Jianting Ning

Orcid: 0000-0001-7165-398X

According to our database1, Jianting Ning authored at least 112 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Time-Controllable Keyword Search Scheme With Efficient Revocation in Mobile E-Health Cloud.
IEEE Trans. Mob. Comput., May, 2024

A Survey on Searchable Symmetric Encryption.
ACM Comput. Surv., May, 2024

A Security-Enhanced Certificateless Designated Verifier Aggregate Signature Scheme for HWMSNs in the YOSO Model.
IEEE Internet Things J., March, 2024

Updatable searchable symmetric encryption: Definitions and constructions.
Theor. Comput. Sci., February, 2024

Privacy-Preserving Traceable Encrypted Traffic Inspection in Blockchain-Based Industrial IoT.
IEEE Internet Things J., January, 2024

Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control.
Comput. J., January, 2024

A Privacy-Preserving and Redactable Healthcare Blockchain System.
IEEE Trans. Serv. Comput., 2024

Single-Server Public-Key Authenticated Encryption With Keyword Search and Its Application in IIoT.
IEEE Trans. Netw. Sci. Eng., 2024

Fluent: Round-efficient Secure Aggregation for Private Federated Learning.
CoRR, 2024

2023
Verifiable Conjunctive Dynamic Searchable Symmetric Encryption With Forward and Backward Privacy.
Comput. J., October, 2023

Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search.
Comput. J., September, 2023

SDRLAP: A secure lightweight RFID mutual authentication protocol based on PUF with strong desynchronization resistance.
Peer Peer Netw. Appl., August, 2023

Deep-Reuse-Enabled Common Satellite Network via Collaborative Blockchains: Architecture, Challenges, and Solutions.
IEEE Commun. Mag., August, 2023

BASRAC: An efficient batch authentication scheme with rule-based access control for VANETs.
Veh. Commun., April, 2023

Trustworthy Announcement Dissemination Scheme With Blockchain-Assisted Vehicular Cloud.
IEEE Trans. Intell. Transp. Syst., February, 2023

DuMSE: Toward Practical and Dynamic Multiuser Search Over Encrypted Cloud Data Against Keyword Guessing Attack.
IEEE Internet Things J., January, 2023

Exploring Dynamic Task Loading in SGX-Based Distributed Computing.
IEEE Trans. Serv. Comput., 2023

Secure Updatable Storage Access Control System for EHRs in the Cloud.
IEEE Trans. Serv. Comput., 2023

Catch me if you can: A Secure Bilateral Access Control System With Anonymous Credentials.
IEEE Trans. Serv. Comput., 2023

Secure and Practical Wildcard Searchable Encryption System Based on Inner Product.
IEEE Trans. Serv. Comput., 2023

Efficient Construction of Verifiable Timed Signatures and Its Application in Scalable Payments.
IEEE Trans. Inf. Forensics Secur., 2023

AADEC: Anonymous and Auditable Distributed Access Control for Edge Computing Services.
IEEE Trans. Inf. Forensics Secur., 2023

Dual-Server Boolean Data Retrieval for Highly-Scalable Secure File Sharing Services.
IEEE Trans. Inf. Forensics Secur., 2023

Secure Cloud-Assisted Data Pub/Sub Service With Fine-Grained Bilateral Access Control.
IEEE Trans. Inf. Forensics Secur., 2023

An Adaptively Secure and Efficient Data Sharing System for Dynamic User Groups in Cloud.
IEEE Trans. Inf. Forensics Secur., 2023

Multi-Client Boolean File Retrieval With Adaptable Authorization Switching for Secure Cloud Search Services.
IEEE Trans. Dependable Secur. Comput., 2023

A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control.
IEEE Trans. Dependable Secur. Comput., 2023

Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity.
IEEE Trans. Dependable Secur. Comput., 2023

ACA: Anonymous, Confidential and Auditable Transaction Systems for Blockchain.
IEEE Trans. Dependable Secur. Comput., 2023

Verifiable Cloud-Based Data Publish-Subscribe Service With Hidden Access Policy.
IEEE Trans. Cloud Comput., 2023

DCDPI: Dynamic and Continuous Deep Packet Inspection in Secure Outsourced Middleboxes.
IEEE Trans. Cloud Comput., 2023

RelCLAS: A Reliable Malicious KGC-Resistant Certificateless Aggregate Signature Protocol for Vehicular Ad Hoc Networks.
IEEE Internet Things J., 2023

Improved Fully Adaptive Decentralized MA-ABE for NC1 from MDDH.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Efficient Encrypted Data Search With Expressive Queries and Flexible Update.
IEEE Trans. Serv. Comput., 2022

A Traitor-Resistant and Dynamic Anonymous Communication Service for Cloud-Based VANETs.
IEEE Trans. Serv. Comput., 2022

Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2022

Redactable Blockchain in Decentralized Setting.
IEEE Trans. Inf. Forensics Secur., 2022

VILS: A Verifiable Image Licensing System.
IEEE Trans. Inf. Forensics Secur., 2022

Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing.
IEEE Trans. Dependable Secur. Comput., 2022

Untouchable Once Revoking: A Practical and Secure Dynamic EHR Sharing System via Cloud.
IEEE Trans. Dependable Secur. Comput., 2022

Privacy-Preserving Federated Deep Learning With Irregular Users.
IEEE Trans. Dependable Secur. Comput., 2022

Differentially Oblivious Data Analysis With Intel SGX: Design, Optimization, and Evaluation.
IEEE Trans. Dependable Secur. Comput., 2022

Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage.
IEEE Trans. Dependable Secur. Comput., 2022

Dual Access Control for Cloud-Based Data Storage and Sharing.
IEEE Trans. Dependable Secur. Comput., 2022

Fine-Grained and Controllably Editable Data Sharing With Accountability in Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2022

Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT.
IEEE Trans. Cloud Comput., 2022

Blockchain-based access control for dynamic device management in microgrid.
Peer-to-Peer Netw. Appl., 2022

MP-BADNet<sup>+</sup>: Secure and effective backdoor attack detection and mitigation protocols among multi-participants in private DNNs.
Peer-to-Peer Netw. Appl., 2022

Offline/Online lattice-based ciphertext policy attribute-based encryption.
J. Syst. Archit., 2022

Blockchain-Enabled decentralized Attribute-Based access control with policy hiding for smart healthcare.
J. King Saud Univ. Comput. Inf. Sci., 2022

Privacy-Preserving Threshold Spatial Keyword Search in Cloud-Assisted IIoT.
IEEE Internet Things J., 2022

Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location.
IACR Cryptol. ePrint Arch., 2022

Volume and Access Pattern Leakage-abuse Attack with Leaked Documents.
IACR Cryptol. ePrint Arch., 2022

A fine-grained and secure health data sharing scheme based on blockchain.
Trans. Emerg. Telecommun. Technol., 2022

A survey of lattice based expressive attribute based encryption.
Comput. Sci. Rev., 2022

Efficiency Boosting of Secure Cross-platform Recommender Systems over Sparse Data.
CoRR, 2022

New Secure Sparse Inner Product with Applications to Machine Learning.
CoRR, 2022

VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder.
CoRR, 2022

E-Tenon: An Efficient Privacy-Preserving Secure Open Data Sharing Scheme for EHR System.
CoRR, 2022

Hybrid Trust Multi-party Computation with Trusted Execution Environment.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption.
Proceedings of the Information Security Practice and Experience, 2022

VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents.
Proceedings of the Computer Security - ESORICS 2022, 2022

A Collaborative Access Control Scheme Based on Incentive Mechanisms.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

2021
CryptCloud$^+$+: Secure and Expressive Data Access Control for Cloud Storage.
IEEE Trans. Serv. Comput., 2021

Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format.
IEEE Trans. Serv. Comput., 2021

K-Time Modifiable and Epoch-Based Redactable Blockchain.
IEEE Trans. Inf. Forensics Secur., 2021

Server-Aided Bilateral Access Control for Secure Data Sharing With Dynamic User Groups.
IEEE Trans. Inf. Forensics Secur., 2021

Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud.
IEEE Trans. Dependable Secur. Comput., 2021

PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment.
IEEE Trans. Dependable Secur. Comput., 2021

Optimized Verifiable Fine-Grained Keyword Search in Dynamic Multi-Owner Settings.
IEEE Trans. Dependable Secur. Comput., 2021

hPRESS: A Hardware-Enhanced Proxy Re-Encryption Scheme Using Secure Enclave.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021

PvCT: A Publicly Verifiable Contact Tracing Algorithm in Cloud Computing.
Secur. Commun. Networks, 2021

Fine-Grained Task Access Control System for Mobile Crowdsensing.
Secur. Commun. Networks, 2021

Distributed additive encryption and quantization for privacy preserving federated deep learning.
Neurocomputing, 2021

Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE.
IACR Cryptol. ePrint Arch., 2021

Securing the Internet-of-Things: Advances, challenges, future trends.
Trans. Emerg. Telecommun. Technol., 2021

A Survey of Privacy-Preserving Techniques for Encrypted Traffic Inspection over Network Middleboxes.
CoRR, 2021

Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog Computing.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021

Efficient and Verifiable Proof of Replication with Fast Fault Localization.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Revocable Policy-Based Chameleon Hash.
Proceedings of the Computer Security - ESORICS 2021, 2021

Lightweight Delegated Authentication with Identity Fraud Detection for Cyber-physical Systems.
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021

LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

MP-BADNet: A Backdoor-Attack Detection and Identification Protocol among Multi-Participants in Private Deep Neural Networks.
Proceedings of the ACM TURC 2021: ACM Turing Award Celebration Conference - Hefei, China, 30 July 2021, 2021

2020
A new encryption scheme for multivariate quadratic systems.
Theor. Comput. Sci., 2020

A novel colour image watermarking scheme based on Schur decomposition.
Int. J. Embed. Syst., 2020

Post quantum proxy signature scheme based on the multivariate public key cryptographic signature.
Int. J. Distributed Sens. Networks, 2020

SFE-GACN: A Novel Unknown Attack Detection Method Using Intra Categories Generation in Embedding Space.
CoRR, 2020

Privacy preserving search services against online attack.
Comput. Secur., 2020

Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment.
Proceedings of the Computer Security - ESORICS 2020, 2020

Secure and Verifiable Inference in Deep Neural Networks.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Passive Attacks Against Searchable Encryption.
IEEE Trans. Inf. Forensics Secur., 2019

Public auditing for shared cloud data with efficient and secure group management.
Inf. Sci., 2019

Lightweight Privacy-Preserving Identity-Based Verifiable IoT-Based Health Storage System.
IEEE Internet Things J., 2019

Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems.
Comput. J., 2019

A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality.
IEEE Access, 2019

Secure Online/Offline Attribute-Based Encryption for IoT Users in Cloud Computing.
Proceedings of the Provable Security, 2019

MQ Aggregate Signature Schemes with Exact Security Based on UOV Signature.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2018

White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively.
IEEE Trans. Dependable Secur. Comput., 2018

Keeping Time-Release Secrets through Smart Contracts.
IACR Cryptol. ePrint Arch., 2018

Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat.
Future Gener. Comput. Syst., 2018

Attribute-Based Encryption with Efficient Keyword Search and User Revocation.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups.
Proceedings of the Provable Security, 2017

2016
Traceable and revocable CP-ABE with shorter ciphertexts.
Sci. China Inf. Sci., 2016

Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes.
IEEE Trans. Inf. Forensics Secur., 2015

Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud.
IACR Cryptol. ePrint Arch., 2015

2014
Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability.
Proceedings of the Computer Security - ESORICS 2014, 2014

2011
Optimized Approach for Computing Multi-base Chains.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

A Trivariate Polynomial-based Dynamic Key Management Scheme for Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011


  Loading...