Jiguo Li

Orcid: 0000-0002-6532-2081

Affiliations:
  • Fujian Normal University, College of Mathematics and Informatics, Fuzhou, China
  • Hohai University, College of Computer and Information, Nanjing, China
  • Harbin Institute of Technology, China (PhD)


According to our database1, Jiguo Li authored at least 135 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Efficient Revocable Attribute-Based Encryption With Verifiable Data Integrity.
IEEE Internet Things J., March, 2024

2023
Toward Forward and Backward Private Dynamic Searchable Symmetric Encryption Supporting Data Deduplication and Conjunctive Queries.
IEEE Internet Things J., October, 2023

TFS-ABS: Traceable and Forward-Secure Attribute-Based Signature Scheme With Constant-Size.
IEEE Trans. Knowl. Data Eng., September, 2023

Revocable Blockchain-Aided Attribute-Based Encryption With Escrow-Free in Cloud Storage.
IEEE Trans. Computers, July, 2023

Multiauthority Attribute-Based Encryption for Assuring Data Deletion.
IEEE Syst. J., June, 2023

Efficient Hierarchical Signature Scheme With Batch Verification Function Suitable for ADS-B System.
IEEE Trans. Aerosp. Electron. Syst., April, 2023

Privacy-Preserving and Forward Public Key Encryption With Field-Free Multi-Keyword Search for Cloud Encrypted Data.
IEEE Trans. Cloud Comput., 2023

ID-Based Ring Signature against Continual Side Channel Attack.
Symmetry, 2023

2022
Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities.
IEEE Trans. Serv. Comput., 2022

Efficient Attribute Based Server-Aided Verification Signature.
IEEE Trans. Serv. Comput., 2022

Lightweight Public Key Authenticated Encryption With Keyword Search Against Adaptively-Chosen-Targets Adversaries for Mobile Devices.
IEEE Trans. Mob. Comput., 2022

Lightweight Public/Private Auditing Scheme for Resource-Constrained End Devices in Cloud Storage.
IEEE Trans. Cloud Comput., 2022

Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT.
IEEE Trans. Cloud Comput., 2022

Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage.
IEEE Trans. Cloud Comput., 2022

Efficient CP-ABE Scheme With Shared Decryption in Cloud Storage.
IEEE Trans. Computers, 2022

Toward Secure and Privacy-Preserving Cloud Data Sharing: Online/Offline Multiauthority CP-ABE With Hidden Policy.
IEEE Syst. J., 2022

Fully Secure ID-Based Signature Scheme with Continuous Leakage Resilience.
Secur. Commun. Networks, 2022

Key escrow-free attribute based encryption with user revocation.
Inf. Sci., 2022

Decentralized Attribute-Based Server-Aid Signature in the Internet of Things.
IEEE Internet Things J., 2022

2021
Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks.
IEEE Trans. Serv. Comput., 2021

Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage.
IEEE Trans. Serv. Comput., 2021

Pairing-Free Certificate-Based Searchable Encryption Supporting Privacy-Preserving Keyword Search Function for IIoTs.
IEEE Trans. Ind. Informatics, 2021

Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing.
IEEE Trans. Emerg. Top. Comput., 2021

Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting.
IEEE Trans. Dependable Secur. Comput., 2021

Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage.
IEEE Syst. J., 2021

An efficient identity-based signature scheme with provable security.
Inf. Sci., 2021

ABKS-SKGA: Attribute-based keyword search secure against keyword guessing attack.
Comput. Stand. Interfaces, 2021

A Privacy-Preserving Logistics Information System with Traceability.
Proceedings of the Cyberspace Safety and Security - 13th International Symposium, 2021

2020
Cryptanalysis and Improvement of Batch Verification Certificateless Signature Scheme for VANETs.
Wirel. Pers. Commun., 2020

Full Verifiability for Outsourced Decryption in Attribute Based Encryption.
IEEE Trans. Serv. Comput., 2020

Content-Centric Group User Authentication for Secure Social Networks.
IEEE Trans. Emerg. Top. Comput., 2020

Anonymous Certificate-Based Broadcast Encryption With Personalized Messages.
IEEE Trans. Broadcast., 2020

A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation.
Soft Comput., 2020

Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext.
Soft Comput., 2020

Remote Data Checking With a Designated Verifier in Cloud Storage.
IEEE Syst. J., 2020

Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model.
Secur. Commun. Networks, 2020

Adaptively secure certificate-based broadcast encryption and its application to cloud storage service.
Inf. Sci., 2020

Privacy-Preserving and Pairing-Free Multirecipient Certificateless Encryption With Keyword Search for Cloud-Assisted IIoT.
IEEE Internet Things J., 2020

Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage.
IEEE Access, 2020

Expressive Public-Key Encryption With Keyword Search: Generic Construction From KP-ABE and an Efficient Scheme Over Prime-Order Groups.
IEEE Access, 2020

2019
Hybrid Keyword-Field Search With Efficient Key Management for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2019

Constructing pairing-free certificateless public key encryption with keyword search.
Frontiers Inf. Technol. Electron. Eng., 2019

A Forward-Secure Certificate-Based Signature Scheme with Enhanced Security in the Standard Model.
KSII Trans. Internet Inf. Syst., 2019

Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service.
KSII Trans. Internet Inf. Syst., 2019

Keyword guessing attacks on a public key encryption with keyword search scheme without random oracle and its improvement.
Inf. Sci., 2019

Key-policy attribute-based encryption against continual auxiliary input leakage.
Inf. Sci., 2019

Hierarchical attribute based encryption with continuous leakage-resilience.
Inf. Sci., 2019

Constructing designated server public key encryption with keyword search schemes withstanding keyword guessing attacks.
Int. J. Commun. Syst., 2019

A certificate-based AKA protocol secure against public key replacement attacks.
Int. Arab J. Inf. Technol., 2019

Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems.
Clust. Comput., 2019

Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage.
IEEE Access, 2019

Constant Size Ciphertext Distributed CP-ABE Scheme With Privacy Protection and Fully Hiding Access Structure.
IEEE Access, 2019

SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search.
IEEE Access, 2019

A Dispersed Multi-Value Attribute-Based Encryption With Mediated Obfuscation.
IEEE Access, 2019

2018
Provably secure certificate-based encryption with leakage resilience.
Theor. Comput. Sci., 2018

Expressive attribute-based keyword search with constant-size ciphertext.
Soft Comput., 2018

User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage.
IEEE Syst. J., 2018

Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key.
Secur. Commun. Networks, 2018

Improving Security and Privacy-Preserving in Multi-Authorities Ciphertext-Policy Attribute-Based Encryption.
KSII Trans. Internet Inf. Syst., 2018

On Security of a Secure Channel Free Public Key Encryption with Conjunctive Field Keyword Search Scheme.
Inf. Technol. Control., 2018

Identity-based broadcast encryption with continuous leakage resilience.
Inf. Sci., 2018

Anonymous certificate-based broadcast encryption with constant decryption cost.
Inf. Sci., 2018

Cryptanalysis and Improvement for Certificateless Aggregate Signature.
Fundam. Informaticae, 2018

2017
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing.
IEEE Trans. Serv. Comput., 2017

KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage.
IEEE Trans. Serv. Comput., 2017

A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2017

Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length.
Secur. Commun. Networks, 2017

New Construction of Short Certificate-Based Signature against Existential Forgery Attacks.
KSII Trans. Internet Inf. Syst., 2017

An Efficient Certificate-Based Authenticated Key Agreement Protocol without Bilinear Pairing.
Inf. Technol. Control., 2017

Outsourced data modification algorithm with assistance of multi-assistants in cloud computing.
Int. J. Sens. Networks, 2017

Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage.
Int. J. Commun. Syst., 2017

Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model.
Comput. J., 2017

Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model.
Adv. Math. Commun., 2017

Efficient designated server identity-based encryption with conjunctive keyword search.
Ann. des Télécommunications, 2017

Hierarchical Trust Level Evaluation for Pervasive Social Networking.
IEEE Access, 2017

2016
Provably secure certificateless proxy signature scheme in the standard model.
Theor. Comput. Sci., 2016

ABKS-CSC: attribute-based keyword search with constant-size ciphertexts.
Secur. Commun. Networks, 2016

Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage.
Secur. Commun. Networks, 2016

Hierarchical attribute-based encryption with continuous auxiliary inputs leakage.
Secur. Commun. Networks, 2016

Provably Secure Certificate-based Conditional Proxy Re-encryption.
J. Inf. Sci. Eng., 2016

Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing.
KSII Trans. Internet Inf. Syst., 2016

Comment on a certificateless one-pass and two-party authenticated key agreement protocol.
Inf. Sci., 2016

A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model.
Inf. Sci., 2016

Continuous leakage-resilient certificate-based encryption.
Inf. Sci., 2016

Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption.
Inf. Sci., 2016

Improved certificate-based signature scheme without random oracles.
IET Inf. Secur., 2016

Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks.
IACR Cryptol. ePrint Arch., 2016

A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds.
Future Gener. Comput. Syst., 2016

A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme.
Comput. J., 2016

Certificate-Based Key-Insulated Signature in the Standard Model.
Comput. J., 2016

An Efficient Certificate-Based Designated Verifier Signature Scheme.
Comput. Informatics, 2016

2015
Leakage-resilient certificate-based encryption.
Secur. Commun. Networks, 2015

Certificateless online/offline signcryption scheme.
Secur. Commun. Networks, 2015

无证书强指定验证者签名方案 (Certificateless Strong Designated Verifier Signature Scheme).
计算机科学, 2015

Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation.
Int. J. Inf. Sec., 2015

Certificate-Based Encryption Resilient to Key Leakage.
IACR Cryptol. ePrint Arch., 2015

Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction.
IACR Cryptol. ePrint Arch., 2015

A Forward-Secure Certificate-Based Signature Scheme.
Comput. J., 2015

An improved certificateless strong key-insulated signature scheme in the standard model.
Adv. Math. Commun., 2015

Private Certificate-Based Remote Data Integrity Checking in Public Clouds.
Proceedings of the Computing and Combinatorics - 21st International Conference, 2015

2014
Efficient Certificate-Based Encryption Scheme Secure Against Key Replacement Attacks in the Standard Model.
J. Inf. Sci. Eng., 2014

Provably Secure Certificate-Based Signcryption Scheme without Pairings.
KSII Trans. Internet Inf. Syst., 2014

Efficient constructions of certificate-based key encapsulation mechanism.
Int. J. Internet Protoc. Technol., 2014

Provably secure certificate-based key-insulated signature scheme.
Concurr. Comput. Pract. Exp., 2014

Certificate-Based Conditional Proxy Re-Encryption.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
Parallel key-insulated signature scheme without random oracles.
J. Commun. Networks, 2013

Certificate-Based Encryption Scheme without Pairing.
KSII Trans. Internet Inf. Syst., 2013

Provably Secure Forward Secure Certificateless Proxy Signature Scheme.
KSII Trans. Internet Inf. Syst., 2013

Provably secure certificate-based signature scheme without pairings.
Inf. Sci., 2013

New forward-secure public-key encryption without random oracles.
Int. J. Comput. Math., 2013

Forward Secure Certificateless Proxy Signature Scheme.
Proceedings of the Network and System Security - 7th International Conference, 2013

Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

2012
An efficient short certificate-based signature scheme.
J. Syst. Softw., 2012

Generic Construction of Forward-Secure Identity-Based Encryption.
J. Comput., 2012

Certificate-based signcryption with enhanced security features.
Comput. Math. Appl., 2012

Certificate-Based Key-Insulated Signature.
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012

A Forward-Secure Certificate-Based Signature Scheme in the Standard Model.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2011
A Practical Forward-Secure Public-Key Encryption Scheme.
J. Networks, 2011

On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption.
J. Inf. Sci. Eng., 2011

Certificate-Based Signcryption: Security Model and Efficient Construction.
IACR Cryptol. ePrint Arch., 2011

2010
Forward-Secure Certificate-Based Encryption and its Generic Construction.
J. Networks, 2010

Constructions of certificate-based signature secure against key replacement attacks.
J. Comput. Secur., 2010

Security Mediated Certificateless Signatures Without Pairing.
J. Comput., 2010

2009
Threshold Certificate-based Encryption.
J. Softw., 2009

Constructing Efficient Certificate-based Encryption with Paring.
J. Comput., 2009

Provably Secure Certificate-based Proxy Signature Schemes.
J. Comput., 2009

Forward-Secure Certificate-Based Encryption.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Cryptanalysis and improvement of an efficient certificateless signature scheme.
J. Commun. Networks, 2008

Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Generic Construction of Certificate-Based Encryption.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A General and Secure Certification-based Encryption Construction.
Proceedings of the Third ChinaGrid Annual Conference, ChinaGrid 2008, Dunhuang, Gansu, 2008

2007
Certificate-Based Signature: Security Model and Efficient Construction.
Proceedings of the Public Key Infrastructure, 2007

2006
Improvement of Threshold Signature Scheme Using Self-Certified Public Key.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2004
Security analysis and improvement of some proxy signature schemes.
Proceedings of the 3rd International Conference on Information Security, 2004

2003
Nonrepudiable Proxy Multi-Signature Scheme.
J. Comput. Sci. Technol., 2003


  Loading...