×
Author ID: mu.yi Recent zbMATH articles by "Mu, Yi"
Published as: Mu, Yi; Mu, Y.
Further Spellings: 穆怡
Homepage: https://sites.google.com/view/yi-mu-home-page/home
External Links: ORCID · Wikidata · Google Scholar · ResearchGate · dblp · GND · IdRef
all top 5

Co-Authors

0 single-authored
91 Susilo, Willy
32 Guo, Fuchun
32 Yang, Guomin
21 Varadharajan, Vijay
14 Huang, Xinyi
13 Au, Man Ho
13 Chen, Rongmao
11 Yang, Bo
11 Zhang, Mingwu
10 Wu, Wei
10 Zhang, Fangguo
8 Zhang, Shiwei
8 Zhou, Yanwei
7 Lai, Jianchang
7 Wu, Qianhong
7 Xia, Zhe
6 Nguyen, Khanh Quoc
6 Yu, Yong
5 Chen, Zhide
5 Guo, Hua
5 Li, Zhoujun
5 Ma, Sha
5 Wang, Xiaofen
5 Wong, Duncan S.
5 Xu, Shengmin
5 Zhang, Futai
4 Chen, Xiaofeng
4 Jiang, Peng
4 Tian, Yangguang
3 Cui, Hui
3 Cui, Jie
3 Han, Jinguang
3 Huang, Qiong
3 Lin, Yanxia
3 Liu, Joseph K. K.
3 Liu, Weiwei
3 Qin, Bo
3 Reyhanitabar, Mohammad Reza
3 Rezaeibagha, Fatemeh
3 Shi, Runhua
3 Thorncharoensri, Pairat
3 Yao, Zhongyuan
3 Yuen, Tsz Hon
3 Zhang, Junqi
3 Zhang, Shun
3 Zhong, Hong
2 Chen, Lanxiang
2 Chen, Liqun
2 Deng, Robert Huijie
2 Jiang, Yinhao
2 Li, Sujuan
2 Liang, Kaitai
2 Seberry, Jennifer R.
2 Wang, Guilin
2 Wang, Huaxiong
2 Wei, Jiannan
2 Wong, Duncan
2 Xu, Chang
2 Zeng, Shengke
2 Zhang, Xiyong
1 Bao, Feng
1 Chang, Shuang
1 Desmedt, Yvo G.
1 Domingo-Ferrer, Josep
1 Feng, Yiteng
1 Fu, Anmin
1 Harn, Lein
1 He, Mingxing
1 Hussain, Sajid
1 Ji, Yafu
1 Kim, Kwangjo
1 Lee, Hyunrok
1 Li, Hui
1 Li, Jie
1 Li, Nan
1 Li, Yongqing
1 Liu, Dennis Y. W.
1 Liu, Ximeng
1 Lv, Xixiang
1 Meng, Weizhi
1 Miao, Songqin
1 Ng, Ching Yu
1 Nguyen Khanh Quoc
1 Park, Jonghyuk
1 Pieprzyk, Josef P.
1 Pointcheval, David
1 Qiao, Zirui
1 Ruan, Chun
1 Safavi-Naini, Reihaneh
1 Shen, Hua
1 Song, Yongcheng
1 Sun, Ying
1 Sun, Yinxia
1 Tan, Chik How
1 Teng, Jikai
1 Tian, Haibo
1 Tsang, Patrick P.
1 Wang, Kefeng
1 Wang, Yikai
1 Wei, Baodian
...and 22 more Co-Authors

Publications by Year

Citations contained in zbMATH Open

108 Publications have been cited 517 times in 387 Documents Cited by Year
Certificateless signature revisited. Zbl 1213.94158
Huang, Xinyi; Mu, Yi; Susilo, Willy; Wong, Duncan S.; Wu, Wei
33
2007
On the security of certificateless signature schemes from Asiacrypt 2003. Zbl 1154.94459
Huang, Xinyi; Susilo, Willy; Mu, Yi; Zhang, Futai
33
2005
Certificateless threshold ring signature. Zbl 1170.94327
Chang, Shuang; Wong, Duncan S.; Mu, Yi; Zhang, Zhenfeng
21
2009
Constant-size dynamic \(k\)-TAA. Zbl 1152.94445
Au, Man Ho; Susilo, Willy; Mu, Yi
21
2006
Quantum private set intersection cardinality and its application to anonymous authentication. Zbl 1428.81071
Shi, Run-hua; Mu, Yi; Zhong, Hong; Zhang, Shun; Cui, Jie
19
2016
Identity-based strong designated verifier signature schemes. Zbl 1098.94630
Susilo, Willy; Zhang, Fangguo; Mu, Yi
17
2004
Cryptographic reverse firewall via malleable smooth projective hash functions. Zbl 1404.94052
Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun; Zhang, Mingwu
17
2016
An efficient quantum scheme for private set intersection. Zbl 1333.81125
Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
15
2016
Strongly leakage-resilient authenticated key exchange. Zbl 1332.94088
Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun
15
2016
Asymmetric group key agreement. Zbl 1239.94078
Wu, Qianhong; Mu, Yi; Susilo, Willy; Qin, Bo; Domingo-Ferrer, Josep
15
2009
Efficient generic on-line/off-line signatures without key exposure. Zbl 1214.94061
Chen, Xiaofeng; Zhang, Fangguo; Susilo, Willy; Mu, Yi
13
2007
Dynamic universal accumulators for DDH groups and their application to attribute-based anonymous credential systems. Zbl 1237.94048
Au, Man Ho; Tsang, Patrick P.; Susilo, Willy; Mu, Yi
12
2009
Strong authenticated key exchange with auxiliary inputs. Zbl 1381.94065
Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun
11
2017
A new general framework for secure public key encryption with keyword search. Zbl 1358.94060
Chen, Rongmao; Mu, Yi; Yang, Guomin; Guo, Fuchun; Wang, Xiaofen
11
2015
ID-based encryption with equality test against insider attack. Zbl 1386.94087
Wu, Tong; Ma, Sha; Mu, Yi; Zeng, Shengke
10
2017
Provably secure pairing-based convertible undeniable signature with short signature length. Zbl 1151.94610
Huang, Xinyi; Mu, Yi; Susilo, Willy; Wu, Wei
8
2007
Identity-based authenticated broadcast encryption and distributed authenticated encryption. Zbl 1115.68407
Mu, Yi; Susilo, Willy; Lin, Yan-Xia; Ruan, Chun
7
2004
A new signature scheme without random oracles from bilinear pairings. Zbl 1295.94192
Zhang, Fangguo; Chen, Xiaofeng; Susilo, Willy; Mu, Yi
7
2006
Certificateless threshold signature scheme from bilinear maps. Zbl 1208.94062
Yuan, Hong; Zhang, Futai; Huang, Xinyi; Mu, Yi; Susilo, Willy; Zhang, Lei
7
2010
Identity-based partial message recovery signatures (or how to shorten ID-based signatures). Zbl 1120.94334
Zhang, Fangguo; Susilo, Willy; Mu, Yi
6
2005
\(m\) out of \(n\) oblivious transfer. Zbl 1024.94515
Mu, Yi; Zhang, Junqi; Varadharajan, Vijay
6
2002
Compact e-cash from bounded accumulator. Zbl 1177.94179
Au, Man Ho; Wu, Qianhong; Susilo, Willy; Mu, Yi
6
2006
Server-aided verification signatures: Definitions and new constructions. Zbl 1204.94093
Wu, Wei; Mu, Yi; Susilo, Willy; Huang, Xinyi
6
2008
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample. Zbl 1410.94078
Guo, Fuchun; Chen, Rongmao; Susilo, Willy; Lai, Jianchang; Yang, Guomin; Mu, Yi
6
2017
A code-based signature scheme from the Lyubashevsky framework. Zbl 1457.94222
Song, Yongcheng; Huang, Xinyi; Mu, Yi; Wu, Wei; Wang, Huaxiong
6
2020
Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query. Zbl 1398.81075
Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
5
2017
Multi-party stand-alone and setup-free verifiably committed signatures. Zbl 1127.94381
Zhu, Huafei; Susilo, Willy; Mu, Yi
5
2007
Online/offline signatures and multisignatures for aodv and dsr routing security. Zbl 1176.94062
Xu, Shidi; Mu, Yi; Susilo, Willy
5
2006
Certificate-based signatures revisited. Zbl 1216.94055
Wu, W.; Mu, Y.; Susilo, W.; Huang, X.
5
2009
On the security of nominative signatures. Zbl 1127.94373
Susilo, Willy; Mu, Yi
5
2005
Introduction to security reduction. Zbl 1437.94002
Guo, Fuchun; Susilo, Willy; Mu, Yi
5
2018
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation. Zbl 1443.68057
Xu, Shengmin; Yang, Guomin; Mu, Yi
5
2019
Distributed signcryption. Zbl 0963.94032
Mu, Yi; Varadharajan, Vijay
4
2000
Perfect concurrent signature schemes. Zbl 1109.68487
Susilo, Willy; Mu, Yi; Zhang, Fangguo
4
2004
Membership encryption and its applications. Zbl 1316.94076
Guo, Fuchun; Mu, Yi; Susilo, Willy; Varadharajan, Vijay
4
2013
Efficient provably secure restrictive partially blind signatures from bilinear pairings. Zbl 1152.94409
Chen, Xiaofeng; Zhang, Fangguo; Mu, Yi; Susilo, Willy
4
2006
Identity-based secure distributed data storage schemes. Zbl 1364.94541
Han, Jinguang; Susilo, Willy; Mu, Yi
4
2014
Non-interactive deniable ring authentication. Zbl 1092.94515
Susilo, Willy; Mu, Yi
4
2004
Efficient generic on-line/off-line (threshold) signatures without key exposure. Zbl 1148.94008
Chen, Xiaofeng; Zhang, Fangguo; Tian, Haibo; Wei, Baodian; Susilo, Willy; Mu, Yi; Lee, Hyunrok; Kim, Kwangjo
4
2008
Anonymous identity-based broadcast encryption with revocation for file sharing. Zbl 1346.94108
Lai, Jianchang; Mu, Yi; Guo, Fuchun; Susilo, Willy; Chen, Rongmao
4
2016
Practical compact e-cash. Zbl 1213.68244
Au, Man Ho; Susilo, Willy; Mu, Yi
4
2007
Provably secure identity-based authenticated key agreement protocols with malicious private key generators. Zbl 1204.94087
Guo, Hua; Li, Zhoujun; Mu, Yi; Zhang, Xiyong
4
2011
Identity-based encryption: How to decrypt multiple ciphertexts using a single decryption key. Zbl 1151.94608
Guo, Fuchun; Mu, Yi; Chen, Zhide
4
2007
The generic construction of continuous leakage-resilient identity-based cryptosystems. Zbl 1439.94078
Zhou, Yanwei; Yang, Bo; Mu, Yi
4
2019
Strongly leakage resilient authenticated key exchange, revisited. Zbl 1423.94116
Yang, Guomin; Chen, Rongmao; Mu, Yi; Susilo, Willy; Guo, Fuchun; Li, Jie
4
2019
Public key encryption with authorized keyword search. Zbl 1346.94107
Jiang, Peng; Mu, Yi; Guo, Fuchun; Wen, Qiaoyan
3
2016
Deniable ring authentication revisited. Zbl 1103.68539
Susilo, Willy; Mu, Yi
3
2004
Efficient oblivious transfers with access control. Zbl 1247.94035
Han, Jinguang; Susilo, Willy; Mu, Yi; Yan, Jun
3
2012
Revocable identity-based encryption with server-aided ciphertext evolution. Zbl 1436.68098
Sun, Yinxia; Mu, Yi; Susilo, Willy; Zhang, Futai; Fu, Anmin
3
2020
Efficient non-interactive range proof. Zbl 1248.94098
Yuen, Tsz Hon; Huang, Qiong; Mu, Yi; Susilo, Willy; Wong, Duncan S.; Yang, Guomin
3
2009
Multi-identity single-key decryption without random oracles. Zbl 1166.94312
Guo, Fuchun; Mu, Yi; Chen, Zhide; Xu, Li
3
2008
Identity-based online/offline encryption. Zbl 1175.94080
Guo, Fuchun; Mu, Yi; Chen, Zhide
3
2008
Publicly verifiable privacy-preserving group decryption. Zbl 1237.94090
Qin, Bo; Wu, Qianhong; Susilo, Willy; Mu, Yi
3
2009
Certificate-based signatures: new definitions and a generic construction from certificateless signatures. Zbl 1352.94072
Wu, Wei; Mu, Yi; Susilo, Willy; Huang, Xinyi
3
2009
PPDCP-ABE: Privacy-preserving decentralized ciphertext-policy attribute-based encryption. Zbl 1443.94061
Han, Jinguang; Susilo, Willy; Mu, Yi; Zhou, Jianying; Au, Man Ho
3
2014
Novel updatable identity-based hash proof system and its applications. Zbl 1455.94202
Zhou, Yanwei; Yang, Bo; Wang, Tao; Mu, Yi
3
2020
Information and communication security. 2nd international conference, ICICS ’99, Sydney, Australia, November 9–11, 1999. Proceedings. Zbl 0931.00051
2
1999
One-round strong oblivious signature-based envelope. Zbl 1346.94098
Chen, Rongmao; Mu, Yi; Susilo, Willy; Yang, Guomin; Guo, Fuchun; Zhang, Mingwu
2
2016
Privacy-preserving \(k\)-time authenticated secret handshakes. Zbl 1426.94126
Tian, Yangguang; Zhang, Shiwei; Yang, Guomin; Mu, Yi; Yu, Yong
2
2017
A note on the strong authenticated key exchange with auxiliary inputs. Zbl 1381.94066
Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun; Zheng, Yang
2
2017
Iterated random oracle: a universal approach for finding loss in security reduction. Zbl 1407.94115
Guo, Fuchun; Susilo, Willy; Mu, Yi; Chen, Rongmao; Lai, Jianchang; Yang, Guomin
2
2016
Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Zbl 1139.94300
2
2008
Provably secure identity based provable data possession. Zbl 1388.94087
Yu, Yong; Zhang, Yafang; Mu, Yi; Susilo, Willy; Liu, Hongyu
2
2015
Achieving IND-CCA security for functional encryption for inner products. Zbl 1372.94447
Zhang, Shiwei; Mu, Yi; Yang, Guomin
2
2017
An efficient privacy-preserving e-coupon system. Zbl 1368.94114
Liu, Weiwei; Mu, Yi; Yang, Guomin
2
2015
Relations between robustness and RKA security under public-key encryption. Zbl 1394.94929
Cui, Hui; Mu, Yi; Au, Man Ho
2
2016
Analysis of property-preservation capabilities of the ROX and ESh hash domain extenders. Zbl 1284.94104
Reyhanitabar, Mohammad Reza; Susilo, Willy; Mu, Yi
2
2009
Provably secure proxy signature scheme from factorization. Zbl 1255.94081
Yu, Yong; Mu, Yi; Susilo, Willy; Sun, Ying; Ji, Yafu
2
2012
Enhanced target collision resistant hash functions revisited. Zbl 1248.94089
Reyhanitabar, Mohammad Reza; Susilo, Willy; Mu, Yi
2
2009
Provably secure identity-based undeniable signatures with selective and universal convertibility. Zbl 1166.94345
Wu, Wei; Mu, Yi; Susilo, Willy; Huang, Xinyi
2
2008
Multi-identity management for identity-based cryptography. Zbl 1167.94331
Guo, Fuchun; Mu, Yi; Chen, Zhide
2
2008
Formal definition and construction of nominative signature. Zbl 1285.94108
Liu, Dennis Y. W.; Wong, Duncan S.; Huang, Xinyi; Wang, Guilin; Huang, Qiong; Mu, Yi; Susilo, Willy
2
2008
A generic scheme of plaintext-checkable database encryption. Zbl 1436.68096
Ma, Sha; Mu, Yi; Susilo, Willy
2
2018
A new digital cash scheme based on blind Nyberg-Rueppel digital signature. Zbl 1067.68569
Nguyen, Khanh Quoc; Mu, Yi; Varadharajan, Vijay
1
1998
Delegated decryption. Zbl 0981.94044
Mu, Yi; Varadharajan, Vijay; Nguyen, Khan Quac
1
1999
On the design of efficient RSA-based off-line electronic cash schemes. Zbl 0959.68038
Varadharajan, Vijay; Nguyen Khanh Quoc; Mu, Yi
1
1999
A fair electronic cash scheme. Zbl 0978.68591
Mu, Yi; Nguyen, Khanh Quoc; Varadharajan, Vijay
1
2001
Updatable lossy trapdoor functions and its application in continuous leakage. Zbl 1381.94077
Li, Sujuan; Mu, Yi; Zhang, Mingwu; Zhang, Futai
1
2016
On security of a certificateless signcryption scheme. Zbl 1293.94105
Miao, Songqin; Zhang, Futai; Li, Sujuan; Mu, Yi
1
2013
Provably secure server-aided verification signatures. Zbl 1219.94083
Wu, Wei; Mu, Yi; Susilo, Willy; Huang, Xinyi
1
2011
Mutative identity-based signatures or dynamic credentials without random oracles. Zbl 1282.94077
Guo, Fuchun; Mu, Yi; Chen, Zhide
1
2007
Efficient online/offline signatures with computational leakage resilience in online phase. Zbl 1295.94179
Guo, Fuchun; Mu, Yi; Susilo, Willy
1
2011
Provable security. First international conference, ProvSec 2007, Wollongong, Australia, November 1–2, 2007. Proceedings. Zbl 1137.94001
1
2007
Ciphertext-policy attribute-based encryption with key-delegation abuse resistance. Zbl 1405.94070
Jiang, Yinhao; Susilo, Willy; Mu, Yi; Guo, Fuchun
1
2016
Linear encryption with keyword search. Zbl 1346.94140
Zhang, Shiwei; Yang, Guomin; Mu, Yi
1
2016
Efficient dynamic threshold identity-based encryption with constant-size ciphertext. Zbl 1358.94078
Susilo, Willy; Guo, Fuchun; Mu, Yi
1
2016
Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks. Zbl 1368.94138
Zhang, Mingwu; Mu, Yi
1
2014
Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems. Zbl 1417.68039
Jiang, Peng; Guo, Fuchun; Mu, Yi
1
2019
Complete robustness in identity-based encryption. Zbl 1368.94092
Cui, Hui; Mu, Yi; Au, Man Ho
1
2014
Threshold broadcast encryption with keyword search. Zbl 1409.94913
Zhang, Shiwei; Mu, Yi; Yang, Guomin
1
2016
Novel generic construction of leakage-resilient PKE scheme with CCA security. Zbl 1517.94174
Zhou, Yanwei; Yang, Bo; Xia, Zhe; Zhang, Mingwu; Mu, Yi
1
2021
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security. Zbl 1448.94238
Zhou, Yanwei; Yang, Bo; Xia, Zhe; Zhang, Mingwu; Mu, Yi
1
2020
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters. Zbl 1441.94083
Jiang, Peng; Lai, Jianchang; Guo, Fuchun; Susilo, Willy; Au, Man Ho; Yang, Guomin; Mu, Yi; Chen, Rongmao
1
2019
Further observations on optimistic fair exchange protocols in the multi-user setting. Zbl 1279.94088
Huang, Xinyi; Mu, Yi; Susilo, Willy; Wu, Wei; Xiang, Yang
1
2010
Enhanced security notions for dedicated-key hash functions: definitions and relationships. Zbl 1285.94093
Reyhanitabar, Mohammad Reza; Susilo, Willy; Mu, Yi
1
2010
Optimal online/offline signature: how to sign a message without online computation. Zbl 1204.94086
Guo, Fuchun; Mu, Yi
1
2008
Cryptology and network security. 5th international conference, CANS 2006, Suzhou, China, December 8–10, 2006. Proceedings. Zbl 1151.94302
1
2006
Sanitizable signatures revisited. Zbl 1362.94059
Yuen, Tsz Hon; Susilo, Willy; Liu, Joseph K.; Mu, Yi
1
2008
Towards a cryptographic treatment of publish/subscribe systems. Zbl 1294.94086
Yuen, Tsz Hon; Susilo, Willy; Mu, Yi
1
2010
Identity-based broadcasting. Zbl 1123.94379
Mu, Yi; Susilo, Willy; Lin, Yan-Xia
1
2003
Novel generic construction of leakage-resilient PKE scheme with CCA security. Zbl 1517.94174
Zhou, Yanwei; Yang, Bo; Xia, Zhe; Zhang, Mingwu; Mu, Yi
1
2021
A code-based signature scheme from the Lyubashevsky framework. Zbl 1457.94222
Song, Yongcheng; Huang, Xinyi; Mu, Yi; Wu, Wei; Wang, Huaxiong
6
2020
Revocable identity-based encryption with server-aided ciphertext evolution. Zbl 1436.68098
Sun, Yinxia; Mu, Yi; Susilo, Willy; Zhang, Futai; Fu, Anmin
3
2020
Novel updatable identity-based hash proof system and its applications. Zbl 1455.94202
Zhou, Yanwei; Yang, Bo; Wang, Tao; Mu, Yi
3
2020
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security. Zbl 1448.94238
Zhou, Yanwei; Yang, Bo; Xia, Zhe; Zhang, Mingwu; Mu, Yi
1
2020
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation. Zbl 1443.68057
Xu, Shengmin; Yang, Guomin; Mu, Yi
5
2019
The generic construction of continuous leakage-resilient identity-based cryptosystems. Zbl 1439.94078
Zhou, Yanwei; Yang, Bo; Mu, Yi
4
2019
Strongly leakage resilient authenticated key exchange, revisited. Zbl 1423.94116
Yang, Guomin; Chen, Rongmao; Mu, Yi; Susilo, Willy; Guo, Fuchun; Li, Jie
4
2019
Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems. Zbl 1417.68039
Jiang, Peng; Guo, Fuchun; Mu, Yi
1
2019
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters. Zbl 1441.94083
Jiang, Peng; Lai, Jianchang; Guo, Fuchun; Susilo, Willy; Au, Man Ho; Yang, Guomin; Mu, Yi; Chen, Rongmao
1
2019
Continuous leakage-resilient identity-based encryption with leakage amplification. Zbl 1419.94055
Zhou, Yanwei; Yang, Bo; Mu, Yi
1
2019
Introduction to security reduction. Zbl 1437.94002
Guo, Fuchun; Susilo, Willy; Mu, Yi
5
2018
A generic scheme of plaintext-checkable database encryption. Zbl 1436.68096
Ma, Sha; Mu, Yi; Susilo, Willy
2
2018
Efficient attribute-based encryption with blackbox traceability. Zbl 1421.94079
Xu, Shengmin; Yang, Guomin; Mu, Yi; Liu, Ximeng
1
2018
Privacy-enhanced attribute-based private information retrieval. Zbl 1440.68063
Lai, Jianchang; Mu, Yi; Guo, Fuchun; Jiang, Peng; Susilo, Willy
1
2018
Witness-based searchable encryption. Zbl 1440.94068
Ma, Sha; Mu, Yi; Susilo, Willy; Yang, Bo
1
2018
Strong authenticated key exchange with auxiliary inputs. Zbl 1381.94065
Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun
11
2017
ID-based encryption with equality test against insider attack. Zbl 1386.94087
Wu, Tong; Ma, Sha; Mu, Yi; Zeng, Shengke
10
2017
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample. Zbl 1410.94078
Guo, Fuchun; Chen, Rongmao; Susilo, Willy; Lai, Jianchang; Yang, Guomin; Mu, Yi
6
2017
Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query. Zbl 1398.81075
Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
5
2017
Privacy-preserving \(k\)-time authenticated secret handshakes. Zbl 1426.94126
Tian, Yangguang; Zhang, Shiwei; Yang, Guomin; Mu, Yi; Yu, Yong
2
2017
A note on the strong authenticated key exchange with auxiliary inputs. Zbl 1381.94066
Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun; Zheng, Yang
2
2017
Achieving IND-CCA security for functional encryption for inner products. Zbl 1372.94447
Zhang, Shiwei; Mu, Yi; Yang, Guomin
2
2017
Deniable ring authentication based on projective hash functions. Zbl 1439.94092
Zeng, Shengke; Mu, Yi; Yang, Guomin; He, Mingxing
1
2017
Provably secure homomorphic signcryption. Zbl 1439.94056
Rezaeibagha, Fatemeh; Mu, Yi; Zhang, Shiwei; Wang, Xiaofen
1
2017
Quantum private set intersection cardinality and its application to anonymous authentication. Zbl 1428.81071
Shi, Run-hua; Mu, Yi; Zhong, Hong; Zhang, Shun; Cui, Jie
19
2016
Cryptographic reverse firewall via malleable smooth projective hash functions. Zbl 1404.94052
Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun; Zhang, Mingwu
17
2016
An efficient quantum scheme for private set intersection. Zbl 1333.81125
Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
15
2016
Strongly leakage-resilient authenticated key exchange. Zbl 1332.94088
Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun
15
2016
Anonymous identity-based broadcast encryption with revocation for file sharing. Zbl 1346.94108
Lai, Jianchang; Mu, Yi; Guo, Fuchun; Susilo, Willy; Chen, Rongmao
4
2016
Public key encryption with authorized keyword search. Zbl 1346.94107
Jiang, Peng; Mu, Yi; Guo, Fuchun; Wen, Qiaoyan
3
2016
One-round strong oblivious signature-based envelope. Zbl 1346.94098
Chen, Rongmao; Mu, Yi; Susilo, Willy; Yang, Guomin; Guo, Fuchun; Zhang, Mingwu
2
2016
Iterated random oracle: a universal approach for finding loss in security reduction. Zbl 1407.94115
Guo, Fuchun; Susilo, Willy; Mu, Yi; Chen, Rongmao; Lai, Jianchang; Yang, Guomin
2
2016
Relations between robustness and RKA security under public-key encryption. Zbl 1394.94929
Cui, Hui; Mu, Yi; Au, Man Ho
2
2016
Updatable lossy trapdoor functions and its application in continuous leakage. Zbl 1381.94077
Li, Sujuan; Mu, Yi; Zhang, Mingwu; Zhang, Futai
1
2016
Ciphertext-policy attribute-based encryption with key-delegation abuse resistance. Zbl 1405.94070
Jiang, Yinhao; Susilo, Willy; Mu, Yi; Guo, Fuchun
1
2016
Linear encryption with keyword search. Zbl 1346.94140
Zhang, Shiwei; Yang, Guomin; Mu, Yi
1
2016
Efficient dynamic threshold identity-based encryption with constant-size ciphertext. Zbl 1358.94078
Susilo, Willy; Guo, Fuchun; Mu, Yi
1
2016
Threshold broadcast encryption with keyword search. Zbl 1409.94913
Zhang, Shiwei; Mu, Yi; Yang, Guomin
1
2016
A new general framework for secure public key encryption with keyword search. Zbl 1358.94060
Chen, Rongmao; Mu, Yi; Yang, Guomin; Guo, Fuchun; Wang, Xiaofen
11
2015
Provably secure identity based provable data possession. Zbl 1388.94087
Yu, Yong; Zhang, Yafang; Mu, Yi; Susilo, Willy; Liu, Hongyu
2
2015
An efficient privacy-preserving e-coupon system. Zbl 1368.94114
Liu, Weiwei; Mu, Yi; Yang, Guomin
2
2015
Identity-based secure distributed data storage schemes. Zbl 1364.94541
Han, Jinguang; Susilo, Willy; Mu, Yi
4
2014
PPDCP-ABE: Privacy-preserving decentralized ciphertext-policy attribute-based encryption. Zbl 1443.94061
Han, Jinguang; Susilo, Willy; Mu, Yi; Zhou, Jianying; Au, Man Ho
3
2014
Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks. Zbl 1368.94138
Zhang, Mingwu; Mu, Yi
1
2014
Complete robustness in identity-based encryption. Zbl 1368.94092
Cui, Hui; Mu, Yi; Au, Man Ho
1
2014
Membership encryption and its applications. Zbl 1316.94076
Guo, Fuchun; Mu, Yi; Susilo, Willy; Varadharajan, Vijay
4
2013
On security of a certificateless signcryption scheme. Zbl 1293.94105
Miao, Songqin; Zhang, Futai; Li, Sujuan; Mu, Yi
1
2013
Efficient and dynamic key management for multiple identities in identity-based systems. Zbl 1293.94070
Guo, Hua; Xu, Chang; Li, Zhoujun; Yao, Yanqing; Mu, Yi
1
2013
Efficient oblivious transfers with access control. Zbl 1247.94035
Han, Jinguang; Susilo, Willy; Mu, Yi; Yan, Jun
3
2012
Provably secure proxy signature scheme from factorization. Zbl 1255.94081
Yu, Yong; Mu, Yi; Susilo, Willy; Sun, Ying; Ji, Yafu
2
2012
Provably secure identity-based authenticated key agreement protocols with malicious private key generators. Zbl 1204.94087
Guo, Hua; Li, Zhoujun; Mu, Yi; Zhang, Xiyong
4
2011
Provably secure server-aided verification signatures. Zbl 1219.94083
Wu, Wei; Mu, Yi; Susilo, Willy; Huang, Xinyi
1
2011
Efficient online/offline signatures with computational leakage resilience in online phase. Zbl 1295.94179
Guo, Fuchun; Mu, Yi; Susilo, Willy
1
2011
Certificateless threshold signature scheme from bilinear maps. Zbl 1208.94062
Yuan, Hong; Zhang, Futai; Huang, Xinyi; Mu, Yi; Susilo, Willy; Zhang, Lei
7
2010
Further observations on optimistic fair exchange protocols in the multi-user setting. Zbl 1279.94088
Huang, Xinyi; Mu, Yi; Susilo, Willy; Wu, Wei; Xiang, Yang
1
2010
Enhanced security notions for dedicated-key hash functions: definitions and relationships. Zbl 1285.94093
Reyhanitabar, Mohammad Reza; Susilo, Willy; Mu, Yi
1
2010
Towards a cryptographic treatment of publish/subscribe systems. Zbl 1294.94086
Yuen, Tsz Hon; Susilo, Willy; Mu, Yi
1
2010
Certificateless threshold ring signature. Zbl 1170.94327
Chang, Shuang; Wong, Duncan S.; Mu, Yi; Zhang, Zhenfeng
21
2009
Asymmetric group key agreement. Zbl 1239.94078
Wu, Qianhong; Mu, Yi; Susilo, Willy; Qin, Bo; Domingo-Ferrer, Josep
15
2009
Dynamic universal accumulators for DDH groups and their application to attribute-based anonymous credential systems. Zbl 1237.94048
Au, Man Ho; Tsang, Patrick P.; Susilo, Willy; Mu, Yi
12
2009
Certificate-based signatures revisited. Zbl 1216.94055
Wu, W.; Mu, Y.; Susilo, W.; Huang, X.
5
2009
Efficient non-interactive range proof. Zbl 1248.94098
Yuen, Tsz Hon; Huang, Qiong; Mu, Yi; Susilo, Willy; Wong, Duncan S.; Yang, Guomin
3
2009
Publicly verifiable privacy-preserving group decryption. Zbl 1237.94090
Qin, Bo; Wu, Qianhong; Susilo, Willy; Mu, Yi
3
2009
Certificate-based signatures: new definitions and a generic construction from certificateless signatures. Zbl 1352.94072
Wu, Wei; Mu, Yi; Susilo, Willy; Huang, Xinyi
3
2009
Analysis of property-preservation capabilities of the ROX and ESh hash domain extenders. Zbl 1284.94104
Reyhanitabar, Mohammad Reza; Susilo, Willy; Mu, Yi
2
2009
Enhanced target collision resistant hash functions revisited. Zbl 1248.94089
Reyhanitabar, Mohammad Reza; Susilo, Willy; Mu, Yi
2
2009
Server-aided verification signatures: Definitions and new constructions. Zbl 1204.94093
Wu, Wei; Mu, Yi; Susilo, Willy; Huang, Xinyi
6
2008
Efficient generic on-line/off-line (threshold) signatures without key exposure. Zbl 1148.94008
Chen, Xiaofeng; Zhang, Fangguo; Tian, Haibo; Wei, Baodian; Susilo, Willy; Mu, Yi; Lee, Hyunrok; Kim, Kwangjo
4
2008
Multi-identity single-key decryption without random oracles. Zbl 1166.94312
Guo, Fuchun; Mu, Yi; Chen, Zhide; Xu, Li
3
2008
Identity-based online/offline encryption. Zbl 1175.94080
Guo, Fuchun; Mu, Yi; Chen, Zhide
3
2008
Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Zbl 1139.94300
2
2008
Provably secure identity-based undeniable signatures with selective and universal convertibility. Zbl 1166.94345
Wu, Wei; Mu, Yi; Susilo, Willy; Huang, Xinyi
2
2008
Multi-identity management for identity-based cryptography. Zbl 1167.94331
Guo, Fuchun; Mu, Yi; Chen, Zhide
2
2008
Formal definition and construction of nominative signature. Zbl 1285.94108
Liu, Dennis Y. W.; Wong, Duncan S.; Huang, Xinyi; Wang, Guilin; Huang, Qiong; Mu, Yi; Susilo, Willy
2
2008
Optimal online/offline signature: how to sign a message without online computation. Zbl 1204.94086
Guo, Fuchun; Mu, Yi
1
2008
Sanitizable signatures revisited. Zbl 1362.94059
Yuen, Tsz Hon; Susilo, Willy; Liu, Joseph K.; Mu, Yi
1
2008
New construction of group secret handshakes based on pairings. Zbl 1285.94103
Zhou, Lan; Susilo, Willy; Mu, Yi
1
2008
Certificateless signature revisited. Zbl 1213.94158
Huang, Xinyi; Mu, Yi; Susilo, Willy; Wong, Duncan S.; Wu, Wei
33
2007
Efficient generic on-line/off-line signatures without key exposure. Zbl 1214.94061
Chen, Xiaofeng; Zhang, Fangguo; Susilo, Willy; Mu, Yi
13
2007
Provably secure pairing-based convertible undeniable signature with short signature length. Zbl 1151.94610
Huang, Xinyi; Mu, Yi; Susilo, Willy; Wu, Wei
8
2007
Multi-party stand-alone and setup-free verifiably committed signatures. Zbl 1127.94381
Zhu, Huafei; Susilo, Willy; Mu, Yi
5
2007
Practical compact e-cash. Zbl 1213.68244
Au, Man Ho; Susilo, Willy; Mu, Yi
4
2007
Identity-based encryption: How to decrypt multiple ciphertexts using a single decryption key. Zbl 1151.94608
Guo, Fuchun; Mu, Yi; Chen, Zhide
4
2007
Mutative identity-based signatures or dynamic credentials without random oracles. Zbl 1282.94077
Guo, Fuchun; Mu, Yi; Chen, Zhide
1
2007
Provable security. First international conference, ProvSec 2007, Wollongong, Australia, November 1–2, 2007. Proceedings. Zbl 1137.94001
1
2007
Constant-size dynamic \(k\)-TAA. Zbl 1152.94445
Au, Man Ho; Susilo, Willy; Mu, Yi
21
2006
A new signature scheme without random oracles from bilinear pairings. Zbl 1295.94192
Zhang, Fangguo; Chen, Xiaofeng; Susilo, Willy; Mu, Yi
7
2006
Compact e-cash from bounded accumulator. Zbl 1177.94179
Au, Man Ho; Wu, Qianhong; Susilo, Willy; Mu, Yi
6
2006
Online/offline signatures and multisignatures for aodv and dsr routing security. Zbl 1176.94062
Xu, Shidi; Mu, Yi; Susilo, Willy
5
2006
Efficient provably secure restrictive partially blind signatures from bilinear pairings. Zbl 1152.94409
Chen, Xiaofeng; Zhang, Fangguo; Mu, Yi; Susilo, Willy
4
2006
Cryptology and network security. 5th international conference, CANS 2006, Suzhou, China, December 8–10, 2006. Proceedings. Zbl 1151.94302
1
2006
On the security of certificateless signature schemes from Asiacrypt 2003. Zbl 1154.94459
Huang, Xinyi; Susilo, Willy; Mu, Yi; Zhang, Futai
33
2005
Identity-based partial message recovery signatures (or how to shorten ID-based signatures). Zbl 1120.94334
Zhang, Fangguo; Susilo, Willy; Mu, Yi
6
2005
On the security of nominative signatures. Zbl 1127.94373
Susilo, Willy; Mu, Yi
5
2005
Identity-based strong designated verifier signature schemes. Zbl 1098.94630
Susilo, Willy; Zhang, Fangguo; Mu, Yi
17
2004
Identity-based authenticated broadcast encryption and distributed authenticated encryption. Zbl 1115.68407
Mu, Yi; Susilo, Willy; Lin, Yan-Xia; Ruan, Chun
7
2004
Perfect concurrent signature schemes. Zbl 1109.68487
Susilo, Willy; Mu, Yi; Zhang, Fangguo
4
2004
Non-interactive deniable ring authentication. Zbl 1092.94515
Susilo, Willy; Mu, Yi
4
2004
Deniable ring authentication revisited. Zbl 1103.68539
Susilo, Willy; Mu, Yi
3
2004
...and 8 more Documents
all top 5

Cited by 768 Authors

38 Susilo, Willy
36 Mu, Yi
22 Guo, Fuchun
16 Huang, Qiong
16 Yang, Guomin
14 Huang, Xinyi
13 Wu, Qianhong
13 Yang, Bo
12 Wong, Duncan S.
11 Chen, Rongmao
10 Zhang, Lei
9 Zhang, Mingwu
9 Zhou, Yanwei
8 Shi, Runhua
7 Lai, Jianchang
7 Li, Jiguo
7 Qin, Bo
7 Weng, Jian
7 Wu, Wei
7 Zhang, Futai
6 Deng, Robert Huijie
6 Domingo-Ferrer, Josep
6 Jiang, Peng
6 Ma, Sha
6 Slamanig, Daniel
6 Wu, Ge
6 Xia, Zhe
5 Derler, David
5 Hu, Yupu
5 Liu, Ximeng
5 Tso, Raylin
5 Wang, Huaxiong
5 Yung, Moti
5 Zhang, Fangguo
5 Zhang, Yichen
4 Au, Man Ho
4 Chakraborty, Suvradip
4 Chen, Xiaofeng
4 Choo, Kim-Kwang Raymond
4 Deng, Lunzhi
4 Dutta, Ratna
4 Emura, Keita
4 Ganesh, Chaya
4 Han, Jinguang
4 Li, Fagen
4 Li, Hui
4 Li, Yingjiu
4 Liu, JianWei
4 Qin, Baodong
4 Shim, Kyungah
4 Tian, Yangguang
4 Xin, Xiangjun
4 Xiong, Hu
4 Yu, Yong
4 Zhang, Yinghui
4 Zhang, Zhenfeng
3 Biswas, G. P.
3 Camenisch, Jan L.
3 Cao, Zhenfu
3 Chen, Liqun
3 Chen, Zhide
3 Cui, Hui
3 Cui, Jie
3 Hanser, Christian
3 He, Debiao
3 Huang, Jianye
3 Hur, Junbeom
3 Islam, Sk Hafizul
3 Jager, Tibor
3 Khan, Muhammad Khurram
3 Lehmann, Anja
3 Li, ChaoYang
3 Li, Zixian
3 Liu, Bai
3 Liu, Shengli
3 Liu, Weiwei
3 Liu, Wen-Jie
3 Liu, Wen
3 Long, Yu
3 Lu, Yang
3 Mambo, Masahiro
3 Qin, Zhiguang
3 Rangan, Chandrasekharan Pandu
3 Samelin, Kai
3 Saraswat, Vishal
3 Shao, Jun
3 Tan, Chik How
3 Tang, Qiang
3 Wang, Baocang
3 Wang, Yi
3 Wei, Baodian
3 Wen, Qiaoyan
3 Xu, Li
3 Xu, Qiuliang
3 Yi, Xun
3 Zeng, Jiwen
3 Zhang, Kai
3 Zhong, Hong
2 Alawatugoda, Janaka
2 Andreeva, Elena Anatol’evna
...and 668 more Authors
all top 5

Cited in 44 Serials

80 Information Sciences
27 Theoretical Computer Science
17 Quantum Information Processing
13 International Journal of Theoretical Physics
13 Designs, Codes and Cryptography
9 Information Processing Letters
8 Computers & Mathematics with Applications
6 Soft Computing
5 Journal of Cryptology
5 Mathematical Problems in Engineering
5 Wuhan University Journal of Natural Sciences (WUJNS)
5 Journal of Discrete Mathematical Sciences & Cryptography
4 Journal of Computer and System Sciences
4 Mathematical and Computer Modelling
4 International Journal of Foundations of Computer Science
3 International Journal of Computer Mathematics
3 Journal of Mathematical Cryptology
2 Informatica (Vilnius)
2 Electronic Commerce Research
2 Journal of Shanghai Jiaotong University (Science)
2 Advances in Mathematics of Communications
2 Science China. Information Sciences
2 Symmetry
2 Arabian Journal for Science and Engineering
2 Matematicheskie Voprosy Kriptografii
1 Acta Informatica
1 Discrete Applied Mathematics
1 Physica A
1 Physics Letters. A
1 Applied Mathematics and Computation
1 Computing
1 Cryptologia
1 Information and Computation
1 Journal of Parallel and Distributed Computing
1 Finite Fields and their Applications
1 Nonlinear Dynamics
1 Journal of Applied Mathematics
1 Journal of Algebra and its Applications
1 International Journal of Quantum Information
1 Mathematical Biosciences and Engineering
1 Journal of Zhejiang University. Science A
1 Cryptography and Communications
1 RAIRO. Theoretical Informatics and Applications
1 Quanta

Citations by Year

The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.