​
Login / Signup
Yuan Zhou
Publication Activity (10 Years)
Years Active: 2008-2016
Publications (10 Years): 1
Top Topics
Signcryption Scheme
Bilinear Pairings
Signature Scheme
Public Key
Top Venues
Secur. Commun. Networks
CCS
ICICS
ACNS
</>
Publications
</>
Yujuan Sun
,
Yu Yu
,
Xiangxue Li
,
Kai Zhang
,
Haifeng Qian
,
Yuan Zhou
Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations.
ACISP (1)
(2016)
Xiangxue Li
,
Haifeng Qian
,
Yu Yu
,
Jian Weng
,
Yuan Zhou
Signcryption KEM/tag-KEM, revisited.
Secur. Commun. Networks
8 (17) (2015)
Haifeng Qian
,
Yuan Zhou
,
Zhibin Li
,
Zhijie Chen
Generating signatures with optimal overhead: practical paddings for signature schemes.
Secur. Commun. Networks
7 (12) (2014)
Xiangxue Li
,
Yu Yu
,
Qiang Li
,
Haifeng Qian
,
Yuan Zhou
,
Jian Weng
POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results.
CCS
(2014)
Xiangxue Li
,
Yu Yu
,
Qiang Li
,
Haifeng Qian
,
Yuan Zhou
,
Jian Weng
POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of Passwords.
CCS
(2014)
Xiangxue Li
,
Haifeng Qian
,
Yuan Zhou
Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption.
Inf. Sci.
276 (2014)
Xiangxue Li
,
Haifeng Qian
,
Yu Yu
,
Yuan Zhou
,
Jian Weng
Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles.
ACNS
(2013)
Xiangxue Li
,
Haifeng Qian
,
Yu Yu
,
Jian Weng
,
Yuan Zhou
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model.
ICICS
(2013)
Haifeng Qian
,
Junqing Gong
,
Yuan Zhou
Anonymous password-based key exchange with low resources consumption and better user-friendliness.
Secur. Commun. Networks
5 (12) (2012)
Yuan Zhou
,
Haifeng Qian
Practical round-optimal blind signatures without random oracles or non-interactive zero-knowledge proofs.
Secur. Commun. Networks
5 (7) (2012)
Xiangxue Li
,
Haifeng Qian
,
Yuan Zhou
Pitfalls in identity based encryption using an elliptic curve combined public key.
Appl. Math. Lett.
25 (8) (2012)
Yuan Zhou
,
Haifeng Qian
Efficient CDH-Based Verifiably Encrypted Signatures with Optimal Bandwidth in the Standard Model.
ADHOC-NOW
(2011)
Yuan Zhou
,
Haifeng Qian
,
Xiangxue Li
Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security.
ISC
(2011)
Junqing Gong
,
Haifeng Qian
,
Yuan Zhou
Fully-Secure and Practical Sanitizable Signatures.
Inscrypt
(2010)
Qingshui Xue
,
Fengying Li
,
Yuan Zhou
,
Jiping Zhang
,
Zhenfu Cao
,
Haifeng Qian
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System.
MobiSec
(2009)
Qingshui Xue
,
Fengying Li
,
Yuan Zhou
,
Jiping Zhang
,
Zhenfu Cao
,
Haifeng Qian
Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme.
Security and Management
(2009)
Haifeng Qian
,
Yuan Zhou
,
Zhibin Li
,
Zecheng Wang
,
Bing Zhang
Efficient public key encryption with smallest ciphertext expansion from factoring.
Des. Codes Cryptogr.
49 (1-3) (2008)