Cryptographic reverse firewall via malleable smooth projective hash functions

R Chen, Y Mu, G Yang, W Susilo, F Guo… - … conference on the theory …, 2016 - Springer
Motivated by the revelations of Edward Snowden, post-Snowden cryptography has become
a prominent research direction in recent years. In Eurocrypt 2015, Mironov and Stephens …

Towards leakage-resilient fine-grained access control in fog computing

Z Yu, MH Au, Q Xu, R Yang, J Han - Future Generation Computer Systems, 2018 - Elsevier
Fog Computing, a technology that takes advantage of both the paradigms of Cloud
Computing and the Internet of Things, has a great advantage in reducing the communication …

Research on evaluation index and application of rockburst risk in deep strip mining

B Jiang, H Ji, L Fu, S Gu, T Zou, J Lu - Shock and Vibration, 2020 - Wiley Online Library
The practice shows that deep strip mining induces rockburst disaster easily. Accurately
evaluating rockburst risk of the strip coal pillar is of great significance for ensuring the safety …

Leakage-resilient identity-based cryptography from minimal assumptions

Y Zhou, B Yang, Z Qiao, Z **a, M Zhang… - Designs, Codes and …, 2023 - Springer
Identity-based hash proof system (IB-HPS), a variant of hash proof system (HPS) in the
identity-based setting, is a useful building block in cryptography. In EUROCRYPT 2010 …

Novel generic construction of leakage-resilient PKE scheme with CCA security

Y Zhou, B Yang, Z **a, M Zhang, Y Mu - Designs, Codes and …, 2021 - Springer
Leakage of private state information (eg the secret keys) through various leakage attacks (eg
side channel attacks, cold-boot attacks, etc) has become a serious threat to the security of …

[HTML][HTML] The generic construction of continuous leakage-resilient identity-based cryptosystems

Y Zhou, B Yang, Y Mu - Theoretical Computer Science, 2019 - Elsevier
In the leakage setting, the adversary is allowed to access the internal secret states of a
cryptosystem, such as the private key of user and the master secret key. In the continuous …

Leakage-resilient functional encryption via pair encodings

Z Yu, MH Au, Q Xu, R Yang, J Han - … , Melbourne, VIC, Australia, July 4-6 …, 2016 - Springer
Leakage-resilient cryptography is proposed to address physical attacks on real world crypto-
systems. Dual system encryption methodology is developed to guide design and analysis of …

Anonymous and updatable identity-based hash proof system

Y Zhou, B Yang, Z **a, Y Mu, T Wang - IEEE Systems Journal, 2018 - ieeexplore.ieee.org
In EUROCRYPT 2002, Alwen et al. demonstrated that an identity-based hash proof system
(IB-HPS) can be used to generate an identity-based encryption (IBE) scheme, which is …

A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience

C Hu, R Yang, P Liu, T Li, F Kong - The Journal of Supercomputing, 2019 - Springer
Public-key encryption is an important security mechanism used in cloud environment. To
ensure the confidentiality of data encrypted using public-key encryption, countermeasures …

Continuous leakage-resilient identity-based encryption with leakage amplification

Y Zhou, B Yang, Y Mu - Designs, Codes and Cryptography, 2019 - Springer
In modern computer systems, leakage of private information may cause catastrophic
consequences, especially those are related to the secret keys in cryptographic mechanisms …