Yi Mu (穆怡)

Professor


Selected Publications:

  1. Fuchun Guo, Willy Susilo and Yi Mu, Introduction to Security Reduction, Springer, pp. 1-253, 2018

  2. Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, and Yi Mu, "Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample", CRYPTO 2017, Lecture Notes in Computer Science 10402, Springer, pp. 517-547, 2017.

  3. Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, and Mingwu Zhang, ``Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions", ASIACRYPT 2016, Lecture Notes in Computer Science 10031, Springer, pp.844-876, 2016

  4. Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, and Guomin Yang, ``Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction", ASIACRYPT 2016, Lecture Notes in Computer Science 10031, Springer, pp.745-776, 2016

  5. Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, ``Strongly Leakage-Resilient Authenticated Key Exchange", Lecture Notes in Computer Science 9610, CT-RSA 2016, pp.19-36, 2016.

  6. Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, and Man-Ho Au. ``PPDCP-ABE: privacy-preserving decentralized cipher-policy attribute-based encryption", European Symposium on Research in Computer Security (ESORICS 2014), pp.73-90.

  7. Fuchun Guo, Yi Mu and Willy Susilo, ``Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext", 17th European Symposium on Research in Computer Security (ESORICS 2012), Lecture Notes in Computer Science 7459, Springer Verlag, 2012, pp. 609-626.

  8. Mohammad Reza Reyhanitabar, Willy Susilo, and Yi Mu, ``Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships", Fast Software Encryption (FSE 2010), Lecture Notes in Computer Science 6147, Springer Verlag, 2010, pp. 192-211.

  9. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Yang Xiao, ``Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting", The 13th International Conference on Practice and Theory in Public Key Cryptography (PKC 2010), Lecture Notes in Computer Science 6056, 2010, pp.124-141.

  10. Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Yi Mu, Kwangjo Kim. ``Three-round Abuse-free Optimistic Contract Signing With Everlasting Secrecy", Financial Cryptography and Data Security (FC 2010), Lecture Notes in Computer Science 6052, Springer Verlag, 2010, pp. 304-311.

  11. Qianhong Wu, Yi Mu, Willy Susilo, Josep Domingo, and Qin Bo, ``Asymmetric Group Key Agreement", Advances in Cryptology - EUROCRYPT 2009, Lecture Notes in Computer Science 5479, Springer Verlag, pp153-170

  12. Mohammad Reza Reyhanitabar, Willy Susilo, and Yi Mu, ``Enhanced Target Collision Resistant Hash Functions Revisited", Fast Software Encryption (FSE 2009), Lecture Notes in Computer Science 5665, Springer Verlag, pp. 327-344.

  13. Man Ho Au and Patrick P. Tsang and Willy Susilo and Yi Mu, ``Dynamic Multiversal Accumulators and Their Application to Attribute-Based Anonymous Credential Systems", CT-RSA 2009, Lecture Notes in Computer Science 5473, Springer Verlag, pp. 295-308.

  14. Ching Yu Ng, Willy Susilo, Yi Mu, and Rei Safavi-Naini, ``New Privacy Results on Synchronized RFID Authentication Protocols Against Tag Tracing", 14th European Symposium on Research in Computer Security (ESORICS 2008), Lecture Notes in Computer Science, Springer Verlag, 2009, pp. 321-336.

  15. Ching Yu Ng, Willy Susilo, Yi Mu, and Rei Safavi-Naini, `` RFID Privacy Models Revisited", 13th European Symposium on Research in Computer Security (ESORICS 2008), Lecture Notes in Computer Science 5283, Springer Verlag, 2008, pp.251-266.

  16. Fuchun Guo, Yi Mu, and Zhide Chen, ``Identity-Based Online/Offline Encryption", Financial Cryptography and Data Security (FC 2008), Lecture Notes in Computer Science 5143, Springer Verlag, 2008, pp.247-261.

  17. Man Ho Au, Willy Susilo, and Yi Mu, ``Practical Anonymous Divisible E-Cash From Bounded Accumulators", Financial Cryptography and Data Security (FC 2008), Lecture Notes in Computer Science 5143, Springer Verlag, 2008, pp.287-301.

  18. Man Ho Au, Qianhong Wu, Willy Susilo and Yi Mu, ``Compact E-Cash from Bounded Accumulator", RSA Conference 2007, Cryptographers' Track (CT-RSA 2007), Lecture Notes in Computer Science, Springer-Verlag, 2007, pp. 178-195.

  19. Huafei Zhu, Willy Susilo and Yi Mu. ``Multi-party stand-alone and setup-free verifiably committed signatures", International Conference on Theory and Practice of Public-Key Cryptography 2007 (PKC 2007), Lecture Notes in Computer Science 4450, Springer Verlag, 2007, pp. 134-149

  20. Fangguo Zhang, Willy Susilo, Yi Mu. ``Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures)", Financial Cryptography (FC 2005), Lecture Notes in Computer Science (LNCS 3570), pp.45-56

  21. Yi Mu, Vijay Varadharajan, "Anonymous secure e-voting over a network," The 14th Annual Computer Security Applications Conference, ACSAC 1998, IEEE, pp. 293-299

  22. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan, "Micro-digital money for electronic commerce", The 13th Annual Computer Security Applications Conference, ACSAC 1997, pp.2-8

  23. Yi Mu, Jennifer Seberry, and Yuliang Zheng, "Shared cryptographic bits via quantized quadrature phase amplitudes of light", Journal of Optics Communications, Vol 123, pp. 344-352, 1996.

  24. Yi Mu and Craig M. Savage, ``One-atom lasers", Physical Review A, 46, 5944 (1992)

Some other papers:

  1. Ke Huang, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha, Xiaojiang Du, Nadra Guizani, Achieving Intelligent Trust-Layer for IoT via Self-Redactable Blockchain, IEEE Transactions on Industrial Informatics, 2019

  2. Yi Mu, Fatemeh Rezaeibagha, Ke Huang, Policy-Driven Blockchain and Its Applications for Transport Systems, IEEE Transactions on Services Computing, 2019

  3. Anmin Fu, Zhenzhu Chen, Yi Mu, Willy Susilo, Yinxia Sun, Jie Wu, Cloud-based Outsourcing for Enabling Privacy-Preserving Large-scale Non-Negative Matrix Factorization, IEEE Transactions on Services Computing, 2019

  4. Tong Wu, Guomin Yang, Yi Mu, Fuchun Guo, Robert Deng, Privacy-Preserving Proof of Storage for the Pay-As-You-Go Business Model, IEEE Transactions on Dependable and Secure Computing, 2019

  5. Yanwei Zhou, Bo Yang, Yi Mu, Continuous leakage-resilient identity-based encryption with leakage amplification, Designs, Codes and Cryptography, 2019

  6. Guomin Yang, Rongmao Chen, Yi Mu, Willy Susilo, Fuchun Guo, Jie Li, Strongly leakage resilient authenticated key exchange, revisited, Designs, Codes and Cryptography, pp.1-27, 2019

  7. Ke Huang, Xiaosong Zhang, Yi Mu, Xiaofen Wang, Guomin Yang, Xiaojiang Du, Fatemeh Rezaeibagha, Qi Xia, Mohsen Guizani, Building Redactable Consortium Blockchain for Industrial Internet-of-Things, IEEE Transactions on Industrial Informatics 15 (6), 3670-3679, 2019

  8. Shengmin Xu, Guomin Yang, Yi Mu, Robert H. Deng: Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud. IEEE Trans. Information Forensics and Security 13(8): 2101-2113 (2018)

  9. Xueqiao Liu, Guomin Yang, Yi Mu, Robert Deng: Multi-user Verifiable Searchable Symmetric En- cryption for Cloud Storage, IEEE Transactions on Dependable and Secure Computing, DOI: 10.1109/TDSC.2018.2876831

  10. Ming Tang, Zhenlong Qiu, Zhipeng Guo, Yi Mu, Xinyi Huang, Jean-Luc Danger: A Generic Table Recomputation-Based Higher-Order Masking. IEEE Trans. on CAD of Integrated Circuits and Systems 36(11): 1779-1789 (2017)

  11. Fuchun Guo, Yi Mu, Willy Susilo, Homer Hsing, Duncan S. Wong, Vijay Varadharajan: Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices. IEEE Trans. Dependable Sec. Comput. 14(2): 211-220 (2017)

  12. Yuan Zhang, Chunxiang Xu, Xiaohui Liang, Hongwei Li, Yi Mu, Xiaojun Zhang: Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation. IEEE Trans. Information Forensics and Security 12(3): 676-688 (2017)

  13. Willy Susilo, Peng Jiang, Fuchun Guo, Guomin Yang, Yong Yu, Yi Mu: EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud. IEEE Trans. Information Forensics and Security 12(12): 3110-3122 (2017)

  14. Runhua Shi, Yi Mu, Hong Zhong, Jie Cui, Shun Zhang: Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query. Quantum Information Processing 16(1): 8 (2017)

  15. Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo: Strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptography 85(1): 145-173 (2017)

  16. Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Zheng Yang: A note on the strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptography 85(1): 175-178 (2017)

  17. Fuchun Guo, Willy Susilo, Yi Mu: Distance-Based Encryption: How to Embed Fuzziness in Biometric- Based Encryption. IEEE Trans. Information Forensics and Security 11(2): 247-257 (2016)

  18. Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xiaofen Wang: Dual-Server Public-Key Encryp- tion With Keyword Search for Secure Cloud Storage. IEEE Trans. Information Forensics and Security 11(4): 789-798 (2016)

  19. Xiaofen Wang, Yi Mu, Rongmao Chen: One-Round Privacy-Preserving Meeting Location Determina- tion for Smartphone Applications. IEEE Trans. Information Forensics and Security 11(8): 1712-1721 (2016)

  20. Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xinyi Huang, Xiaofen Wang, Yongjun Wang: Server-Aided Public Key Encryption With Keyword Search. IEEE Trans. Information Forensics and Security 11(12): 2833-2842 (2016)

  21. Fuchun Guo, Willy Susilo, Yi Mu: Generalized closest substring encryption. Des. Codes Cryptography 80(1): 103-124 (2016)

  22. Xixiang Lv, Yi Mu, Hui Li: Loss-Tolerant Bundle Fragment Authentication for Space-Based DTNs. IEEE Trans. Dependable Sec. Comput. 12(6): 615-625 (2015)

  23. Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, Man Ho Allen Au: Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption. IEEE Trans. Information Forensics and Security 10(3): 665-678 (2015)

  24. Jinguang Han, Willy Susilo, Yi Mu, Man Ho Au, Jie Cao: AAC-OT: Accountable Oblivious Transfer With Access Control. IEEE Trans. Information Forensics and Security 10(12): 2502-2514 (2015)

  25. Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo: BL-MLE: Block-Level Message-Locked Encryp- tion for Secure Large File Deduplication. IEEE Trans. Information Forensics and Security 10(12): 2643-2652 (2015)

  26. Fuchun Guo, Yi Mu, Willy Susilo, Duncan Wong and Vijay Varadharajan, “CP-ABE with Constant- Size Keys for Lightweight Devices,” IEEE Transactions on Information Forensics & Security, 9(5), pp. 763-771, 2014

  27. Xixiang Lv, Yi Mu and Hui Li, “Non-interactive Key Establishment for Bundle Security Protocol of Space DTNs,” IEEE Transactions on Information Forensics & Security, Vol. 9, No. 1, Jan. 2014, pp. 5-13

  28. Jianbing Ni, Yong Yu and Yi Mu, “On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage,” IEEE Transactions on the Transactions on Parallel and Distributed Systems, 25(10), pp.2760-2761 (2014)

  29. Jinguang Han, Willy Susilo and Yi Mu, “Identity-Based Secure Distributed Data Storage Schemes,” IEEE Transactions on Computers, 520, pp. 51-61, 2014.

  30. Jiangshan Yu, Guilin Wang, Yi Mu and Wei Gao, “An Efficient Generic Framework for Three-Factor Authentication with Provably Secure Instantiation,” IEEE Transactions on Information Forensics & Security, 9(12), pp.2302-2313 (2014)

  31. Fuchun Guo, Yi Mu and Willy Susilo, “Subset Membership Encryption and Its Applications to Obliv- ious Transfer,” IEEE Transactions on Information Forensics & Security, 9(7), pp. 1098-1107 (2014)

  32. Jinguang Han, Willy Susilo, Yi Mu, and Jun Yan, “Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 11, 2012, pp. 2150-2162.

  33. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Jianying Zhou, and Robert H. Deng, “Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures,” IEEE Transactions on Forensics and Security, 6(2): pp. 498-512 (2011)