Jianhua Chen

Orcid: 0000-0001-6432-4926

Affiliations:
  • Wuhan University, School of Mathematics and Statistics, China


According to our database1, Jianhua Chen authored at least 85 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Isoga: An Isogeny-Based Quantum-Resist Searchable Encryption Scheme Against Keyword Guessing Attacks.
IEEE Syst. J., June, 2023

2022
Provably secure post-quantum authenticated key exchange from supersingular isogenies.
J. Supercomput., 2022

Authentication and key establishment protocol from supersingular isogeny for mobile environments.
J. Supercomput., 2022

SAKE*: A Symmetric Authenticated Key Exchange Protocol With Perfect Forward Secrecy for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022

An efficient and privacy-preserving mutual authentication with key agreement scheme for telecare medicine information system.
Peer-to-Peer Netw. Appl., 2022

CPP-CLAS: Efficient and Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme for VANETs.
IEEE Internet Things J., 2022

A biometrics-based anonymous authentication and key agreement scheme for wireless sensor networks.
Concurr. Comput. Pract. Exp., 2022

2021
EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System.
ACM Trans. Internet Techn., 2021

Efficient Distributed Decryption Scheme for IoT Gateway-based Applications.
ACM Trans. Internet Techn., 2021

Secure authenticated key exchange for WSNs in IoT applications.
J. Supercomput., 2021

An efficient mutual authentication and key agreement scheme without password for wireless sensor networks.
J. Supercomput., 2021

A secure three-factor-based authentication with key agreement protocol for e-Health clouds.
J. Supercomput., 2021

An Efficient One-Way Authenticated Key Exchange Protocol for Anonymity Networks.
IEEE Syst. J., 2021

Two-Pass Privacy Preserving Authenticated Key Agreement Scheme for Smart Grid.
IEEE Syst. J., 2021

Anonymous and provably secure authentication protocol using self-certified cryptography for wireless sensor networks.
Multim. Tools Appl., 2021

A secure and efficient authentication and data sharing scheme for Internet of Things based on blockchain.
J. Syst. Archit., 2021

An enhanced dynamic authentication scheme for mobile satellite communication systems.
Int. J. Satell. Commun. Netw., 2021

2020
CsiIBS: A post-quantum identity-based signature scheme based on isogenies.
J. Inf. Secur. Appl., 2020

Efficient and Provably Secure Multireceiver Signcryption Scheme for Multicast Communication in Edge Computing.
IEEE Internet Things J., 2020

An improved mutual authentication protocol based on perfect forward secrecy for satellite communications.
Int. J. Satell. Commun. Netw., 2020

A privacy-preserving biometrics based authenticated key agreement scheme using ECC.
Int. J. Commun. Syst., 2020

Robust three-factor authentication protocol for satellite communication systems.
Int. J. Commun. Syst., 2020

2019
Anonymous biconf/www/WuJZJLHW19 conf/ccis/WuWFZHLDJ18 ometrics-based authentication with key agreement scheme for multi-server environment using ECC.
Multim. Tools Appl., 2019

基于智能卡的扩展混沌映射异步认证密钥协商协议 (Chaotic Mapping Asynchronous Authentication Key Agreement Scheme with Smart-cards).
计算机科学, 2019

一个前向安全的基于RSA的多服务器的认证协议 (Forward-secure RSA-based Multi-server Authentication Protocol).
计算机科学, 2019

Provably secure anonymous three-factor authentication scheme for multi-server environments.
J. Ambient Intell. Humaniz. Comput., 2019

Isogeny-Based Cryptography: A Promising Post-Quantum Technique.
IT Prof., 2019

A secure authentication with key agreement scheme using ECC for satellite communication systems.
Int. J. Satell. Commun. Netw., 2019

2018
Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018

A provably secure anonymous mutual authentication scheme with key agreement for SIP using ECC.
Peer-to-Peer Netw. Appl., 2018

New robust biometrics-based mutual authentication scheme with key agreement using elliptic curve cryptography.
Multim. Tools Appl., 2018

多服务器环境下基于椭圆曲线密码的改进的身份认证协议 (Improved Identity Authentication Protocol Based on Elliptic Curve Cryptographyin Multi-server Environment).
计算机科学, 2018

Privacy-Preserving and Efficient Truly Three-Factor Authentication Scheme for Telecare Medical Information Systems.
J. Medical Syst., 2018

An enhanced authentication with key agreement scheme for satellite communication systems.
Int. J. Satell. Commun. Netw., 2018

A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC.
Comput. Methods Programs Biomed., 2018

Certificateless searchable public key encryption scheme for mobile healthcare system.
Comput. Electr. Eng., 2018

2017
Insecurity of a Pairing-Free Certificateless Ring Signcryption Scheme.
Wirel. Pers. Commun., 2017

An Enhanced Anonymous Password-based Authenticated Key Agreement Scheme with Formal Proof.
Int. J. Netw. Secur., 2017

An improved authenticated key agreement with anonymity for session initiation protocol.
Int. J. Electron. Secur. Digit. Forensics, 2017

An efficient two-party authentication key exchange protocol for mobile environment.
Int. J. Commun. Syst., 2017

Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error.
IACR Cryptol. ePrint Arch., 2017

2016
A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography.
Secur. Commun. Networks, 2016

Cryptanalysis of a certificateless aggregate signature scheme with efficient verification.
Secur. Commun. Networks, 2016

Security analysis and enhancements of a multi-factor biometric authentication scheme.
Int. J. Electron. Secur. Digit. Forensics, 2016

Insecurity of a Certificateless Aggregate Signature Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

2015
An Improved Two-Party Authentication Key Exchange Protocol for Mobile Environment.
Wirel. Pers. Commun., 2015

Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks.
Multim. Syst., 2015

An improved authentication scheme for mobile satellite communication systems.
Int. J. Satell. Commun. Netw., 2015

Enhanced authentication protocol for session initiation protocol using smart card.
Int. J. Electron. Secur. Digit. Forensics, 2015

Robust Biometric-Based User Authentication Scheme for Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2015

2014
Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks.
Wirel. Pers. Commun., 2014

An Efficient Password Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography.
Inf. Technol. Control., 2014

Security Analysis and Improvements of a Three-Party Password-Based Key Exchange Protocol.
Inf. Technol. Control., 2014

Insecurity of an efficient certificateless aggregate signature with constant pairing computations.
Inf. Sci., 2014

Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol.
Int. J. Netw. Secur., 2014

Security analysis of an authentication and key agreement protocol for satellite communications.
Int. J. Commun. Syst., 2014

2013
An efficient certificateless proxy signature scheme without pairing.
Math. Comput. Model., 2013

On the security of an authentication scheme for multi-server architecture.
Int. J. Electron. Secur. Digit. Forensics, 2013

New certificateless short signature scheme.
IET Inf. Secur., 2013

An efficient certificateless designated verifier signature scheme.
Int. Arab J. Inf. Technol., 2013

2012
A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography.
Secur. Commun. Networks, 2012

Note on 'Design of improved password authentication and update scheme based on elliptic curve cryptography'.
Math. Comput. Model., 2012

A More Secure Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2012

An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security.
Inf. Fusion, 2012

Cryptanalysis of a three-party password-based authenticated key exchange protocol using Weil pairing.
Int. J. Electron. Secur. Digit. Forensics, 2012

An efficient and provably-secure certificateless signature scheme without bilinear pairings.
Int. J. Commun. Syst., 2012

A pairing-free certificateless authenticated key agreement protocol.
Int. J. Commun. Syst., 2012

An efficient certificateless two-party authenticated key agreement protocol.
Comput. Math. Appl., 2012

2011
A new two-round certificateless authenticated key agreement protocol without bilinear pairings.
Math. Comput. Model., 2011

Weaknesses of a Remote User Password Authentication Scheme Using Smart Card.
Int. J. Netw. Secur., 2011

An Authenticated Key Agreement Protocol Using Isogenies Between Elliptic Curves.
Int. J. Comput. Commun. Control, 2011

Identity-based Digital Signature Scheme Without Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2011

An efficient identity-based blind signature scheme without bilinear pairings.
Comput. Electr. Eng., 2011

An ID-based proxy signature schemes without bilinear pairings.
Ann. des Télécommunications, 2011

2010
Cryptanalysis of a Simple Three-party Key Exchange Protocol.
Informatica (Slovenia), 2010

Weaknesses of a dynamic ID-based remote user authentication scheme.
Int. J. Electron. Secur. Digit. Forensics, 2010

Efficient and provably-secure certificateless signature scheme without bilinear pairings.
IACR Cryptol. ePrint Arch., 2010

Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices.
IACR Cryptol. ePrint Arch., 2010

On security of a remote user authentication scheme without using smart cards.
IACR Cryptol. ePrint Arch., 2010

Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card.
IACR Cryptol. ePrint Arch., 2010

Weaknesses of a dynamic ID-based remote user authentication scheme.
IACR Cryptol. ePrint Arch., 2010

Cryptanalysis of a DoS-resistant ID-based password authentication.
IACR Cryptol. ePrint Arch., 2010

A Random Number Generator Based on Isogenies Operations.
IACR Cryptol. ePrint Arch., 2010

Weakness Analysis and Improvement of a Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
CoRR, 2010

2009
Fast Algorithm for Computing the Minimal Polynomials of Gaussian Periods.
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009


  Loading...