Debiao He

From MaRDI portal
Person:356083

Available identifiers

zbMath Open he.debiaoDBLP87/7765WikidataQ51105870 ScholiaQ51105870MaRDI QIDQ356083

List of research outcomes





PublicationDate of PublicationType
Parameter-hiding order-revealing encryption without pairings2024-11-12Paper
Traceable ring signatures from group actions: logarithmic, flexible, and quantum resistant2024-10-16Paper
Further investigations on nonlinear complexity of periodic binary sequences2024-07-23Paper
On the Niho Type Locally-APN Power Functions and Their Boomerang Spectrum2024-03-21Paper
A practical NIZK argument for confidential transactions over account-model blockchain2023-03-21Paper
An efficient blind signature scheme based on SM2 signature algorithm2021-12-08Paper
An identity-based blind signature scheme using lattice with provable security2021-05-14Paper
Blockchain-based system for secure outsourcing of bilinear pairings2021-04-19Paper
Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks2019-12-10Paper
Improved secure fuzzy auditing protocol for cloud data storage2019-08-12Paper
Privacy-preserving certificateless provable data possession scheme for big data storage on cloud2019-04-29Paper
An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage2018-11-27Paper
Attribute-based fuzzy identity access control in multicloud computing environments2018-10-23Paper
Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps2018-10-22Paper
Provable secure and efficient digital rights management authentication scheme using smart card based on elliptic curve cryptography2018-08-27Paper
https://portal.mardi4nfdi.de/entity/Q46407532018-05-25Paper
A general compiler for password-authenticated group key exchange protocol in the standard model2018-04-10Paper
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing2018-03-07Paper
Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing2018-02-27Paper
Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry2016-09-02Paper
Proxy Provable Data Possession with General Access Structure in Public Clouds2016-07-25Paper
Insecurity of an efficient certificateless aggregate signature with constant pairing computations2016-07-08Paper
An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments2014-10-07Paper
An efficient certificateless proxy signature scheme without pairing2014-05-14Paper
An efficient certificateless two-party authenticated key agreement protocol2013-07-25Paper
An efficient identity-based blind signature scheme without bilinear pairings2013-05-31Paper
Note on: ``Design of improved password authentication and update scheme based on elliptic curve cryptography2013-01-27Paper
Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol2013-01-04Paper
Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol2012-11-15Paper
A new two-round certificateless authenticated key agreement protocol without bilinear pairings2012-04-15Paper
On Diophantine equation \(3a^2x^4 - By^2 = 1\)2010-10-26Paper
https://portal.mardi4nfdi.de/entity/Q34032342010-02-12Paper

Research outcomes over time

This page was built for person: Debiao He