What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Guomin Yang
Google Scholar
ORCID:
0000-0002-4949-7738
80
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
An Efficient Privacy-Preserving Scheme for Weak Password Collection in Internet of Things Against Perpetual Leakage.
Changsong Jiang
Chunxiang Xu
Xinfeng Dong
Kefei Chen
Guomin Yang
2025
journals/tifs
ROBY: A Byzantine-Robust and Privacy-Preserving Serverless Federated Learning Framework.
Xiangyun Tang
Minyang Li
Meng Shen
Jiawen Kang
Liehuang Zhu
Zhiquan Liu
Guomin Yang
Dusit Niyato
Robert H. Deng
2025
journals/tifs
Device-Enhanced Password-Based Threshold Single-Sign-On Authentication.
Changsong Jiang
Chunxiang Xu
Guomin Yang
Zhao Zhang
Jie Chen
2025
journals/tifs
Forward-Secure Hierarchical Delegable Signature for Smart Homes.
Jianfei Sun
Guowen Xu
Yang Yang
Xuehuan Yang
Xiaoguo Li
Cong Wu
Zhen Liu
Guomin Yang
Robert H. Deng
2025
conf/acisp
Strong Federated Authentication With Password-Based Credential Against Identity Server Corruption.
Changsong Jiang
Chunxiang Xu
Guomin Yang
Li Duan
Jing Wang
2025
conf/ndss
Siniel: Distributed Privacy-Preserving zkSNARK.
Yunbo Yang
Yuejia Cheng
Kailun Wang
Xiaoguo Li
Jianfei Sun
Jiachen Shen
Xiaolei Dong
Zhenfu Cao
Guomin Yang
Robert H. Deng
2025
conf/ndss
Impact Tracing: Identifying the Culprit of Misinformation in Encrypted Messaging Systems.
Zhongming Wang
Tao Xiang
Xiaoguo Li
Biwen Chen
Guomin Yang
Chuan Ma
Robert H. Deng
2025
conf/esorics
An Efficient Security-Enhanced Accountable Access Control for Named Data Networking.
Jianfei Sun
Yuxian Li
Xuehuan Yang
Guomin Yang
Robert H. Deng
2025
conf/uss
AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication.
Yang Yang
Guomin Yang
Yingjiu Li
Minming Huang
Zilin Shen
Imtiaz Karim
Ralf Sasse
David A. Basin
Elisa Bertino
Jian Weng
HweeHwa Pang
Robert H. Deng
2024
journals/tifs
PkT-SIN: A Secure Communication Protocol for Space Information Networks With Periodic k-Time Anonymous Authentication.
Yang Yang
Wenyi Xue
Jianfei Sun
Guomin Yang
Yingjiu Li
HweeHwa Pang
Robert H. Deng
2024
journals/tifs
Secure and Flexible Wildcard Queries.
Qing Wang
Donghui Hu
Meng Li
Guomin Yang
2024
journals/tifs
OpenVFL: A Vertical Federated Learning Framework With Stronger Privacy-Preserving.
Yunbo Yang
Xiang Chen
Yuhao Pan
Jiachen Shen
Zhenfu Cao
Xiaolei Dong
Xiaoguo Li
Jianfei Sun
Guomin Yang
Robert H. Deng
2024
journals/tifs
STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area Network.
Xiaoguo Li
Zixi Huang
Bowen Zhao
Guomin Yang
Tao Xiang
Robert H. Deng
2024
journals/tifs
Blockchain-Based Dynamic Time-Encapsulated Data Auditing for Outsourcing Storage.
Chuan Zhang
Haojun Xuan
Tong Wu
Ximeng Liu
Guomin Yang
Liehuang Zhu
2024
conf/acisp
Key Cooperative Attribute-Based Encryption.
Luqi Huang
Willy Susilo
Guomin Yang
Fuchun Guo
2024
conf/sp
Make Revocation Cheaper: Hardware-Based Revocable Attribute-Based Encryption.
Xiaoguo Li
Guomin Yang
Tao Xiang
Shengmin Xu
Bowen Zhao
HweeHwa Pang
Robert H. Deng
2024
conf/esorics
Device-Enhanced Secure Cloud Storage with Keyword Searchable Encryption and Deduplication.
Changsong Jiang
Chunxiang Xu
Guomin Yang
2024
conf/ndss
PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications.
Yang Yang
Robert H. Deng
Guomin Yang
Yingjiu Li
HweeHwa Pang
Minming Huang
Rui Shi
Jian Weng
2023
journals/tifs
Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits.
Xueqiao Liu
Guomin Yang
Willy Susilo
Kai He
Robert H. Deng
Jian Weng
2023
conf/acisp
A Tightly Secure ID-Based Signature Scheme Under DL Assumption in AGM.
Jia-Chng Loh
Fuchun Guo
Willy Susilo
Guomin Yang
2022
conf/crypto
Multimodal Private Signatures.
Khoa Nguyen
Fuchun Guo
Willy Susilo
Guomin Yang
2022
conf/esorics
Secure Hierarchical Deterministic Wallet Supporting Stealth Address.
Xin Yin
Zhen Liu
Guomin Yang
Guoxing Chen
Haojin Zhu
2021
conf/acisp
Broadcast Authenticated Encryption with Keyword Search.
Xueqiao Liu
Kai He
Guomin Yang
Willy Susilo
Joseph Tonien
Qiong Huang
2021
conf/acisp
Concise Mercurial Subvector Commitments: Definitions and Constructions.
Yannan Li
Willy Susilo
Guomin Yang
Tran Viet Xuan Phuong
Yong Yu
Dongxi Liu
2021
conf/crypto
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved.
Yi Wang
Rongmao Chen
Guomin Yang
Xinyi Huang
Baosheng Wang
Moti Yung
2021
conf/provsec
Public Key Encryption with Fuzzy Matching.
Yuanhao Wang
Qiong Huang
Hongbo Li
Meiyan Xiao
Jianye Huang
Guomin Yang
2021
conf/esorics
SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments.
Tran Viet Xuan Phuong
Willy Susilo
Guomin Yang
Jongkil Kim
Yang-Wai Chow
Dongxi Liu
2021
conf/asiaccs
Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual.
Yannan Li
Willy Susilo
Guomin Yang
Yong Yu
Tran Viet Xuan Phuong
Dongxi Liu
2020
journals/istr
A generalised bound for the Wiener attack on RSA.
Willy Susilo
Joseph Tonien
Guomin Yang
2020
conf/esorics
A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.
Wenling Liu
Zhen Liu
Khoa Nguyen
Guomin Yang
Yu Yu
2019
conf/acisp
The Wiener Attack on RSA Revisited: A Quest for the Exact Bound.
Willy Susilo
Joseph Tonien
Guomin Yang
2019
conf/acisp
Location Based Encryption.
Tran Viet Xuan Phuong
Willy Susilo
Guomin Yang
Jun Yan
Dongxi Liu
2019
conf/eurosp
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.
Zhen Liu
Guomin Yang
Duncan S. Wong
Khoa Nguyen
Huaxiong Wang
2019
conf/provsec
Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search.
Xueqiao Liu
Hongbo Li
Guomin Yang
Willy Susilo
Joseph Tonien
Qiong Huang
2019
conf/esorics
A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses.
Zhen Liu
Khoa Nguyen
Guomin Yang
Huaxiong Wang
Duncan S. Wong
2019
conf/esorics
Puncturable Proxy Re-Encryption Supporting to Group Messaging Service.
Tran Viet Xuan Phuong
Willy Susilo
Jongkil Kim
Guomin Yang
Dongxi Liu
2018
journals/tifs
Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud.
Shengmin Xu
Guomin Yang
Yi Mu
Robert H. Deng
2018
conf/provsec
Efficient Attribute-Based Encryption with Blackbox Traceability.
Shengmin Xu
Guomin Yang
Yi Mu
Ximeng Liu
2018
conf/esorics
Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls - Secure and Efficient Fine-Grained Access Control on Corrupted Machines.
Hui Ma
Rui Zhang
Guomin Yang
Zishuai Song
Shuzhou Sun
Yuting Xiao
2017
journals/istr
Sequence aware functional encryption and its application in searchable encryption.
Tran Viet Xuan Phuong
Guomin Yang
Willy Susilo
Fuchun Guo
Qiong Huang
2017
journals/tifs
EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud.
Willy Susilo
Peng Jiang
Fuchun Guo
Guomin Yang
Yong Yu
Yi Mu
2017
conf/acisp
Privacy-Preserving k-time Authenticated Secret Handshakes.
Yangguang Tian
Shiwei Zhang
Guomin Yang
Yi Mu
Yong Yu
2017
conf/acisp
Mergeable and Revocable Identity-Based Encryption.
Shengmin Xu
Guomin Yang
Yi Mu
Willy Susilo
2017
conf/acisp
Hierarchical Functional Encryption for Linear Transformations.
Shiwei Zhang
Yi Mu
Guomin Yang
Xiaofen Wang
2017
conf/crypto
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample.
Fuchun Guo
Rongmao Chen
Willy Susilo
Jianchang Lai
Guomin Yang
Yi Mu
2017
conf/provsec
Deniable Ring Authentication Based on Projective Hash Functions.
Shengke Zeng
Yi Mu
Guomin Yang
Mingxing He
2016
journals/tifs
Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions.
Tran Viet Xuan Phuong
Guomin Yang
Willy Susilo
2016
journals/tifs
Server-Aided Public Key Encryption With Keyword Search.
Rongmao Chen
Yi Mu
Guomin Yang
Fuchun Guo
Xinyi Huang
Xiaofen Wang
Yongjun Wang
2016
journals/tifs
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage.
Rongmao Chen
Yi Mu
Guomin Yang
Fuchun Guo
Xiaofen Wang
2016
journals/tifs
Comments on "Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification".
Yong Yu
Yannan Li
Jianbing Ni
Guomin Yang
Yi Mu
Willy Susilo
2016
conf/ccs
Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext.
Willy Susilo
Rongmao Chen
Fuchun Guo
Guomin Yang
Yi Mu
Yang-Wai Chow
2016
conf/acisp
Linear Encryption with Keyword Search.
Shiwei Zhang
Guomin Yang
Yi Mu
2016
conf/acisp
Proxy Signature with Revocation.
Shengmin Xu
Guomin Yang
Yi Mu
Sha Ma
2016
conf/acisp
Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing.
Yang-Wai Chow
Willy Susilo
Guomin Yang
James G. Phillips
Ilung Pranata
Ari Moesriami Barmawi
2016
conf/acisp
One-Round Strong Oblivious Signature-Based Envelope.
Rongmao Chen
Yi Mu
Willy Susilo
Guomin Yang
Fuchun Guo
Mingwu Zhang
2016
conf/acisp
Edit Distance Based Encryption and Its Application.
Tran Viet Xuan Phuong
Guomin Yang
Willy Susilo
Kaitai Liang
2016
conf/provsec
One-Round Attribute-Based Key Exchange in the Multi-party Setting.
Yangguang Tian
Guomin Yang
Yi Mu
Kaitai Liang
Yong Yu
2016
conf/ctrsa
Strongly Leakage-Resilient Authenticated Key Exchange.
Rongmao Chen
Yi Mu
Guomin Yang
Willy Susilo
Fuchun Guo
2016
conf/asiacrypt
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
Rongmao Chen
Yi Mu
Guomin Yang
Willy Susilo
Fuchun Guo
Mingwu Zhang
2016
conf/asiacrypt
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction.
Fuchun Guo
Willy Susilo
Yi Mu
Rongmao Chen
Jianchang Lai
Guomin Yang
2015
journals/tifs
BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication.
Rongmao Chen
Yi Mu
Guomin Yang
Fuchun Guo
2015
conf/acisp
A New General Framework for Secure Public Key Encryption with Keyword Search.
Rongmao Chen
Yi Mu
Guomin Yang
Fuchun Guo
Xiaofen Wang
2015
conf/acisp
A New Public Remote Integrity Checking Scheme with User Privacy.
Yiteng Feng
Yi Mu
Guomin Yang
Joseph K. Liu
2015
conf/esorics
Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key.
Tran Viet Xuan Phuong
Guomin Yang
Willy Susilo
Xiaofeng Chen
2014
journals/tifs
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
Kaitai Liang
Man Ho Au
Joseph K. Liu
Willy Susilo
Duncan S. Wong
Guomin Yang
Tran Viet Xuan Phuong
Qi Xie
2014
conf/ccs
POSTER: Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear Assumption.
Tran Viet Xuan Phuong
Guomin Yang
Willy Susilo
2014
conf/esorics
Efficient Hidden Vector Encryption with Constant-Size Ciphertext.
Tran Viet Xuan Phuong
Guomin Yang
Willy Susilo
2013
conf/provsec
k-time Proxy Signature: Formal Definition and Efficient Construction.
Weiwei Liu
Guomin Yang
Yi Mu
Jiannan Wei
2011
conf/ccs
Strongly secure certificateless key exchange without pairing.
Guomin Yang
Chik How Tan
2011
conf/fc
Authenticated Key Exchange under Bad Randomness.
Guomin Yang
Shanshan Duan
Duncan S. Wong
Chik How Tan
Huaxiong Wang
2010
conf/ctrsa
Probabilistic Public Key Encryption with Equality Test.
Guomin Yang
Chik How Tan
Qiong Huang
Duncan S. Wong
2010
conf/cans
Dynamic Group Key Exchange Revisited.
Guomin Yang
Chik How Tan
2008
conf/acns
Traceable and Retrievable Identity-Based Encryption.
Man Ho Au
Qiong Huang
Joseph K. Liu
Willy Susilo
Duncan S. Wong
Guomin Yang
2008
conf/ctrsa
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles.
Qiong Huang
Guomin Yang
Duncan S. Wong
Willy Susilo
2008
conf/asiacrypt
Ambiguous Optimistic Fair Exchange.
Qiong Huang
Guomin Yang
Duncan S. Wong
Willy Susilo
2007
conf/acns
A More Natural Way to Construct Identity-Based Identification Schemes.
Guomin Yang
Jing Chen
Duncan S. Wong
Xiaotie Deng
Dongsheng Wang
2006
conf/pkc
Anonymous Signature Schemes.
Guomin Yang
Duncan S. Wong
Xiaotie Deng
Huaxiong Wang
2006
conf/icics
Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper).
Guomin Yang
Duncan S. Wong
Huaxiong Wang
Xiaotie Deng
2005
conf/acisp
Deposit-Case Attack Against Secure Roaming.
Guomin Yang
Duncan S. Wong
Xiaotie Deng
2005
conf/acns
Efficient Anonymous Roaming and Its Security Analysis.
Guomin Yang
Duncan S. Wong
Xiaotie Deng
Coauthors
Ari Moesriami Barmawi
(1)
Baosheng Wang
(1)
Biwen Chen
(1)
Bowen Zhao
(2)
Changsong Jiang
(4)
Chik How Tan
(4)
Chuan Ma
(1)
Chuan Zhang
(1)
Chunxiang Xu
(4)
Cong Wu
(1)
David A. Basin
(1)
Donghui Hu
(1)
Dongsheng Wang
(1)
Dongxi Liu
(5)
Duncan S. Wong
(13)
Dusit Niyato
(1)
Elisa Bertino
(1)
Fuchun Guo
(15)
Guomin Yang
(80)
Guowen Xu
(1)
Guoxing Chen
(1)
Haojin Zhu
(1)
Haojun Xuan
(1)
Hongbo Li
(2)
Huaxiong Wang
(5)
Hui Ma
(1)
HweeHwa Pang
(4)
Ilung Pranata
(1)
Imtiaz Karim
(1)
James G. Phillips
(1)
Jia-Chng Loh
(1)
Jiachen Shen
(2)
Jian Weng
(3)
Jianbing Ni
(1)
Jianchang Lai
(2)
Jianfei Sun
(5)
Jiannan Wei
(1)
Jianye Huang
(1)
Jiawen Kang
(1)
Jie Chen
(1)
Jing Chen
(1)
Jing Wang
(1)
Jongkil Kim
(2)
Joseph K. Liu
(3)
Joseph Tonien
(4)
Jun Yan
(1)
Kai He
(2)
Kailun Wang
(1)
Kaitai Liang
(3)
Kefei Chen
(1)
Khoa Nguyen
(4)
Li Duan
(1)
Liehuang Zhu
(2)
Luqi Huang
(1)
Man Ho Au
(2)
Meiyan Xiao
(1)
Meng Li
(1)
Meng Shen
(1)
Mingwu Zhang
(2)
Mingxing He
(1)
Minming Huang
(2)
Minyang Li
(1)
Moti Yung
(1)
Peng Jiang
(1)
Qi Xie
(1)
Qing Wang
(1)
Qiong Huang
(8)
Ralf Sasse
(1)
Robert H. Deng
(13)
Rongmao Chen
(11)
Rui Shi
(1)
Rui Zhang
(1)
Sha Ma
(1)
Shanshan Duan
(1)
Shengke Zeng
(1)
Shengmin Xu
(5)
Shiwei Zhang
(3)
Shuzhou Sun
(1)
Tao Xiang
(3)
Tong Wu
(1)
Tran Viet Xuan Phuong
(12)
Weiwei Liu
(1)
Wenling Liu
(1)
Wenyi Xue
(1)
Willy Susilo
(33)
Xiang Chen
(1)
Xiangyun Tang
(1)
Xiaofen Wang
(4)
Xiaofeng Chen
(1)
Xiaoguo Li
(6)
Xiaolei Dong
(2)
Xiaotie Deng
(5)
Ximeng Liu
(2)
Xin Yin
(1)
Xinfeng Dong
(1)
Xinyi Huang
(2)
Xuehuan Yang
(2)
Xueqiao Liu
(3)
Yang Yang
(4)
Yang-Wai Chow
(3)
Yangguang Tian
(2)
Yannan Li
(3)
Yi Mu
(23)
Yi Wang
(1)
Yingjiu Li
(3)
Yiteng Feng
(1)
Yong Yu
(6)
Yongjun Wang
(1)
Yu Yu
(1)
Yuanhao Wang
(1)
Yuejia Cheng
(1)
Yuhao Pan
(1)
Yunbo Yang
(2)
Yuting Xiao
(1)
Yuxian Li
(1)
Zhao Zhang
(1)
Zhen Liu
(5)
Zhenfu Cao
(2)
Zhiquan Liu
(1)
Zhongming Wang
(1)
Zilin Shen
(1)
Zishuai Song
(1)
Zixi Huang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to