Han Jiang

Orcid: 0000-0002-4909-367X

Affiliations:
  • Shandong University, Jinan, China


According to our database1, Han Jiang authored at least 38 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cut-and-choose bilateral oblivious transfer protocol based on DDH assumption.
J. Ambient Intell. Humaniz. Comput., February, 2024

2022
Distributed Fog Computing and Federated-Learning-Enabled Secure Aggregation for IoT Devices.
IEEE Internet Things J., 2022

Privacy-enhancing machine learning framework with private aggregation of teacher ensembles.
Int. J. Intell. Syst., 2022

A New and Efficient Lattice-Based Online/Offline Signature From Perspective of Abort.
Comput. J., 2022

2021
Postquantum Cut-and-Choose Oblivious Transfer Protocol Based on LWE.
Secur. Commun. Networks, 2021

Lightweight Threshold Private Set Intersection via Oblivious Transfer.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

2020
An Efficient Outsourced Oblivious Transfer Extension Protocol and Its Applications.
Secur. Commun. Networks, 2020

Lattice-Based Linearly Homomorphic Signature Scheme over F 2.
Secur. Commun. Networks, 2020

Post-Quantum Universal Composable OT Based on Key Exchange.
IEEE Access, 2020

Searchable Symmetric Encryption with Tunable Leakage Using Multiple Servers.
Proceedings of the Database Systems for Advanced Applications, 2020

2019
ID-Based Strong Designated Verifier Signature over ℛ-SIS Assumption.
Secur. Commun. Networks, 2019

Keyword guessing on multi-user searchable encryption.
Int. J. High Perform. Comput. Netw., 2019

Privacy preserved wireless sensor location protocols based on mobile edge computing.
Comput. Secur., 2019

Decentralization is Vulnerable Under the Gap Game.
IEEE Access, 2019

An Efficient Strong Designated Verifier Signature Based on ℛ-SIS Assumption.
IEEE Access, 2019

Research on Key Exchange Protocol Based on LWE.
Proceedings of the 15th International Conference on Computational Intelligence and Security, 2019

2018
An ORAM-based privacy preserving data sharing scheme for cloud storage.
J. Inf. Secur. Appl., 2018

An efficient symmetric searchable encryption scheme for dynamic dataset in cloud computing paradigms.
Int. J. High Perform. Comput. Netw., 2018

A New Post-Quantum Blind Signature From Lattice Assumptions.
IEEE Access, 2018

A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity.
Proceedings of the Network and System Security - 12th International Conference, 2018

Analysis on the Block Reward of Fork After Withholding (FAW).
Proceedings of the Network and System Security - 12th International Conference, 2018

Towards Security Authentication for IoT Devices with Lattice-Based ZK.
Proceedings of the Network and System Security - 12th International Conference, 2018

2017
Multi-user searchable encryption with a designated server.
Ann. des Télécommunications, 2017

An Efficient CPA-Secure Encryption Scheme with Equality Test.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
An Improvement to a Multi-Client Searchable Encryption Scheme for Boolean Queries.
J. Medical Syst., 2016

A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Practical Server-Aided k-out-of-n Oblivious Transfer Protocol.
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016

Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016

2015
Several Oblivious Transfer Variants in Cut-and-Choose Scenario.
Int. J. Inf. Secur. Priv., 2015

Cut-and-Choose Bilateral Oblivious Transfer and Its Application.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Efficient ORAM Based on Binary Tree without Data Overflow and Evictions.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

2014
Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation.
IACR Cryptol. ePrint Arch., 2014

2011
Attribute-Based Authenticated Key Exchange Protocol with General Relations.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

A New Cross-realm Group Password-based Authenticated Key Exchange Protocol.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Cryptanalysis on Identity-based Authenticated Key Agreement Protocols from Pairings.
J. Networks, 2010

A Fully Anonymous Identity-Based Signcryption Scheme in the Standard Model.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

Convertible Perfect Concurrent Signature Protocol.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010


  Loading...