Qianhong Wu

From MaRDI portal
Person:425522

Available identifiers

zbMath Open wu.qianhongMaRDI QIDQ425522

List of research outcomes





PublicationDate of PublicationType
Secure Stern Signatures in Quantum Random Oracle Model2024-03-14Paper
A Secure Cross-Shard View-Change Protocol for Sharding Blockchains2023-04-13Paper
Design theory and method of multivariate hash function2022-10-28Paper
A paid message forwarding scheme based on social network2021-12-08Paper
Modeling of the transient cerebrospinal fluid flow under external impacts2021-12-01Paper
Traceable ring signatures: general framework and post-quantum security2021-06-23Paper
Secure server-aided data sharing clique with attestation2021-04-19Paper
Flexible attribute-based proxy re-encryption for efficient data sharing2021-03-18Paper
Traceable ring signatures with post-quantum security2020-08-05Paper
A practical lattice-based sequential aggregate signature2020-01-10Paper
On the study of fluid flow in a soft porous media using a scaled-up indenter2019-06-26Paper
Batch blind signatures on elliptic curves2018-12-07Paper
Efficient subtree-based encryption for fuzzy-entity data sharing2018-11-27Paper
Verifiably encrypted group signatures2018-11-07Paper
Provably secure self-extractable encryption2018-11-07Paper
Linkable group signature for auditing anonymous communication2018-09-26Paper
Auditable hierarchy-private public-key encryption2018-09-26Paper
Predicate fully homomorphic encryption: achieving fine-grained access control over manipulable ciphertext2018-04-20Paper
A position-aware Merkle tree for dynamic cloud data integrity verification2018-02-27Paper
Confidentiality-Preserving Publicly Verifiable Computation2018-02-23Paper
Dynamic searchable symmetric encryption with physical deletion and small leakage2017-08-25Paper
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack2017-07-12Paper
Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response2017-05-16Paper
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts2017-05-16Paper
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments2017-05-16Paper
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email2017-05-16Paper
Towards Certificate-Based Group Encryption2017-01-06Paper
Identity-Based Group Encryption2016-09-02Paper
Accelerating Oblivious Transfer with Batch Multi-exponentiation2016-08-31Paper
Towards Efficient Fully Randomized Message-Locked Encryption2016-08-31Paper
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts2016-07-11Paper
Signatures in hierarchical certificateless cryptography: efficient constructions and provable security2016-07-08Paper
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement2015-12-02Paper
https://portal.mardi4nfdi.de/entity/Q55009152015-08-10Paper
Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test2015-07-27Paper
Practical (fully) distributed signatures provably secure in the standard model2015-07-24Paper
Hierarchical Identity-Based Broadcast Encryption2014-07-24Paper
Practical Distributed Signatures in the Standard Model2014-03-28Paper
Provably secure threshold public-key encryption with adaptive security and short ciphertexts2012-10-25Paper
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol2012-07-13Paper
Delegation of signing rights using certificateless proxy signatures2012-06-08Paper
Bridging Broadcast Encryption and Group Key Agreement2011-12-02Paper
Fully Distributed Broadcast Encryption2011-09-16Paper
https://portal.mardi4nfdi.de/entity/Q30166792011-07-19Paper
New receipt-free voting scheme using double-trapdoor commitment2011-06-17Paper
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts2010-12-17Paper
Efficient many-to-one authentication with certificateless aggregate signatures2010-11-25Paper
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol2010-07-20Paper
Simulatable certificateless two-party authenticated key agreement protocol2010-03-11Paper
Novel Efficient Certificateless Aggregate Signatures2010-01-14Paper
Identity-Based Verifiably Encrypted Signatures without Random Oracles2009-12-11Paper
Asymmetric Group Key Agreement2009-05-12Paper
Publicly Verifiable Privacy-Preserving Group Decryption2009-04-29Paper
Privacy for Private Key in Signatures2009-04-29Paper
Concurrent Signatures without a Conventional Keystone2009-03-09Paper
Efficient Partially Blind Signatures with Provable Security2009-02-10Paper
https://portal.mardi4nfdi.de/entity/Q35372272008-11-24Paper
Compact E-Cash from Bounded Accumulator2008-04-17Paper
A knapsack-based probabilistic encryption scheme2007-10-10Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Information Security2006-10-16Paper
https://portal.mardi4nfdi.de/entity/Q57155562006-01-03Paper
Information Security Practice and Experience2005-09-13Paper

Research outcomes over time

This page was built for person: Qianhong Wu