Edit Profile (opens in new tab) Mu, Yi Co-Author Distance Author ID: mu.yi Published as: Mu, Yi; Mu, Y. Further Spellings: 穆怡 Homepage: https://sites.google.com/view/yi-mu-home-page/home External Links: ORCID · Wikidata · Google Scholar · ResearchGate · dblp · GND · IdRef Documents Indexed: 164 Publications since 1997, including 1 Book 12 Contributions as Editor Co-Authors: 119 Co-Authors with 176 Joint Publications 4,029 Co-Co-Authors all top 5 Co-Authors 0 single-authored 90 Susilo, Willy 32 Guo, Fuchun 32 Yang, Guomin 21 Varadharajan, Vijay 14 Huang, Xinyi 13 Au, Man Ho 13 Chen, Rongmao 10 Wu, Wei 10 Yang, Bo 10 Zhang, Fangguo 10 Zhang, Mingwu 8 Zhang, Shiwei 8 Zhou, Yanwei 7 Lai, Jianchang 7 Wu, Qianhong 6 Nguyen, Khanh Quoc 6 Xia, Zhe 6 Yu, Yong 5 Chen, Zhide 5 Guo, Hua 5 Li, Zhoujun 5 Ma, Sha 5 Wang, Xiaofen 5 Wong, Duncan S. 5 Xu, Shengmin 5 Zhang, Futai 4 Chen, Xiaofeng 4 Jiang, Peng 4 Tian, Yangguang 3 Cui, Hui 3 Cui, Jie 3 Han, Jinguang 3 Huang, Qiong 3 Lin, Yanxia 3 Liu, Joseph K. K. 3 Liu, Weiwei 3 Qin, Bo 3 Reyhanitabar, Mohammad Reza 3 Rezaeibagha, Fatemeh 3 Shi, Runhua 3 Thorncharoensri, Pairat 3 Yao, Zhongyuan 3 Yuen, Tsz Hon 3 Zhang, Junqi 3 Zhang, Shun 3 Zhong, Hong 2 Chen, Lanxiang 2 Chen, Liqun 2 Deng, Robert Huijie 2 Jiang, Yinhao 2 Li, Sujuan 2 Liang, Kaitai 2 Seberry, Jennifer R. 2 Wang, Guilin 2 Wang, Huaxiong 2 Wei, Jiannan 2 Wong, Duncan 2 Xu, Chang 2 Zeng, Shengke 2 Zhang, Xiyong 1 Bao, Feng 1 Chang, Shuang 1 Desmedt, Yvo G. 1 Domingo-Ferrer, Josep 1 Feng, Yiteng 1 Fu, Anmin 1 He, Mingxing 1 Hussain, Sajid 1 Ji, Yafu 1 Kim, Kwangjo 1 Lee, Hyunrok 1 Li, Hui 1 Li, Jie 1 Li, Nan 1 Li, Yongqing 1 Liu, Dennis Y. W. 1 Liu, Ximeng 1 Lv, Xixiang 1 Miao, Songqin 1 Ng, Ching Yu 1 Nguyen Khanh Quoc 1 Park, Jonghyuk 1 Pieprzyk, Josef P. 1 Pointcheval, David 1 Qiao, Zirui 1 Ruan, Chun 1 Safavi-Naini, Reihaneh 1 Shen, Hua 1 Song, Yongcheng 1 Sun, Ying 1 Sun, Yinxia 1 Tan, Chik How 1 Teng, Jikai 1 Tian, Haibo 1 Tsang, Patrick P. 1 Wang, Kefeng 1 Wang, Yikai 1 Wei, Baodian 1 Wen, Qiaoyan 1 Wu, Chuankun ...and 19 more Co-Authors all top 5 Serials 15 Information Sciences 13 Theoretical Computer Science 11 Lecture Notes in Computer Science 7 Designs, Codes and Cryptography 4 Computers & Mathematics with Applications 3 International Journal of Foundations of Computer Science 2 Computers and Electrical Engineering 2 International Journal of Computer Mathematics 2 Quantum Information Processing 1 Information Processing Letters 1 IEEE Transactions on Computers 1 Mathematical and Computer Modelling 1 Informatica (Ljubljana) 1 Journal of Discrete Mathematical Sciences & Cryptography 1 Journal of Universal Computer Science 1 Frontiers of Computer Science all top 5 Fields 166 Information and communication theory, circuits (94-XX) 62 Computer science (68-XX) 12 General and overarching topics; collections (00-XX) 3 Quantum theory (81-XX) 2 Algebraic geometry (14-XX) 1 Number theory (11-XX) 1 Statistics (62-XX) 1 Operations research, mathematical programming (90-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 105 Publications have been cited 462 times in 344 Documents Cited by ▼ Year ▼ On the security of certificateless signature schemes from Asiacrypt 2003. Zbl 1154.94459 Huang, Xinyi; Susilo, Willy; Mu, Yi; Zhang, Futai 32 2005 Certificateless signature revisited. Zbl 1213.94158 Huang, Xinyi; Mu, Yi; Susilo, Willy; Wong, Duncan S.; Wu, Wei 32 2007 Certificateless threshold ring signature. Zbl 1170.94327 Chang, Shuang; Wong, Duncan S.; Mu, Yi; Zhang, Zhenfeng 21 2009 Constant-size dynamic \(k\)-TAA. Zbl 1152.94445 Au, Man Ho; Susilo, Willy; Mu, Yi 20 2006 Identity-based strong designated verifier signature schemes. Zbl 1098.94630 Susilo, Willy; Zhang, Fangguo; Mu, Yi 17 2004 An efficient quantum scheme for private set intersection. Zbl 1333.81125 Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun 14 2016 Strongly leakage-resilient authenticated key exchange. Zbl 1332.94088 Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun 14 2016 Cryptographic reverse firewall via malleable smooth projective hash functions. Zbl 1404.94052 Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun; Zhang, Mingwu 13 2016 Asymmetric group key agreement. Zbl 1239.94078 Wu, Qianhong; Mu, Yi; Susilo, Willy; Qin, Bo; Domingo-Ferrer, Josep 13 2009 Quantum private set intersection cardinality and its application to anonymous authentication. Zbl 1428.81071 Shi, Run-hua; Mu, Yi; Zhong, Hong; Zhang, Shun; Cui, Jie 13 2016 Efficient generic on-line/off-line signatures without key exposure. Zbl 1214.94061 Chen, Xiaofeng; Zhang, Fangguo; Susilo, Willy; Mu, Yi 12 2007 Dynamic universal accumulators for DDH groups and their application to attribute-based anonymous credential systems. Zbl 1237.94048 Au, Man Ho; Tsang, Patrick P.; Susilo, Willy; Mu, Yi 11 2009 Strong authenticated key exchange with auxiliary inputs. Zbl 1381.94065 Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun 10 2017 A new general framework for secure public key encryption with keyword search. Zbl 1358.94060 Chen, Rongmao; Mu, Yi; Yang, Guomin; Guo, Fuchun; Wang, Xiaofen 8 2015 Provably secure pairing-based convertible undeniable signature with short signature length. Zbl 1151.94610 Huang, Xinyi; Mu, Yi; Susilo, Willy; Wu, Wei 8 2007 A new signature scheme without random oracles from bilinear pairings. Zbl 1295.94192 Zhang, Fangguo; Chen, Xiaofeng; Susilo, Willy; Mu, Yi 7 2006 Identity-based authenticated broadcast encryption and distributed authenticated encryption. Zbl 1115.68407 Mu, Yi; Susilo, Willy; Lin, Yan-Xia; Ruan, Chun 7 2004 Certificateless threshold signature scheme from bilinear maps. Zbl 1208.94062 Yuan, Hong; Zhang, Futai; Huang, Xinyi; Mu, Yi; Susilo, Willy; Zhang, Lei 7 2010 Identity-based partial message recovery signatures (or how to shorten ID-based signatures). Zbl 1120.94334 Zhang, Fangguo; Susilo, Willy; Mu, Yi 6 2005 \(m\) out of \(n\) oblivious transfer. Zbl 1024.94515 Mu, Yi; Zhang, Junqi; Varadharajan, Vijay 6 2002 Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample. Zbl 1410.94078 Guo, Fuchun; Chen, Rongmao; Susilo, Willy; Lai, Jianchang; Yang, Guomin; Mu, Yi 5 2017 ID-based encryption with equality test against insider attack. Zbl 1386.94087 Wu, Tong; Ma, Sha; Mu, Yi; Zeng, Shengke 5 2017 Server-aided verification signatures: Definitions and new constructions. Zbl 1204.94093 Wu, Wei; Mu, Yi; Susilo, Willy; Huang, Xinyi 5 2008 Certificate-based signatures revisited. Zbl 1216.94055 Wu, W.; Mu, Y.; Susilo, W.; Huang, X. 5 2009 Multi-party stand-alone and setup-free verifiably committed signatures. Zbl 1127.94381 Zhu, Huafei; Susilo, Willy; Mu, Yi 5 2007 Online/offline signatures and multisignatures for aodv and dsr routing security. Zbl 1176.94062 Xu, Shidi; Mu, Yi; Susilo, Willy 5 2006 Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation. Zbl 1443.68057 Xu, Shengmin; Yang, Guomin; Mu, Yi 5 2019 A code-based signature scheme from the Lyubashevsky framework. Zbl 1457.94222 Song, Yongcheng; Huang, Xinyi; Mu, Yi; Wu, Wei; Wang, Huaxiong 5 2020 Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query. Zbl 1398.81075 Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun 4 2017 Anonymous identity-based broadcast encryption with revocation for file sharing. Zbl 1346.94108 Lai, Jianchang; Mu, Yi; Guo, Fuchun; Susilo, Willy; Chen, Rongmao 4 2016 Non-interactive deniable ring authentication. Zbl 1092.94515 Susilo, Willy; Mu, Yi 4 2004 Distributed signcryption. Zbl 0963.94032 Mu, Yi; Varadharajan, Vijay 4 2000 The generic construction of continuous leakage-resilient identity-based cryptosystems. Zbl 1439.94078 Zhou, Yanwei; Yang, Bo; Mu, Yi 4 2019 Identity-based secure distributed data storage schemes. Zbl 1364.94541 Han, Jinguang; Susilo, Willy; Mu, Yi 4 2014 On the security of nominative signatures. Zbl 1127.94373 Susilo, Willy; Mu, Yi 4 2005 Perfect concurrent signature schemes. Zbl 1109.68487 Susilo, Willy; Mu, Yi; Zhang, Fangguo 4 2004 Membership encryption and its applications. Zbl 1316.94076 Guo, Fuchun; Mu, Yi; Susilo, Willy; Varadharajan, Vijay 4 2013 Strongly leakage resilient authenticated key exchange, revisited. Zbl 1423.94116 Yang, Guomin; Chen, Rongmao; Mu, Yi; Susilo, Willy; Guo, Fuchun; Li, Jie 4 2019 Provably secure identity-based authenticated key agreement protocols with malicious private key generators. Zbl 1204.94087 Guo, Hua; Li, Zhoujun; Mu, Yi; Zhang, Xiyong 4 2011 Efficient provably secure restrictive partially blind signatures from bilinear pairings. Zbl 1152.94409 Chen, Xiaofeng; Zhang, Fangguo; Mu, Yi; Susilo, Willy 4 2006 Identity-based encryption: How to decrypt multiple ciphertexts using a single decryption key. Zbl 1151.94608 Guo, Fuchun; Mu, Yi; Chen, Zhide 4 2007 Efficient generic on-line/off-line (threshold) signatures without key exposure. Zbl 1148.94008 Chen, Xiaofeng; Zhang, Fangguo; Tian, Haibo; Wei, Baodian; Susilo, Willy; Mu, Yi; Lee, Hyunrok; Kim, Kwangjo 4 2008 Introduction to security reduction. Zbl 1437.94002 Guo, Fuchun; Susilo, Willy; Mu, Yi 3 2018 Public key encryption with authorized keyword search. Zbl 1346.94107 Jiang, Peng; Mu, Yi; Guo, Fuchun; Wen, Qiaoyan 3 2016 Deniable ring authentication revisited. Zbl 1103.68539 Susilo, Willy; Mu, Yi 3 2004 Efficient oblivious transfers with access control. Zbl 1247.94035 Han, Jinguang; Susilo, Willy; Mu, Yi; Yan, Jun 3 2012 Multi-identity single-key decryption without random oracles. Zbl 1166.94312 Guo, Fuchun; Mu, Yi; Chen, Zhide; Xu, Li 3 2008 Identity-based online/offline encryption. Zbl 1175.94080 Guo, Fuchun; Mu, Yi; Chen, Zhide 3 2008 Certificate-based signatures: new definitions and a generic construction from certificateless signatures. Zbl 1352.94072 Wu, Wei; Mu, Yi; Susilo, Willy; Huang, Xinyi 3 2009 Practical compact e-cash. Zbl 1213.68244 Au, Man Ho; Susilo, Willy; Mu, Yi 3 2007 Efficient non-interactive range proof. Zbl 1248.94098 Yuen, Tsz Hon; Huang, Qiong; Mu, Yi; Susilo, Willy; Wong, Duncan S.; Yang, Guomin 3 2009 Revocable identity-based encryption with server-aided ciphertext evolution. Zbl 1436.68098 Sun, Yinxia; Mu, Yi; Susilo, Willy; Zhang, Futai; Fu, Anmin 3 2020 Novel updatable identity-based hash proof system and its applications. Zbl 1455.94202 Zhou, Yanwei; Yang, Bo; Wang, Tao; Mu, Yi 3 2020 Information and communication security. 2nd international conference, ICICS ’99, Sydney, Australia, November 9–11, 1999. Proceedings. Zbl 0931.00051 2 1999 Provably secure identity based provable data possession. Zbl 1388.94087 Yu, Yong; Zhang, Yafang; Mu, Yi; Susilo, Willy; Liu, Hongyu 2 2015 PPDCP-ABE: Privacy-preserving decentralized ciphertext-policy attribute-based encryption. Zbl 1443.94061 Han, Jinguang; Susilo, Willy; Mu, Yi; Zhou, Jianying; Au, Man Ho 2 2014 Provably secure identity-based undeniable signatures with selective and universal convertibility. Zbl 1166.94345 Wu, Wei; Mu, Yi; Susilo, Willy; Huang, Xinyi 2 2008 Multi-identity management for identity-based cryptography. Zbl 1167.94331 Guo, Fuchun; Mu, Yi; Chen, Zhide 2 2008 Publicly verifiable privacy-preserving group decryption. Zbl 1237.94090 Qin, Bo; Wu, Qianhong; Susilo, Willy; Mu, Yi 2 2009 Achieving IND-CCA security for functional encryption for inner products. Zbl 1372.94447 Zhang, Shiwei; Mu, Yi; Yang, Guomin 2 2017 Relations between robustness and RKA security under public-key encryption. Zbl 1394.94929 Cui, Hui; Mu, Yi; Au, Man Ho 2 2016 Compact e-cash from bounded accumulator. Zbl 1177.94179 Au, Man Ho; Wu, Qianhong; Susilo, Willy; Mu, Yi 2 2006 Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Zbl 1139.94300 2 2008 Complete robustness in identity-based encryption. Zbl 1368.94092 Cui, Hui; Mu, Yi; Au, Man Ho 1 2014 A new digital cash scheme based on blind Nyberg-Rueppel digital signature. Zbl 1067.68569 Nguyen, Khanh Quoc; Mu, Yi; Varadharajan, Vijay 1 1998 Delegated decryption. Zbl 0981.94044 Mu, Yi; Varadharajan, Vijay; Nguyen, Khan Quac 1 1999 Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks. Zbl 1368.94138 Zhang, Mingwu; Mu, Yi 1 2014 An efficient privacy-preserving e-coupon system. Zbl 1368.94114 Liu, Weiwei; Mu, Yi; Yang, Guomin 1 2015 Efficient dynamic threshold identity-based encryption with constant-size ciphertext. Zbl 1358.94078 Susilo, Willy; Guo, Fuchun; Mu, Yi 1 2016 Threshold broadcast encryption with keyword search. Zbl 1409.94913 Zhang, Shiwei; Mu, Yi; Yang, Guomin 1 2016 Linear encryption with keyword search. Zbl 1346.94140 Zhang, Shiwei; Yang, Guomin; Mu, Yi 1 2016 On the design of efficient RSA-based off-line electronic cash schemes. Zbl 0959.68038 Varadharajan, Vijay; Nguyen Khanh Quoc; Mu, Yi 1 1999 A fair electronic cash scheme. Zbl 0978.68591 Mu, Yi; Nguyen, Khanh Quoc; Varadharajan, Vijay 1 2001 Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems. Zbl 1417.68039 Jiang, Peng; Guo, Fuchun; Mu, Yi 1 2019 Privacy-preserving \(k\)-time authenticated secret handshakes. Zbl 1426.94126 Tian, Yangguang; Zhang, Shiwei; Yang, Guomin; Mu, Yi; Yu, Yong 1 2017 A note on the strong authenticated key exchange with auxiliary inputs. Zbl 1381.94066 Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun; Zheng, Yang 1 2017 Continuous leakage-resilient identity-based encryption with leakage amplification. Zbl 1419.94055 Zhou, Yanwei; Yang, Bo; Mu, Yi 1 2019 On security of a certificateless signcryption scheme. Zbl 1293.94105 Miao, Songqin; Zhang, Futai; Li, Sujuan; Mu, Yi 1 2013 Efficient and dynamic key management for multiple identities in identity-based systems. Zbl 1293.94070 Guo, Hua; Xu, Chang; Li, Zhoujun; Yao, Yanqing; Mu, Yi 1 2013 Updatable lossy trapdoor functions and its application in continuous leakage. Zbl 1381.94077 Li, Sujuan; Mu, Yi; Zhang, Mingwu; Zhang, Futai 1 2016 Iterated random oracle: a universal approach for finding loss in security reduction. Zbl 1407.94115 Guo, Fuchun; Susilo, Willy; Mu, Yi; Chen, Rongmao; Lai, Jianchang; Yang, Guomin 1 2016 Analysis of property-preservation capabilities of the ROX and ESh hash domain extenders. Zbl 1284.94104 Reyhanitabar, Mohammad Reza; Susilo, Willy; Mu, Yi 1 2009 Optimal online/offline signature: how to sign a message without online computation. Zbl 1204.94086 Guo, Fuchun; Mu, Yi 1 2008 Enhanced target collision resistant hash functions revisited. Zbl 1248.94089 Reyhanitabar, Mohammad Reza; Susilo, Willy; Mu, Yi 1 2009 Ciphertext-policy attribute-based encryption with key-delegation abuse resistance. Zbl 1405.94070 Jiang, Yinhao; Susilo, Willy; Mu, Yi; Guo, Fuchun 1 2016 One-round strong oblivious signature-based envelope. Zbl 1346.94098 Chen, Rongmao; Mu, Yi; Susilo, Willy; Yang, Guomin; Guo, Fuchun; Zhang, Mingwu 1 2016 Novel generic construction of leakage-resilient PKE scheme with CCA security. Zbl 1517.94174 Zhou, Yanwei; Yang, Bo; Xia, Zhe; Zhang, Mingwu; Mu, Yi 1 2021 Efficient attribute-based encryption with blackbox traceability. Zbl 1421.94079 Xu, Shengmin; Yang, Guomin; Mu, Yi; Liu, Ximeng 1 2018 Deniable ring authentication based on projective hash functions. Zbl 1439.94092 Zeng, Shengke; Mu, Yi; Yang, Guomin; He, Mingxing 1 2017 Provably secure homomorphic signcryption. Zbl 1439.94056 Rezaeibagha, Fatemeh; Mu, Yi; Zhang, Shiwei; Wang, Xiaofen 1 2017 Efficient online/offline signatures with computational leakage resilience in online phase. Zbl 1295.94179 Guo, Fuchun; Mu, Yi; Susilo, Willy 1 2011 Provably secure server-aided verification signatures. Zbl 1219.94083 Wu, Wei; Mu, Yi; Susilo, Willy; Huang, Xinyi 1 2011 Towards a cryptographic treatment of publish/subscribe systems. Zbl 1294.94086 Yuen, Tsz Hon; Susilo, Willy; Mu, Yi 1 2010 Identity-based encryption with leakage-amplified chosen-ciphertext attacks security. Zbl 1448.94238 Zhou, Yanwei; Yang, Bo; Xia, Zhe; Zhang, Mingwu; Mu, Yi 1 2020 Identity-based broadcasting. Zbl 1123.94379 Mu, Yi; Susilo, Willy; Lin, Yan-Xia 1 2003 New construction of group secret handshakes based on pairings. Zbl 1285.94103 Zhou, Lan; Susilo, Willy; Mu, Yi 1 2008 Formal definition and construction of nominative signature. Zbl 1285.94108 Liu, Dennis Y. W.; Wong, Duncan S.; Huang, Xinyi; Wang, Guilin; Huang, Qiong; Mu, Yi; Susilo, Willy 1 2008 Mutative identity-based signatures or dynamic credentials without random oracles. Zbl 1282.94077 Guo, Fuchun; Mu, Yi; Chen, Zhide 1 2007 Provable security. First international conference, ProvSec 2007, Wollongong, Australia, November 1–2, 2007. Proceedings. Zbl 1137.94001 1 2007 Further observations on optimistic fair exchange protocols in the multi-user setting. Zbl 1279.94088 Huang, Xinyi; Mu, Yi; Susilo, Willy; Wu, Wei; Xiang, Yang 1 2010 Novel generic construction of leakage-resilient PKE scheme with CCA security. Zbl 1517.94174 Zhou, Yanwei; Yang, Bo; Xia, Zhe; Zhang, Mingwu; Mu, Yi 1 2021 A code-based signature scheme from the Lyubashevsky framework. Zbl 1457.94222 Song, Yongcheng; Huang, Xinyi; Mu, Yi; Wu, Wei; Wang, Huaxiong 5 2020 Revocable identity-based encryption with server-aided ciphertext evolution. Zbl 1436.68098 Sun, Yinxia; Mu, Yi; Susilo, Willy; Zhang, Futai; Fu, Anmin 3 2020 Novel updatable identity-based hash proof system and its applications. Zbl 1455.94202 Zhou, Yanwei; Yang, Bo; Wang, Tao; Mu, Yi 3 2020 Identity-based encryption with leakage-amplified chosen-ciphertext attacks security. Zbl 1448.94238 Zhou, Yanwei; Yang, Bo; Xia, Zhe; Zhang, Mingwu; Mu, Yi 1 2020 Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation. Zbl 1443.68057 Xu, Shengmin; Yang, Guomin; Mu, Yi 5 2019 The generic construction of continuous leakage-resilient identity-based cryptosystems. Zbl 1439.94078 Zhou, Yanwei; Yang, Bo; Mu, Yi 4 2019 Strongly leakage resilient authenticated key exchange, revisited. Zbl 1423.94116 Yang, Guomin; Chen, Rongmao; Mu, Yi; Susilo, Willy; Guo, Fuchun; Li, Jie 4 2019 Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems. Zbl 1417.68039 Jiang, Peng; Guo, Fuchun; Mu, Yi 1 2019 Continuous leakage-resilient identity-based encryption with leakage amplification. Zbl 1419.94055 Zhou, Yanwei; Yang, Bo; Mu, Yi 1 2019 Introduction to security reduction. Zbl 1437.94002 Guo, Fuchun; Susilo, Willy; Mu, Yi 3 2018 Efficient attribute-based encryption with blackbox traceability. Zbl 1421.94079 Xu, Shengmin; Yang, Guomin; Mu, Yi; Liu, Ximeng 1 2018 A generic scheme of plaintext-checkable database encryption. Zbl 1436.68096 Ma, Sha; Mu, Yi; Susilo, Willy 1 2018 Privacy-enhanced attribute-based private information retrieval. Zbl 1440.68063 Lai, Jianchang; Mu, Yi; Guo, Fuchun; Jiang, Peng; Susilo, Willy 1 2018 Strong authenticated key exchange with auxiliary inputs. Zbl 1381.94065 Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun 10 2017 Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample. Zbl 1410.94078 Guo, Fuchun; Chen, Rongmao; Susilo, Willy; Lai, Jianchang; Yang, Guomin; Mu, Yi 5 2017 ID-based encryption with equality test against insider attack. Zbl 1386.94087 Wu, Tong; Ma, Sha; Mu, Yi; Zeng, Shengke 5 2017 Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query. Zbl 1398.81075 Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun 4 2017 Achieving IND-CCA security for functional encryption for inner products. Zbl 1372.94447 Zhang, Shiwei; Mu, Yi; Yang, Guomin 2 2017 Privacy-preserving \(k\)-time authenticated secret handshakes. Zbl 1426.94126 Tian, Yangguang; Zhang, Shiwei; Yang, Guomin; Mu, Yi; Yu, Yong 1 2017 A note on the strong authenticated key exchange with auxiliary inputs. Zbl 1381.94066 Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun; Zheng, Yang 1 2017 Deniable ring authentication based on projective hash functions. Zbl 1439.94092 Zeng, Shengke; Mu, Yi; Yang, Guomin; He, Mingxing 1 2017 Provably secure homomorphic signcryption. Zbl 1439.94056 Rezaeibagha, Fatemeh; Mu, Yi; Zhang, Shiwei; Wang, Xiaofen 1 2017 An efficient quantum scheme for private set intersection. Zbl 1333.81125 Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun 14 2016 Strongly leakage-resilient authenticated key exchange. Zbl 1332.94088 Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun 14 2016 Cryptographic reverse firewall via malleable smooth projective hash functions. Zbl 1404.94052 Chen, Rongmao; Mu, Yi; Yang, Guomin; Susilo, Willy; Guo, Fuchun; Zhang, Mingwu 13 2016 Quantum private set intersection cardinality and its application to anonymous authentication. Zbl 1428.81071 Shi, Run-hua; Mu, Yi; Zhong, Hong; Zhang, Shun; Cui, Jie 13 2016 Anonymous identity-based broadcast encryption with revocation for file sharing. Zbl 1346.94108 Lai, Jianchang; Mu, Yi; Guo, Fuchun; Susilo, Willy; Chen, Rongmao 4 2016 Public key encryption with authorized keyword search. Zbl 1346.94107 Jiang, Peng; Mu, Yi; Guo, Fuchun; Wen, Qiaoyan 3 2016 Relations between robustness and RKA security under public-key encryption. Zbl 1394.94929 Cui, Hui; Mu, Yi; Au, Man Ho 2 2016 Efficient dynamic threshold identity-based encryption with constant-size ciphertext. Zbl 1358.94078 Susilo, Willy; Guo, Fuchun; Mu, Yi 1 2016 Threshold broadcast encryption with keyword search. Zbl 1409.94913 Zhang, Shiwei; Mu, Yi; Yang, Guomin 1 2016 Linear encryption with keyword search. Zbl 1346.94140 Zhang, Shiwei; Yang, Guomin; Mu, Yi 1 2016 Updatable lossy trapdoor functions and its application in continuous leakage. Zbl 1381.94077 Li, Sujuan; Mu, Yi; Zhang, Mingwu; Zhang, Futai 1 2016 Iterated random oracle: a universal approach for finding loss in security reduction. Zbl 1407.94115 Guo, Fuchun; Susilo, Willy; Mu, Yi; Chen, Rongmao; Lai, Jianchang; Yang, Guomin 1 2016 Ciphertext-policy attribute-based encryption with key-delegation abuse resistance. Zbl 1405.94070 Jiang, Yinhao; Susilo, Willy; Mu, Yi; Guo, Fuchun 1 2016 One-round strong oblivious signature-based envelope. Zbl 1346.94098 Chen, Rongmao; Mu, Yi; Susilo, Willy; Yang, Guomin; Guo, Fuchun; Zhang, Mingwu 1 2016 A new general framework for secure public key encryption with keyword search. Zbl 1358.94060 Chen, Rongmao; Mu, Yi; Yang, Guomin; Guo, Fuchun; Wang, Xiaofen 8 2015 Provably secure identity based provable data possession. Zbl 1388.94087 Yu, Yong; Zhang, Yafang; Mu, Yi; Susilo, Willy; Liu, Hongyu 2 2015 An efficient privacy-preserving e-coupon system. Zbl 1368.94114 Liu, Weiwei; Mu, Yi; Yang, Guomin 1 2015 Identity-based secure distributed data storage schemes. Zbl 1364.94541 Han, Jinguang; Susilo, Willy; Mu, Yi 4 2014 PPDCP-ABE: Privacy-preserving decentralized ciphertext-policy attribute-based encryption. Zbl 1443.94061 Han, Jinguang; Susilo, Willy; Mu, Yi; Zhou, Jianying; Au, Man Ho 2 2014 Complete robustness in identity-based encryption. Zbl 1368.94092 Cui, Hui; Mu, Yi; Au, Man Ho 1 2014 Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks. Zbl 1368.94138 Zhang, Mingwu; Mu, Yi 1 2014 Membership encryption and its applications. Zbl 1316.94076 Guo, Fuchun; Mu, Yi; Susilo, Willy; Varadharajan, Vijay 4 2013 On security of a certificateless signcryption scheme. Zbl 1293.94105 Miao, Songqin; Zhang, Futai; Li, Sujuan; Mu, Yi 1 2013 Efficient and dynamic key management for multiple identities in identity-based systems. Zbl 1293.94070 Guo, Hua; Xu, Chang; Li, Zhoujun; Yao, Yanqing; Mu, Yi 1 2013 Efficient oblivious transfers with access control. Zbl 1247.94035 Han, Jinguang; Susilo, Willy; Mu, Yi; Yan, Jun 3 2012 Provably secure proxy signature scheme from factorization. Zbl 1255.94081 Yu, Yong; Mu, Yi; Susilo, Willy; Sun, Ying; Ji, Yafu 1 2012 Provably secure identity-based authenticated key agreement protocols with malicious private key generators. Zbl 1204.94087 Guo, Hua; Li, Zhoujun; Mu, Yi; Zhang, Xiyong 4 2011 Efficient online/offline signatures with computational leakage resilience in online phase. Zbl 1295.94179 Guo, Fuchun; Mu, Yi; Susilo, Willy 1 2011 Provably secure server-aided verification signatures. Zbl 1219.94083 Wu, Wei; Mu, Yi; Susilo, Willy; Huang, Xinyi 1 2011 Certificateless threshold signature scheme from bilinear maps. Zbl 1208.94062 Yuan, Hong; Zhang, Futai; Huang, Xinyi; Mu, Yi; Susilo, Willy; Zhang, Lei 7 2010 Towards a cryptographic treatment of publish/subscribe systems. Zbl 1294.94086 Yuen, Tsz Hon; Susilo, Willy; Mu, Yi 1 2010 Further observations on optimistic fair exchange protocols in the multi-user setting. Zbl 1279.94088 Huang, Xinyi; Mu, Yi; Susilo, Willy; Wu, Wei; Xiang, Yang 1 2010 Enhanced security notions for dedicated-key hash functions: definitions and relationships. Zbl 1285.94093 Reyhanitabar, Mohammad Reza; Susilo, Willy; Mu, Yi 1 2010 Certificateless threshold ring signature. Zbl 1170.94327 Chang, Shuang; Wong, Duncan S.; Mu, Yi; Zhang, Zhenfeng 21 2009 Asymmetric group key agreement. Zbl 1239.94078 Wu, Qianhong; Mu, Yi; Susilo, Willy; Qin, Bo; Domingo-Ferrer, Josep 13 2009 Dynamic universal accumulators for DDH groups and their application to attribute-based anonymous credential systems. Zbl 1237.94048 Au, Man Ho; Tsang, Patrick P.; Susilo, Willy; Mu, Yi 11 2009 Certificate-based signatures revisited. Zbl 1216.94055 Wu, W.; Mu, Y.; Susilo, W.; Huang, X. 5 2009 Certificate-based signatures: new definitions and a generic construction from certificateless signatures. Zbl 1352.94072 Wu, Wei; Mu, Yi; Susilo, Willy; Huang, Xinyi 3 2009 Efficient non-interactive range proof. Zbl 1248.94098 Yuen, Tsz Hon; Huang, Qiong; Mu, Yi; Susilo, Willy; Wong, Duncan S.; Yang, Guomin 3 2009 Publicly verifiable privacy-preserving group decryption. Zbl 1237.94090 Qin, Bo; Wu, Qianhong; Susilo, Willy; Mu, Yi 2 2009 Analysis of property-preservation capabilities of the ROX and ESh hash domain extenders. Zbl 1284.94104 Reyhanitabar, Mohammad Reza; Susilo, Willy; Mu, Yi 1 2009 Enhanced target collision resistant hash functions revisited. Zbl 1248.94089 Reyhanitabar, Mohammad Reza; Susilo, Willy; Mu, Yi 1 2009 Server-aided verification signatures: Definitions and new constructions. Zbl 1204.94093 Wu, Wei; Mu, Yi; Susilo, Willy; Huang, Xinyi 5 2008 Efficient generic on-line/off-line (threshold) signatures without key exposure. Zbl 1148.94008 Chen, Xiaofeng; Zhang, Fangguo; Tian, Haibo; Wei, Baodian; Susilo, Willy; Mu, Yi; Lee, Hyunrok; Kim, Kwangjo 4 2008 Multi-identity single-key decryption without random oracles. Zbl 1166.94312 Guo, Fuchun; Mu, Yi; Chen, Zhide; Xu, Li 3 2008 Identity-based online/offline encryption. Zbl 1175.94080 Guo, Fuchun; Mu, Yi; Chen, Zhide 3 2008 Provably secure identity-based undeniable signatures with selective and universal convertibility. Zbl 1166.94345 Wu, Wei; Mu, Yi; Susilo, Willy; Huang, Xinyi 2 2008 Multi-identity management for identity-based cryptography. Zbl 1167.94331 Guo, Fuchun; Mu, Yi; Chen, Zhide 2 2008 Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Zbl 1139.94300 2 2008 Optimal online/offline signature: how to sign a message without online computation. Zbl 1204.94086 Guo, Fuchun; Mu, Yi 1 2008 New construction of group secret handshakes based on pairings. Zbl 1285.94103 Zhou, Lan; Susilo, Willy; Mu, Yi 1 2008 Formal definition and construction of nominative signature. Zbl 1285.94108 Liu, Dennis Y. W.; Wong, Duncan S.; Huang, Xinyi; Wang, Guilin; Huang, Qiong; Mu, Yi; Susilo, Willy 1 2008 Sanitizable signatures revisited. Zbl 1362.94059 Yuen, Tsz Hon; Susilo, Willy; Liu, Joseph K.; Mu, Yi 1 2008 Certificateless signature revisited. Zbl 1213.94158 Huang, Xinyi; Mu, Yi; Susilo, Willy; Wong, Duncan S.; Wu, Wei 32 2007 Efficient generic on-line/off-line signatures without key exposure. Zbl 1214.94061 Chen, Xiaofeng; Zhang, Fangguo; Susilo, Willy; Mu, Yi 12 2007 Provably secure pairing-based convertible undeniable signature with short signature length. Zbl 1151.94610 Huang, Xinyi; Mu, Yi; Susilo, Willy; Wu, Wei 8 2007 Multi-party stand-alone and setup-free verifiably committed signatures. Zbl 1127.94381 Zhu, Huafei; Susilo, Willy; Mu, Yi 5 2007 Identity-based encryption: How to decrypt multiple ciphertexts using a single decryption key. Zbl 1151.94608 Guo, Fuchun; Mu, Yi; Chen, Zhide 4 2007 Practical compact e-cash. Zbl 1213.68244 Au, Man Ho; Susilo, Willy; Mu, Yi 3 2007 Mutative identity-based signatures or dynamic credentials without random oracles. Zbl 1282.94077 Guo, Fuchun; Mu, Yi; Chen, Zhide 1 2007 Provable security. First international conference, ProvSec 2007, Wollongong, Australia, November 1–2, 2007. Proceedings. Zbl 1137.94001 1 2007 Constant-size dynamic \(k\)-TAA. Zbl 1152.94445 Au, Man Ho; Susilo, Willy; Mu, Yi 20 2006 A new signature scheme without random oracles from bilinear pairings. Zbl 1295.94192 Zhang, Fangguo; Chen, Xiaofeng; Susilo, Willy; Mu, Yi 7 2006 Online/offline signatures and multisignatures for aodv and dsr routing security. Zbl 1176.94062 Xu, Shidi; Mu, Yi; Susilo, Willy 5 2006 Efficient provably secure restrictive partially blind signatures from bilinear pairings. Zbl 1152.94409 Chen, Xiaofeng; Zhang, Fangguo; Mu, Yi; Susilo, Willy 4 2006 Compact e-cash from bounded accumulator. Zbl 1177.94179 Au, Man Ho; Wu, Qianhong; Susilo, Willy; Mu, Yi 2 2006 On the security of certificateless signature schemes from Asiacrypt 2003. Zbl 1154.94459 Huang, Xinyi; Susilo, Willy; Mu, Yi; Zhang, Futai 32 2005 Identity-based partial message recovery signatures (or how to shorten ID-based signatures). Zbl 1120.94334 Zhang, Fangguo; Susilo, Willy; Mu, Yi 6 2005 On the security of nominative signatures. Zbl 1127.94373 Susilo, Willy; Mu, Yi 4 2005 Identity-based strong designated verifier signature schemes. Zbl 1098.94630 Susilo, Willy; Zhang, Fangguo; Mu, Yi 17 2004 Identity-based authenticated broadcast encryption and distributed authenticated encryption. Zbl 1115.68407 Mu, Yi; Susilo, Willy; Lin, Yan-Xia; Ruan, Chun 7 2004 Non-interactive deniable ring authentication. Zbl 1092.94515 Susilo, Willy; Mu, Yi 4 2004 Perfect concurrent signature schemes. Zbl 1109.68487 Susilo, Willy; Mu, Yi; Zhang, Fangguo 4 2004 Deniable ring authentication revisited. Zbl 1103.68539 Susilo, Willy; Mu, Yi 3 2004 Identity-based broadcasting. Zbl 1123.94379 Mu, Yi; Susilo, Willy; Lin, Yan-Xia 1 2003 \(m\) out of \(n\) oblivious transfer. Zbl 1024.94515 Mu, Yi; Zhang, Junqi; Varadharajan, Vijay 6 2002 A fair electronic cash scheme. Zbl 0978.68591 Mu, Yi; Nguyen, Khanh Quoc; Varadharajan, Vijay 1 2001 ...and 5 more Documents all cited Publications top 5 cited Publications all top 5 Cited by 691 Authors 36 Susilo, Willy 35 Mu, Yi 20 Guo, Fuchun 13 Huang, Qiong 13 Huang, Xinyi 13 Yang, Guomin 12 Wong, Duncan S. 12 Wu, Qianhong 12 Yang, Bo 9 Chen, Rongmao 9 Zhang, Lei 9 Zhang, Mingwu 9 Zhou, Yanwei 8 Shi, Runhua 7 Wu, Wei 7 Zhang, Futai 6 Domingo-Ferrer, Josep 6 Li, Jiguo 6 Qin, Bo 6 Weng, Jian 6 Wu, Ge 6 Xia, Zhe 5 Hu, Yupu 5 Jiang, Peng 5 Lai, Jianchang 5 Li, Fagen 5 Liu, Ximeng 5 Slamanig, Daniel 5 Tso, Raylin 5 Zhang, Fangguo 4 Chakraborty, Suvradip 4 Chen, Xiaofeng 4 Choo, Kim-Kwang Raymond 4 Deng, Robert Huijie 4 Derler, David 4 Emura, Keita 4 Ganesh, Chaya 4 Li, Hui 4 Ma, Sha 4 Qin, Baodong 4 Shim, Kyungah 4 Xin, Xiangjun 4 Xiong, Hu 4 Yung, Moti 4 Zhang, Yichen 4 Zhang, Yinghui 4 Zhang, Zhenfeng 3 Au, Man Ho 3 Biswas, G. P. 3 Cao, Zhenfu 3 Chen, Liqun 3 Chen, Zhide 3 Cui, Hui 3 Cui, Jie 3 Deng, Lunzhi 3 Dutta, Ratna 3 Han, Jinguang 3 Hanser, Christian 3 He, Debiao 3 Hur, Junbeom 3 Islam, Sk Hafizul 3 Li, ChaoYang 3 Li, Yingjiu 3 Liu, Bai 3 Liu, JianWei 3 Liu, Shengli 3 Liu, Wen-Jie 3 Liu, Wen 3 Long, Yu 3 Lu, Yang 3 Mambo, Masahiro 3 Qin, Zhiguang 3 Rangan, Chandrasekharan Pandu 3 Saraswat, Vishal 3 Shao, Jun 3 Tian, Yangguang 3 Wang, Baocang 3 Wei, Baodian 3 Wen, Qiaoyan 3 Xu, Li 3 Yi, Xun 3 Yu, Yong 3 Zhong, Hong 2 Alawatugoda, Janaka 2 Aranha, Diego F. 2 Benhamouda, Fabrice 2 Bernstein, Daniel Julius 2 Biryukov, Alex 2 Camenisch, Jan L. 2 Chen, Jie 2 Chen, Kefei 2 Chen, Liqing 2 Choi, Kyu Young 2 Choudhury, Tanmay 2 Dakhilalian, Mohammad 2 Debnath, Sumit Kumar 2 Ding, Yong 2 Feng, Dengguo 2 Gong, Junqing 2 Gu, Chunxiang ...and 591 more Authors all top 5 Cited in 41 Serials 74 Information Sciences 27 Theoretical Computer Science 14 Quantum Information Processing 12 Designs, Codes and Cryptography 11 International Journal of Theoretical Physics 9 Information Processing Letters 8 Computers & Mathematics with Applications 5 Wuhan University Journal of Natural Sciences (WUJNS) 5 Journal of Discrete Mathematical Sciences & Cryptography 4 Journal of Computer and System Sciences 4 Mathematical and Computer Modelling 4 Journal of Cryptology 4 International Journal of Foundations of Computer Science 4 Soft Computing 3 International Journal of Computer Mathematics 3 Mathematical Problems in Engineering 3 Journal of Mathematical Cryptology 2 Informatica (Vilnius) 2 Electronic Commerce Research 2 Journal of Shanghai Jiaotong University (Science) 2 Advances in Mathematics of Communications 2 Science China. Information Sciences 2 Symmetry 2 Arabian Journal for Science and Engineering 1 Acta Informatica 1 Discrete Applied Mathematics 1 Applied Mathematics and Computation 1 Computing 1 Cryptologia 1 Information and Computation 1 Journal of Parallel and Distributed Computing 1 Finite Fields and their Applications 1 Nonlinear Dynamics 1 Journal of Applied Mathematics 1 International Journal of Quantum Information 1 Mathematical Biosciences and Engineering 1 Journal of Zhejiang University. Science A 1 Cryptography and Communications 1 RAIRO. Theoretical Informatics and Applications 1 Quanta 1 Matematicheskie Voprosy Kriptografii all top 5 Cited in 16 Fields 312 Information and communication theory, circuits (94-XX) 104 Computer science (68-XX) 34 Quantum theory (81-XX) 11 Algebraic geometry (14-XX) 10 Number theory (11-XX) 3 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 1 Mathematical logic and foundations (03-XX) 1 Linear and multilinear algebra; matrix theory (15-XX) 1 Special functions (33-XX) 1 Partial differential equations (35-XX) 1 Dynamical systems and ergodic theory (37-XX) 1 Harmonic analysis on Euclidean spaces (42-XX) 1 Convex and discrete geometry (52-XX) 1 Numerical analysis (65-XX) 1 Mechanics of particles and systems (70-XX) 1 Biology and other natural sciences (92-XX) Citations by Year Wikidata Timeline The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.