Chungen Xu

Orcid: 0000-0001-9380-5913

According to our database1, Chungen Xu authored at least 39 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Practical Multi-Source Multi-Client Searchable Encryption With Forward Privacy: Refined Security Notion and New Constructions.
IEEE Trans. Dependable Secur. Comput., 2024

2023
TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage.
Peer Peer Netw. Appl., January, 2023

Towards Efficient Cryptographic Data Validation Service in Edge Computing.
IEEE Trans. Serv. Comput., 2023

Optimization of Functional Bootstrap with Large LUT and Packing Key Switching.
IACR Cryptol. ePrint Arch., 2023

Byzantine-Robust Federated Learning Based on Multi-center Secure Clustering.
Proceedings of the International Conference on Electronics, 2023

2022
Hardening secure search in encrypted database: a KGA-resistance conjunctive searchable encryption scheme from lattice.
Soft Comput., 2022

Revisiting the Orthogonal Lattice Algorithm in Solving General Approximate Common Divisor Problem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

An Efficient Lattice-Based Encrypted Search Scheme with Forward Security.
Proceedings of the Network and System Security - 16th International Conference, 2022

Geometric Range Searchable Encryption with Forward and Backward Security.
Proceedings of the Network and System Security - 16th International Conference, 2022

2021
Enabling Authorized Encrypted Search for Multi-Authority Medical Databases.
IEEE Trans. Emerg. Top. Comput., 2021

Multi-user search on the encrypted multimedia database: lattice-based searchable encryption scheme with time-controlled proxy re-encryption.
Multim. Tools Appl., 2021

Privacy-Preserving Ranked Searchable Encryption Based on Differential Privacy.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

Puncturable Search: Enabling Authorized Search in Cross-data Federation.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

2020
Building a dynamic searchable encrypted medical database for multi-client.
Inf. Sci., 2020

Attacking the Niederreiter-type cryptosystem based on rank metric.
Int. J. Embed. Syst., 2020

Multi-owner Encrypted Ranked Keyword Search Using Machine Learning Techniques.
Proceedings of the Security and Privacy in Digital Economy, 2020

Attribute-Based Searchable Encryption Scheme with Fuzzy Keywords.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Conjunctive Keywords Searchable Encryption Scheme Against Inside Keywords Guessing Attack from Lattice.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Forward Secure Conjunctive-Keyword Searchable Symmetric Encryption Using Shamir Threshold Secret Sharing Scheme.
Proceedings of the Applications and Techniques in Information Security, 2020

2019
Lattice-Based Searchable Encryption With Keywords Revocable and Bounded Trapdoor Exposure Resistance.
IEEE Access, 2019

Forward Private Searchable Encryption with Conjunctive Keywords Query.
Proceedings of the Science of Cyber Security - Second International Conference, 2019

Towards Realizing Authorized Encrypted Search with Designed Access Policy.
Proceedings of the Science of Cyber Security - Second International Conference, 2019

Interpretable Encrypted Searchable Neural Networks.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Hardening Database Padding for Searchable Encryption.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Multi-Writer Searchable Encryption: An LWE-based Realization and Implementation.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Multi-owner Secure Encrypted Search Using Searching Adversarial Networks.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
信息隐藏中伪随机序列碰撞问题的算法改进 (Algorithm Improvement of Pseudo-random Sequence Collision in Information Hiding).
计算机科学, 2018

2017
云计算中基于属性的可搜索加密电子病历系统 (Attribute-based Searchable Encryption of Electronic Medical Records in Cloud Computing).
计算机科学, 2017

A Secure and Efficient E-Medical Record System via Searchable Encryption in Public Platform.
KSII Trans. Internet Inf. Syst., 2017

A Multi-client Dynamic Searchable Symmetric Encryption System with Physical Deletion.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
Reverse Iterative Image Encryption Scheme Using 8-layer Cellular Automata.
KSII Trans. Internet Inf. Syst., 2016

A New Digital Signature Scheme from Layered Cellular Automata.
Int. J. Netw. Secur., 2016

2015
Efficient and Secure Data Retrieval Scheme Using Searchable Encryption in Cloud Storage.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

2014
A New Public Key Encryption Scheme based on Layered Cellular Automata.
KSII Trans. Internet Inf. Syst., 2014

2013
Key Substitution Attacks on Multisignature Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Rogue Key Attacks on Lu et al.'s Verifiably Encrypted Signature Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

2011
Cyclic codes over R = F<sub>p</sub> + uF<sub>p</sub> ++ u<sup>k-1</sup>F<sub>p</sub> with length p<sup>s</sup>n.
Inf. Sci., 2011

2009
Formal Description for an Object-Oriented Role-based Access Control Model.
Comput. Inf. Sci., 2009

Identity-Based Sequential Aggregate Signature from RSA.
Proceedings of the Fourth ChinaGrid Annual Conference, ChinaGrid 2009, Yantai, Shandong, 2009


  Loading...