Qianhong Wu

From MaRDI portal
(Redirected from Person:425522)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Secure Stern Signatures in Quantum Random Oracle Model2024-03-14Paper
A Secure Cross-Shard View-Change Protocol for Sharding Blockchains2023-04-13Paper
Design theory and method of multivariate hash function
Science China Information Sciences
2022-10-28Paper
A paid message forwarding scheme based on social network2021-12-08Paper
Modeling of the transient cerebrospinal fluid flow under external impacts
European Journal of Mechanics. B. Fluids
2021-12-01Paper
Traceable ring signatures: general framework and post-quantum security
Designs, Codes and Cryptography
2021-06-23Paper
Secure server-aided data sharing clique with attestation
Information Sciences
2021-04-19Paper
Flexible attribute-based proxy re-encryption for efficient data sharing
Information Sciences
2021-03-18Paper
Traceable ring signatures with post-quantum security2020-08-05Paper
A practical lattice-based sequential aggregate signature2020-01-10Paper
On the study of fluid flow in a soft porous media using a scaled-up indenter
European Journal of Mechanics. B. Fluids
2019-06-26Paper
Batch blind signatures on elliptic curves2018-12-07Paper
Efficient subtree-based encryption for fuzzy-entity data sharing
Soft Computing
2018-11-27Paper
Verifiably encrypted group signatures2018-11-07Paper
Provably secure self-extractable encryption2018-11-07Paper
Linkable group signature for auditing anonymous communication2018-09-26Paper
Auditable hierarchy-private public-key encryption2018-09-26Paper
Predicate fully homomorphic encryption: achieving fine-grained access control over manipulable ciphertext2018-04-20Paper
A position-aware Merkle tree for dynamic cloud data integrity verification
Soft Computing
2018-02-27Paper
Confidentiality-preserving publicly verifiable computation
International Journal of Foundations of Computer Science
2018-02-23Paper
Dynamic searchable symmetric encryption with physical deletion and small leakage2017-08-25Paper
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
IEEE Transactions on Computers
2017-07-12Paper
Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response
IEEE Transactions on Computers
2017-05-16Paper
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
IEEE Transactions on Computers
2017-05-16Paper
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
IEEE Transactions on Computers
2017-05-16Paper
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
IEEE Transactions on Computers
2017-05-16Paper
Towards certificate-based group encryption
Provable Security
2017-01-06Paper
Identity-based group encryption
Information Security and Privacy
2016-09-02Paper
Accelerating oblivious transfer with batch multi-exponentiation
Information Security and Privacy
2016-08-31Paper
Towards efficient fully randomized message-locked encryption
Information Security and Privacy
2016-08-31Paper
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
Information Sciences
2016-07-11Paper
Signatures in hierarchical certificateless cryptography: efficient constructions and provable security
Information Sciences
2016-07-08Paper
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement
Information Security and Cryptology
2015-12-02Paper
Robust distributed privacy-preserving secure aggregation in vehicular communication2015-08-10Paper
Practical direct chosen ciphertext secure key-policy attribute-based encryption with public ciphertext test
Computer Security - ESORICS 2014
2015-07-27Paper
Practical (fully) distributed signatures provably secure in the standard model
Theoretical Computer Science
2015-07-24Paper
Hierarchical Identity-Based Broadcast Encryption
Information Security and Privacy
2014-07-24Paper
Practical distributed signatures in the standard model
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Provably secure threshold public-key encryption with adaptive security and short ciphertexts
Information Sciences
2012-10-25Paper
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
Information Sciences
2012-07-13Paper
Delegation of signing rights using certificateless proxy signatures
Information Sciences
2012-06-08Paper
Bridging broadcast encryption and group key agreement
Lecture Notes in Computer Science
2011-12-02Paper
Fully distributed broadcast encryption
Provable Security
2011-09-16Paper
Multivariable algebra theory and its application in cryptography2011-07-19Paper
New receipt-free voting scheme using double-trapdoor commitment
Information Sciences
2011-06-17Paper
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Information and Communications Security
2010-12-17Paper
Efficient many-to-one authentication with certificateless aggregate signatures
Computer Networks
2010-11-25Paper
Identity-based authenticated asymmetric group key agreement protocol
Lecture Notes in Computer Science
2010-07-20Paper
Simulatable certificateless two-party authenticated key agreement protocol
Information Sciences
2010-03-11Paper
Novel efficient certificateless aggregate signatures
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
2010-01-14Paper
Identity-based verifiably encrypted signatures without random oracles
Provable Security
2009-12-11Paper
Asymmetric Group Key Agreement
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Publicly Verifiable Privacy-Preserving Group Decryption
Information Security and Cryptology
2009-04-29Paper
Privacy for Private Key in Signatures
Information Security and Cryptology
2009-04-29Paper
Concurrent Signatures without a Conventional Keystone
Coding and Cryptology
2009-03-09Paper
Efficient Partially Blind Signatures with Provable Security
Computational Science and Its Applications - ICCSA 2006
2009-02-10Paper
Study of the application of the gilding-box method for calculate multifractal spectrum in the distribution of surface layer and in-depth elements2008-11-24Paper
Compact E-Cash from Bounded Accumulator
Lecture Notes in Computer Science
2008-04-17Paper
A knapsack-based probabilistic encryption scheme
Information Sciences
2007-10-10Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Information Security
Lecture Notes in Computer Science
2006-10-16Paper
scientific article; zbMATH DE number 2243081 (Why is no real title available?)2006-01-03Paper
Information Security Practice and Experience
Lecture Notes in Computer Science
2005-09-13Paper


Research outcomes over time


This page was built for person: Qianhong Wu