| Publication | Date of Publication | Type |
|---|
| An efficient privacy-preserving scheme for weak password collection in Internet of Things | 2024-07-19 | Paper |
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles Science China Information Sciences | 2022-10-28 | Paper |
Certificateless identity-concealed authenticated encryption under multi-KGC Information Security and Cryptology | 2022-10-14 | Paper |
| Blockchain-based efficient public integrity auditing for cloud storage against malicious auditors | 2021-12-08 | Paper |
CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN Theoretical Computer Science | 2021-09-06 | Paper |
Attribute-based proxy re-encryption from standard lattices Theoretical Computer Science | 2021-04-08 | Paper |
Functional broadcast encryption with applications to data sharing for cloud storage Information Sciences | 2021-02-04 | Paper |
A more efficient leveled strongly-unforgeable fully homomorphic signature scheme Information Sciences | 2020-10-07 | Paper |
Access control encryption with efficient verifiable sanitized decryption Information Sciences | 2020-09-22 | Paper |
Insight of the protection for data security under selective opening attacks Information Sciences | 2020-07-02 | Paper |
A new identification algorithm Cryptography: Policy and Algorithms | 2019-10-10 | Paper |
| scientific article; zbMATH DE number 7108581 (Why is no real title available?) | 2019-09-20 | Paper |
| Revocable identity-based encryption from the computational Diffie-Hellman problem | 2018-09-26 | Paper |
| On the linear span of the extended WG sequences | 2017-01-06 | Paper |
Attribute-based key-insulated signature and its applications Information Sciences | 2016-07-11 | Paper |
Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext Science China Information Sciences | 2015-11-20 | Paper |
Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited International Journal of Applied Mathematics and Computer Science | 2015-10-16 | Paper |
Continuous non-malleable key derivation and its application to related-key security Lecture Notes in Computer Science | 2015-08-27 | Paper |
| Homomorphic linear authentication schemes from \(\varepsilon\)-ASU\(_2\) functions for proofs of retrievability | 2015-08-10 | Paper |
Optimal assignment schemes for general access structures based on linear programming Designs, Codes and Cryptography | 2015-03-12 | Paper |
An efficient threshold key-insulated signature scheme Journal of Shanghai Jiaotong University (Science) | 2014-03-27 | Paper |
| Identity-based key-insulated signcryption | 2013-04-30 | Paper |
Annihilators of fast discrete Fourier spectra attacks Advances in Information and Computer Security | 2013-04-04 | Paper |
A generic construction of accountable decryption and its applications Information Security and Privacy | 2012-09-07 | Paper |
Attack based on direct sum decomposition against the nonlinear filter generator Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
Transitive signature scheme from LFSR JISE. Journal of Information Science and Engineering | 2012-05-30 | Paper |
| Cryptographic protocol. Security analysis based on trusted freshness. | 2011-11-21 | Paper |
| Security analysis of cryptographic protocols based on fine-grained freshness | 2011-09-29 | Paper |
Self-generated-certificate public key encryption without pairing and its application Information Sciences | 2011-06-22 | Paper |
Key updating technique in identity-based encryption Information Sciences | 2011-06-22 | Paper |
Lightweight delegated subset test with privacy protection Information Security Practice and Experience | 2011-05-19 | Paper |
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings Information Sciences | 2011-01-28 | Paper |
Some remarks on the TKIP key mixing function of IEEE 802.11i Journal of Shanghai Jiaotong University (Science) | 2011-01-05 | Paper |
Distributed certificateless key encapsulation mechanism secure against the adaptive adversary Journal of Shanghai Jiaotong University (Science) | 2011-01-05 | Paper |
A universal composability framework for analysis of proxy threshold signature Journal of Shanghai Jiaotong University (Science) | 2011-01-05 | Paper |
Formal analysis of authentication in 802.11i Journal of Shanghai Jiaotong University (Science) | 2011-01-05 | Paper |
| Analysis and improvements of two identity-based perfect concurrent signature schemes | 2010-10-29 | Paper |
Building representative-based data aggregation tree in wireless sensor networks Mathematical Problems in Engineering | 2010-04-23 | Paper |
Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism Information Sciences | 2010-03-11 | Paper |
Identity-Based Strong Key-Insulated Signature Without Random Oracles Journal of Software | 2010-02-12 | Paper |
A tabu search approach for the minimum sum-of-squares clustering problem Information Sciences | 2009-10-30 | Paper |
Democratic group signatures with collective traceability Computers and Electrical Engineering | 2009-10-15 | Paper |
Filling the gap between voters and cryptography in e-voting Journal of Shanghai Jiaotong University (Science) | 2009-06-30 | Paper |
A synthetic indifferentiability analysis of some block-cipher-based hash functions Designs, Codes and Cryptography | 2009-03-31 | Paper |
| A reliable pairwise key-updating scheme for sensor networks | 2009-03-06 | Paper |
A Tamper-Evident Voting Machine Resistant to Covert Channels Provable Security | 2009-01-27 | Paper |
Identity-Based Key-Insulated Signature with Secure Key-Updates Information Security and Cryptology | 2009-01-15 | Paper |
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings Cryptology and Network Security | 2009-01-09 | Paper |
Some New Characters on the Wire-Tap Channel of Type II IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Identity-Based Threshold Key-Insulated Encryption without Random Oracles Topics in Cryptology – CT-RSA 2008 | 2008-04-24 | Paper |
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
Certificateless threshold cryptosystem secure against chosen-ciphertext attack Information Sciences | 2008-01-03 | Paper |
Pirate decoder for the broadcast encryption schemes from Crypto 2005 Science in China. Series F | 2007-10-12 | Paper |
| Provably secure convertible user designating confirmer partially blind signatures | 2007-09-18 | Paper |
Efficient Partially Blind Signature Scheme with Provable Security Lecture Notes in Computer Science | 2007-09-10 | Paper |
ID-based threshold decryption secure against adaptive chosen-ciphertext attack Computers and Electrical Engineering | 2007-06-08 | Paper |
Trust based pervasive computing Wuhan University Journal of Natural Sciences | 2007-06-01 | Paper |
A generic solution to realize public verifiability of signcryption Wuhan University Journal of Natural Sciences | 2007-06-01 | Paper |
| Adaptive chosen ciphertext secure threshold key escrow scheme from pairing | 2007-04-05 | Paper |
On the orders of transformation matrices (mod \(n\)) and two types of generalized Arnold transformation matrices Science in China. Series F | 2007-02-20 | Paper |
Optimistic fair exchange e-commerce protocol based on secret sharing Journal of Systems Engineering and Electronics | 2007-02-14 | Paper |
Verifiable encrypted signatures without random oracles Journal of Shanghai Jiaotong University (Science) | 2006-11-15 | Paper |
ID-based threshold decryption secure against chosen plaintext attack Journal of Shanghai Jiaotong University (Science) | 2006-11-15 | Paper |
Buffer overflow detection on binary code Journal of Shanghai Jiaotong University (Science) | 2006-11-15 | Paper |
How to play E-lottery games via voting Journal of Shanghai Jiaotong University (Science) | 2006-11-15 | Paper |
Cryptology and Network Security Lecture Notes in Computer Science | 2006-11-14 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2006-10-24 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-20 | Paper |
A provably secure asynchronous proactive RSA scheme Journal of Shanghai Jiaotong University (Science) | 2006-10-04 | Paper |
A dynamic threshold commercial key escrow scheme based on conic Applied Mathematics and Computation | 2006-05-18 | Paper |
ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings Applied Mathematics and Computation | 2005-11-16 | Paper |
Identity oriented signature scheme based on quadratic residues Applied Mathematics and Computation | 2005-11-04 | Paper |
| scientific article; zbMATH DE number 2222201 (Why is no real title available?) | 2005-11-02 | Paper |
| scientific article; zbMATH DE number 2222192 (Why is no real title available?) | 2005-11-02 | Paper |
| scientific article; zbMATH DE number 2222200 (Why is no real title available?) | 2005-11-02 | Paper |
| scientific article; zbMATH DE number 2222198 (Why is no real title available?) | 2005-11-02 | Paper |
| scientific article; zbMATH DE number 2222188 (Why is no real title available?) | 2005-11-02 | Paper |
| scientific article; zbMATH DE number 2222202 (Why is no real title available?) | 2005-11-02 | Paper |
Multiparty authentication services and key agreement protocols with semi-trusted third party. Journal of Computer Science and Technology | 2004-07-01 | Paper |
| scientific article; zbMATH DE number 2043318 (Why is no real title available?) | 2004-02-16 | Paper |
| scientific article; zbMATH DE number 1941237 (Why is no real title available?) | 2003-06-29 | Paper |
| scientific article; zbMATH DE number 1930142 (Why is no real title available?) | 2003-06-18 | Paper |
| scientific article; zbMATH DE number 1021808 (Why is no real title available?) | 1997-12-15 | Paper |
On the Non - Existence of Perfect Codes with Rank Distance Mathematische Nachrichten | 1996-11-18 | Paper |
| scientific article; zbMATH DE number 789825 (Why is no real title available?) | 1995-08-23 | Paper |