​
Login / Signup
Jia Yu
ORCID
Publication Activity (10 Years)
Years Active: 2006-2025
Publications (10 Years): 6
Top Topics
Ciphertext
Privacy Preserving
Secret Key
Signature Scheme
Top Venues
Inf. Sci.
3PGCIC
Future Gener. Comput. Syst.
Comput. Secur.
</>
Publications
</>
Xuan Zhao
,
Jia Yu
Privacy-preserving top-k spatio-temporal keyword preference query.
Comput. Stand. Interfaces
92 (2025)
Xuan Zhao
,
Jia Yu
,
Xinrui Ge
,
Rong Hao
Towards efficient Secure Boolean Range Query over encrypted spatial data.
Comput. Secur.
136 (2024)
Jia Yu
,
Rong Hao
,
Hui Xia
,
Hanlin Zhang
,
Xiangguo Cheng
,
Fanyu Kong
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction.
Inf. Sci.
(2018)
Wenting Shen
,
Guangyang Yang
,
Jia Yu
,
Hanlin Zhang
,
Fanyu Kong
,
Rong Hao
Remote data possession checking with privacy-preserving authenticators for cloud storage.
Future Gener. Comput. Syst.
76 (2017)
Xiuxiu Jiang
,
Xinrui Ge
,
Jia Yu
,
Fanyu Kong
,
Xiangguo Cheng
,
Rong Hao
An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage.
J. Internet Serv. Inf. Secur.
7 (2) (2017)
Fanyu Kong
,
Dashui Zhou
,
Yali Jiang
,
Jianwei Shang
,
Jia Yu
Fault Attack on an Improved CRT-RSA Algorithm with the Modulus Chaining Method.
CSE/EUC (1)
(2017)
Fanyu Kong
,
Jie Wang
,
Jia Yu
,
Xu An Wang
Analysis and Improvement of a Verifiable Phrase Search over Encrypted Data in a Single Phrase.
3PGCIC
(2015)
Xiuxiu Jiang
,
Jia Yu
,
Fanyu Kong
,
Xiangguo Cheng
,
Rong Hao
A Novel Privacy Preserving Keyword Search Scheme over Encrypted Cloud Data.
3PGCIC
(2015)
Jia Yu
,
Fanyu Kong
,
Xiangguo Cheng
,
Rong Hao
,
Guowen Li
One forward-secure signature scheme using bilinear maps and its applications.
Inf. Sci.
279 (2014)
Jia Yu
,
Fanyu Kong
,
Xiangguo Cheng
,
Rong Hao
,
Jianxi Fan
Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Informaticae
114 (1) (2012)
Jia Yu
,
Fanyu Kong
,
Xiangguo Cheng
,
Rong Hao
,
Jianxi Fan
Intrusion-resilient identity-based signature: Security definition and construction.
J. Syst. Softw.
85 (2) (2012)
Jia Yu
,
Fanyu Kong
,
Huawei Zhao
,
Xiangguo Cheng
,
Rong Hao
,
Xiang-Fa Guo
Non-Interactive Forward-Secure Threshold Signature without Random Oracles.
J. Inf. Sci. Eng.
28 (3) (2012)
Fanyu Kong
,
Jia Yu
,
Lei Wu
Security Analysis of an RSA Key Generation Algorithm with a Large Private Key.
ISC
(2011)
Jia Yu
,
Fanyu Kong
,
Xiangguo Cheng
,
Rong Hao
,
Jianxi Fan
New Forward-Secure Signature Scheme with Untrusted Update.
J. Inf. Sci. Eng.
27 (4) (2011)
Jia Yu
,
Rong Hao
,
Fanyu Kong
,
Xiangguo Cheng
,
Jianxi Fan
,
Yangkui Chen
Forward-secure identity-based signature: Security notions and construction.
Inf. Sci.
181 (3) (2011)
Jia Yu
,
Fanyu Kong
,
Xiangguo Cheng
,
Rong Hao
,
Jianxi Fan
Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Informaticae
111 (2) (2011)
Jia Yu
,
Fanyu Kong
,
Xiangguo Cheng
,
Rong Hao
Two Protocols for Member Revocation in Secret Sharing Schemes.
PAISI
(2011)
Jia Yu
,
Fanyu Kong
,
Xiangguo Cheng
,
Rong Hao
,
Yangkui Chen
,
Xuliang Li
,
Guowen Li
Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes.
J. Networks
5 (6) (2010)
Jia Yu
,
Fanyu Kong
,
Xiangguo Cheng
,
Rong Hao
A Forward Secure Threshold Signature Scheme Based on the Structure of Binary Tree.
J. Softw.
4 (1) (2009)
Fanyu Kong
,
Jia Yu
Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme.
IAS
(2009)
Jia Yu
,
Fanyu Kong
,
Rong Hao
,
Zhen Cheng
A Publicly Verifiable Dynamic Sharing Protocol for Data Secure Storage.
WAIM
(2008)
Jia Yu
,
Fanyu Kong
,
Rong Hao
,
Xuliang Li
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme.
ISI Workshops
(2008)
Jia Yu
,
Fanyu Kong
,
Rong Hao
,
Dexiang Zhang
,
Guowen Li
How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme.
J. Commun.
3 (7) (2008)
Jia Yu
,
Fanyu Kong
,
Rong Hao
,
Xuliang Li
,
Guowen Li
Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures.
J. Commun.
3 (7) (2008)
Jia Yu
,
Fanyu Kong
,
Rong Hao
,
Dexiang Zhang
Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme.
ISECS
(2008)
Jia Yu
,
Fanyu Kong
,
Xiangguo Cheng
,
Rong Hao
,
Guowen Li
Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps.
ProvSec
(2008)
Jia Yu
,
Fanyu Kong
,
Xiangguo Cheng
,
Rong Hao
,
Guowen Li
Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005.
ProvSec
(2008)
Fanyu Kong
,
Jia Yu
,
Baodong Qin
,
Daxing Li
Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005.
ATC
(2007)
Fanyu Kong
,
Jia Yu
,
Zhun Cai
,
Daxing Li
Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems.
TAMC
(2007)
Fanyu Kong
,
Jia Yu
,
Baodong Qin
,
Ming Li
,
Daxing Li
Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme.
SNPD (3)
(2007)
Jia Yu
,
Fanyu Kong
,
Rong Hao
Publicly Verifiable Secret Sharing with Enrollment Ability.
SNPD (3)
(2007)
Fanyu Kong
,
Zhun Cai
,
Jia Yu
,
Daxing Li
Improved generalized Atkin algorithm for computing square roots in finite fields.
Inf. Process. Lett.
98 (1) (2006)
Jia Yu
,
Fanyu Kong
,
Rong Hao
Forward Secure Threshold Signature Scheme from Bilinear Pairings.
CIS
(2006)