| Publication | Date of Publication | Type |
|---|
Parameter-hiding order-revealing encryption without pairings | 2024-11-12 | Paper |
Sender-anamorphic encryption reformulated: achieving robust and generic constructions | 2024-09-13 | Paper |
Blockwise rank decoding problem and LRPC codes: cryptosystems with smaller sizes | 2024-08-30 | Paper |
Grey-prediction-based double model predictive control strategy for the speed and current control of permanent magnet synchronous motor Asian Journal of Control | 2024-07-25 | Paper |
Complicated dynamical behaviors of a geometrical oscillator with a mass parameter International Journal of Bifurcation and Chaos in Applied Sciences and Engineering | 2024-05-14 | Paper |
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts Information Sciences | 2024-04-11 | Paper |
A New Design of Online/Offline Signatures Based on Lattice Information Security Practice and Experience | 2023-06-30 | Paper |
Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE Lecture Notes in Computer Science | 2023-05-12 | Paper |
Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption | 2023-03-21 | Paper |
Privacy-preserving authentication for tree-structured data with designated verification in outsourced environments | 2023-03-21 | Paper |
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment 1524.68044 | 2022-12-22 | Paper |
Linearly Homomorphic Signatures with Designated Entities Information Security Practice and Experience | 2022-12-09 | Paper |
Dissemination of authenticated tree-structured data with privacy protection and fine-grained control in outsourced databases | 2022-08-25 | Paper |
Ring trapdoor redactable signatures from lattice Information Security Practice and Experience | 2022-08-11 | Paper |
Universal product learning with errors: a new variant of \textsf{LWE} for lattice-based cryptography Theoretical Computer Science | 2022-05-31 | Paper |
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved | 2022-05-18 | Paper |
Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control IEEE Transactions on Computers | 2022-03-23 | Paper |
An efficient blind signature scheme based on SM2 signature algorithm | 2021-12-08 | Paper |
Blockchain-based system for secure outsourcing of bilinear pairings Information Sciences | 2021-04-19 | Paper |
Functional broadcast encryption with applications to data sharing for cloud storage Information Sciences | 2021-02-04 | Paper |
A code-based signature scheme from the Lyubashevsky framework Theoretical Computer Science | 2020-08-17 | Paper |
Equilibrium competition binding assay: inhibition mechanism from a single dose response Journal of Theoretical Biology | 2020-05-06 | Paper |
Supporting dynamic updates in storage clouds with the Akl-Taylor scheme Information Sciences | 2020-02-06 | Paper |
Revocable threshold attribute-based signature against signing key exposure | 2018-12-07 | Paper |
An efficient certificate-based designated verifier signature scheme | 2018-11-27 | Paper |
Secure publicly verifiable computation with polynomial commitment in cloud computing | 2018-09-26 | Paper |
Cost-effective and scalable data sharing in cloud storage using hierarchical attribute-based encryption with forward security International Journal of Foundations of Computer Science | 2018-05-14 | Paper |
Self-adaptive trust management based on game theory in fuzzy large-scale networks Soft Computing | 2018-02-27 | Paper |
Dual trapdoor identity-based encryption with keyword search Soft Computing | 2018-02-27 | Paper |
A general framework for secure sharing of personal health records in cloud system Journal of Computer and System Sciences | 2017-09-15 | Paper |
Towards revocable fine-grained encryption of cloud data: reducing trust upon cloud | 2017-08-25 | Paper |
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security IEEE Transactions on Computers | 2017-05-16 | Paper |
Secure Distributed Deduplication Systems with Improved Reliability IEEE Transactions on Computers | 2017-05-16 | Paper |
Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing IEEE Transactions on Computers | 2017-05-16 | Paper |
<inline-formula><tex-math>$k$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="huang-ieq1-2366741.gif"/></alternatives></inline-formula>-Times Attribute-Based Anonymous Access Control for Cloud Computing IEEE Transactions on Computers | 2017-05-16 | Paper |
A new universal designated verifier transitive signature scheme for big graph data Journal of Computer and System Sciences | 2016-09-16 | Paper |
Accelerating oblivious transfer with batch multi-exponentiation Information Security and Privacy | 2016-08-31 | Paper |
Forgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanism Journal of Computer Science and Technology | 2014-10-07 | Paper |
Certificate-based signcryption with enhanced security features Computers & Mathematics with Applications | 2013-07-25 | Paper |
Efficient escrow-free identity-based signature Provable Security | 2012-11-06 | Paper |
Dynamic Secure Cloud Storage with Provenance Cryptography and Security: From Theory to Applications | 2012-06-08 | Paper |
Provably secure server-aided verification signatures Computers & Mathematics with Applications | 2011-08-28 | Paper |
Certificateless threshold signature scheme from bilinear maps Information Sciences | 2011-01-28 | Paper |
Further observations on optimistic fair exchange protocols in the multi-user setting Public Key Cryptography – PKC 2010 | 2010-05-28 | Paper |
scientific article; zbMATH DE number 5622710 (Why is no real title available?) | 2009-10-28 | Paper |
Further Observations on Certificateless Public Key Encryption Information Security and Cryptology | 2009-04-29 | Paper |
Certificateless Signature Revisited Information Security and Privacy | 2009-03-06 | Paper |
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures Information Security Applications | 2009-02-24 | Paper |
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility Information Security and Cryptology | 2009-02-10 | Paper |
Server-Aided Verification Signatures: Definitions and New Constructions Provable Security | 2009-01-27 | Paper |
Efficient and Short Certificateless Signature Cryptology and Network Security | 2009-01-09 | Paper |
A Generic Construction for Universally-Convertible Undeniable Signatures Cryptology and Network Security | 2008-04-15 | Paper |
Formal Definition and Construction of Nominative Signature Information and Communications Security | 2008-03-25 | Paper |
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length Pairing-Based Cryptography – Pairing 2007 | 2007-11-29 | Paper |
Cryptology and Network Security Lecture Notes in Computer Science | 2006-11-14 | Paper |