Qianhong Wu

From MaRDI portal
Person:425522

Available identifiers

zbMath Open wu.qianhongMaRDI QIDQ425522

List of research outcomes

PublicationDate of PublicationType
Design theory and method of multivariate hash function2022-10-28Paper
A paid message forwarding scheme based on social network2021-12-08Paper
Modeling of the transient cerebrospinal fluid flow under external impacts2021-12-01Paper
Traceable ring signatures: general framework and post-quantum security2021-06-23Paper
Secure server-aided data sharing clique with attestation2021-04-19Paper
Flexible attribute-based proxy re-encryption for efficient data sharing2021-03-18Paper
Traceable ring signatures with post-quantum security2020-08-05Paper
A practical lattice-based sequential aggregate signature2020-01-10Paper
On the study of fluid flow in a soft porous media using a scaled-up indenter2019-06-26Paper
Batch blind signatures on elliptic curves2018-12-07Paper
Efficient subtree-based encryption for fuzzy-entity data sharing2018-11-27Paper
Provably secure self-extractable encryption2018-11-07Paper
Verifiably encrypted group signatures2018-11-07Paper
Linkable group signature for auditing anonymous communication2018-09-26Paper
Auditable hierarchy-private public-key encryption2018-09-26Paper
Predicate fully homomorphic encryption: achieving fine-grained access control over manipulable ciphertext2018-04-20Paper
A position-aware Merkle tree for dynamic cloud data integrity verification2018-02-27Paper
Confidentiality-Preserving Publicly Verifiable Computation2018-02-23Paper
Dynamic searchable symmetric encryption with physical deletion and small leakage2017-08-25Paper
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack2017-07-12Paper
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments2017-05-16Paper
Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response2017-05-16Paper
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts2017-05-16Paper
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email2017-05-16Paper
Towards Certificate-Based Group Encryption2017-01-06Paper
Identity-Based Group Encryption2016-09-02Paper
Accelerating Oblivious Transfer with Batch Multi-exponentiation2016-08-31Paper
Towards Efficient Fully Randomized Message-Locked Encryption2016-08-31Paper
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts2016-07-11Paper
Signatures in hierarchical certificateless cryptography: efficient constructions and provable security2016-07-08Paper
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement2015-12-02Paper
https://portal.mardi4nfdi.de/entity/Q55009152015-08-10Paper
Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test2015-07-27Paper
Practical (fully) distributed signatures provably secure in the standard model2015-07-24Paper
Hierarchical Identity-Based Broadcast Encryption2014-07-24Paper
Practical Distributed Signatures in the Standard Model2014-03-28Paper
Provably secure threshold public-key encryption with adaptive security and short ciphertexts2012-10-25Paper
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol2012-07-13Paper
Delegation of signing rights using certificateless proxy signatures2012-06-08Paper
Bridging Broadcast Encryption and Group Key Agreement2011-12-02Paper
Fully Distributed Broadcast Encryption2011-09-16Paper
https://portal.mardi4nfdi.de/entity/Q30166792011-07-19Paper
New receipt-free voting scheme using double-trapdoor commitment2011-06-17Paper
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts2010-12-17Paper
Efficient many-to-one authentication with certificateless aggregate signatures2010-11-25Paper
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol2010-07-20Paper
Simulatable certificateless two-party authenticated key agreement protocol2010-03-11Paper
Novel Efficient Certificateless Aggregate Signatures2010-01-14Paper
Identity-Based Verifiably Encrypted Signatures without Random Oracles2009-12-11Paper
Asymmetric Group Key Agreement2009-05-12Paper
Publicly Verifiable Privacy-Preserving Group Decryption2009-04-29Paper
Privacy for Private Key in Signatures2009-04-29Paper
Concurrent Signatures without a Conventional Keystone2009-03-09Paper
Efficient Partially Blind Signatures with Provable Security2009-02-10Paper
https://portal.mardi4nfdi.de/entity/Q35372272008-11-24Paper
Compact E-Cash from Bounded Accumulator2008-04-17Paper
A knapsack-based probabilistic encryption scheme2007-10-10Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Information Security2006-10-16Paper
https://portal.mardi4nfdi.de/entity/Q57155562006-01-03Paper
Information Security Practice and Experience2005-09-13Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Qianhong Wu