Rui Xue
Orcid: 0000-0001-6024-3635Affiliations:
- Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China
- Beijing Normal University, Department of Mathematics, China (PhD)
According to our database1,
Rui Xue
authored at least 106 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
Comput. Stand. Interfaces, March, 2024
$\mathsf {moKHS}$moKHS: A More Lightweight Model for Multi-Client Delegatable Computation.
IEEE Trans. Dependable Secur. Comput., 2024
Measure-Rewind-Extract: Tighter Proofs of One-Way to Hiding and CCA Security in the Quantum Random Oracle Model.
IACR Cryptol. ePrint Arch., 2024
metaNet: Interpretable unknown mobile malware identification with a novel meta-features mining algorithm.
Comput. Networks, 2024
Demo: Enhancing Smart Contract Security Comprehensively through Dynamic Symbolic Execution.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Cybersecur., December, 2023
VulHunter: Hunting Vulnerable Smart Contracts at EVM Bytecode-Level via Multiple Instance Learning.
IEEE Trans. Software Eng., November, 2023
IEEE Trans. Ind. Informatics, 2023
Tighter QCCA-Secure Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model.
IACR Cryptol. ePrint Arch., 2023
On the Fujisaki-Okamoto transform: from Classical CCA Security to Quantum CCA Security.
IACR Cryptol. ePrint Arch., 2023
2022
Public auditing protocol with dynamic update and privacy-preserving properties in fog-to-cloud-based IoT applications.
Peer-to-Peer Netw. Appl., 2022
J. Cloud Comput., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
The Gap Is Sensitive to Size of Preimages: Collapsing Property Doesn't Go Beyond Quantum Collision-Resistance for Preimages Bounded Hash Functions.
IACR Cryptol. ePrint Arch., 2022
Empir. Softw. Eng., 2022
Secure medical data management with privacy-preservation and authentication properties in smart healthcare system.
Comput. Networks, 2022
Toward Both Privacy and Efficiency of Homomorphic MACs for Polynomial Functions and Its Applications.
Comput. J., 2022
2021
RTChain: A Reputation System with Transaction and Consensus Incentives for E-commerce Blockchain.
ACM Trans. Internet Techn., 2021
Being a permutation is also orthogonal to one-wayness in quantum world: Impossibilities of quantum one-way permutations from one-wayness primitives.
Theor. Comput. Sci., 2021
IET Inf. Secur., 2021
IACR Cryptol. ePrint Arch., 2021
Comput. Secur., 2021
Sci. China Inf. Sci., 2021
Proceedings of the Provable and Practical Security, 2021
2020
IEEE Trans. Software Eng., 2020
IEEE/ACM Trans. Netw., 2020
EAI Endorsed Trans. Security Safety, 2020
Verifiable outsourcing computation for modular exponentiation from shareable functions.
Clust. Comput., 2020
Secure Outsourcing Algorithms for Composite Modular Exponentiation Based on Single Untrusted Cloud.
Comput. J., 2020
IEEE Access, 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the Web Services - ICWS 2020, 2020
Chosen Ciphertext Attacks Secure Inner-Product Functional Encryption from Learning with Errors Assumption.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
2019
General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding.
Future Gener. Comput. Syst., 2019
A more compact multi-id identity-based FHE scheme in the standard model and its applications.
Sci. China Inf. Sci., 2019
Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper).
Proceedings of the Advances in Information and Computer Security, 2019
An Efficient Traceable and Anonymous Authentication Scheme for Permissioned Blockchain.
Proceedings of the Web Services - ICWS 2019, 2019
Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs.
Proceedings of the Information and Communications Security - 21st International Conference, 2019
2018
IEEE Trans. Serv. Comput., 2018
Multim. Tools Appl., 2018
Future Gener. Comput. Syst., 2018
Proceedings of the Information Security - 21st International Conference, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Homomorphic MAC from Algebraic One-Way Functions for Network Coding with Small Key Size.
Comput. J., 2017
Proceedings of the 2017 IEEE International Conference on Web Services, 2017
Proceedings of the 2017 IEEE International Conference on Web Services, 2017
Proceedings of the 39th International Conference on Software Engineering, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
2016
Dynamic and Efficient Private Keyword Search over Inverted Index-Based Encrypted Data.
ACM Trans. Internet Techn., 2016
Secur. Commun. Networks, 2016
Security analysis of a TESLA-based homomorphic MAC scheme for authentication in P2P live streaming system.
Secur. Commun. Networks, 2016
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016
PVSAE: A Public Verifiable Searchable Encryption Service Framework for Outsourced Encrypted Data.
Proceedings of the IEEE International Conference on Web Services, 2016
Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016
2015
Practical key-dependent message chosen-ciphertext security based on decisional composite residuosity and quadratic residuosity assumptions.
Secur. Commun. Networks, 2015
A Generic Construction of Homomorphic MAC for Multi-File Transmission in Network Coding.
J. Commun., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the Information and Communications Security - 17th International Conference, 2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
2014
Secur. Commun. Networks, 2014
General Construction of Chameleon All-But-One Trapdoor Functions and Their Applications.
J. Softw., 2014
On the Security against Nonadaptive Chosen Ciphertext Attack and Key-Dependent Message Attack.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Proceedings of the SECRYPT 2014, 2014
2013
Attribute-Based Encryption for a Subclass of Circuits with Bounded Depth from Lattices.
IACR Cryptol. ePrint Arch., 2013
Sci. China Inf. Sci., 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013
2012
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011
Some Improvements to the Cost-Based Framework for Analyzing Denial of Service Attacks.
Proceedings of the Trusted Systems - Third International Conference, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Information Security - 13th International Conference, 2010
2008
2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
Int. J. Netw. Secur., 2006
2005
Comput. Secur., 2005
Proceedings of the Applied Public Key Infrastructure, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
2004
J. Comput. Sci. Technol., 2004
Proceedings of the 7th Eurographics Multimedia Workshop 2004, 2004
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004