Yudi Zhang
Cited by
Cited by
Secure and efficient two-party signing protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography
D He, Y Zhang, D Wang, KKR Choo
IEEE transactions on dependable and secure computing 17 (5), 1124-1132, 2018
Privacy-preserving federated learning in medical diagnosis with homomorphic re-encryption
H Ku, W Susilo, Y Zhang, W Liu, M Zhang
Computer Standards & Interfaces 80, 103583, 2022
Obfuscating EVES algorithm and its application in fair electronic transactions in public clouds
M Zhang, Y Zhang, Y Jiang, J Shen
IEEE Systems Journal 13 (2), 1478-1486, 2019
Efficient identity-based distributed decryption scheme for electronic personal health record sharing system
Y Zhang, D He, MS Obaidat, P Vijayakumar, KF Hsiao
IEEE Journal on Selected Areas in Communications 39 (2), 384-395, 2020
White-box implementation of the identity-based signature scheme in the IEEE P1363 standard for public key cryptography
Y Zhang, D He, X Huang, D Wang, KKR Choo, J Wang
IEICE TRANSACTIONS on Information and Systems 103 (2), 188-195, 2020
A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm
Y Zhang, D He, M Zhang, KKR Choo
Frontiers of Computer Science 14, 1-14, 2020
Attribute-based hash proof system under learning-with-errors assumption in obfuscator-free and leakage-resilient environments
M Zhang, Y Zhang, Y Su, Q Huang, Y Mu
IEEE Systems Journal 11 (2), 1018-1026, 2015
Efficient and provably secure distributed signing protocol for mobile devices in wireless networks
Y Zhang, D He, S Zeadally, D Wang, KKR Choo
IEEE Internet of Things Journal 5 (6), 5271-5280, 2018
An efficient identity-based homomorphic signature scheme for network coding
Y Zhang, Y Jiang, B Li, M Zhang
Advances in Internetworking, Data & Web Technologies: The 5th International …, 2018
Efficient obfuscation for encrypted identity-based signatures in wireless body area networks
Y Zhang, D He, Y Li, M Zhang, KKR Choo
IEEE Systems Journal 14 (4), 5320-5328, 2020
Privacy-preserving outsourcing schemes of modular exponentiations using single untrusted cloud server
L Zhao, M Zhang, H Shen, Y Zhang, J Shen
KSII Transactions on Internet and Information Systems (TIIS) 11 (2), 826-845, 2017
An efficient blind signature scheme based on SM2 signature algorithm
Y Zhang, D He, F Zhang, X Huang, D Li
Information Security and Cryptology: 16th International Conference, Inscrypt …, 2021
Balancing privacy and flexibility of cloud-based personal health records sharing system
Y Zhang, F Guo, W Susilo, G Yang
IEEE Transactions on Cloud Computing 11 (3), 2420-2430, 2022
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing
S Chen, W Susilo, Y Zhang, B Yang, M Zhang
Computer Standards & Interfaces 85, 103707, 2023
Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security.
M Zhang, Y Zhang, H Shen, C Tang, L Harn
Journal of Information Science & Engineering 33 (4), 2017
The system can't perform the operation now. Try again later.
Articles 1–15