Yang Lu

ORCID: 0000-0003-4860-8384
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Complexity and Algorithms in Graphs
  • Cryptographic Implementations and Security
  • Privacy-Preserving Technologies in Data
  • Advanced Authentication Protocols Security
  • Cryptography and Residue Arithmetic
  • Cloud Data Security Solutions
  • Chaos-based Image/Signal Encryption
  • Security in Wireless Sensor Networks
  • Coding theory and cryptography
  • Access Control and Trust
  • graph theory and CDMA systems
  • Environmental Changes in China
  • Diverse Musicological Studies
  • Freezing and Crystallization Processes
  • Network Security and Intrusion Detection
  • Musicology and Musical Analysis
  • Forest, Soil, and Plant Ecology in China
  • Asian Culture and Media Studies
  • Martial Arts: Techniques, Psychology, and Education
  • Wireless Signal Modulation Classification
  • Vehicular Ad Hoc Networks (VANETs)
  • Simulation and Modeling Applications
  • Central Asia Education and Culture
  • Human Motion and Animation

Nanjing Normal University
2006-2025

Herzen University
2021

Hohai University
2009-2019

University of Tennessee at Knoxville
2019

Ecosystem (Spain)
2013-2014

Jiangnan University
2011-2012

Hunan City University
2009

PLA Army Engineering University
2008

Southwest University of Science and Technology
2008

University of Languages and International Studies
2006

Nowadays, cloud-assisted Industrial Internet of Things (IIoT) has become pervasive in modern enterprises, because it supplies a promising way to transform the operation mode existing industrial facilities, enhancing production efficiency and lowering manufacturing cost. In order preserve privacy sensitive data needs be encrypted prior being uploaded cloud. Recently, certificateless encryption with keyword search (CLKS) was introduced resolve problem retrieval IIoT. However, CLKS schemes only...

10.1109/jiot.2019.2943379 article EN IEEE Internet of Things Journal 2019-09-24

Searchable public key encryption (SPKE) is a useful cryptographic primitive that allows user to perform keyword searches over publicly encrypted messages on an untrusted storage server while guaranteeing the privacy of original as well search keywords. However, most previously proposed SPKE frameworks suffer from security vulnerability caused by guessing attack and some other weaknesses. Inspired ideas certificate-based cryptography signcryption, we present new framework called searchable...

10.1109/tsc.2019.2910113 article EN IEEE Transactions on Services Computing 2020-04-16

As a practical application of the Internet Things (IoT) in modern industry, industrial IoT (IIoT) enables enterprises to accelerate development. Nowadays, cloud computing technology has been applied data storage and processing IIoTs, but how protect privacy become challenge technical issue. Recently, certificate-based encryption with keyword search (CBEKS) was presented handle ciphertext retrieval. By CBEKS, one can get back all desired ciphertexts from without decrypting or leaking...

10.1109/tii.2020.3006474 article EN IEEE Transactions on Industrial Informatics 2020-07-02

Cloud storage services have grown extensively in recent years. For security and privacy purposes, sensitive data need to be outsourced clouds encrypted form. Searchable public key encryption (SPKE) enables ciphertexts retrieved by keyword(s) without decryption. Unfortunately, most of the existing SPKE schemes cannot withstand keyword guessing attack. To combat such attack, authenticated with search (PAEKS) was presented. However, PAEKS were proven secure under a designated-targets model,...

10.1109/tmc.2021.3077508 article EN IEEE Transactions on Mobile Computing 2021-05-04

The situation for post-challenge continuous auxiliary input leakage has not been considered in the cryptography schemes previous literature. We present a semantic-security model with inputs identity-based encryption. In this model, adversary is permitted to obtain some information of private keys constantly and query more after seeing challenge ciphertext through side-channel attacks. Furthermore, we an encryption scheme resilient under composite order groups. Our secure against input,...

10.1002/sec.1396 article EN Security and Communication Networks 2015-12-18

In order to alleviate key escrow issue, the notion of multiauthority attribute-based encryption (MA-ABE) was presented, which widely applied in cloud storage environment. data sharing environment, secure deletion is very crucial and challenging issue. Hence, this article, we concentrate on verification operation, i.e., assuring deletion. To solve problem, put forward a system model, formal definition security model MA-ABE for Furthermore, design scheme deletion, more practicable than single...

10.1109/jsyst.2022.3208149 article EN IEEE Systems Journal 2022-09-30

Public key encryption with equality test (PKE-ET) is a novel cryptosystem to deal the problem of multi-public-key encrypted data computing. It can be used verify if different ciphertexts are encryptions same plaintext under public keys without decryption. As an extension PKE-ET, certificateless (CLE-ET) has merits no escrow and certificate. However, existing CLE-ET schemes vulnerable message recovery (MR) attack suffer from low efficiency due using computationally expensive bilinear pairing....

10.1109/tmc.2023.3348849 article EN IEEE Transactions on Mobile Computing 2024-01-01

10.1016/j.tcs.2017.10.020 article EN publisher-specific-oa Theoretical Computer Science 2017-12-12

In order to guarantee security and privacy of sensitive data, attribute-based keyword search (ABKS) enables data owners upload their encrypted cloud servers, authorizes intended users retrieve it. Meanwhile, ABKS outsources heavy work which makes adaptive mobile computing environment. However, as servers can both generate ciphertexts run algorithm, the existing most schemes are vulnerable guessing attack. this paper, we show fundamental cause that do not resist attack is any entity...

10.1016/j.csi.2020.103471 article EN cc-by Computer Standards & Interfaces 2020-10-15

The certificate-based encryption (CBE) is a new PKC paradigm which combines traditional public-key (PKE) and identity based (IBE) while preserving their features. CBE provides an efficient implicit certificate mechanism to eliminate third-party queries for the status simply revocation problem. Therefore, can be used construct PKI requiring fewer infrastructures. In addition, it also solves key escrow problem distribution inherent in IBE. this paper, we scheme with paring prove CCAsecure...

10.4304/jcp.4.1.19-26 article EN Journal of Computers 2009-01-01

10.1631/fitee.1700534 article EN Frontiers of Information Technology & Electronic Engineering 2019-08-01

10.1016/j.tcs.2016.05.019 article EN Theoretical Computer Science 2016-05-24
Coming Soon ...