Yansen Xin

ORCID: 0009-0004-8869-4533
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Cloud Data Security Solutions
  • Advanced Authentication Protocols Security
  • User Authentication and Security Systems
  • Complexity and Algorithms in Graphs

Institute of Information Engineering
2023-2025

Chinese Academy of Sciences
2023-2025

University of Chinese Academy of Sciences
2025

Abstract Multi-factor authentication (MFA) is extensively employed in mobile applications to enhance security, including Internet of Vehicles, healthcare systems, smart homes, etc. Traditional MFA requires users present specific factors, which can be inconvenient if certain factors are unavailable. To address this, $ (t, n) $-threshold (T-MFA) allows select any t out n registered for authentication. However, existing T-MFA solutions face four key issues: (i) reliance on n-1 devices, may...

10.1093/comjnl/bxaf001 article EN The Computer Journal 2025-01-06

Searchable symmetric encryption (SSE) schemes allow a client to store encrypted data with storage provider and retrieve corresponding documents without revealing the content or search keywords provider. However, achieving efficient SSE often comes at cost of statistical information leakage, including search, access size patterns. The known solutions from fully homomorphic oblivious RAM admit poor performances due significant computational communication overheads. Additionally, demand for...

10.1109/tifs.2024.3351433 article EN IEEE Transactions on Information Forensics and Security 2024-01-01

Personally identifiable information (PII) refers to any that links an individual. Sharing PII is extremely useful in public affairs yet hard implement due the worries about privacy violations. Building a retrieval service over multi-cloud, which modern strategy make services stable where multiple servers are deployed, seems be promising solution. However, three major technical challenges remain solved. The first and access control of PII. In fact, each entry can shared different users with...

10.1186/s42400-023-00146-z article EN cc-by Cybersecurity 2023-06-03
Coming Soon ...