Baocang Wang

From MaRDI portal
(Redirected from Person:352089)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A refined hardness estimation of LWE in two-step mode2024-11-12Paper
Lattice-based threshold, accountable, and private signature2024-11-12Paper
Hardness of (M)LWE with semi-uniform seeds
Theoretical Computer Science
2024-03-28Paper
Constructions of several special classes of cubic bent functions outside the completed Maiorana-McFarland class
Information and Computation
2024-03-27Paper
Group public key encryption supporting equality test without bilinear pairings
Information Sciences
2024-03-07Paper
MDOPE: efficient multi-dimensional data order preserving encryption scheme
Information Sciences
2024-02-28Paper
Toward practical privacy-preserving linear regression
Information Sciences
2024-02-28Paper
A polynomial system for bit-based division property solving by quantum algorithm
Quantum Information Processing
2024-01-25Paper
Hiding the input-size in multi-party private set intersection
Designs, Codes and Cryptography
2023-09-07Paper
Allocating rotational cryptanalysis-based preimage attack on 4-round \textsc{Keccak}-224 for quantum setting
Quantum Information Processing
2023-06-13Paper
Improved key-recovery attacks on reduced-round WEM-8
Designs, Codes and Cryptography
2022-09-22Paper
Lattice-based linearly homomorphic signature scheme over binary field
Science China Information Sciences
2021-12-15Paper
Accountable identity-based encryption with distributed private key generators
Information Sciences
2021-03-16Paper
A key-sharing based secure deduplication scheme in cloud storage
Information Sciences
2021-02-05Paper
D-NTRU: more efficient and average-case IND-CPA secure NTRU variant
Information Sciences
2020-09-08Paper
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts
Theoretical Computer Science
2020-01-29Paper
Algebraic attacks against several weak variants of GVW'13 ABE
International Journal of Foundations of Computer Science
2019-12-10Paper
Signature scheme using the root extraction problem on quaternions
Journal of Applied Mathematics
2019-11-19Paper
Improved secure fuzzy auditing protocol for cloud data storage
Soft Computing
2019-08-12Paper
Preimage selective trapdoor function: how to repair an easy problem
Mathematical Problems in Engineering
2019-02-08Paper
Lattice-based certificateless encryption scheme
Frontiers of Computer Science
2018-12-19Paper
Sieve method for polynomial linear equivalence
Journal of Applied Mathematics
2018-10-10Paper
Identity-based blind signature from lattices
Wuhan University Journal of Natural Sciences
2018-05-25Paper
An Improved Secure Cloud Storage Auditing Protocol Based on Distributed String Equality Checking
Fundamenta Informaticae
2018-05-03Paper
Identity-based blind signature from lattices in standard model
Information Security and Cryptology
2017-05-05Paper
The termination of the F5 algorithm revisited
Proceedings of the 38th International Symposium on Symbolic and Algebraic Computation
2017-02-10Paper
Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model
Frontiers of Computer Science
2015-11-20Paper
Authenticated asymmetric group key agreement based on certificateless cryptosystem
International Journal of Computer Mathematics
2014-08-14Paper
Identity-based key distribution for mobile ad hoc networks
Frontiers of Computer Science in China
2013-07-04Paper
Key exchange schemes using finite non-abelian groups2013-06-20Paper
A fast public key cryptosystem based on matrix rings2013-06-20Paper
Group key agreement for secure group communication in dynamic peer systems
Journal of Parallel and Distributed Computing
2012-10-23Paper
The Termination of Algorithms for Computing Gr\"{o}bner Bases2012-02-16Paper
A digital signature scheme based on the root extraction problem on a matrix ring2012-01-27Paper
scientific article; zbMATH DE number 5973815 (Why is no real title available?)2011-11-17Paper
Quadratic compact knapsack public-key cryptosystem
Computers & Mathematics with Applications
2010-06-28Paper
NTRUSign With a New Perturbation
IEEE Transactions on Information Theory
2009-02-24Paper
A knapsack-based probabilistic encryption scheme
Information Sciences
2007-10-10Paper
New weak keys in RSA
Wuhan University Journal of Natural Sciences
2007-06-01Paper


Research outcomes over time


This page was built for person: Baocang Wang