| Publication | Date of Publication | Type |
|---|
| Provably secure group authentication in the asynchronous communication model | 2024-04-19 | Paper |
Leakage-resilient identity-based cryptography from minimal assumptions Designs, Codes and Cryptography | 2023-11-07 | Paper |
An Efficient and Provably Secure Private Polynomial Evaluation Scheme Information Security Practice and Experience | 2023-06-30 | Paper |
Public-key encryption scheme with optimal continuous leakage resilience Information Processing Letters | 2023-01-30 | Paper |
Novel generic construction of leakage-resilient PKE scheme with CCA security Designs, Codes and Cryptography | 2021-06-24 | Paper |
| Improvement of attribute-based encryption using Blakley secret sharing | 2021-06-08 | Paper |
Cryptanalysis of Cramer-Shoup like cryptosystems based on index exchangeable family International Journal of Foundations of Computer Science | 2021-04-19 | Paper |
Efficient attribute-based encryption with attribute revocation for assured data deletion Information Sciences | 2020-10-07 | Paper |
Secure rational numbers equivalence test based on threshold cryptosystem with rational numbers Information Sciences | 2020-09-22 | Paper |
Witness-based searchable encryption Information Sciences | 2020-09-08 | Paper |
A construction of highly nonlinear Boolean functions with optimal algebraic immunity and low hardware implementation cost Discrete Applied Mathematics | 2020-08-31 | Paper |
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security Theoretical Computer Science | 2020-01-29 | Paper |
| Provably secure proactive secret sharing without the adjacent assumption | 2020-01-10 | Paper |
Novel updatable identity-based hash proof system and its applications Theoretical Computer Science | 2019-12-27 | Paper |
Novel identity-based hash proof system with compact master public key from lattices in the standard model International Journal of Foundations of Computer Science | 2019-12-10 | Paper |
Continuous leakage-resilient identity-based encryption with leakage amplification Designs, Codes and Cryptography | 2019-09-12 | Paper |
An alternative approach to public cloud data auditing supporting data dynamics Soft Computing | 2019-08-14 | Paper |
| scientific article; zbMATH DE number 7071594 (Why is no real title available?) | 2019-06-21 | Paper |
The generic construction of continuous leakage-resilient identity-based cryptosystems Theoretical Computer Science | 2019-05-17 | Paper |
| 基于身份的多接收者(多消息)匿名混合签密机制 | 2018-10-22 | Paper |
| Verifiable secret sharing based on hyperplane geometry with its applications to optimal resilient proactive cryptosystems | 2018-09-26 | Paper |
| Anonymous identity-based hash proof system from lattices in the standard model | 2018-09-26 | Paper |
| Secure certificateless signcryption scheme without bilinear pairing | 2018-07-18 | Paper |
Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing Information Processing Letters | 2017-11-22 | Paper |
Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures IEEE Transactions on Computers | 2017-07-12 | Paper |
Anonymous spatial encryption under affine space delegation functionality with full security Information Sciences | 2017-01-31 | Paper |
Secure and efficient roaming authentication protocol with controllable anonymity for heterogeneous wireless network Journal of Software | 2016-10-06 | Paper |
| scientific article; zbMATH DE number 6611931 (Why is no real title available?) | 2016-08-10 | Paper |
| scientific article; zbMATH DE number 6611934 (Why is no real title available?) | 2016-08-10 | Paper |
Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing Discrete Applied Mathematics | 2016-04-07 | Paper |
On security against the server in designated tester public key encryption with keyword search Information Processing Letters | 2015-09-15 | Paper |
Effective error-tolerant keyword search for secure cloud computing Journal of Computer Science and Technology | 2014-10-07 | Paper |
Constructions of balanced Boolean functions with high nonlinearity and high algebraic degree International Journal of Computer Mathematics | 2014-05-20 | Paper |
A secure scalar product protocol against malicious adversaries Journal of Computer Science and Technology | 2014-02-11 | Paper |
| A ciphertext-based proxy secure two-party computation protocol | 2013-06-20 | Paper |
LR-UESDE: a continual-leakage resilient encryption with unbounded extensible set delegation Provable Security | 2012-11-06 | Paper |
Group-oriented setting's multisigncryption scheme with threshold designcryption Information Sciences | 2012-07-13 | Paper |
Anonymous encryption with partial-order subset delegation functionality Provable Security | 2011-09-16 | Paper |
Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem Provable Security | 2009-01-27 | Paper |
A potential approach of internet worm propagation based on P2P Wuhan University Journal of Natural Sciences | 2007-06-01 | Paper |
| scientific article; zbMATH DE number 2080673 (Why is no real title available?) | 2004-08-04 | Paper |