Books
- 公钥加密的设计方法
陈宇, 秦宝东
科学出版社, 2025-06-01, “十四五”时期国家重点出版物出版专项规划项目
- 公钥密码学
陈宇, 秦宝东, 钱宸
科学出版社, 2025-09-01, “十四五”普通高等教育规划教材
Papers
2025
- Multi-Party Private Set Operations from Predicative Zero-Sharing
Minglang Dong, Yu Chen, Cong Zhang, Yujie Bai, Yang Cao
ACM CCS 2025
[eprint]
- Fast Enhanced Private Set Union in the Balanced and Unbalanced Scenarios
Binbin Tu, Yujie Bai, Cong Zhang, Yang Cao, Yu Chen
USENIX Security 2025
[eprint]
- Efficient Multi-Party Private Set Union Without Non-Collusion Assumptions
Minglang Dong, Cong Zhang, Yujie Bai, Yu Chen
USENIX Security 2025
[eprint]
2024
- Unbalanced Private Set Union with Reduced Computation and Communication
Cong Zhang, Yu Chen, Weiran Liu, Liqiang Peng, Meng Hao, Anyu Wang, Xiaoyun Wang
ACM CCS 2024
[eprint]
- Private Set Operations from Multi-Query Reverse Private Membership Test
Yu Chen, Min Zhang, Cong Zhang, Minlang Dong, Weiran Liu
PKC 2024, LNCS, vol 14603, pp.387-416.
[eprint]
[slide]
[code]
- Lattice-Based Programmable Hash Functions and Applications
Jiang Zhang, Yu Chen, Zhenfeng Zhang
Journal of Cryptology, 2024, vol 37(4)(extended version of CRYPTO 2016)
[eprint]
- 公钥加密综述 (A Survey on Public-Key Encryption)
陈宇, 易红旭, 王煜宇
密码学报 (Journal of Cryptologic Research), 2024, vol 11(1), pp.191-226. [link]
- 可认证数据结构综述 (A Survey on Authenticated Data Structures)
孔祥玉, 陈宇
密码学报 (Journal of Cryptologic Research), 2024, vol 11(3), pp.545-574. [link]
- 隐私集合运算中的关键数据结构研究 (A Survey on Key Data Structures in Private Set Operation)
张响鸰, 张聪, 刘巍然, 陈宇
密码学报 (Journal of Cryptologic Research), 2024, vol 11(2), pp.263-281. [link]
- Fast Two-Party Signature for Upgrading ECDSA to Two-Party Scenario Easily
Binbin Tu, Yu Chen, Hongrui Cui, Xianfang Wang
Theoretical Computer Science, 2024, vol 986, pp.1-12.
[link]
2023
- Fine-Grained Secure Attribute-Based Encryption
Yuyu Wang, Jiaxin Pan, Yu Chen
Journal of Cryptology, 2023, vol 36(4) (extended version of CRYPTO 2021) [eprint]
- A Simple and Efficient Framework of Proof Systems for NP
Yuyu Wang, Chuanjie Su, Jiaxin Pan, Yu Chen
ASIACRYPT 2023, LNCS, vol 14439, pp.174-207.
[eprint]
- Sigma Protocols from Verifiable Secret Sharing and Their Applications
Min Zhang, Yu Chen, Chuanzhou Yao, Zhicao Wang
ASIACRYPT 2023, LNCS, vol 14439, pp.208-242.
[eprint]
[slide]
- Fast Unbalanced Private Set Union from Fully Homomorphic Encryption
Binbin Tu, Yu Chen, Qi Liu, Cong Zhang
ACM CCS, 2023, pp.2959-2973.
[eprint]
- Linear Private Set Union from Multi-Query Reverse Private Membership Test
Cong Zhang, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin
USENIX Security, 2023, pp. 337-354.
[eprint]
[slide]
- 支持批量证明的SM2适配器签名及其分布式扩展 (SM2-based Adaptor Signature with Batch Proofs and Its Distributed Extension)
涂彬彬, 陈宇
软件学报 (Journal of Software), 2024, vol 35(5), pp.2566-2582. [link]
2022
- You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature
Min Zhang, Binbin Tu, Yu Chen
INSCRYPT 2022, LNCS, vol 13837, pp.67-86.
[eprint]
[slide]
- Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps
Binbin Tu, Min Zhang, Yu Chen
ISC 2022, LNCS, vol 13640, pp.175-193.
[springer]
- Non-Malleable Functions and Their Applications
Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow
Journal of Cryptology, 2022, vol 35(2) (extended version of PKC 2016)[pdf]
2021
- Hierarchical Integrated Signature and Encryption
(or Key Separation vs. Key Reuse: Enjoy the Best of Both Worlds)
Yu Chen, Qiang Tang, Yuyu Wang
ASIACRYPT 2021, LNCS, vol 13091, pp.514-543.
[eprint]
[slide]
[code]
[video]
[springer]
- Fine-grained Secure Attribute-based Encryption
Yuyu Wang, Jiaxin Pan, Yu Chen
CRYPTO 2021, LNCS 12828, pp.179-207.
[video]
[springer]
- MPC-in-Multi-Heads: a Multi-Prover Zero-Knowledge Proof System (or: How to Jointly Prove Any NP Statements in ZK)
Hongrui Cui, Kaiyi Zhang, Yu Chen, Zhen Liu, Yu Yu
ESORICS 2021, LNCS, vol 12973, pp.332-351.
[video]
[springer]
2020
- PGC: Decentralized Confidential Payment System with Auditability
Yu Chen, Xuecheng Ma, Cong Tang, Man Ho Au
ESORICS 2020, LNCS 12308, pp.591-610. [eprint]
[slide]
[extended_slide]
[code]
[video]
[springer]
- Public-Key Authenticated Encryption with Keyword Search Revisited: Security Model and Constructions
Baodong Qin, Yu Chen, Qiong Huang, Ximeng Liu, Dong Zheng
Information Sciences, Vol.516, 2019, pp.515-528.
- Threshold Trapdoor Functions and Their Applications
Binbin Tu, Yu Chen, Xueli Wang
IET Information Security, 2020, Vol.14(2), pp.220-231.
[arxiv]
- A Survey of Threshold Cryptosystems
Binbin Tu, Yu Chen
Journal of Cryptologic Research (密码学报), 2020, Vol.7(1), pp.1-14.
[link]
2019
- Adding Linkability to Ring Signatures with One-Time Signatures
Xueli Wang, Yu Chen, Xuecheng Ma
ISC 2019, LNCS 11723, pp.445-464. [eprint]
- KDM Security for Identity-Based Encryption: Constructions and Separations
Yu Chen, Jiang Zhang, Yi Deng, Jinyong Chang
Information Sciences, Vol.486, 2019, pp.450-473
[eprint]
2018
- Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation
Yu Chen, Yuyu Wang, Hong-Sheng Zhou
ASIACRYPT 2018, LNCS 11273, pp.575-606 [eprint]
[slides]
- Regular Lossy Functions and Their Applications in Leakage-Resilient Cryptography
Yu Chen, Baodong Qin, Haiyang Xue
CT-RSA 2018, LNCS 10808, pp.491-511 [eprint]
[slides] (Extended version appears at Theoretical Computer Science 2018)
- Two Message Key Exchange with Strong Security from Ideal Lattices
Zheng Yang, Yu Chen, Song Luo
CT-RSA 2018, LNCS 10808, pp.98-115 [eprint]
[slides]
- On the Security of Classic Protocols for Unique Witness Relations
Yi Deng, Xuyang Song, Jingyue Yu, Yu Chen
PKC 2018, LNCS 10770, pp.589-615 [eprint]
2017
- From Attack on Feige-Shamir to Construction of Oblivious Transfer
Jingyue Yu, Yi Deng, Yu Chen
Inscrypt 2017
2016
- How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks
Baodong Qin, Shuai Han, Yu Chen, Shengli Liu, Zhuo Wei
Inscrypt 2016
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
Jiang Zhang, Yu Chen, Zhenfeng Zhang
CRYPTO 2016 [eprint]
- Non-Malleable Functions and Their Applications
Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow
PKC 2016 [eprint]
[slides]
- Generalized (Identity-Based) Hash Proof System and Its Applications
Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
Security and Communication Networks, 2016, Vol.9(12), pp.1698-1716.
[eprint]
- Generic Constructions of Integrated PKE and PEKS
Yu Chen, Jiang Zhang, Dongdai Lin, Zhenfeng Zhang
Designs, Codes and Cryptography, 2016, Vol.78(2), pp.493-526.
[eprint]
- Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Revisited and More
Yu Chen, Qiong Huang, Zongyang Zhang
International Journal of Information Security, 2016, Vol.15(1), pp.15-33.
[eprint]
- Publicly Evaluable Pseudorandom Functions and Their Applications
Yu Chen, Zongyang Zhang
Journal of Computer Security, 2016, Vol.24(2), pp.289-320.
[eprint]
2015
- Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model
Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao and Yunlei Zhao
Provsec 2015
2014
- Black-Box Separations for One-More (Static) CDH and Its Generalization
Jiang Zhang, Zhenfeng Zhang, Yu Chen, Yanfei Guo, Zongyang Zhang
ASIACRYPT 2014
[iacr archive]
- PRE: Stronger Security Notions and Efficient Construction with Non-Interactive Opening
Jiang Zhang, Zhenfeng Zhang, Yu Chen
Theoretical Computer Science, Vol. 542, 2014, pp. 1-16.
[eprint]
- Publicly Evaluable Pseudorandom Functions and Their Applications
Yu Chen, Zongyang Zhang
SCN 2014
- Sakai-Ohgishi-Kasahara Non-Interactive Identity-Based Key Exchange Scheme, Revisited
Yu Chen, Qiong Huang, Zongyang Zhang
ACISP 2014
- All-But-One Dual Projective Hashing and Its Applications
Zongyang Zhang, Yu Chen, Sherman S.M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao
ACNS 2014
- CCA-secure IB-KEM from Identity-Based Extractable Hash Proof System
Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
The Computer Journal, Vol.57(10), 2014, pp. 1537-1556
[eprint]
2013
- Reflections on the Security Proofs of Boneh-Franklin Identity-Based Encryption Scheme
Yu Chen, Liqun Chen, Dongdai Lin
Science China Mathematics (中国科学:数学), Vol.56 (7), 2013, pp. 1385-1401
2012
- Anonymous Identity-Based Hash Proof Systems and Their Applications
Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
Provsec 2012
- Identity-Based Extractable Hash Proof Systems and Their Applications
Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
ACNS 2012
- CCA-secure IB-KEM Based on the Computational Bilinear Diffie-Hellman Assumption
Yu Chen, Liqun Chen, Zongyang Zhang
ICISC 2012 [eprint]
- The n-Diffie-Hellman Problem and Multiple-Key Encryption
Liqun Chen, Yu Chen
International Journal of Information Security, Vol.11(5), 2012, pp. 305-320.
[eprint]
2011
- The n-Diffie-Hellman Problem and Its Applications
Liqun Chen, Yu Chen
ISC 2011 [pdf]
- A New Leakage-Resilient IBE Scheme in the Relative Leakage Model
Yu Chen, Song Luo, Zhong Chen
DBSec 2011 [pdf]
- A Novel Commutative Blinding Identity-Based Encryption Scheme
Yu Chen, Song Luo, Jianbin Hu, Zhong Chen
FPS 2011 [pdf]
- Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes
Yu Chen, Liqun Chen, Zhong Chen
ISPEC 2011 [eprint]
2010
- Twin Bilinear Diffie-Hellman Inversion Problem and Its Application
Yu Chen, Liqun Chen
ICISC 2011
- When ABE Meets RSS
Yu Chen, Hyun Sung Kim, Jianbin Hu, Zhong Chen
DBSec 2010
- Identity-Based Encryption Based on DHIES
Yu Chen, Manuel Charlemagne, Zhi Guan, Jianbin Hu, Zhong Chen
ASIACCS 2010
Manuscripts
- Verifiable Secret Sharing Based on Fully Batchable Polynomial Commitment
Xiangyu Kong, Min Zhang, Yu Chen
[eprint]
- k-out-of-n Proofs and Application to Privacy-Preserving Cryptocurrencies
Min Zhang, Yu Chen, Xiyuan Fu, Zhiying Cui
[eprint]
Professional Activities
- General PC Chair: Inscrypt 2021
- Program Committee: PKC 2025, Inscrypt (2014, 2018, 2019, 2022, 2024), Provsec (2016, 2024), CANS 2017, SSR 2024, ESORICS (2020, 2021, 2022)
- Reviewer: Asiacrypt (2012, 2013, 2016, 2017), PKC (2018, 2019)