Maliciously secure and efficient large-scale genome-wide association study with multi-party computation C Dong, J Weng, JN Liu, A Yang, Z Liu, Y Yang, J Ma IEEE Transactions on Dependable and Secure Computing 20 (2), 1243-1257, 2022 | 13 | 2022 |
Notes on a provably-secure certificate-based encryption against malicious CA attacks W Yang, J Weng, A Yang, C Xie, Y Yang Information Sciences 463, 86-91, 2018 | 7 | 2018 |
Predicate private set intersection with linear complexity Y Yang, J Weng, Y Yi, C Dong, LY Zhang, J Zhou International Conference on Applied Cryptography and Network Security, 143-166, 2023 | 3 | 2023 |
PriRanGe: Privacy-Preserving Range-Constrained Intersection Query Over Genomic Data Y Yang, Y Tong, J Weng, Y Yi, Y Zheng, LY Zhang, R Lu IEEE Transactions on Cloud Computing 11 (3), 2379-2391, 2022 | 3 | 2022 |
PPOLQ: Privacy-Preserving Optimal Location Query With Multiple-Condition Filter in Outsourced Environments L Han, W Luo, Y Yang, A Yang, R Lu, J Lai, Y Zheng IEEE Transactions on Services Computing 16 (5), 3564-3577, 2023 | 2 | 2023 |
PriGenX: privacy-preserving query with anonymous access control for genomic data Y Yang, J Weng, Y Tong, JN Liu, Z Wu, LY Zhang, A Yang IEEE Transactions on Dependable and Secure Computing 21 (2), 961-974, 2023 | 1 | 2023 |
Efficient Privacy-preserving Non-exhaustive Nearest Neighbor Search of large-scale databases Y Yi, W Tan, Y Yang Journal of Information Security and Applications 70, 103335, 2022 | 1 | 2022 |
Maliciously Secure Circuit-PSI via SPDZ-Compatible Oblivious PRF Y Yang, X Liang, X Song, L Huang, H Ren, C Dong, J Zhou Cryptology ePrint Archive, 2024 | | 2024 |