lobipages.blogg.se

Yu chen
Yu chen










Yu Chen, Xuecheng Ma, Cong Tang, Man Ho AuĮSORICS 2020, LNCS 12308, pp.591-610 PGC: Decentralized Confidential Payment System with Auditability.Hongrui Cui, Kaiyi Zhang, Yu Chen, Zhen Liu, Yu Yu

#YU CHEN HOW TO#

  • MPC-in-Multi-Heads: a Multi-Prover Zero-Knowledge Proof System (or: How to Jointly Prove Any NP Statements in ZK).
  • Fine-grained Secure Attribute-based Encryption.
  • Key Reuse: Enjoy the Best of Both Worlds)
  • Hierarchical Integrated Signature and Encryption.
  • Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps.
  • You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature.
  • Linear Private Set Union from Multi-Query Reverse Private Membership TestĬong Zhang, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin.
  • High-level Training Class on Public-Key Cryptography, organized by CACR, Dec.
  • Generic Constructions of Public-Key Encryptions.
  • Introduction to Zero-Knowledge Proof Systems.
  • Technical Salon, organized by Oracle Chain, Dec.
  • Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation.
  • Xi'an University of Post & Telecommunications, Jan.
  • Ģ018 China Cryptography Innovation Award: Second Prize.
  • Spring 2017: (Graduate) Theoretical Foundations of Cryptography.
  • Spring 2018: (Graduate) Theoretical Foundations of Cryptography.
  • Summer 2018: (Graduate) Advanced Cryptographic Primitives and Applications.
  • Autumn 2018: (Graduate) Theoretical Foundations of Cryptography.
  • (Graduate) Advanced Cryptographic Primitives and Applications
  • Spring 2020: (Undergraduate) Design and Analysis of Algorithms.
  • Spring 2021: (Undergraduate) Design and Analysis of Algorithms.
  • Autumn 2021: (Graduate) Theoretical Cryptography.
  • Spring 2022: (Undergraduate) Design and Analysis of Algorithms.
  • yu chen yu chen

    Autumn 2022: (Undergraduate) Design and Analysis of Algorithms.Autumn 2022: (Graduate) Theoretical Cryptography.2002.09 - 2006.07: School of Computer Science and Engineering,.2008.02 - 2008.08: Research Intern at IBM CRL (The Next Generation Group).I am always looking for motivated students, please send me an email with your CV if you are interested in working with me! Recently, I am working on zero-knowledge proofs and secure multiparty computation. Advanced Security: chosen-ciphertext security, key-dependent message security, leakage/tampering resilience.With emphasis on fundamental primitives and their applications to the design of highly efficient, Theory and applications of cryptography in general, Professor (PhD Supervisor) School of Cyber Science and Technology,










    Yu chen