Baodong Qin

From MaRDI portal
(Redirected from Person:747508)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Further construction of even-variable balanced rotation symmetric Boolean functions with optimal algebraic immunity
Theoretical Computer Science
2024-08-27Paper
Server-aided revocable attribute-based encryption resilient to decryption key exposure
Cryptology and Network Security
2023-08-02Paper
Improved security model for public-key authenticated encryption with keyword search2023-04-13Paper
Server-aided revocable attribute-based encryption2022-08-19Paper
Server-aided revocable identity-based encryption
Computer Security -- ESORICS 2015
2022-08-19Paper
Forward-secure revocable identity-based encryption2022-06-08Paper
Non-malleable functions and their applications
Journal of Cryptology
2022-04-04Paper
Public-key authenticated encryption with keyword search revisited: security model and constructions
Information Sciences
2021-03-31Paper
Key regeneration-free ciphertext-policy attribute-based encryption and its application
Information Sciences
2021-03-31Paper
(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance
Information Sciences
2020-12-10Paper
Robust digital signature revisited
Theoretical Computer Science
2020-10-21Paper
Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman
Information Sciences
2020-02-07Paper
Regularly lossy functions and applications2020-01-21Paper
Escrow free attribute-based signature with self-revealability
Information Sciences
2020-01-06Paper
Fuzzy public-key encryption based on biometric data2018-11-07Paper
Regular lossy functions and their applications in leakage-resilient cryptography
Theoretical Computer Science
2018-06-18Paper
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
Designs, Codes and Cryptography
2018-04-06Paper
Public key encryption resilient to leakage and tampering attacks
Journal of Computer and System Sciences
2017-09-07Paper
A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains
IEEE Transactions on Computers
2017-05-16Paper
How to make the Cramer-Shoup cryptosystem secure against linear related-key attacks
Information Security and Cryptology
2017-05-05Paper
Non-malleable functions and their applications
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited
International Journal of Applied Mathematics and Computer Science
2015-10-16Paper
Continuous non-malleable key derivation and its application to related-key security
Lecture Notes in Computer Science
2015-08-27Paper
Leakage-flexible CCA-secure public-key encryption: simple construction and free of pairing
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Key-dependent message chosen-ciphertext security of the Cramer-Shoup cryptosystem
Information Security and Privacy
2013-06-28Paper
Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited
Public-Key Cryptography – PKC 2013
2013-04-19Paper
New left-to-right minimal weight signed-digit radix-\(r\) representation
Computers and Electrical Engineering
2009-04-17Paper


Research outcomes over time


This page was built for person: Baodong Qin