Yi Deng
Orcid: 0000-0001-5948-0780Affiliations:
- Chinese Academy of sciences, Institute of Software, State Key Laboratory of Information Security, Beijing, China
According to our database1,
Yi Deng
authored at least 41 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Cybersecur., December, 2024
IACR Cryptol. ePrint Arch., 2024
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
Promise Σ-protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups.
IACR Cryptol. ePrint Arch., 2022
Knowledge Encryption and Its Applications to Simulatable Protocols With Low Round-Complexity.
IACR Cryptol. ePrint Arch., 2022
2021
An Efficient NIZK Scheme for Privacy-Preserving Transactions Over Account-Model Blockchain.
IEEE Trans. Dependable Secur. Comput., 2021
Promise $\varSigma $-Protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
A Practical NIZK Argument for Confidential Transactions over Account-Model Blockchain.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
2019
Inf. Sci., 2019
(Identity-based) dual receiver encryption from lattice-based programmable hash functions with high min-entropy.
Cybersecur., 2019
A novel approach to public-coin concurrent zero-knowledge and applications on resettable security.
Sci. China Inf. Sci., 2019
2018
Concurrent non-malleable zero-knowledge and simultaneous resettable non-malleable zero-knowledge in constant rounds.
Cybersecur., 2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
2017
On Instance Compression, Schnorr/Guillou-Quisquater, and the Security of Classic Protocols for Unique Witness Relations.
IACR Cryptol. ePrint Arch., 2017
Electron. Colloquium Comput. Complex., 2017
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
2014
Evaluating and comparing the quality of access control in different operating systems.
Comput. Secur., 2014
Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones.
Proceedings of the 13th IEEE International Conference on Trust, 2014
2013
Proceedings of the Advances in Information and Computer Security, 2013
Heuristic Path Pruning Algorithm Based on Error Handling Pattern Recognition in Detecting Vulnerability.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013
2012
On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable Zero-Knowledge Proofs.
IACR Cryptol. ePrint Arch., 2012
2011
IACR Cryptol. ePrint Arch., 2011
2009
Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy.
Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, 2009
Proceedings of the Computer Science, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Information Hiding, 10th International Workshop, 2008
2007
Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability.
Proceedings of the Advances in Cryptology, 2007
Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006