Haifeng Qian

From MaRDI portal
(Redirected from Person:394923)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On the squares of LCD cyclic codes and their complements: study of several families and analyzing their parameters
IEEE Transactions on Information Theory
2025-01-23Paper
Public-key encryption with keyword search in multi-user, multi-challenge setting under adaptive corruptions2024-11-12Paper
Registered functional encryptions from pairings2024-11-12Paper
Improved unbounded inner-product functional encryption
Theoretical Computer Science
2024-10-07Paper
Registered ABE via predicate encodings2024-09-13Paper
Fine-grained polynomial functional encryption
Theoretical Computer Science
2024-08-27Paper
Parameters of squares of primitive narrow-sense BCH codes and their complements
IEEE Transactions on Information Theory
2024-07-18Paper
On Bose distance of a class of BCH codes with two types of designed distances
Designs, Codes and Cryptography
2024-06-28Paper
Parameters of several families of binary duadic codes and their related codes
Designs, Codes and Cryptography
2024-01-15Paper
Updatable all-but-one dual projective hashing and its applications2022-06-08Paper
On Hulls of Some Primitive BCH Codes and Self-Orthogonal Codes
IEEE Transactions on Information Theory
2022-02-17Paper
CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN
Theoretical Computer Science
2021-09-06Paper
Simple and efficient FE for quadratic functions
Designs, Codes and Cryptography
2021-08-02Paper
Simpler CCA secure PKE from LPN problem without double-trapdoor2021-01-18Paper
CCA secure multi-recipient KEM from LPN2021-01-18Paper
A post-quantum hybrid encryption based on QC-LDPC codes in the multi-user setting
Theoretical Computer Science
2020-08-17Paper
An encrypted database with enforced access control and blockchain validation2019-10-31Paper
Public key encryption with equality test via hash proof system
Theoretical Computer Science
2019-10-18Paper
Efficient public key encryption with equality test in the standard model
Theoretical Computer Science
2019-02-14Paper
Broadbeam for Massive MIMO Systems
IEEE Transactions on Signal Processing
2019-02-07Paper
More efficient CCA-secure identity-based dual receiver encryption2017-07-14Paper
An effective localization attack in location-based social network
Journal of East China Normal University. Natural Science Edition
2016-10-06Paper
Batch verifiable computation with public verifiability for outsourcing polynomials and matrix computations
Information Security and Privacy
2016-08-31Paper
Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption
Information Sciences
2016-07-11Paper
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model
Mathematical and Computer Modelling
2015-02-19Paper
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model
Information and Communications Security
2014-09-29Paper
Balanced \(2p\)-variable rotation symmetric Boolean functions with optimal algebraic immunity, good nonlinearity, and good algebraic degree
Journal of Mathematical Analysis and Applications
2014-01-28Paper
Constructing practical signcryption KEM from standard assumptions without random oracles
Applied Cryptography and Network Security
2014-01-24Paper
Tightly secure non-interactive multisignatures in the plain public key model2013-06-11Paper
Non-interactive multisignatures in the plain public-key model with efficient verification
Information Processing Letters
2013-04-04Paper
Pitfalls in identity based encryption using an elliptic curve combined public key
Applied Mathematics Letters
2012-08-30Paper
Fully-Secure and Practical Sanitizable Signatures
Information Security and Cryptology
2011-07-29Paper
Security analysis and improvement of digital multi-signature on the generalized conic curve2011-07-19Paper
Cryptanalysis and improvement of a block cipher based on multiple chaotic systems
Mathematical Problems in Engineering
2010-09-30Paper
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System
Security and Privacy in Mobile Information and Communication Systems
2010-04-24Paper
Adaptively secure threshold signature scheme in the standard model2010-01-21Paper
Stochastic Preconditioning for Diagonally Dominant Matrices
SIAM Journal on Scientific Computing
2009-05-28Paper
Efficient public key encryption with smallest ciphertext expansion from factoring
Designs, Codes and Cryptography
2009-03-31Paper
A Method and Its Implementation for Constructing Bäcklund Transformations to Nonlinear Evolution Equations
Computer Mathematics
2009-01-29Paper
A Practical Optimal Padding for Signature Schemes
Lecture Notes in Computer Science
2008-04-17Paper
Hybrid proxy multisignature: a new type multi-party signature
Information Sciences
2008-01-03Paper
Simulatability and security of certificateless threshold signatures
Information Sciences
2007-02-20Paper
A new threshold proxy signature scheme from bilinear pairings
Science in China. Series F
2007-02-20Paper
The braid-based bit commitment protocol
Journal of Shanghai Jiaotong University (Science)
2006-11-15Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper
Security of Pon-Lu-Jeng's Meta-He digital signature schemes
Applied Mathematics and Computation
2005-11-14Paper
scientific article; zbMATH DE number 2202168 (Why is no real title available?)2005-09-05Paper
Cryptanalysis of Li-Tzeng-Hwang's improved signature schemes based on factoring and discrete logarithms
Applied Mathematics and Computation
2005-08-05Paper
scientific article; zbMATH DE number 842025 (Why is no real title available?)1996-07-14Paper


Research outcomes over time


This page was built for person: Haifeng Qian