代表性学术论文:
(1)Privacy-Preserving and Standard-Compatible AKA Protocol, The 30th USENIX Security Symposium(USENIX Security,四大安全顶会), 2021,通讯作者
(2)Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication, ACM CCS(四大安全顶会), 2016,第1作者(3)Strong Authentication without Temper-Resistant Hardware and Application to Federated Identities, Network and Distributed System Security Symposium (NDSS,四大安全顶会), 2020,第1作者
(4)Multiple Handshakes Security of TLS 1.3 Candidates, IEEE Symposium on Security & Privacy(四大安全顶会), 2016,通讯作者(5)Dumbo: Faster Asynchronous BFT Protocols, ACM Conference on Computer and Communications Security (CCS,四大安全顶会), 2020,第5作者
(6)IND-CCA-secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited, Advances in Cryptology - CRYPTO(三大密码顶会), 2018,通讯作者
(7)On the Hardness of the Computational Ring-LWR Problem and Its Applications, Advances in Cryptology - ASIACRYPT(三大密码顶会), 2018,通讯作者
(8)Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes, Advances in Cryptology - CRYPTO 2016,Lecture Notes in Computer Science 9816(三大密码顶会), 2016,通讯作者
(9)Authenticated Key Exchange from Ideal Lattices, Advances in Cryptology - EUROCRYPT 2015(三大密码顶会), 2015,通讯作者
(10)Black-box Separations for One-More (Static) CDH and Its Generalization, Advances in Cryptology - ASIACRYPT 2014(三大密码顶会), 2014,通讯作者
(11)Batched Multi-hop Multi-key FHE from Ring-LWE with Compact Ciphertext Extension, Theory of Cryptography Conference(TCC,CCF-B), 2017,通讯作者
(12)Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes, Public-Key Cryptography (PKC, CCF-B), 2020,通讯作者
(13)Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model, Public Key Cryptography (CCF-B), 2019,通讯作者
(14)Simpler Efficient Group Signatures from Lattices, PKC 2015,Lecture Notes in Computer Science 9020, 2015,通讯作者
(15)Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks, Security Standardisation Research - SSR 2015, 2015,第1作者
(16)Accountable Proxy Re-encryption for Secure Data Sharing, IEEE Transactions on Dependable and Secure Computing (CCF-A), 2021,通讯作者
(17)Puncturable Signatures and Applications in_Proof-of-Stake Blockchain Protocols, IEEE Transactions on Information Forensics and Security (CCF-A), 2020,第5作者
(18)Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3, IEEE Transactions on Dependable and Secure Computing(CCF-A), 2017,第3作者
(19)Towards Secure Data Distribution Systems in Mobile Cloud Computing, IEEE Transactions on Mobile Computing(CCF-A), 2017,第2作者
(20)Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme, IEEE Trans. Parallel Distrib. Syst.(CCF-A), 2013,
(21)UC-secure Two-Server Password-Based Authentication Protocol and Its Applications, ASIACCS(CACR-B), 2016,第2作者
(22)Ciphertext Policy Attribute-Based Encryption from Lattices , ASIACCS(CACR-B), 2012,通讯作者
(23)Generic Traceable Proxy Re-encryption and Accountable Extension in Consensus Network, European Symposium on Research in Computer Security (ESORICS, CCF-B), 2019,第2作者
(24)Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model, Post-quantum Cryptography (CACR-B), 2019,通讯作者
(25)Modular Security Analysis of OAuth 2.0 in the Three-Party Setting, IEEE European Symposium on Security and Privacy, 2020,第3作者
(26)PRE: Stronger Security Notions and Efficient Construction with Non-interactive Opening, Theoretical Computer Science(CCF-B), 2014,通讯作者
(27)Optiwords: A new password policy for creating memorable and strong passwords, Computers & Security (CCF-B), 2019,通讯作者
(28)Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications, Computers & Security (CCF-B), 2019,第2作者
(29)Non-transferable Proxy Re-encryption, The Computer Journal (CCF-B), 2019,通讯作者
(30)LPSE: Lightweight password-strength estimation for password meters, Computers & Security(CCF-B), 2018,第2作者
(31)Attribute-based signature scheme with constant size signature in the standard model, IET Information Security(CACR-B), 2012,第3作者
(32)Certificateless signature: a new security model and an improved generic construction, Des. Codes Cryptography(CCF-B), 2007,第3作者
(33)Certificateless Public-Key Signature: Security Model and Efficient Construction, ACNS, 2006,第1作者