Jianye Huang

Orcid: 0000-0001-5212-7562

According to our database1, Jianye Huang authored at least 29 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A fully secure lattice-based signcryption with designated equality test in standard model.
Inf. Sci., February, 2024

A lattice-based public key encryption scheme with delegated equality test.
Comput. Stand. Interfaces, January, 2024

An Identity-Based Encryption with Equality Test scheme for healthcare social apps.
Comput. Stand. Interfaces, January, 2024

2023
Secure channel free public key authenticated encryption with multi-keyword search on healthcare systems.
Future Gener. Comput. Syst., August, 2023

FS-IBEKS: Forward secure identity-based encryption with keyword search from lattice.
Comput. Stand. Interfaces, August, 2023

A more efficient public-key authenticated encryption scheme with keyword search.
J. Syst. Archit., April, 2023

An identity-based traceable ring signatures based on lattice.
Peer Peer Netw. Appl., March, 2023

Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search.
IEEE Trans. Inf. Forensics Secur., 2023

Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security.
Inf., 2023

A Lattice-Based Certificateless Traceable Ring Signature Scheme.
Inf., 2023

Improve Knowledge Graph Completion for Diagnosing Defects in Main Electrical Equipment.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2023

A Novel Approach to Analyzing Defects: Enhancing Knowledge Graph Embedding Models for Main Electrical Equipment.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2023

2022
An Anonymous Authentication System for Pay-As-You-Go Cloud Computing$^*$*.
IEEE Trans. Dependable Secur. Comput., 2022

Secure-Channel Free Certificateless Searchable Public Key Authenticated Encryption with Keyword Search.
Proceedings of the Provable and Practical Security, 2022

2021
Public Key Encryption with Fuzzy Matching.
Proceedings of the Provable and Practical Security, 2021

A Novel Certificateless Multi-signature Scheme over NTRU Lattices.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

2020
Leakage-resilient group signature: Definitions and constructions.
Inf. Sci., 2020

Attribute-Based Equality Test Over Encrypted Data Without Random Oracles.
IEEE Access, 2020

2019
Leakage-resilient ring signature schemes.
Theor. Comput. Sci., 2019

Leakage-Resilient Group Signature: Definitions and Constructions.
IACR Cryptol. ePrint Arch., 2019

Public Key Authenticated Encryption With Designated Equality Test and its Applications in Diagnostic Related Groups.
IEEE Access, 2019

Cooperative Connected Autonomous Vehicles (CAV): Research, Applications and Challenges.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

2018
Modeling and Optimization of The Four-Coil Wireless Power Transfer System.
J. Inf. Hiding Multim. Signal Process., 2018

Black-box constructions of signature schemes in the bounded leakage setting.
Inf. Sci., 2018

Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification.
IACR Cryptol. ePrint Arch., 2018

Leakage-Resilient Dual-Form Signatures.
Comput. J., 2018

Outsourced Ciphertext-Policy Attribute-Based Encryption with Equality Test.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting.
Int. J. Found. Comput. Sci., 2017

2016
A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model.
Proceedings of the Provable Security, 2016


  Loading...