Haiyang Xue
Orcid: 0000-0002-0173-7894
According to our database1,
Haiyang Xue
authored at least 37 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Efficient Verifiably Encrypted ECDSA Schemes From Castagnos-Laguillaumie and Joye-Libert Encryptions.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IACR Cryptol. ePrint Arch., 2024
Scalable Two-Round n-out-of-n and Multi-Signatures from Lattices in the Quantum Random Oracle Model.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
2023
Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA.
IACR Cryptol. ePrint Arch., 2023
2022
IEEE Trans. Serv. Comput., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
2020
IACR Cryptol. ePrint Arch., 2020
Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers.
Sci. China Inf. Sci., 2020
2019
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy.
Secur. Commun. Networks, 2019
Constructing Strong Designated Verifier Signatures from Key Encapsulation Mechanisms.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the Natural Language Processing and Chinese Computing, 2019
Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
2018
Theor. Comput. Sci., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018
2017
New Framework of Password-Based Authenticated Key Exchange from Only-One Lossy Encryption.
Proceedings of the Provable Security, 2017
IND-PCA Secure KEM Is Enough for Password-Based Authenticated Key Exchange (Short Paper).
Proceedings of the Advances in Information and Computer Security, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
2016
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016
(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Proceedings of the Advances in Information and Computer Security, 2015
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015
2014
Sci. China Inf. Sci., 2014
Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation.
Proceedings of the Provable Security - 8th International Conference, 2014
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014
2013
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013