Baocang Wang

Orcid: 0000-0002-2554-4464

According to our database1, Baocang Wang authored at least 149 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Optimized byzantine fault tolerant algorithm for improving performance and security with trust values.
IET Blockchain, March, 2024

Beyond k-Means++: Towards better cluster exploration with geometrical information.
Pattern Recognit., February, 2024

MixCam-attack: Boosting the transferability of adversarial examples with targeted data augmentation.
Inf. Sci., February, 2024

Verifiable Privacy-Preserving Federated Learning Under Multiple Encrypted Keys.
IEEE Internet Things J., January, 2024

Privacy-Preserving Convolutional Neural Network Classification Scheme With Multiple Keys.
IEEE Trans. Serv. Comput., 2024

A Refined Hardness Estimation of LWE in Two-step Mode.
IACR Cryptol. ePrint Arch., 2024

2023
A Privacy-Preserving Ride-Matching Scheme Without a Trusted Third-Party Server.
IEEE Syst. J., December, 2023

A polynomial system for bit-based division property solving by quantum algorithm.
Quantum Inf. Process., December, 2023

Multi-key homomorphic encryption with tightened RGSW ciphertexts without relinearization for ciphertexts product.
J. King Saud Univ. Comput. Inf. Sci., December, 2023

Privacy-preserving multi-party deep learning based on homomorphic proxy re-encryption.
J. Syst. Archit., November, 2023

Modified Multi-Key Fully Homomorphic Encryption Scheme in the Plain Model.
Comput. J., October, 2023

Perfect Data Protection, Storage, and Reputation Management Scheme for Ride-Sharing Services.
IEEE Syst. J., September, 2023

PPeFL: Privacy-Preserving Edge Federated Learning With Local Differential Privacy.
IEEE Internet Things J., September, 2023

Hiding the input-size in multi-party private set intersection.
Des. Codes Cryptogr., September, 2023

Communication-Efficient and Privacy-Preserving Verifiable Aggregation for Federated Learning.
Entropy, August, 2023

Full black-box retrievable and accountable identity-based encryption.
Comput. Stand. Interfaces, August, 2023

More efficient tightly-secure lattice-based IBE with equality test.
Comput. Stand. Interfaces, August, 2023

Black-Box Accountable Authority CP-ABE Scheme for Cloud-Assisted E-Health System.
IEEE Syst. J., March, 2023

PLDP-FL: Federated Learning with Personalized Local Differential Privacy.
Entropy, March, 2023

Improved integral cryptanalysis of SPNbox in digital rights management systems.
IET Inf. Secur., January, 2023

Multi-key Fully Homomorphic Encryption from Additive Homomorphism.
Comput. J., January, 2023

SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers.
IACR Trans. Symmetric Cryptol., 2023

Public-Key Encryption With Tester Verifiable Equality Test for Cloud Computing.
IEEE Trans. Cloud Comput., 2023

Quantum rotational cryptanalysis for preimage recovery of round-reduced Keccak.
Quantum Inf. Comput., 2023

Forward and backward secure updatable ElGamal encryption scheme for cloud storage.
J. Syst. Archit., 2023

New Quantum Search Model on Symmetric Ciphers and Its Applications.
IACR Cryptol. ePrint Arch., 2023

SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers (Long Paper).
IACR Cryptol. ePrint Arch., 2023

On the Invalidity of LV16/Lin17 Obfuscation Schemes Revisited.
IACR Cryptol. ePrint Arch., 2023

On the Invalidity of LV16/Lin17 Obfuscation Schemes.
IACR Cryptol. ePrint Arch., 2023

Privacy-preserving COVID-19 contact tracing solution based on blockchain.
Comput. Stand. Interfaces, 2023

A Trade-off SVP-solving Strategy based on a Sharper pnj-BKZ Simulator.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Privacy-preserving association rule mining based on electronic medical system.
Wirel. Networks, 2022

Efficient Function Queryable and Privacy Preserving Data Aggregation Scheme in Smart Grid.
IEEE Trans. Parallel Distributed Syst., 2022

Privacy-Preserving Multi-Class Support Vector Machine Model on Medical Diagnosis.
IEEE J. Biomed. Health Informatics, 2022

Privacy-Preserving Classification Scheme Based on Support Vector Machine.
IEEE Syst. J., 2022

Leakage-Suppressed Range Query Scheme for Structured Data in IoT.
IEEE Syst. J., 2022

PDLHR: Privacy-Preserving Deep Learning Model With Homomorphic Re-Encryption in Robot System.
IEEE Syst. J., 2022

Module-LWE-Based Key Exchange Protocol Using Error Reconciliation Mechanism.
Secur. Commun. Networks, 2022

AES-128 under HHL algorithm.
Quantum Inf. Comput., 2022

Updatable privacy-preserving itK-nearest neighbor query in location-based s-ervice.
Peer-to-Peer Netw. Appl., 2022

MDOPE: Efficient multi-dimensional data order preserving encryption scheme.
Inf. Sci., 2022

Toward practical privacy-preserving linear regression.
Inf. Sci., 2022

Group public key encryption supporting equality test without bilinear pairings.
Inf. Sci., 2022

Secure Infectious Diseases Detection System With IoT-Based e-Health Platforms.
IEEE Internet Things J., 2022

Cryptanalysis and Improvement of DeepPAR: Privacy-Preserving and Asynchronous Deep Learning for Industrial IoT.
IEEE Internet Things J., 2022

Privacy-preserving convolutional neural network prediction with low latency and lightweight users.
Int. J. Intell. Syst., 2022

Applications of the indirect sum in the design of several special classes of bent functions outside the completed <i>MM</i> class.
IACR Cryptol. ePrint Arch., 2022

Improved Progressive BKZ with Lattice Sieving.
IACR Cryptol. ePrint Arch., 2022

Improved Pump and Jump BKZ by Sharp Simulator.
IACR Cryptol. ePrint Arch., 2022

Identity-based Matchmaking Encryption with Stronger Security and Instantiation on Lattices.
IACR Cryptol. ePrint Arch., 2022

Allocating Rotational Cryptanalysis based Preimage Attack on 4-round Keccak-224 for Quantum Setting.
IACR Cryptol. ePrint Arch., 2022

Notes on Reusable Garbling.
IACR Cryptol. ePrint Arch., 2022

Verifiable privacy-preserving association rule mining using distributed decryption mechanism on the cloud.
Expert Syst. Appl., 2022

Improved key-recovery attacks on reduced-round WEM-8.
Des. Codes Cryptogr., 2022

Cryptanalysis of an additively homomorphic public key encryption scheme.
Comput. Stand. Interfaces, 2022

WARX: efficient white-box block cipher based on ARX primitives and random MDS matrix.
Sci. China Inf. Sci., 2022

Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022

Updatable Hybrid Encryption Scheme with No-Directional Key Update for Cloud Storage.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

2021
Efficient Small-Batch Verification and Identification Scheme With Invalid Signatures in VANETs.
IEEE Trans. Veh. Technol., 2021

A Blockchain-Based Traceable Self-Tallying E-Voting Protocol in AI Era.
IEEE Trans. Netw. Sci. Eng., 2021

Comments on "Privacy-Preserving Public Auditing Protocol for Regenerating-Code-Based Cloud Storage".
IEEE Trans. Inf. Forensics Secur., 2021

Privacy-Preserving Association Rule Mining Using Homomorphic Encryption in a Multikey Environment.
IEEE Syst. J., 2021

Efficient Private Information Retrieval Protocol with Homomorphically Computing Univariate Polynomials.
Secur. Commun. Networks, 2021

Privacy-preserving image multi-classification deep learning model in robot system of industrial IoT.
Neural Comput. Appl., 2021

A threshold hybrid encryption method for integrity audit without trusted center.
J. Cloud Comput., 2021

Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption.
KSII Trans. Internet Inf. Syst., 2021

DRBFT: Delegated randomization Byzantine fault tolerance consensus protocol for blockchains.
Inf. Sci., 2021

Cryptanalysis and Improvement of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks.
IEEE Internet Things J., 2021

Efficient lattice-based authenticated key exchange based on key encapsulation mechanism and signature.
IET Inf. Secur., 2021

Comment on 'Targeted Ciphers for Format-Preserving Encryption' from Selected Areas in Cryptography 2018.
IET Inf. Secur., 2021

Lattice-based revocable attribute-based encryption with decryption key exposure resistance.
IET Inf. Secur., 2021

P/poly Invalidity of the Agr17 Functional Encryption Scheme.
IACR Cryptol. ePrint Arch., 2021

A Note on P/poly Validity of GVW15 Predicate Encryption Scheme.
IACR Cryptol. ePrint Arch., 2021

Size of IK00 Branching Program.
IACR Cryptol. ePrint Arch., 2021

Secure Privacy-Preserving Association Rule Mining With Single Cloud Server.
IEEE Access, 2021

2020
Improvement on a privacy-preserving outsourced classification protocol over encrypted data.
Wirel. Networks, 2020

Authenticated key agreement for blockchain-based WBAN.
Telecommun. Syst., 2020

Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts.
Theor. Comput. Sci., 2020

Improved Proxy Re-Encryption With Delegatable Verifiability.
IEEE Syst. J., 2020

Practical Privacy-Preserving Frequent Itemset Mining on Supermarket Transactions.
IEEE Syst. J., 2020

Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing.
Secur. Commun. Networks, 2020

Improved Cloud-Assisted Privacy-Preserving Profile-Matching Scheme in Mobile Social Networks.
Secur. Commun. Networks, 2020

Server-Aided Revocable Attribute-Based Encryption from Lattices.
Secur. Commun. Networks, 2020

Enhanced Certificateless Auditing Protocols for Cloud Data Management and Transformative Computation.
Inf. Process. Manag., 2020

Energy-Efficient Neighbor Discovery for the Internet of Things.
IEEE Internet Things J., 2020

Public Data Integrity Verification Scheme for Secure Cloud Storage.
Inf., 2020

A Multi-Keyword Searchable Encryption Scheme Based on Probability Trapdoor over Encryption Cloud Data.
Inf., 2020

Secure outsourcing of modular inverses and scalar multiplications on elliptic curves.
Int. J. Secur. Networks, 2020

Verifiable Attribute-based Keyword Search Encryption with Attribute Revocation for Electronic Health Record System.
Int. J. Netw. Secur., 2020

New group user based privacy preserving cloud auditing protocol.
Future Gener. Comput. Syst., 2020

New public auditing protocol based on homomorphic tags for secure cloud storage.
Concurr. Comput. Pract. Exp., 2020

Black-Box Accountable Authority Identity-Based Revocation System.
Comput. J., 2020

Privacy-Preserving Multi-Authority Attribute-Based Data Sharing Framework for Smart Grid.
IEEE Access, 2020

A Physically Secure, Lightweight Three-Factor and Anonymous User Authentication Protocol for IoT.
IEEE Access, 2020

2019
Improved secure fuzzy auditing protocol for cloud data storage.
Soft Comput., 2019

Cryptanalysis of a Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Network.
Secur. Commun. Networks, 2019

Improved Cryptanalysis of a Fully Homomorphic Symmetric Encryption Scheme.
Secur. Commun. Networks, 2019

Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation.
J. Ambient Intell. Humaniz. Comput., 2019

Accountable identity-based encryption with distributed private key generators.
Inf. Sci., 2019

A key-sharing based secure deduplication scheme in cloud storage.
Inf. Sci., 2019

PKCHD: Towards a Probabilistic Knapsack Public-Key Cryptosystem with High Density.
Inf., 2019

An improved public auditing protocol for cloud storage integrity checking.
Int. J. Web Grid Serv., 2019

Lattice-based deniable ring signatures.
Int. J. Inf. Sec., 2019

Algebraic Attacks Against Several Weak Variants of GVW'13 ABE.
Int. J. Found. Comput. Sci., 2019

Revisiting BGG<sup>+</sup>14 ABE with weakness analysis.
IET Inf. Secur., 2019

Faster Bootstrapping of FHE over the integers with large prime message space.
IACR Cryptol. ePrint Arch., 2019

An efficient linkable group signature for payer tracing in anonymous cryptocurrencies.
Future Gener. Comput. Syst., 2019

Traceable-then-revocable ciphertext-policy attribute-based encryption scheme.
Future Gener. Comput. Syst., 2019

Blockchain-based photo forensics with permissible transformations.
Comput. Secur., 2019

Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption.
IEEE Access, 2019

Attack and Improvement on a Symmetric Fully Homomorphic Encryption Scheme.
IEEE Access, 2019

Efficient Training Support Vector Clustering With Appropriate Boundary Information.
IEEE Access, 2019

Updatable Ciphertext-Policy Attribute-Based Encryption Scheme With Traceability and Revocability.
IEEE Access, 2019

Privacy-Preserving Attribute-Based Multi-keyword Search Encryption Scheme with User Tracing.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme.
IEEE Trans. Inf. Forensics Secur., 2018

Bootstrapping of FHE over the Integers with Large Message Space.
Secur. Commun. Networks, 2018

D-NTRU: More efficient and average-case IND-CPA secure NTRU variant.
Inf. Sci., 2018

Deterministic lattice reduction on knapsacks with collision-free properties.
IET Inf. Secur., 2018

An Improved Secure Cloud Storage Auditing Protocol Based on Distributed String Equality Checking.
Fundam. Informaticae, 2018

An Approach for Predicting the Popularity of Online Security News Articles.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Building Secure Public Key Encryption Scheme from Hidden Field Equations.
Secur. Commun. Networks, 2017

FRSVC: Towards making support vector clustering consume less.
Pattern Recognit., 2017

Improved identification protocol in the quantum random oracle model..
Int. Arab J. Inf. Technol., 2017

Improved Online/Offline Attribute Based Encryption and More.
Proceedings of the Advances in Internetworking, 2017

2016
Identity-Based Blind Signature from Lattices in Standard Model.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

On the Security of a Cloud-Based Revocable IBPRE Scheme for Data Sharing.
Proceedings of the Advances on P2P, 2016

2015
New method of key-dependent message security for asymmetric encryption.
Secur. Commun. Networks, 2015

Lattice-based multi-use unidirectional proxy re-encryption.
Secur. Commun. Networks, 2015

2014
Indistinguishable against adaptive chosen ciphertext attack secure public key cryptosystem with double trapdoor decryption mechanism.
Secur. Commun. Networks, 2014

Signature Scheme Using the Root Extraction Problem on Quaternions.
J. Appl. Math., 2014

Authenticated asymmetric group key agreement based on certificateless cryptosystem.
Int. J. Comput. Math., 2014

Improvement on a Knapsack-Based Probabilistic Encryption Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model.
Frontiers Comput. Sci., 2014

Lattice-based certificateless encryption scheme.
Frontiers Comput. Sci., 2014

2013
Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks.
Secur. Commun. Networks, 2013

Sieve Method for Polynomial Linear Equivalence.
J. Appl. Math., 2013

Lattice-based linearly homomorphic signature scheme over binary field.
Sci. China Inf. Sci., 2013

The termination of the F5 algorithm revisited.
Proceedings of the International Symposium on Symbolic and Algebraic Computation, 2013

2012
Group key agreement for secure group communication in dynamic peer systems.
J. Parallel Distributed Comput., 2012

Lattice Attack on the Knapsack Cipher 0/255.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
Identity-based key distribution for mobile Ad Hoc networks.
Frontiers Comput. Sci. China, 2011

2010
A Novel Combinatorial Public Key Cryptosystem.
Informatica, 2010

Quadratic compact knapsack public-key cryptosystem.
Comput. Math. Appl., 2010

2009
Signature scheme based on the root extraction problem over braid groups.
IET Inf. Secur., 2009

A New Knapsack Public-Key Cryptosystem.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Cryptanalysis of a Knapsack Public Key Cryptosystem.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
NTRUSign With a New Perturbation.
IEEE Trans. Inf. Theory, 2008

2007
A knapsack-based probabilistic encryption scheme.
Inf. Sci., 2007

2006
Diophantine Approximation Attack on a Fast Public Key Cryptosystem.
Proceedings of the Information Security Practice and Experience, 2006


  Loading...