Yu Chen
Orcid: 0000-0003-2553-1281Affiliations:
- Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
- Peking University, Beijing, China
According to our database1,
Yu Chen
authored at least 60 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Theor. Comput. Sci., February, 2024
Breaking Free: Efficient Multi-Party Private Set Union Without Non-Collusion Assumptions.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Public-Key Cryptography - PKC 2024, 2024
Generating Handwritten Mathematical Expressions From Symbol Graphs: An End-to-End Pipeline.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Temporal-Spatial dependencies ENhanced deep learning model (TSEN) for household leverage series forecasting.
CoRR, 2022
2021
MPC-in-Multi-Heads: A Multi-Prover Zero-Knowledge Proof System - (or: How to Jointly Prove Any NP Statements in ZK).
Proceedings of the Computer Security - ESORICS 2021, 2021
Hierarchical Integrated Signature and Encryption - (or: Key Separation vs. Key Reuse: Enjoy the Best of both Worlds).
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
Public-key authenticated encryption with keyword search revisited: Security model and constructions.
Inf. Sci., 2020
2019
Inf. Sci., 2019
Proceedings of the Information Security - 22nd International Conference, 2019
2018
Theor. Comput. Sci., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018
2017
On Instance Compression, Schnorr/Guillou-Quisquater, and the Security of Classic Protocols for Unique Witness Relations.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
2016
Secur. Commun. Networks, 2016
J. Comput. Secur., 2016
Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange revisited and more.
Int. J. Inf. Sec., 2016
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model.
Proceedings of the Provable Security, 2015
2014
PRE: Stronger security notions and efficient construction with non-interactive opening.
Theor. Comput. Sci., 2014
Sakai-Ohgishi-Kasahara Non-Interactive Identity-Based Key Exchange Scheme, Revisited.
IACR Cryptol. ePrint Arch., 2014
Comput. J., 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
IACR Cryptol. ePrint Arch., 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Provable Security - 6th International Conference, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model.
IACR Cryptol. ePrint Arch., 2011
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes.
IACR Cryptol. ePrint Arch., 2011
New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts.
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the Foundations and Practice of Security, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
2008
How to Optimize the Cryptographic Symmetric Primitives on Loongson-2E Microprocessor.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008