Chunxiang Xu

According to our database1, Chunxiang Xu authored at least 93 papers between 2004 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber-physical systems.
Pervasive and Mobile Computing, 2019

Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing.
TIIS, 2019

An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks.
TIIS, 2019

CSED: Client-Side encrypted deduplication scheme based on proofs of ownership for cloud storage.
J. Inf. Sec. Appl., 2019

Identity-based key-exposure resilient cloud storage public auditing scheme from lattices.
Inf. Sci., 2019

Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage.
Inf. Sci., 2019

On error linear complexity of new generalized cyclotomic binary sequences of period p2.
Inf. Process. Lett., 2019

Identity-based public auditing for cloud storage systems against malicious auditors via blockchain.
SCIENCE CHINA Information Sciences, 2019

An efficient \(\mathcal{iO}\) -based data integrity verification scheme for cloud storage.
SCIENCE CHINA Information Sciences, 2019

Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server.
Wireless Personal Communications, 2018

HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems.
IEEE Trans. Industrial Informatics, 2018

A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage.
TIIS, 2018

Private Blockchain-Based Secure Access Control for Smart Home Systems.
TIIS, 2018

A dynamic and non-interactive boolean searchable symmetric encryption in multi-client setting.
J. Inf. Sec. Appl., 2018

Lattice-based searchable public-key encryption scheme for secure cloud storage.
IJWGS, 2018

Efficient multi-receiver identity-based signcryption from lattice assumption.
IJESDF, 2018

Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation.
SCIENCE CHINA Information Sciences, 2018

Pretraining Convolutional Neural Networks for Image-Based Vehicle Classification.
Adv. in MM, 2018

Blockchain-Based Secure Data Provenance for Cloud Storage.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

DStore: A Distributed Cloud Storage System Based on Smart Contracts and Blockchain.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Efficient Integrity Verification Scheme for Medical Data Records in Cloud-Assisted Wireless Medical Sensor Networks.
Wireless Personal Communications, 2017

Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation.
IEEE Trans. Information Forensics and Security, 2017

Statistical learning based fully homomorphic encryption on encrypted data.
Soft Comput., 2017

A Privacy Model for RFID Tag Ownership Transfer.
Security and Communication Networks, 2017

Fuzzy identity-based signature scheme from lattice and its application in biometric authentication.
TIIS, 2017

Medical Image Encryption Scheme Based on Arnold Transformation and ID-AK Protocol.
I. J. Network Security, 2017

Identity-based provable data possession revisited: Security analysis and generic construction.
Computer Standards & Interfaces, 2017

A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems.
Symmetry, 2016

A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.
J. Medical Systems, 2016

An Efficient Dynamic Group Signature with Non-frameability.
TIIS, 2016

Efficient Dynamic Integrity Verification for Big Data Supporting Users Revocability.
Information, 2016

An ID-based Hierarchical Access Control Scheme with Constant Size Public Parameter.
I. J. Network Security, 2016

A Secure and Robust Certificateless Public Key Steganography Based on SVD-DDWT.
I. J. Network Security, 2016

PPAM: Privacy-preserving Attributes Matchmaking Protocol for Mobile Social Networks Secure against Malicious Users.
I. J. Network Security, 2016

User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System.
I. J. Network Security, 2016

Enabling identity-based cloud storage public auditing with quantum computers resistance.
IJESDF, 2016

A new group signature scheme for dynamic membership.
IJESDF, 2016

Cloud Storage Access Control Scheme of Ciphertext Algorithm Based on Digital Envelope.
Intelligent Automation & Soft Computing, 2016

A new certificateless signature with enhanced security and aggregation version.
Concurrency and Computation: Practice and Experience, 2016

Analysis and improvement of a fair remote retrieval protocol for private medical records.
Concurrency and Computation: Practice and Experience, 2016

Cryptographic Public Verification of Data Integrity for Cloud Storage Systems.
IEEE Cloud Computing, 2016

Secure Searchable Public-Key Encryption for Cloud Storage.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016

SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors.
IEEE Trans. Comput. Social Systems, 2015

A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography.
J. Medical Systems, 2015

Cryptanalysis of an integrity checking scheme for cloud data sharing.
J. Inf. Sec. Appl., 2015

A Practical Forward-Secure Public-Key Encryption Scheme with Untrusted Update.
I. J. Network Security, 2015

Server-aided aggregate verification signature: security definition and construction.
IJICT, 2015

A post-quantum communication secure identity-based proxy-signcryption scheme.
IJESDF, 2015

An efficient certificateless deniable authentication protocol without pairings.
IJESDF, 2015

Efficient Pairing-Free Privacy-Preserving Auditing Scheme for Cloud Storage in Distributed Sensor Networks.
IJDSN, 2015

ID-Based Deniable Threshold Ring Authentication.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Analysis and Comparison of the Network Security Protocol with DoS/DDoS Attack Resistance Performance.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

An Efficient Provable Secure Public Auditing Scheme for Cloud Storage.
TIIS, 2014

Efficient fully homomorphic encryption from RLWE with an extension to a threshold encryption scheme.
Future Generation Comp. Syst., 2014

Cloud data auditing with designated verifier.
Frontiers Comput. Sci., 2014

Improved security of a dynamic remote data possession checking protocol for cloud storage.
Expert Syst. Appl., 2014

Efficient forward secure identity-based shorter signature from lattice.
Computers & Electrical Engineering, 2014

Secure and efficient privacy-preserving public auditing scheme for cloud storage.
Computers & Electrical Engineering, 2014

A Non-Parametric Data Envelopment Analysis Approach for Cloud Services Evaluation.
Proceedings of the Service-Oriented Computing - ICSOC 2014 Workshops, 2014

Optimized MHealth Batch Verification for a Variant of DSA.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

Efficient Identity-Based Public Auditing Scheme for Cloud Storage from Lattice Assumption.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

A Secure and Efficient Privacy-Preserving Attribute Matchmaking Protocol in Proximity-Based Mobile Social Networks.
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014

An Improved Certificateless Aggregate Signature.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing.
IEICE Transactions, 2013

A novel certificateless deniable authentication protocol.
IACR Cryptology ePrint Archive, 2013

Threshold public key encryption scheme resilient against continual leakage without random oracles.
Frontiers Comput. Sci., 2013

New forward-secure signature schemes with untrusted update.
Frontiers Comput. Sci., 2013

A Server-Aided Aggregate Verification Signature Scheme from Bilinear Pairing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Efficient Chosen Ciphertext Secure Threshold Public-Key Encryption with Forward Security.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Strongly Secure Attribute-Based Authenticated Key Exchange with Traceability.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

Cryptanalysis of Wang's Auditing Protocol for Data Storage Security in Cloud Computing.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

Strongly unforgeable proxy signature scheme secure in the standard model.
Journal of Systems and Software, 2011

Improvement of a proxy multi-signature scheme without random oracles.
Computer Communications, 2011

The Research of Tobacco Leaf Roasting Control Tactics Based on Fuzzy PID.
Proceedings of the Advances in Computer Science, 2011

A new model for model checking: cycle-weighted Kripke structure.
Frontiers Comput. Sci. China, 2010

Semantic Analysis of UML2.0 Sequence Diagram Based on Model Transformation.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

A Petri Net-Based Method for Data Validation of Web Services Composition.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

A Petri Net-Based Algorithm for RFID Event Detection.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

Golden Fish: An Intelligent Stream Cipher Fuse Memory Modules.
IACR Cryptology ePrint Archive, 2009

An efficient anonymous proxy signature scheme with provable security.
Computer Standards & Interfaces, 2009

Designated verifier proxy signature scheme without random oracles.
Computers & Mathematics with Applications, 2009

A New Method to Model and Analyze the WS-BPEL Process under the Dead-Path-Elimination Semantics.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

Cryptanalysis of Two Identity Based Signcryption Schemes.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Identity Based Multi-proxy Multi-signcryption Scheme for Electronic Commerce.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

General Group Oriented ID-based Cryptosystems with Chosen Plaintext Security.
I. J. Network Security, 2008

A practical method to analyze workflow logic models.
Concurrency and Computation: Practice and Experience, 2008

Modeling and verifying BPEL using synchronized net.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Formalizing Web Service Choreography Interface.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Stochastic modeling and quality evaluation of component-based software systems.
Proceedings of the Sixth International Conference on Quality Software (QSIC 2006), 2006

Stochastic Modeling and Quality Evaluation of Workflow Systems Based on QWF-Nets.
Proceedings of the Computational Science, 2006

A Note on Secure Key Issuing in ID-based Cryptography.
IACR Cryptology ePrint Archive, 2005

Forgery Attacks on Chang et al.'s signature scheme with message recovery.
IACR Cryptology ePrint Archive, 2004