default search action
Haiyang Xue
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Guowei Ling, Fei Tang, Chaochao Cai, Jinyong Shan, Haiyang Xue, Wulu Li, Peng Tang, Xinyi Huang, Weidong Qiu:
P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection. IEEE Trans. Inf. Forensics Secur. 19: 2201-2216 (2024) - [j6]Xiao Yang, Chengru Zhang, Haiyang Xue, Man Ho Au:
Efficient Verifiably Encrypted ECDSA Schemes From Castagnos-Laguillaumie and Joye-Libert Encryptions. IEEE Trans. Inf. Forensics Secur. 19: 4161-4173 (2024) - [c24]Zhikang Xie, Mengling Liu, Haiyang Xue, Man Ho Au, Robert H. Deng, Siu-Ming Yiu:
Direct Range Proofs for Paillier Cryptosystem and Their Applications. CCS 2024: 899-913 - [c23]Borui Gong, Wang Fat Lau, Man Ho Au, Rupeng Yang, Haiyang Xue, Lichun Li:
Efficient Zero-Knowledge Arguments For Paillier Cryptosystem. SP 2024: 1813-1831 - [i15]Borui Gong, Wang Fat Lau, Man Ho Au, Rupeng Yang, Haiyang Xue, Lichun Li:
Efficient Zero-Knowledge Arguments for Paillier Cryptosystem. IACR Cryptol. ePrint Arch. 2024: 1303 (2024) - [i14]Zhikang Xie, Mengling Liu, Haiyang Xue, Man Ho Au, Robert H. Deng, Siu-Ming Yiu:
Direct Range Proofs for Paillier Cryptosystem and Their Applications. IACR Cryptol. ePrint Arch. 2024: 1355 (2024) - [i13]Qiqi Lai, Feng-Hao Liu, Yang Lu, Haiyang Xue, Yong Yu:
Scalable Two-Round n-out-of-n and Multi-Signatures from Lattices in the Quantum Random Oracle Model. IACR Cryptol. ePrint Arch. 2024: 1574 (2024) - 2023
- [c22]Haiyang Xue, Man Ho Au, Mengling Liu, Kwan Yin Chan, Handong Cui, Xiang Xie, Tsz Hon Yuen, Chengru Zhang:
Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA. CCS 2023: 2974-2988 - [i12]Haiyang Xue, Man Ho Au, Mengling Liu, Kwan Yin Chan, Handong Cui, Xiang Xie, Tsz Hon Yuen, Chengru Zhang:
Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA. IACR Cryptol. ePrint Arch. 2023: 1312 (2023) - 2022
- [j5]Chengliang Tian, Jia Yu, Hanlin Zhang, Haiyang Xue, Cong Wang, Kui Ren:
Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus. IEEE Trans. Serv. Comput. 15(1): 241-253 (2022) - [c21]Handong Zhang, Puwen Wei, Haiyang Xue, Yi Deng, Jinsong Li, Wei Wang, Guoxiao Liu:
Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives. ACISP 2022: 375-398 - [i11]Haiyang Xue, Man Ho Au, Xiang Xie, Tsz Hon Yuen, Handong Cui:
Efficient Online-friendly Two-Party ECDSA Signature. IACR Cryptol. ePrint Arch. 2022: 318 (2022) - [i10]Handong Zhang, Puwen Wei, Haiyang Xue, Yi Deng, Jinsong Li, Wei Wang, Guoxiao Liu:
Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives. IACR Cryptol. ePrint Arch. 2022: 556 (2022) - 2021
- [c20]Haiyang Xue, Man Ho Au, Xiang Xie, Tsz Hon Yuen, Handong Cui:
Efficient Online-friendly Two-Party ECDSA Signature. CCS 2021: 558-573 - 2020
- [j4]Quan Yuan, Puwen Wei, Keting Jia, Haiyang Xue:
Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers. Sci. China Inf. Sci. 63(3) (2020) - [i9]Haiyang Xue, Man Ho Au, Rupeng Yang, Bei Liang, Haodong Jiang:
Compact Authenticated Key Exchange in the Quantum Random Oracle Model. IACR Cryptol. ePrint Arch. 2020: 1282 (2020)
2010 – 2019
- 2019
- [j3]Daode Zhang, Jie Li, Bao Li, Xianhui Lu, Haiyang Xue, Dingding Jia, Yamin Liu:
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy. Secur. Commun. Networks 2019: 1816393:1-1816393:12 (2019) - [c19]Xiu Xu, Haiyang Xue, Kunpeng Wang, Man Ho Au, Song Tian:
Strongly Secure Authenticated Key Exchange from Supersingular Isogenies. ASIACRYPT (1) 2019: 278-308 - [c18]Zhengyu Zhang, Puwen Wei, Haiyang Xue:
Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting. CANS 2019: 141-160 - [c17]Haiyang Xue, Yang Feng, Di You, Wen Zhang, Jingyu Li:
Neural Machine Translation with Bilingual History Involved Attention. NLPCC (2) 2019: 265-275 - [c16]Borui Gong, Man Ho Au, Haiyang Xue:
Constructing Strong Designated Verifier Signatures from Key Encapsulation Mechanisms. TrustCom/BigDataSE 2019: 586-593 - [i8]Daode Zhang, Jie Li, Bao Li, Xianhui Lu, Haiyang Xue, Dingding Jia, Yamin Liu:
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy. IACR Cryptol. ePrint Arch. 2019: 51 (2019) - 2018
- [j2]Yu Chen, Baodong Qin, Haiyang Xue:
Regular lossy functions and their applications in leakage-resilient cryptography. Theor. Comput. Sci. 739: 13-38 (2018) - [c15]Daode Zhang, Kai Zhang, Bao Li, Xianhui Lu, Haiyang Xue, Jie Li:
Lattice-Based Dual Receiver Encryption and More. ACISP 2018: 520-538 - [c14]Haiyang Xue, Xianhui Lu, Bao Li, Bei Liang, Jingnan He:
Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism. ASIACRYPT (2) 2018: 158-189 - [c13]Shuai Zhou, Haiyang Xue, Daode Zhang, Kunpeng Wang, Xianhui Lu, Bao Li, Jingnan He:
Preprocess-then-NTT Technique and Its Applications to Kyber and NewHope. Inscrypt 2018: 117-137 - [c12]Yu Chen, Baodong Qin, Haiyang Xue:
Regularly Lossy Functions and Applications. CT-RSA 2018: 491-511 - [i7]Xiang Li, Haiyang Xue, Wei Chen, Yang Liu, Yang Feng, Qun Liu:
Improving the Robustness of Speech Translation. CoRR abs/1811.00728 (2018) - [i6]Yu Chen, Baodong Qin, Haiyang Xue:
Regularly Lossy Functions and Their Applications. IACR Cryptol. ePrint Arch. 2018: 21 (2018) - [i5]Daode Zhang, Kai Zhang, Bao Li, Xianhui Lu, Haiyang Xue, Jie Li:
Lattice-Based Dual Receiver Encryption and More. IACR Cryptol. ePrint Arch. 2018: 636 (2018) - [i4]Xiu Xu, Haiyang Xue, Kunpeng Wang, Song Tian, Bei Liang, Wei Yu:
Strongly Secure Authenticated Key Exchange from Supersingular Isogeny. IACR Cryptol. ePrint Arch. 2018: 760 (2018) - [i3]Haiyang Xue, Xianhui Lu, Bao Li, Bei Liang, Jingnan He:
Understanding and Constructing AKE via Double-key Key Encapsulation Mechanism. IACR Cryptol. ePrint Arch. 2018: 817 (2018) - [i2]Shuai Zhou, Haiyang Xue, Daode Zhang, Kunpeng Wang, Xianhui Lu, Bao Li, Jingnan He:
Preprocess-then-NTT Technique and Its Applications to KYBER and NEWHOPE. IACR Cryptol. ePrint Arch. 2018: 995 (2018) - [i1]Xianhui Lu, Yamin Liu, Zhenfei Zhang, Dingding Jia, Haiyang Xue, Jingnan He, Bao Li:
LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus. IACR Cryptol. ePrint Arch. 2018: 1009 (2018) - 2017
- [c11]Daode Zhang, Bao Li, Yamin Liu, Haiyang Xue, Xianhui Lu, Dingding Jia:
Towards Tightly Secure Deterministic Public Key Encryption. ICICS 2017: 154-161 - [c10]Daode Zhang, Fuyang Fang, Bao Li, Haiyang Xue, Bei Liang:
Compact Hierarchical IBE from Lattices in the Standard Model. ICICS 2017: 210-221 - [c9]Haiyang Xue, Bao Li, Xianhui Lu:
IND-PCA Secure KEM Is Enough for Password-Based Authenticated Key Exchange (Short Paper). IWSEC 2017: 231-241 - [c8]Haiyang Xue, Bao Li, Jingnan He:
New Framework of Password-Based Authenticated Key Exchange from Only-One Lossy Encryption. ProvSec 2017: 188-198 - 2016
- [c7]Fuyang Fang, Bao Li, Xianhui Lu, Yamin Liu, Dingding Jia, Haiyang Xue:
(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus. AsiaCCS 2016: 907-912 - [c6]Yamin Liu, Xianhui Lu, Bao Li, Haiyang Xue:
Lossy Key Encapsulation Mechanism and Its Applications. ICISC 2016: 126-144 - 2015
- [c5]Haiyang Xue, Yamin Liu, Xianhui Lu, Bao Li:
Lossy Projective Hashing and Its Applications. INDOCRYPT 2015: 64-84 - [c4]Jingnan He, Bao Li, Xianhui Lu, Dingding Jia, Haiyang Xue, Xiaochao Sun:
Identity-Based Lossy Encryption from Learning with Errors. IWSEC 2015: 3-20 - 2014
- [j1]Mingqiang Wang, Haiyang Xue, Tao Zhan:
Fault attacks on hyperelliptic curve discrete logarithm problem over binary field. Sci. China Inf. Sci. 57(3): 1-17 (2014) - [c3]Haiyang Xue, Bao Li, Xianhui Lu, Kunpeng Wang, Yamin Liu:
On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP. CANS 2014: 34-49 - [c2]Haiyang Xue, Xianhui Lu, Bao Li, Yamin Liu:
Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation. ProvSec 2014: 162-177 - 2013
- [c1]Haiyang Xue, Bao Li, Xianhui Lu, Dingding Jia, Yamin Liu:
Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions. CANS 2013: 235-250
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint