Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Haiyang Xue is active.

Publication


Featured researches published by Haiyang Xue.


cryptology and network security | 2013

Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions

Haiyang Xue; Bao Li; Xianhui Lu; Dingding Jia; Yamin Liu

We propose a generic construction of lossy trapdoor function from the subgroup membership assumption. We present three concrete constructions based on the k-DCR assumption over


computer and communications security | 2016

(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus

Fuyang Fang; Bao Li; Xianhui Lu; Yamin Liu; Dingding Jia; Haiyang Xue

\mathbb{Z}^*_{N^2}


international workshop on security | 2015

Identity-Based Lossy Encryption from Learning with Errors

Jingnan He; Bao Li; Xianhui Lu; Dingding Jia; Haiyang Xue; Xiaochao Sun

, the extended p-subgroup assumption over


provable security | 2014

Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation

Haiyang Xue; Xianhui Lu; Bao Li; Yamin Liu

\mathbb{Z}^*_{N^2}


cryptology and network security | 2014

On the Lossiness of 2k-th Power and the Instantiability of Rabin-OAEP

Haiyang Xue; Bao Li; Xianhui Lu; Kunpeng Wang; Yamin Liu

, and the decisional RSA subgroup membership assumption over


australasian conference on information security and privacy | 2018

Lattice-Based Dual Receiver Encryption and More.

Daode Zhang; Kai Zhang; Bao Li; Xianhui Lu; Haiyang Xue; Jie Li

\mathbb{Z}^*_{N}


Archive | 2018

Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism

Haiyang Xue; Xianhui Lu; Bao Li; Bei Liang; Jingnan He

. Our constructions are more efficient than the previous construction from the DCR assumption over


provable security | 2017

New Framework of Password-Based Authenticated Key Exchange from Only-One Lossy Encryption

Haiyang Xue; Bao Li; Jingnan He

\mathbb{Z}^*_{N^{s}}


international workshop on security | 2017

IND-PCA Secure KEM Is Enough for Password-Based Authenticated Key Exchange (Short Paper)

Haiyang Xue; Bao Li; Xianhui Lu

(s ≤ 3).


international conference on information and communication security | 2017

Towards Tightly Secure Deterministic Public Key Encryption

Daode Zhang; Bao Li; Yamin Liu; Haiyang Xue; Xianhui Lu; Dingding Jia

In this paper, we propose a hierarchical identity-based encryption (HIBE) scheme in the random oracle (RO) model based on the learning with rounding (LWR) problem over small modulus

Collaboration


Dive into the Haiyang Xue's collaboration.

Top Co-Authors

Avatar

Bao Li

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Xianhui Lu

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Yamin Liu

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Dingding Jia

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Daode Zhang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Jingnan He

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Fuyang Fang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Kunpeng Wang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Bei Liang

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar

Jie Li

Chinese Academy of Sciences

View shared research outputs
Researchain Logo
Decentralizing Knowledge