| Publication | Date of Publication | Type |
|---|
| Lion: a new ring signature construction from lattice gadget | 2026-03-11 | Paper |
| Conditional attribute-based encryption with keyword search for pay-per-query commercial model | 2026-03-11 | Paper |
Efficient revocable identity-based encryption with equality test International Journal of Applied Cryptography | 2025-05-14 | Paper |
| Public-key encryption with keyword search in multi-user, multi-challenge setting under adaptive corruptions | 2024-11-12 | Paper |
Verifiable multi-party quantum secret sharing based on GHZ states International Journal of Quantum Information | 2024-07-29 | Paper |
| Forward secure online/offline key policy attribute-based encryption with keyword search | 2024-07-19 | Paper |
| Public key authenticated encryption with keyword search improved: strong security model and multi-keyword construction | 2024-07-17 | Paper |
Secure three-party quantum summation based on W-class states International Journal of Theoretical Physics | 2024-07-10 | Paper |
Numerical analysis of temporal second-order accurate scheme for the abstract Volterra integrodifferential equation Mathematical Methods in the Applied Sciences | 2024-05-24 | Paper |
Controllable forward secure identity-based encryption with equality test in privacy-preserving text similarity analysis Information Sciences | 2024-03-20 | Paper |
A fully secure lattice-based signcryption with designated equality test in standard model Information Sciences | 2024-02-13 | Paper |
A novel quantum private set intersection scheme with a semi-honest third party Quantum Information Processing | 2024-01-16 | Paper |
Hierarchical identity-based inner product functional encryption Information Sciences | 2023-12-11 | Paper |
Abelian Hearts of Twin Cotorsion Pairs on Extriangulated Categories Algebra Colloquium | 2023-09-08 | Paper |
\textit{CCOM}: cost-efficient and collusion-resistant oracle mechanism for smart contracts Information Security and Privacy | 2023-07-26 | Paper |
High-order orthogonal spline collocation ADI scheme for a new complex two-dimensional distributed-order fractional integro-differential equation with two weakly singular kernels International Journal of Computer Mathematics | 2023-07-03 | Paper |
| A CCA-full-anonymous group signature with verifiable controllable linkability in the standard model | 2023-04-13 | Paper |
| Public key encryption with fuzzy matching | 2023-04-13 | Paper |
| Broadcast Authenticated Encryption with Keyword Search | 2023-04-13 | Paper |
The efficient alternating direction implicit Galerkin method for the nonlocal diffusion-wave equation in three dimensions Journal of Applied Mathematics and Computing | 2022-10-06 | Paper |
A novel identity-based multi-signature scheme over NTRU lattices Theoretical Computer Science | 2022-09-27 | Paper |
| Plaintext-checkable encryption with unlink-CCA security in the standard model | 2022-08-30 | Paper |
A novel certificateless multi-signature scheme over NTRU lattices Information Security Practice and Experience | 2022-08-11 | Paper |
Privacy-preserving polynomial interpolation and its applications on predictive analysis Information Sciences | 2021-11-30 | Paper |
Secure three-party semi-quantum summation using single photons International Journal of Theoretical Physics | 2021-11-05 | Paper |
Public-key authenticated encryption with keyword search revisited: security model and constructions Information Sciences | 2021-03-31 | Paper |
Leakage-resilient group signature: definitions and constructions Information Sciences | 2021-03-18 | Paper |
Group public key encryption with equality test against offline message recovery attack Information Sciences | 2021-03-18 | Paper |
On \(\overline{\mathscr C}\)-extensions and balanced pairs Communications in Algebra | 2020-09-03 | Paper |
| 切换正系统的渐近稳定性、L1增益及时变H∞控制 | 2020-08-12 | Paper |
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes Information Sciences | 2020-07-20 | Paper |
Black-box constructions of signature schemes in the bounded leakage setting Information Sciences | 2020-07-16 | Paper |
| Group ID-based encryption with equality test | 2020-05-27 | Paper |
An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks Information Sciences | 2020-02-07 | Paper |
| Plaintext-verifiably-checkable encryption | 2020-01-10 | Paper |
| Towards enhanced security for certificateless public-key authenticated encryption with keyword search | 2020-01-10 | Paper |
Multi-party quantum summation with a single \(d\)-level quantum system International Journal of Quantum Information | 2019-11-06 | Paper |
| Outsourced ciphertext-policy attribute-based encryption with equality test | 2019-10-31 | Paper |
Control of the fractional-order Chen chaotic system via fractional-order scalar controller and its circuit implementation Mathematical Problems in Engineering | 2019-02-08 | Paper |
Leakage-resilient ring signature schemes Theoretical Computer Science | 2019-01-18 | Paper |
How to protect privacy in optimistic fair exchange of digital signatures Information Sciences | 2018-05-18 | Paper |
A black-box construction of strongly unforgeable signature scheme in the leakage setting International Journal of Foundations of Computer Science | 2018-02-23 | Paper |
Multi-party quantum summation without a trusted third party based on single particles International Journal of Quantum Information | 2017-10-20 | Paper |
Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures IEEE Transactions on Computers | 2017-07-12 | Paper |
| Subnormal subgroups and supersolvability of finite groups | 2017-05-17 | Paper |
A black-box construction of strongly unforgeable signature schemes in the bounded leakage model Provable Security | 2017-01-06 | Paper |
Subnormal subgroups and p-super solvability of finite groups Journal of Chongqing Normal University. Natural Science | 2016-10-06 | Paper |
Ambiguous one-move nominative signature without random oracles Information Security and Cryptology -- ICISC 2013 | 2015-10-16 | Paper |
Ambiguous optimistic fair exchange: definition and constructions Theoretical Computer Science | 2014-12-02 | Paper |
Concurrent signature without random oracles Theoretical Computer Science | 2014-12-02 | Paper |
Extending concurrent signature to multiple parties Theoretical Computer Science | 2014-08-27 | Paper |
The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles Information Sciences | 2014-08-01 | Paper |
Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange scheme. Revisited Information Security and Privacy | 2014-07-24 | Paper |
New delay-dependent stability analysis for fuzzy time-delay interconnected systems International Journal of General Systems | 2014-04-15 | Paper |
P^2OFE: privacy-preserving optimistic fair exchange of digital signatures Topics in Cryptology – CT-RSA 2014 | 2014-03-28 | Paper |
Short and efficient convertible undeniable signature schemes without random oracles Theoretical Computer Science | 2013-04-17 | Paper |
The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Group-oriented fair exchange of signatures Information Sciences | 2012-07-13 | Paper |
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles Computer Security – ESORICS 2011 | 2011-11-22 | Paper |
Concurrent signatures with fully negotiable binding control Provable Security | 2011-09-16 | Paper |
Short Convertible Undeniable Signature in the Standard Model Information Security Practice and Experience | 2011-05-19 | Paper |
Oblivious transfer with access control: realizing disjunction without duplication Lecture Notes in Computer Science | 2010-11-26 | Paper |
A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange Lecture Notes in Computer Science | 2010-11-26 | Paper |
Escrowed deniable identification schemes Security Technology | 2010-04-23 | Paper |
Probabilistic public key encryption with equality test Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
Efficient Non-interactive Range Proof Lecture Notes in Computer Science | 2009-07-23 | Paper |
Generic Transformation to Strongly Unforgeable Signatures Applied Cryptography and Network Security | 2009-03-10 | Paper |
On the Relation among Various Security Models for Certificateless Cryptography Coding and Cryptology | 2009-03-09 | Paper |
Generic Certificateless Key Encapsulation Mechanism Information Security and Privacy | 2009-03-06 | Paper |
On the relation among various security models for certificateless cryptography International Journal of Applied Cryptography | 2009-02-24 | Paper |
Efficient lattice-based signature scheme International Journal of Applied Cryptography | 2009-02-24 | Paper |
An efficient one-move nominative signature scheme International Journal of Applied Cryptography | 2009-02-24 | Paper |
Ambiguous Optimistic Fair Exchange Advances in Cryptology - ASIACRYPT 2008 | 2009-02-10 | Paper |
Traceable and Retrievable Identity-Based Encryption Applied Cryptography and Network Security | 2008-06-13 | Paper |
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles Topics in Cryptology – CT-RSA 2008 | 2008-04-24 | Paper |
Formal Definition and Construction of Nominative Signature Information and Communications Security | 2008-03-25 | Paper |