| Publication | Date of Publication | Type |
|---|
| Secure Stern Signatures in Quantum Random Oracle Model | 2024-03-14 | Paper |
| A Secure Cross-Shard View-Change Protocol for Sharding Blockchains | 2023-04-13 | Paper |
Design theory and method of multivariate hash function Science China Information Sciences | 2022-10-28 | Paper |
| A paid message forwarding scheme based on social network | 2021-12-08 | Paper |
Modeling of the transient cerebrospinal fluid flow under external impacts European Journal of Mechanics. B. Fluids | 2021-12-01 | Paper |
Traceable ring signatures: general framework and post-quantum security Designs, Codes and Cryptography | 2021-06-23 | Paper |
Secure server-aided data sharing clique with attestation Information Sciences | 2021-04-19 | Paper |
Flexible attribute-based proxy re-encryption for efficient data sharing Information Sciences | 2021-03-18 | Paper |
| Traceable ring signatures with post-quantum security | 2020-08-05 | Paper |
| A practical lattice-based sequential aggregate signature | 2020-01-10 | Paper |
On the study of fluid flow in a soft porous media using a scaled-up indenter European Journal of Mechanics. B. Fluids | 2019-06-26 | Paper |
| Batch blind signatures on elliptic curves | 2018-12-07 | Paper |
Efficient subtree-based encryption for fuzzy-entity data sharing Soft Computing | 2018-11-27 | Paper |
| Verifiably encrypted group signatures | 2018-11-07 | Paper |
| Provably secure self-extractable encryption | 2018-11-07 | Paper |
| Linkable group signature for auditing anonymous communication | 2018-09-26 | Paper |
| Auditable hierarchy-private public-key encryption | 2018-09-26 | Paper |
| Predicate fully homomorphic encryption: achieving fine-grained access control over manipulable ciphertext | 2018-04-20 | Paper |
A position-aware Merkle tree for dynamic cloud data integrity verification Soft Computing | 2018-02-27 | Paper |
Confidentiality-preserving publicly verifiable computation International Journal of Foundations of Computer Science | 2018-02-23 | Paper |
| Dynamic searchable symmetric encryption with physical deletion and small leakage | 2017-08-25 | Paper |
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack IEEE Transactions on Computers | 2017-07-12 | Paper |
Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response IEEE Transactions on Computers | 2017-05-16 | Paper |
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts IEEE Transactions on Computers | 2017-05-16 | Paper |
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments IEEE Transactions on Computers | 2017-05-16 | Paper |
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email IEEE Transactions on Computers | 2017-05-16 | Paper |
Towards certificate-based group encryption Provable Security | 2017-01-06 | Paper |
Identity-based group encryption Information Security and Privacy | 2016-09-02 | Paper |
Accelerating oblivious transfer with batch multi-exponentiation Information Security and Privacy | 2016-08-31 | Paper |
Towards efficient fully randomized message-locked encryption Information Security and Privacy | 2016-08-31 | Paper |
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts Information Sciences | 2016-07-11 | Paper |
Signatures in hierarchical certificateless cryptography: efficient constructions and provable security Information Sciences | 2016-07-08 | Paper |
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement Information Security and Cryptology | 2015-12-02 | Paper |
| Robust distributed privacy-preserving secure aggregation in vehicular communication | 2015-08-10 | Paper |
Practical direct chosen ciphertext secure key-policy attribute-based encryption with public ciphertext test Computer Security - ESORICS 2014 | 2015-07-27 | Paper |
Practical (fully) distributed signatures provably secure in the standard model Theoretical Computer Science | 2015-07-24 | Paper |
Hierarchical Identity-Based Broadcast Encryption Information Security and Privacy | 2014-07-24 | Paper |
Practical distributed signatures in the standard model Topics in Cryptology – CT-RSA 2014 | 2014-03-28 | Paper |
Provably secure threshold public-key encryption with adaptive security and short ciphertexts Information Sciences | 2012-10-25 | Paper |
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol Information Sciences | 2012-07-13 | Paper |
Delegation of signing rights using certificateless proxy signatures Information Sciences | 2012-06-08 | Paper |
Bridging broadcast encryption and group key agreement Lecture Notes in Computer Science | 2011-12-02 | Paper |
Fully distributed broadcast encryption Provable Security | 2011-09-16 | Paper |
| Multivariable algebra theory and its application in cryptography | 2011-07-19 | Paper |
New receipt-free voting scheme using double-trapdoor commitment Information Sciences | 2011-06-17 | Paper |
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts Information and Communications Security | 2010-12-17 | Paper |
Efficient many-to-one authentication with certificateless aggregate signatures Computer Networks | 2010-11-25 | Paper |
Identity-based authenticated asymmetric group key agreement protocol Lecture Notes in Computer Science | 2010-07-20 | Paper |
Simulatable certificateless two-party authenticated key agreement protocol Information Sciences | 2010-03-11 | Paper |
Novel efficient certificateless aggregate signatures Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2010-01-14 | Paper |
Identity-based verifiably encrypted signatures without random oracles Provable Security | 2009-12-11 | Paper |
Asymmetric Group Key Agreement Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Publicly Verifiable Privacy-Preserving Group Decryption Information Security and Cryptology | 2009-04-29 | Paper |
Privacy for Private Key in Signatures Information Security and Cryptology | 2009-04-29 | Paper |
Concurrent Signatures without a Conventional Keystone Coding and Cryptology | 2009-03-09 | Paper |
Efficient Partially Blind Signatures with Provable Security Computational Science and Its Applications - ICCSA 2006 | 2009-02-10 | Paper |
| Study of the application of the gilding-box method for calculate multifractal spectrum in the distribution of surface layer and in-depth elements | 2008-11-24 | Paper |
Compact E-Cash from Bounded Accumulator Lecture Notes in Computer Science | 2008-04-17 | Paper |
A knapsack-based probabilistic encryption scheme Information Sciences | 2007-10-10 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-16 | Paper |
| scientific article; zbMATH DE number 2243081 (Why is no real title available?) | 2006-01-03 | Paper |
Information Security Practice and Experience Lecture Notes in Computer Science | 2005-09-13 | Paper |