Debiao He

Orcid: 0000-0002-2446-7436

According to our database1, Debiao He authored at least 371 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Decentralized Authenticated Key Agreement Scheme Based on Smart Contract for Securing Vehicular Ad-Hoc Networks.
IEEE Trans. Mob. Comput., May, 2024

Cryptographic Primitives in Privacy-Preserving Machine Learning: A Survey.
IEEE Trans. Knowl. Data Eng., May, 2024

LPDB: Lightweight Policy-Driven Blockchain With Batch Verification for Rail Transit Systems.
IEEE Trans. Veh. Technol., April, 2024

Lightweight and Secure Data Sharing Based on Proxy Re-Encryption for Blockchain-Enabled Industrial Internet of Things.
IEEE Internet Things J., April, 2024

The governance technology for blockchain systems: a survey.
Frontiers Comput. Sci., April, 2024

DBCPA: Dual Blockchain-Assisted Conditional Privacy-Preserving Authentication Framework and Protocol for Vehicular Ad Hoc Networks.
IEEE Trans. Mob. Comput., February, 2024

Multi-Party Privacy-Preserving Faster R-CNN Framework for Object Detection.
IEEE Trans. Emerg. Top. Comput. Intell., February, 2024

PSSC: Practical and Secure Sidechain Construction for Heterogeneous Blockchains Orienting IoT.
IEEE Internet Things J., February, 2024

LaRRS: Lattice-Based Revocable Ring Signature and Its Application for VANETs.
IEEE Trans. Veh. Technol., January, 2024

PpNNT: Multiparty Privacy-Preserving Neural Network Training System.
IEEE Trans. Artif. Intell., January, 2024

SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size.
Comput. Stand. Interfaces, January, 2024

ATRC: An Anonymous Traceable and Revocable Credential System Using Blockchain for VANETs.
IEEE Trans. Veh. Technol., 2024

Single-Server Public-Key Authenticated Encryption With Keyword Search and Its Application in IIoT.
IEEE Trans. Netw. Sci. Eng., 2024

A Practical and Provably Secure Authentication and Key Agreement Scheme for UAV-Assisted VANETs for Emergency Rescue.
IEEE Trans. Netw. Sci. Eng., 2024

A Lightweight Certificateless Multi-User Matchmaking Encryption for Mobile Devices: Enhancing Security and Performance.
IEEE Trans. Inf. Forensics Secur., 2024

Anonymity-Enhancing Multi-Hop Locks for Monero-Enabled Payment Channel Networks.
IEEE Trans. Inf. Forensics Secur., 2024

Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication Algorithm.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Parameter-Hiding Order-Revealing Encryption without Pairings.
IACR Cryptol. ePrint Arch., 2024

Stateless Deterministic Multi-Party EdDSA Signatures with Low Communication.
IACR Cryptol. ePrint Arch., 2024

Parameter-Hiding Order-Revealing Encryption Without Pairings.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

2023
Provable Secure and Lightweight Blockchain-Based V2I Handover Authentication and V2V Broadcast Protocol for VANETs.
IEEE Trans. Veh. Technol., December, 2023

Efficient Blockchain-Based Data Integrity Auditing for Multi-Copy in Decentralized Storage.
IEEE Trans. Parallel Distributed Syst., December, 2023

CoTree: A Side-Channel Collision Tool to Push the Limits of Conquerable Space.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., December, 2023

LedgerMaze: An Efficient Privacy-Preserving Noninteractive Zero-Knowledge Scheme Over Account-Model Blockchain.
IEEE Trans. Computers, December, 2023

A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth.
Connect. Sci., December, 2023

Lightweight Encryption and Authentication for Controller Area Network of Autonomous Vehicles.
IEEE Trans. Veh. Technol., November, 2023

MCPAP: A MSIS-based conditional privacy-preserving authentication protocol for smart grids.
J. Syst. Archit., October, 2023

Collaborative Intrusion Detection System for SDVN: A Fairness Federated Deep Learning Approach.
IEEE Trans. Parallel Distributed Syst., September, 2023

Blockchain-Assisted Privacy-Preserving Traffic Route Management Scheme for Fog-Based Vehicular Ad-Hoc Networks.
IEEE Trans. Netw. Serv. Manag., September, 2023

Faster Implementation of Ideal Lattice-Based Cryptography Using AVX512.
ACM Trans. Embed. Comput. Syst., September, 2023

EPRICE: An Efficient and Privacy-Preserving Real-Time Incentive System for Crowdsensing in Industrial Internet of Things.
IEEE Trans. Computers, September, 2023

Blockchain-Assisted Secure Data Sharing Protocol With a Dynamic Multiuser Keyword Search in IIoT.
IEEE Internet Things J., September, 2023

User-Friendly Public-Key Authenticated Encryption With Keyword Search for Industrial Internet of Things.
IEEE Internet Things J., August, 2023

Deep-Reuse-Enabled Common Satellite Network via Collaborative Blockchains: Architecture, Challenges, and Solutions.
IEEE Commun. Mag., August, 2023

Efficient Attribute-Based Signature With Collusion Resistance for Internet of Vehicles.
IEEE Trans. Veh. Technol., June, 2023

On the Niho Type Locally-APN Power Functions and Their Boomerang Spectrum.
IEEE Trans. Inf. Theory, June, 2023

Isoga: An Isogeny-Based Quantum-Resist Searchable Encryption Scheme Against Keyword Guessing Attacks.
IEEE Syst. J., June, 2023

SAPFS: An Efficient Symmetric-Key Authentication Key Agreement Scheme With Perfect Forward Secrecy for Industrial Internet of Things.
IEEE Internet Things J., June, 2023

Certificateless Public Auditing Scheme With Data Privacy and Dynamics in Group User Model of Cloud-Assisted Medical WSNs.
IEEE J. Biomed. Health Informatics, May, 2023

A Secure Certificateless Signcryption Scheme Without Pairing for Internet of Medical Things.
IEEE Internet Things J., May, 2023

Conditional privacy-preserving message authentication scheme for cross-domain Industrial Internet of Things.
Ad Hoc Networks, May, 2023

An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks.
IEEE Trans. Intell. Veh., April, 2023

High-Performance Implementation of the Identity-Based Signature Scheme in IEEE P1363 on GPU.
ACM Trans. Embed. Comput. Syst., March, 2023

BCGS: Blockchain-assisted privacy-preserving cross-domain authentication for VANETs.
Veh. Commun., 2023

An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for VANETs.
IEEE Trans. Veh. Technol., 2023

Exploring Dynamic Task Loading in SGX-Based Distributed Computing.
IEEE Trans. Serv. Comput., 2023

Efficient Blockchain-Based Electronic Medical Record Sharing With Anti-Malicious Propagation.
IEEE Trans. Serv. Comput., 2023

EthereumX: Improving Signature Security With Randomness Preprocessing Module.
IEEE Trans. Serv. Comput., 2023

A Survey on Redactable Blockchain: Challenges and Opportunities.
IEEE Trans. Netw. Sci. Eng., 2023

PCNN<sub>CEC</sub>: Efficient and Privacy-Preserving Convolutional Neural Network Inference Based on Cloud-Edge-Client Collaboration.
IEEE Trans. Netw. Sci. Eng., 2023

Efficient and Anonymous Cross-Domain Authentication for IIoT Based on Blockchain.
IEEE Trans. Netw. Sci. Eng., 2023

PBidm: Privacy-Preserving Blockchain-Based Identity Management System for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2023

Efficient Construction of Verifiable Timed Signatures and Its Application in Scalable Payments.
IEEE Trans. Inf. Forensics Secur., 2023

AADEC: Anonymous and Auditable Distributed Access Control for Edge Computing Services.
IEEE Trans. Inf. Forensics Secur., 2023

Efficient Anonymous Authentication Based on Physically Unclonable Function in Industrial Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2023

Identity-Based Broadcast Proxy Re-Encryption for Flexible Data Sharing in VANETs.
IEEE Trans. Inf. Forensics Secur., 2023

Dynamic Consensus Committee-Based for Secure Data Sharing With Authorized Multi-Receiver Searchable Encryption.
IEEE Trans. Inf. Forensics Secur., 2023

Lattice-Based Group Signatures With Time-Bound Keys via Redactable Signatures.
IEEE Trans. Inf. Forensics Secur., 2023

PERCE: A Permissioned Redactable Credentials Scheme for a Period of Membership.
IEEE Trans. Inf. Forensics Secur., 2023

Designated-Verifier Aggregate Signature Scheme With Sensitive Data Privacy Protection for Permissioned Blockchain-Assisted IIoT.
IEEE Trans. Inf. Forensics Secur., 2023

Efficient Multi-Party EdDSA Signature With Identifiable Aborts and its Applications to Blockchain.
IEEE Trans. Inf. Forensics Secur., 2023

BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records.
IEEE Trans. Inf. Forensics Secur., 2023

On the Security of a Lattice-Based Multi-Stage Secret Sharing Scheme.
IEEE Trans. Dependable Secur. Comput., 2023

Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices.
IEEE Trans. Dependable Secur. Comput., 2023

ACA: Anonymous, Confidential and Auditable Transaction Systems for Blockchain.
IEEE Trans. Dependable Secur. Comput., 2023

EBCPA: Efficient Blockchain-Based Conditional Privacy-Preserving Authentication for VANETs.
IEEE Trans. Dependable Secur. Comput., 2023

An Efficient Identity-Based Encryption With Equality Test in Cloud Computing.
IEEE Trans. Cloud Comput., 2023

Two-Party Adaptor Signature Scheme Based on IEEE P1363 Identity-Based Signature.
IEEE Open J. Commun. Soc., 2023

An Identity-Based Adaptor Signature Scheme and its Applications in the Blockchain System.
IEEE Open J. Comput. Soc., 2023

Communication-Efficient and Byzantine-Robust Federated Learning for Mobile Edge Computing Networks.
IEEE Netw., 2023

An identity-based dynamic group signature scheme for reputation evaluation systems.
J. Syst. Archit., 2023

A Group Signature Scheme With Selective Linkability and Traceability for Blockchain-Based Data Sharing Systems in E-Health Services.
IEEE Internet Things J., 2023

Lattice Based Signatures with Additional Functionalities.
IACR Cryptol. ePrint Arch., 2023

Revisiting Pairing-friendly Curves with Embedding Degrees 10 and 14.
IACR Cryptol. ePrint Arch., 2023

Traceable Ring Signatures from Group Actions: Logarithmic, Flexible, and Quantum Resistant.
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023

FleS: A Compact and Parameter-Flexible Supersingular Isogeny Based Public Key Encryption Scheme.
Proceedings of the Provable and Practical Security, 2023

Secure CNN Training and Inference based on Multi-key Fully Homomorphic Encryption.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Power Grid Encrypted Data Range Filtering Scheme Based on Order-revealing Encryption.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
G-VCFL: Grouped Verifiable Chained Privacy-Preserving Federated Learning.
IEEE Trans. Netw. Serv. Manag., December, 2022

Efficient Certificateless Conditional Privacy-Preserving Authentication for VANETs.
IEEE Trans. Veh. Technol., 2022

Lattice-Based Conditional Privacy-Preserving Authentication Protocol for the Vehicular Ad Hoc Network.
IEEE Trans. Veh. Technol., 2022

A Blockchain-Based Self-Tallying Voting Protocol With Maximum Voter Privacy.
IEEE Trans. Netw. Sci. Eng., 2022

SAKE*: A Symmetric Authenticated Key Exchange Protocol With Perfect Forward Secrecy for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022

Synchronized Provable Data Possession Based on Blockchain for Digital Twin.
IEEE Trans. Inf. Forensics Secur., 2022

An Efficient Identity-Based Aggregate Signcryption Scheme With Blockchain for IoT-Enabled Maritime Transportation System.
IEEE Trans. Green Commun. Netw., 2022

Human-in-the-Loop-Aided Privacy-Preserving Scheme for Smart Healthcare.
IEEE Trans. Emerg. Top. Comput. Intell., 2022

Dual-Server Public-Key Authenticated Encryption with Keyword Search.
IEEE Trans. Cloud Comput., 2022

DssP: Efficient Dual-Server Secret Sharing Protocol Based on Password Authentication for Cloud Storage Services.
IEEE Syst. J., 2022

The Security of Blockchain-Based Medical Systems: Research Challenges and Opportunities.
IEEE Syst. J., 2022

An Efficient Privacy-Preserving Credit Score System Based on Noninteractive Zero-Knowledge Proof.
IEEE Syst. J., 2022

A Quantum Secure and Noninteractive Identity-Based Aggregate Signature Protocol From Lattices.
IEEE Syst. J., 2022

High-throughput block cipher implementations with SIMD.
J. Inf. Secur. Appl., 2022

A blockchain-based conditional privacy-preserving authentication scheme for edge computing services.
J. Inf. Secur. Appl., 2022

Blockchain-Based Secure and Lightweight Authentication for Internet of Things.
IEEE Internet Things J., 2022

A Secure and Efficient Multiserver Authentication and Key Agreement Protocol for Internet of Vehicles.
IEEE Internet Things J., 2022

An Efficient Privacy-Preserving Aggregation Scheme for Multidimensional Data in IoT.
IEEE Internet Things J., 2022

Multifunctional and Multidimensional Secure Data Aggregation Scheme in WSNs.
IEEE Internet Things J., 2022

Blockchain-Based Privacy-Preserving and Rewarding Private Data Sharing for IoT.
IEEE Internet Things J., 2022

A Blockchain-Assisted Privacy-Aware Authentication Scheme for Internet of Medical Things.
IEEE Internet Things J., 2022

A Redesigned Identity-Based Anonymous Authentication Scheme for Mobile-Edge Computing.
IEEE Internet Things J., 2022

Hash-balanced binary tree-based public auditing in vehicular edge computing and networks.
Int. J. Commun. Syst., 2022

An efficient blockchain-based batch verification scheme for vehicular ad hoc networks.
Trans. Emerg. Telecommun. Technol., 2022

An efficient data aggregation scheme with local differential privacy in smart grid.
Digit. Commun. Networks, 2022

Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges.
ACM Comput. Surv., 2022

The Application of the Blockchain Technology in Voting Systems: A Review.
ACM Comput. Surv., 2022

An adaptive access control scheme based on trust degrees for edge computing.
Comput. Stand. Interfaces, 2022

Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9.
Comput. J., 2022

Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0.
Sci. China Inf. Sci., 2022

Lattice-based undeniable signature scheme.
Ann. des Télécommunications, 2022

Secure Distributed Outsourcing of Large-scale Linear Systems.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Asymmetric Secure Multi-party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
Proceedings of the Emerging Information Security and Applications, 2022

Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

2021
Reliable and Secure e-Health Networks.
Wirel. Pers. Commun., 2021

Provable Data Possession with Outsourced Data Transfer.
IEEE Trans. Serv. Comput., 2021

A Software/Hardware Co-Design of Crystals-Dilithium Signature Scheme.
ACM Trans. Reconfigurable Technol. Syst., 2021

Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid.
ACM Trans. Sens. Networks, 2021

EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System.
ACM Trans. Internet Techn., 2021

Efficient Distributed Decryption Scheme for IoT Gateway-based Applications.
ACM Trans. Internet Techn., 2021

Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities.
ACM Trans. Internet Techn., 2021

A Blockchain-Based Proxy Re-Encryption With Equality Test for Vehicular Communication Systems.
IEEE Trans. Netw. Sci. Eng., 2021

An Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit Authentication Protocol for Internet of Connected Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021

BCPPA: A Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2021

Secure Storage Auditing With Efficient Key Updates for Cognitive Industrial IoT Environment.
IEEE Trans. Ind. Informatics, 2021

OBFP: Optimized Blockchain-Based Fair Payment for Outsourcing Computations in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2021

Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data.
IEEE Trans. Emerg. Top. Comput., 2021

Blockchain-Based Private Provable Data Possession.
IEEE Trans. Dependable Secur. Comput., 2021

Dynamic Group-Oriented Provable Data Possession in the Cloud.
IEEE Trans. Dependable Secur. Comput., 2021

PPChain: A Privacy-Preserving Permissioned Blockchain Architecture for Cryptocurrency and Other Regulated Applications.
IEEE Syst. J., 2021

A Survey of Blockchain Applications in the Energy Sector.
IEEE Syst. J., 2021

The Applications of Blockchain in Artificial Intelligence.
Secur. Commun. Networks, 2021

Blockchain-Based Secure Communication for Space Information Networks.
IEEE Netw., 2021

Efficient Identity-Based Distributed Decryption Scheme for Electronic Personal Health Record Sharing System.
IEEE J. Sel. Areas Commun., 2021

RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks.
J. Parallel Distributed Comput., 2021

Blockchain-based multi-party proof of assets with privacy preservation.
Inf. Sci., 2021

An Efficient and Privacy-Preserving Outsourced Support Vector Machine Training for Internet of Medical Things.
IEEE Internet Things J., 2021

Efficient Certificateless Online/Offline Signature Scheme for Wireless Body Area Networks.
IEEE Internet Things J., 2021

Permissioned Blockchain-Based Anonymous and Traceable Aggregate Signature Scheme for Industrial Internet of Things.
IEEE Internet Things J., 2021

CL-ME: Efficient Certificateless Matchmaking Encryption for Internet of Things.
IEEE Internet Things J., 2021

Analysis and Improvement of a Certificateless Signature Scheme for Resource-Constrained Scenarios.
IEEE Commun. Lett., 2021

CoTree: Push the Limits of Conquerable Space in Collision-Optimized Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2021

Editorial for special issue on "security and privacy protection in the era of IoT devices".
Digit. Commun. Networks, 2021

Privacy-Enhancing Decentralized Anonymous Credential in Smart Grids.
Comput. Stand. Interfaces, 2021

An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud.
Connect. Sci., 2021

A Secure and Privacy-Preserving Data Transmission Scheme in the Healthcare Framework.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

2020
A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020

Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing.
IEEE Trans. Sustain. Comput., 2020

VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud.
IEEE Trans. Serv. Comput., 2020

Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure.
IEEE Trans. Ind. Informatics, 2020

BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks.
IEEE Trans. Ind. Informatics, 2020

DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain.
IEEE Trans. Inf. Forensics Secur., 2020

On the Security of a Key Agreement and Key Protection Scheme.
IEEE Trans. Inf. Forensics Secur., 2020

SecureNLP: A System for Multi-Party Privacy-Preserving Natural Language Processing.
IEEE Trans. Inf. Forensics Secur., 2020

Blockchain-Based Anonymous Reporting Scheme With Anonymous Rewarding.
IEEE Trans. Engineering Management, 2020

Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IEEE Trans. Dependable Secur. Comput., 2020

Efficient Obfuscation for Encrypted Identity-Based Signatures in Wireless Body Area Networks.
IEEE Syst. J., 2020

CB-PS: An Efficient Short-Certificate-Based Proxy Signature Scheme for UAVs.
IEEE Syst. J., 2020

A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing.
IEEE Syst. J., 2020

White-Box Implementation of Shamir's Identity-Based Signature Scheme.
IEEE Syst. J., 2020

Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs.
Secur. Commun. Networks, 2020

Blockchain-based identity management systems: A review.
J. Netw. Comput. Appl., 2020

Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems.
J. Medical Syst., 2020

A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems.
J. Inf. Secur. Appl., 2020

CsiIBS: A post-quantum identity-based signature scheme based on isogenies.
J. Inf. Secur. Appl., 2020

Certificateless searchable public key encryption scheme secure against keyword guessing attacks for smart healthcare.
J. Inf. Secur. Appl., 2020

An efficient and provable certificate-based proxy signature scheme for IIoT environment.
Inf. Sci., 2020

Blockchain-based system for secure outsourcing of bilinear pairings.
Inf. Sci., 2020

Efficient and Provably Secure Multireceiver Signcryption Scheme for Multicast Communication in Edge Computing.
IEEE Internet Things J., 2020

HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes.
IEEE Internet Things J., 2020

Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography.
IET Inf. Secur., 2020

Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme.
IET Inf. Secur., 2020

White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IEICE Trans. Inf. Syst., 2020

Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography.
Future Gener. Comput. Syst., 2020

A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm.
Frontiers Comput. Sci., 2020

Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey.
Comput. Secur., 2020

A lightweight authentication and key agreement scheme for Internet of Drones.
Comput. Commun., 2020

SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system.
Sci. China Inf. Sci., 2020

Introduction to the special section on blockchain techniques for the internet of vehicles security (VSI-bciov).
Comput. Electr. Eng., 2020

Efficient and Secure Ciphertext-Policy Attribute-Based Encryption Without Pairing for Cloud-Assisted Smart Grid.
IEEE Access, 2020

A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing.
IEEE Access, 2020

Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in Cryptocurrency.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Efficient and Secure Two-Party Distributed Signing Protocol for the GOST Signature Algorithm.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

A Practical NIZK Argument for Confidential Transactions over Account-Model Blockchain.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020

An Efficient Data Aggregation Scheme with Local Differential Privacy in Smart Grid.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

An Efficient Blind Signature Scheme Based on SM2 Signature Algorithm.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
Authenticated key agreement scheme for fog-driven IoT healthcare system.
Wirel. Networks, 2019

Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network.
IEEE Trans. Veh. Technol., 2019

Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession.
IEEE Trans. Serv. Comput., 2019

Secure Key Agreement and Key Protection for Mobile Device User Authentication.
IEEE Trans. Inf. Forensics Secur., 2019

Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2019

Improved secure fuzzy auditing protocol for cloud data storage.
Soft Comput., 2019

Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices.
IEEE Syst. J., 2019

Anonymous and Efficient Message Authentication Scheme for Smart Grid.
Secur. Commun. Networks, 2019

A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks.
Secur. Commun. Networks, 2019

Blockchain in healthcare applications: Research challenges and opportunities.
J. Netw. Comput. Appl., 2019

A survey on privacy protection in blockchain system.
J. Netw. Comput. Appl., 2019

Isogeny-Based Cryptography: A Promising Post-Quantum Technique.
IT Prof., 2019

Privacy-preserving incentive and rewarding scheme for crowd computing in social media.
Inf. Sci., 2019

BBARS: Blockchain-Based Anonymous Rewarding Scheme for V2G Networks.
IEEE Internet Things J., 2019

An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks.
IEEE Internet Things J., 2019

Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks.
Int. J. Found. Comput. Sci., 2019

Parking Management: A Blockchain-Based Privacy-Preserving System.
IEEE Consumer Electron. Mag., 2019

Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things.
Ann. des Télécommunications, 2019

Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web Users.
Proceedings of the 28th USENIX Security Symposium, 2019

Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
BaDS: Blockchain-Based Architecture for Data Sharing with ABS and CP-ABE in IoT.
Wirel. Commun. Mob. Comput., 2018

Efficient Identity-Based Encryption Scheme with Equality Test in Smart City.
IEEE Trans. Sustain. Comput., 2018

Privacy-preserving auditing scheme for shared data in public clouds.
J. Supercomput., 2018

Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018

Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018

Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems.
IEEE Trans. Ind. Informatics, 2018

A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks.
Telecommun. Syst., 2018

A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network.
IEEE Trans. Dependable Secur. Comput., 2018

An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage.
Soft Comput., 2018

Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps.
Soft Comput., 2018

Attribute-based fuzzy identity access control in multicloud computing environments.
Soft Comput., 2018

Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption.
Soft Comput., 2018

On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices.
IEEE Syst. J., 2018

Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks.
IEEE Syst. J., 2018

Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services.
IEEE Syst. J., 2018

A General Architecture for Multiserver Authentication Key Agreement with Provable Security.
Secur. Commun. Networks, 2018

New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment.
Secur. Commun. Networks, 2018

An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System.
Secur. Commun. Networks, 2018

Signature-based three-factor authenticated key exchange for internet of things applications.
Multim. Tools Appl., 2018

Efficient and secure searchable encryption protocol for cloud-based Internet of Things.
J. Parallel Distributed Comput., 2018

BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0.
J. Netw. Comput. Appl., 2018

Efficient and Provably Secure Distributed Signing Protocol for Mobile Devices in Wireless Networks.
IEEE Internet Things J., 2018

An efficient and secure 3-factor user-authentication protocol for multiserver environment.
Int. J. Commun. Syst., 2018

Efficient revocable ID-based encryption with cloud revocation server.
Int. J. Commun. Syst., 2018

White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IACR Cryptol. ePrint Arch., 2018

PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds.
Future Gener. Comput. Syst., 2018

Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment.
Future Gener. Comput. Syst., 2018

Taxonomy and analysis of security protocols for Internet of Things.
Future Gener. Comput. Syst., 2018

A general compiler for password-authenticated group key exchange protocol in the standard model.
Discret. Appl. Math., 2018

IoTChain: A Three-Tier Blockchain-based IoT Security Architecture.
CoRR, 2018

Security and Privacy for the Internet of Drones: Challenges and Solutions.
IEEE Commun. Mag., 2018

Certificateless searchable public key encryption scheme for mobile healthcare system.
Comput. Electr. Eng., 2018

An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment.
Ad Hoc Networks, 2018

Compact Hardware Implementation of a SHA-3 Core for Wireless Body Sensor Networks.
IEEE Access, 2018

A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems.
IEEE Access, 2018

IEEE Access Special Section Editorial: Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies.
IEEE Access, 2018

2017
Advances and Challenges in Convergent Communication Networks.
Wirel. Pers. Commun., 2017

Insecurity of a Pairing-Free Certificateless Ring Signcryption Scheme.
Wirel. Pers. Commun., 2017

Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography.
Wirel. Commun. Mob. Comput., 2017

Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid Against Internal Adversaries.
IEEE Trans. Smart Grid, 2017

A secure and efficient public auditing scheme using RSA algorithm for cloud storage.
J. Supercomput., 2017

Security analysis of a publicly verifiable data possession scheme for remote storage.
J. Supercomput., 2017

Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System.
IEEE Trans. Inf. Forensics Secur., 2017

Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing.
Soft Comput., 2017

Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing.
Soft Comput., 2017

Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices.
Soft Comput., 2017

Anonymous Authentication for Wireless Body Area Networks With Provable Security.
IEEE Syst. J., 2017

Secure public data auditing scheme for cloud storage in smart city.
Pers. Ubiquitous Comput., 2017

Cryptanalysis of an identity-based public auditing protocol for cloud storage.
Frontiers Inf. Technol. Electron. Eng., 2017

An Enhanced Cloud Data Storage Auditing Protocol Providing Strong Security and Efficiency for Smart City.
J. Inf. Sci. Eng., 2017

An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network.
J. Inf. Secur. Appl., 2017

Special issue on Secure Computation on Encrypted Data.
J. Inf. Secur. Appl., 2017

Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage.
Inf. Sci., 2017

A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks.
Int. J. Netw. Manag., 2017

A secure and efficient identity-based mutual authentication scheme with smart card using elliptic curve cryptography.
Int. J. Commun. Syst., 2017

An efficient chaos-based 2-party key agreement protocol with provable security.
Int. J. Commun. Syst., 2017

Balanced anonymity and traceability for outsourcing small-scale data linear aggregation in the smart grid.
IET Inf. Secur., 2017

A secure data backup scheme using multi-factor authentication.
IET Inf. Secur., 2017

Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error.
IACR Cryptol. ePrint Arch., 2017

An Efficient NIZK Scheme for Privacy-Preserving Transactions over Account-Model Blockchain.
IACR Cryptol. ePrint Arch., 2017

Efficient and secure identity-based encryption scheme with equality test in cloud computing.
Future Gener. Comput. Syst., 2017

Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography.
Comput. Networks, 2017

Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation.
Sci. China Inf. Sci., 2017

Introduction to the Special Section on Security and Privacy in Wearable and Embedded Technologies.
Comput. Electr. Eng., 2017

Privacy-preserving certificateless provable data possession scheme for big data storage on cloud.
Appl. Math. Comput., 2017

Security Analysis of Two Password-Authenticated Multi-Key Exchange Protocols.
IEEE Access, 2017

Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks.
IEEE Access, 2017

Efficient Revocable ID-Based Signature With Cloud Revocation Server.
IEEE Access, 2017

Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
Privacy-preserving data aggregation scheme against internal attackers in smart grids.
Wirel. Networks, 2016

A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem.
J. Supercomput., 2016

Security analysis of a user registration approach.
J. Supercomput., 2016

A privacy preserving three-factor authentication protocol for e-Health clouds.
J. Supercomput., 2016

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud.
IEEE Trans. Inf. Forensics Secur., 2016

Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures.
IEEE Trans. Inf. Forensics Secur., 2016

ESDR: an efficient and secure data repairing paradigm in cloud storage.
Secur. Commun. Networks, 2016

A novel covert channel detection method in cloud based on XSRM and improved event association algorithm.
Secur. Commun. Networks, 2016

Cryptanalysis of a certificateless aggregate signature scheme with efficient verification.
Secur. Commun. Networks, 2016

New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems.
J. High Speed Networks, 2016

Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography.
IET Commun., 2016

One-to-many authentication for access control in mobile pay-TV systems.
Sci. China Inf. Sci., 2016

fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Oblivious Transfer Protocols Based on Group Factoring Problem.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography.
Wirel. Pers. Commun., 2015

An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2015

Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment.
IEEE Trans. Dependable Secur. Comput., 2015

Secure pseudonym-based near field communication protocol for the consumer internet of things.
IEEE Trans. Consumer Electron., 2015

Robust Biometrics-Based Authentication Scheme for Multiserver Environment.
IEEE Syst. J., 2015

Efficient provably secure password-based explicit authenticated key agreement.
Pervasive Mob. Comput., 2015

Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks.
Multim. Syst., 2015

New biometrics-based authentication scheme for multi-server environment in critical systems.
J. Ambient Intell. Humaniz. Comput., 2015

A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks.
Inf. Sci., 2015

An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography.
IEEE Internet Things J., 2015

Enhanced authentication protocol for session initiation protocol using smart card.
Int. J. Electron. Secur. Digit. Forensics, 2015

A new handover authentication protocol based on bilinear pairing functions for wireless networks.
Int. J. Ad Hoc Ubiquitous Comput., 2015

Authentication protocol for an ambient assisted living system.
IEEE Commun. Mag., 2015

Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model.
Comput. J., 2015

Robust Biometric-Based User Authentication Scheme for Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2015

Proxy Provable Data Possession with General Access Structure in Public Clouds.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks.
Wirel. Pers. Commun., 2014

An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks.
J. Supercomput., 2014

Enhanced three-factor security protocol for consumer USB mass storage devices.
IEEE Trans. Consumer Electron., 2014

Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol.
J. Medical Syst., 2014

Security Analysis and Improvements of a Three-Party Password-Based Key Exchange Protocol.
Inf. Technol. Control., 2014

Provably Secure Proxy Multi-Signature Scheme Based on ECC.
Inf. Technol. Control., 2014

Insecurity of an efficient certificateless aggregate signature with constant pairing computations.
Inf. Sci., 2014

Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol.
Int. J. Netw. Secur., 2014

On the Security of a RSA-based Certificateless Signature Scheme.
Int. J. Netw. Secur., 2014

Cryptanalysis and improvement of a DoS-resistant ID-based password authentication scheme without using smart card.
Int. J. Inf. Commun. Technol., 2014

Anonymous Two-Factor Authentication: Certain Goals Are Beyond Attainment.
IACR Cryptol. ePrint Arch., 2014

2013
Security Flaws in a Smart Card Based Authentication Scheme for Multi-server Environment.
Wirel. Pers. Commun., 2013

Anonymous two-factor authentication for consumer roaming service in global mobility networks.
IEEE Trans. Consumer Electron., 2013

An efficient certificateless proxy signature scheme without pairing.
Math. Comput. Model., 2013

Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards.
Inf. Technol. Control., 2013

Security Analysis of a Dynamic ID-based Authentication Scheme for Multi-server Environment Using Smart Cards.
Int. J. Netw. Secur., 2013

Cryptanalysis of a key agreement protocol based on chaotic Hash.
Int. J. Electron. Secur. Digit. Forensics, 2013

On the security of an authentication scheme for multi-server architecture.
Int. J. Electron. Secur. Digit. Forensics, 2013

New certificateless short signature scheme.
IET Inf. Secur., 2013

Cryptanalysis of a Dynamic ID-Based Remote User Authentication Scheme with Access Control for Multi-Server Environments.
IEICE Trans. Inf. Syst., 2013

An efficient certificateless designated verifier signature scheme.
Int. Arab J. Inf. Technol., 2013

Efficient ID-based multiproxy multisignature without bilinear maps in ROM.
Ann. des Télécommunications, 2013

Cryptanalysis of "An Improved Remote Password Authentication Scheme with Smartcard".
Proceedings of the 12th IEEE International Conference on Trust, 2013

A secure temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks.
Proceedings of the International Symposium on Wireless and pervasive Computing, 2013

2012
A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography.
Secur. Commun. Networks, 2012

A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography.
Secur. Commun. Networks, 2012

Note on 'Design of improved password authentication and update scheme based on elliptic curve cryptography'.
Math. Comput. Model., 2012

A More Secure Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2012

Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol.
Inf. Sci., 2012

An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security.
Inf. Fusion, 2012

Weaknesses in a dynamic ID-based remote user authentication scheme for multi-server environment.
Int. J. Electron. Secur. Digit. Forensics, 2012

Cryptanalysis of a three-party password-based authenticated key exchange protocol using Weil pairing.
Int. J. Electron. Secur. Digit. Forensics, 2012

An efficient and provably-secure certificateless signature scheme without bilinear pairings.
Int. J. Commun. Syst., 2012

A pairing-free certificateless authenticated key agreement protocol.
Int. J. Commun. Syst., 2012

Cryptanalysis of a Smartcard-Based User Authentication Scheme for Multi-Server Environments.
IEICE Trans. Commun., 2012

A note on 'An efficient certificateless aggregate signature with constant pairing computations'.
IACR Cryptol. ePrint Arch., 2012

Cryptanalysis of a Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2012

Robust biometric-based user authentication scheme for wireless sensor networks.
IACR Cryptol. ePrint Arch., 2012

An efficient certificateless two-party authenticated key agreement protocol.
Comput. Math. Appl., 2012

An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings.
Ad Hoc Networks, 2012

Weaknesses of "Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol".
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012

2011
A new two-round certificateless authenticated key agreement protocol without bilinear pairings.
Math. Comput. Model., 2011

Weaknesses of a Remote User Password Authentication Scheme Using Smart Card.
Int. J. Netw. Secur., 2011

An Authenticated Key Agreement Protocol Using Isogenies Between Elliptic Curves.
Int. J. Comput. Commun. Control, 2011

A Pairing-free Certificateless Authenticated Key Agreement Protocol in the eCK Model.
IACR Cryptol. ePrint Arch., 2011

An efficient certificateless two-party authenticated key agreement scheme from pairings.
IACR Cryptol. ePrint Arch., 2011

Identity-based Digital Signature Scheme Without Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2011

Comments on a password authentication and update scheme based on elliptic curve cryptography.
IACR Cryptol. ePrint Arch., 2011

Security flaws in a biometrics-based multi-server authentication with key agreement scheme.
IACR Cryptol. ePrint Arch., 2011

Cryptanalysis of a key agreement protocol based on chaotic Hash.
IACR Cryptol. ePrint Arch., 2011

Comments on a secure dynamic ID-based remote user authentication scheme for multi-server environment using smart cards.
IACR Cryptol. ePrint Arch., 2011

Weakness in a Mutual Authentication Scheme for Session Initiation Protocol using Elliptic Curve Cryptography
CoRR, 2011

An efficient certificateless authenticated key agreement protocol without bilinear pairings
CoRR, 2011

An efficient identity-based blind signature scheme without bilinear pairings.
Comput. Electr. Eng., 2011

An ID-based proxy signature schemes without bilinear pairings.
Ann. des Télécommunications, 2011

2010
Cryptanalysis of a Simple Three-party Key Exchange Protocol.
Informatica (Slovenia), 2010

Weaknesses of a dynamic ID-based remote user authentication scheme.
Int. J. Electron. Secur. Digit. Forensics, 2010

Efficient and provably-secure certificateless signature scheme without bilinear pairings.
IACR Cryptol. ePrint Arch., 2010

Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices.
IACR Cryptol. ePrint Arch., 2010

On security of a remote user authentication scheme without using smart cards.
IACR Cryptol. ePrint Arch., 2010

Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card.
IACR Cryptol. ePrint Arch., 2010

Weaknesses of a dynamic ID-based remote user authentication scheme.
IACR Cryptol. ePrint Arch., 2010

Cryptanalysis of a DoS-resistant ID-based password authentication.
IACR Cryptol. ePrint Arch., 2010

A Random Number Generator Based on Isogenies Operations.
IACR Cryptol. ePrint Arch., 2010

Weakness Analysis and Improvement of a Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
CoRR, 2010

2009
Fast Algorithm for Computing the Minimal Polynomials of Gaussian Periods.
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009


  Loading...