Attribute-Based Generalized Signcryption Scheme. ICYCSEE 2015: 353-360 - [c31]Xu An Wang
, Jianfeng Ma, Xiaoyuan Yang:
New Compact CCA Secure Elgamal Scheme in the Random Oracle Model. INCoS 2015: 379-383 - [c30]Yiliang Han, Di Jiang, Xiaoyuan Yang:
The Revocable Attribute Based Encryption Scheme for Social Networks. SocialSec 2015: 44-51 - [i10]Tanping Zhou, Xiaoyuan Yang, Wei Zhang, Liqiang Wu:
Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process. IACR Cryptol. ePrint Arch. 2015: 466 (2015) - [i9]Tanping Zhou, Longfei Liu, Xiaoyuan Yang, Yiliang Han:
Extend FHEW to General Case. IACR Cryptol. ePrint Arch. 2015: 1232 (2015) - 2014
- [j18]Yuechuan Wei, Xiaoyuan Yang, Chao Li:
Impossible differential cryptanalysis on cipher E2. Concurr. Comput. Pract. Exp. 26(8): 1477-1489 (2014) - 2013
- [j17]Xiaoyuan Yang, Liqiang Wu, Minqing Zhang, Xiaofeng Chen:
An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption. Comput. Math. Appl. 65(9): 1254-1263 (2013) - [j16]Jindan Zhang, Xu An Wang
, Yi Ding, Xiaoyuan Yang:
On the security of two multi-use CCA-secure proxy re-encryption schemes. Int. J. Intell. Inf. Database Syst. 7(5): 422-440 (2013) - [j15]Jindan Zhang, Xu An Wang
, Xiaoyuan Yang:
Identity Based Proxy Re-encryption Based on BB2 and SK IBE with the Help of PKG. J. Comput. 8(5): 1230-1239 (2013) - [j14]Jindan Zhang, Xu An Wang
, Xiaoyuan Yang:
Identity Based Proxy Re-encryption From BB1 IBE. J. Comput. 8(6): 1618-1626 (2013) - [j13]Jindan Zhang, Xu An Wang
, Xiaoyuan Yang:
Hybrid Proxy Re-encryption Between IBE And CBE. J. Comput. 8(7): 1873-1881 (2013) - [j12]Minqing Zhang, Xu An Wang
, Weihua Li, Xiaoyuan Yang:
CCA Secure Publicly Verifiable Public Key Encryption Without Pairings Nor Random Oracle and Its Applications. J. Comput. 8(8): 1987-1994 (2013) - [j11]Jindan Zhang, Xu An Wang
, Xiaoyuan Yang:
Analysis and Improvements of Several (H)IBS/IBSC/PRBE Schemes. J. Comput. 8(9): 2304-2312 (2013) - [j10]Shuaishuai Zhu, Xiaoyuan Yang:
Proxy Re-encryption Scheme based on New Multivariate Quadratic Assumptions. J. Comput. 8(12): 3238-3242 (2013) - [j9]Jindan Zhang, Xu An Wang
, Xiaoyuan Yang:
DDos Attack against Proxy in PRE and PRS. J. Softw. 8(3): 617-626 (2013) - [c29]Shuaishuai Zhu, Xiaoyuan Yang, Xuguang Wu
:
Secure Cloud File System with Attribute Based Encryption. INCoS 2013: 99-102 - [c28]Minqing Zhang, Xu An Wang
, Xiaoyuan Yang, Weiyi Cai:
Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption. INCoS 2013: 438-442 - [c27]Xiaoyuan Yang, Weidong Du, Xu An Wang, Liqiang Wang:
Fully Secure Attribute-Based Encryption with Non-monotonic Access Structures. INCoS 2013: 521-527 - [c26]Wei Zhang, Shuguang Liu, Xiaoyuan Yang:
RLWE-Based Homomorphic Encryption and Private Information Retrieval. INCoS 2013: 535-540 - [c25]