The following pages link to Qianhong Wu (Q425522):
Displaying 50 items.
- Delegation of signing rights using certificateless proxy signatures (Q425523) (← links)
- Provably secure one-round identity-based authenticated asymmetric group key agreement protocol (Q433086) (← links)
- Provably secure threshold public-key encryption with adaptive security and short ciphertexts (Q456458) (← links)
- New receipt-free voting scheme using double-trapdoor commitment (Q543836) (← links)
- Efficient many-to-one authentication with certificateless aggregate signatures (Q605627) (← links)
- Signatures in hierarchical certificateless cryptography: efficient constructions and provable security (Q726365) (← links)
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts (Q726568) (← links)
- Traceable ring signatures with post-quantum security (Q785032) (← links)
- Provably secure self-extractable encryption (Q1616851) (← links)
- Verifiably encrypted group signatures (Q1616868) (← links)
- Efficient subtree-based encryption for fuzzy-entity data sharing (Q1626290) (← links)
- Batch blind signatures on elliptic curves (Q1631914) (← links)
- A position-aware Merkle tree for dynamic cloud data integrity verification (Q1701711) (← links)
- Predicate fully homomorphic encryption: achieving fine-grained access control over manipulable ciphertext (Q1745037) (← links)
- Linkable group signature for auditing anonymous communication (Q1784461) (← links)
- Auditable hierarchy-private public-key encryption (Q1784462) (← links)
- Flexible attribute-based proxy re-encryption for efficient data sharing (Q1999111) (← links)
- Traceable ring signatures: general framework and post-quantum security (Q2034982) (← links)
- Modeling of the transient cerebrospinal fluid flow under external impacts (Q2055508) (← links)
- A paid message forwarding scheme based on social network (Q2057144) (← links)
- Simulatable certificateless two-party authenticated key agreement protocol (Q2269791) (← links)
- A practical lattice-based sequential aggregate signature (Q2283602) (← links)
- Practical (fully) distributed signatures provably secure in the standard model (Q2354772) (← links)
- A knapsack-based probabilistic encryption scheme (Q2384519) (← links)
- Dynamic searchable symmetric encryption with physical deletion and small leakage (Q2399958) (← links)
- On the study of fluid flow in a soft porous media using a scaled-up indenter (Q2424998) (← links)
- Secure server-aided data sharing clique with attestation (Q2663469) (← links)
- Accelerating Oblivious Transfer with Batch Multi-exponentiation (Q2817471) (← links)
- Towards Efficient Fully Randomized Message-Locked Encryption (Q2817475) (← links)
- Identity-Based Group Encryption (Q2817806) (← links)
- Towards Certificate-Based Group Encryption (Q2953867) (← links)
- DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments (Q2985155) (← links)
- Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response (Q2985355) (← links)
- Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts (Q2985622) (← links)
- Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email (Q2985664) (← links)
- (Q3016679) (← links)
- Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts (Q3063955) (← links)
- Fully Distributed Broadcast Encryption (Q3092351) (← links)
- Bridging Broadcast Encryption and Group Key Agreement (Q3102182) (← links)
- Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement (Q3454156) (← links)
- (Q3537227) (← links)
- Identity-Based Authenticated Asymmetric Group Key Agreement Protocol (Q3578351) (← links)
- Efficient Partially Blind Signatures with Provable Security (Q3600108) (← links)
- Concurrent Signatures without a Conventional Keystone (Q3614604) (← links)
- Publicly Verifiable Privacy-Preserving Group Decryption (Q3623073) (← links)
- Privacy for Private Key in Signatures (Q3624269) (← links)
- Asymmetric Group Key Agreement (Q3627433) (← links)
- Identity-Based Verifiably Encrypted Signatures without Random Oracles (Q3651582) (← links)
- Novel Efficient Certificateless Aggregate Signatures (Q3656835) (← links)
- Confidentiality-Preserving Publicly Verifiable Computation (Q4605653) (← links)