Qiong Huang

From MaRDI portal
(Redirected from Person:401476)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Lion: a new ring signature construction from lattice gadget2026-03-11Paper
Conditional attribute-based encryption with keyword search for pay-per-query commercial model2026-03-11Paper
Efficient revocable identity-based encryption with equality test
International Journal of Applied Cryptography
2025-05-14Paper
Public-key encryption with keyword search in multi-user, multi-challenge setting under adaptive corruptions2024-11-12Paper
Verifiable multi-party quantum secret sharing based on GHZ states
International Journal of Quantum Information
2024-07-29Paper
Forward secure online/offline key policy attribute-based encryption with keyword search2024-07-19Paper
Public key authenticated encryption with keyword search improved: strong security model and multi-keyword construction2024-07-17Paper
Secure three-party quantum summation based on W-class states
International Journal of Theoretical Physics
2024-07-10Paper
Numerical analysis of temporal second-order accurate scheme for the abstract Volterra integrodifferential equation
Mathematical Methods in the Applied Sciences
2024-05-24Paper
Controllable forward secure identity-based encryption with equality test in privacy-preserving text similarity analysis
Information Sciences
2024-03-20Paper
A fully secure lattice-based signcryption with designated equality test in standard model
Information Sciences
2024-02-13Paper
A novel quantum private set intersection scheme with a semi-honest third party
Quantum Information Processing
2024-01-16Paper
Hierarchical identity-based inner product functional encryption
Information Sciences
2023-12-11Paper
Abelian Hearts of Twin Cotorsion Pairs on Extriangulated Categories
Algebra Colloquium
2023-09-08Paper
\textit{CCOM}: cost-efficient and collusion-resistant oracle mechanism for smart contracts
Information Security and Privacy
2023-07-26Paper
High-order orthogonal spline collocation ADI scheme for a new complex two-dimensional distributed-order fractional integro-differential equation with two weakly singular kernels
International Journal of Computer Mathematics
2023-07-03Paper
A CCA-full-anonymous group signature with verifiable controllable linkability in the standard model2023-04-13Paper
Public key encryption with fuzzy matching2023-04-13Paper
Broadcast Authenticated Encryption with Keyword Search2023-04-13Paper
The efficient alternating direction implicit Galerkin method for the nonlocal diffusion-wave equation in three dimensions
Journal of Applied Mathematics and Computing
2022-10-06Paper
A novel identity-based multi-signature scheme over NTRU lattices
Theoretical Computer Science
2022-09-27Paper
Plaintext-checkable encryption with unlink-CCA security in the standard model2022-08-30Paper
A novel certificateless multi-signature scheme over NTRU lattices
Information Security Practice and Experience
2022-08-11Paper
Privacy-preserving polynomial interpolation and its applications on predictive analysis
Information Sciences
2021-11-30Paper
Secure three-party semi-quantum summation using single photons
International Journal of Theoretical Physics
2021-11-05Paper
Public-key authenticated encryption with keyword search revisited: security model and constructions
Information Sciences
2021-03-31Paper
Leakage-resilient group signature: definitions and constructions
Information Sciences
2021-03-18Paper
Group public key encryption with equality test against offline message recovery attack
Information Sciences
2021-03-18Paper
On \(\overline{\mathscr C}\)-extensions and balanced pairs
Communications in Algebra
2020-09-03Paper
切换正系统的渐近稳定性、L1增益及时变H∞控制2020-08-12Paper
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes
Information Sciences
2020-07-20Paper
Black-box constructions of signature schemes in the bounded leakage setting
Information Sciences
2020-07-16Paper
Group ID-based encryption with equality test2020-05-27Paper
An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
Information Sciences
2020-02-07Paper
Plaintext-verifiably-checkable encryption2020-01-10Paper
Towards enhanced security for certificateless public-key authenticated encryption with keyword search2020-01-10Paper
Multi-party quantum summation with a single \(d\)-level quantum system
International Journal of Quantum Information
2019-11-06Paper
Outsourced ciphertext-policy attribute-based encryption with equality test2019-10-31Paper
Control of the fractional-order Chen chaotic system via fractional-order scalar controller and its circuit implementation
Mathematical Problems in Engineering
2019-02-08Paper
Leakage-resilient ring signature schemes
Theoretical Computer Science
2019-01-18Paper
How to protect privacy in optimistic fair exchange of digital signatures
Information Sciences
2018-05-18Paper
A black-box construction of strongly unforgeable signature scheme in the leakage setting
International Journal of Foundations of Computer Science
2018-02-23Paper
Multi-party quantum summation without a trusted third party based on single particles
International Journal of Quantum Information
2017-10-20Paper
Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures
IEEE Transactions on Computers
2017-07-12Paper
Subnormal subgroups and supersolvability of finite groups2017-05-17Paper
A black-box construction of strongly unforgeable signature schemes in the bounded leakage model
Provable Security
2017-01-06Paper
Subnormal subgroups and p-super solvability of finite groups
Journal of Chongqing Normal University. Natural Science
2016-10-06Paper
Ambiguous one-move nominative signature without random oracles
Information Security and Cryptology -- ICISC 2013
2015-10-16Paper
Ambiguous optimistic fair exchange: definition and constructions
Theoretical Computer Science
2014-12-02Paper
Concurrent signature without random oracles
Theoretical Computer Science
2014-12-02Paper
Extending concurrent signature to multiple parties
Theoretical Computer Science
2014-08-27Paper
The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles
Information Sciences
2014-08-01Paper
Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange scheme. Revisited
Information Security and Privacy
2014-07-24Paper
New delay-dependent stability analysis for fuzzy time-delay interconnected systems
International Journal of General Systems
2014-04-15Paper
P^2OFE: privacy-preserving optimistic fair exchange of digital signatures
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Short and efficient convertible undeniable signature schemes without random oracles
Theoretical Computer Science
2013-04-17Paper
The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles
Public Key Cryptography – PKC 2012
2012-07-20Paper
Group-oriented fair exchange of signatures
Information Sciences
2012-07-13Paper
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles
Computer Security – ESORICS 2011
2011-11-22Paper
Concurrent signatures with fully negotiable binding control
Provable Security
2011-09-16Paper
Short Convertible Undeniable Signature in the Standard Model
Information Security Practice and Experience
2011-05-19Paper
Oblivious transfer with access control: realizing disjunction without duplication
Lecture Notes in Computer Science
2010-11-26Paper
A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange
Lecture Notes in Computer Science
2010-11-26Paper
Escrowed deniable identification schemes
Security Technology
2010-04-23Paper
Probabilistic public key encryption with equality test
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Efficient Non-interactive Range Proof
Lecture Notes in Computer Science
2009-07-23Paper
Generic Transformation to Strongly Unforgeable Signatures
Applied Cryptography and Network Security
2009-03-10Paper
On the Relation among Various Security Models for Certificateless Cryptography
Coding and Cryptology
2009-03-09Paper
Generic Certificateless Key Encapsulation Mechanism
Information Security and Privacy
2009-03-06Paper
On the relation among various security models for certificateless cryptography
International Journal of Applied Cryptography
2009-02-24Paper
Efficient lattice-based signature scheme
International Journal of Applied Cryptography
2009-02-24Paper
An efficient one-move nominative signature scheme
International Journal of Applied Cryptography
2009-02-24Paper
Ambiguous Optimistic Fair Exchange
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
Traceable and Retrievable Identity-Based Encryption
Applied Cryptography and Network Security
2008-06-13Paper
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
Formal Definition and Construction of Nominative Signature
Information and Communications Security
2008-03-25Paper


Research outcomes over time


This page was built for person: Qiong Huang