Hui Ma

Orcid: 0000-0001-8359-5158

Affiliations:
  • Chinese Academy of Sciences (CAS), State Key Laboratory of Information Security, China


According to our database1, Hui Ma authored at least 29 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Gringotts: An Encrypted Version Control System With Less Trust on Servers.
IEEE Trans. Dependable Secur. Comput., 2024

2023
Rainbow: reliable personally identifiable information retrieval across multi-cloud.
Cybersecur., December, 2023

Flexible and Controllable Access Policy Update for Encrypted Data Sharing in the Cloud.
Comput. J., June, 2023

Everything Under Control: Secure Data Sharing Mechanism for Cloud-Edge Computing.
IEEE Trans. Inf. Forensics Secur., 2023

Wolverine: A Scalable and Transaction-Consistent Redactable Permissionless Blockchain.
IEEE Trans. Inf. Forensics Secur., 2023

2022
Server-Aided Fine-Grained Access Control Mechanism with Robust Revocation in Cloud Computing.
IEEE Trans. Serv. Comput., 2022

SeUpdate: Secure Encrypted Data Update for Multi-User Environments.
IEEE Trans. Dependable Secur. Comput., 2022

WebCloud: Web-Based Cloud Storage for Secure Data Sharing Across Platforms.
IEEE Trans. Dependable Secur. Comput., 2022

2021
Fully Accountable Data Sharing for Pay-as-You-Go Cloud Scenes.
IEEE Trans. Dependable Secur. Comput., 2021

Hashing multiple messages with SM3 on GPU platforms.
Sci. China Inf. Sci., 2021

Modular Design of Role-Symmetric Authenticated Key Exchange Protocols.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Efficient Parallelism of Post-Quantum Signature Scheme SPHINCS.
IEEE Trans. Parallel Distributed Syst., 2020

Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices.
IEEE Trans. Dependable Secur. Comput., 2020

Server-aided immediate and robust user revocation mechanism for SM9.
Cybersecur., 2020

Tightly Secure Two-Pass Authenticated Key Exchange Protocol in the CK Model.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020

Fully Secure ABE with Outsourced Decryption against Chosen Ciphertext Attack.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

An Efficient CCA-Secure Access Control Encryption for Any Policy.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications.
IEEE Trans. Dependable Secur. Comput., 2019

RKA Security of Identity-Based Homomorphic Signature Scheme.
IEEE Access, 2019

2018
Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2018

Certifying Variant of RSA with Generalized Moduli.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls - Secure and Efficient Fine-Grained Access Control on Corrupted Machines.
Proceedings of the Computer Security, 2018

2017
Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2017

Fine-grained access control system based on fully outsourced attribute-based encryption.
J. Syst. Softw., 2017

Provably secure cloud storage for mobile networks with less computation and smaller overhead.
Sci. China Inf. Sci., 2017

Access Control Encryption Based on LWE.
Proceedings of the 4th ACM International Workshop on ASIA Public-Key Cryptography, 2017

2016
Comments on "Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption".
IEEE Trans. Inf. Forensics Secur., 2016

2015
Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption.
IEEE Trans. Inf. Forensics Secur., 2015

Secure Cloud Storage for Dynamic Group: How to Achieve Identity Privacy-Preserving and Privilege Control.
Proceedings of the Network and System Security - 9th International Conference, 2015


  Loading...