Jiguo Li

According to our database1, Jiguo Li authored at least 83 papers between 2003 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Provably secure certificate-based encryption with leakage resilience.
Theor. Comput. Sci., 2018

Expressive attribute-based keyword search with constant-size ciphertext.
Soft Comput., 2018

User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage.
IEEE Systems Journal, 2018

On Security of a Secure Channel Free Public Key Encryption with Conjunctive Field Keyword Search Scheme.
ITC, 2018

Identity-based broadcast encryption with continuous leakage resilience.
Inf. Sci., 2018

Anonymous certificate-based broadcast encryption with constant decryption cost.
Inf. Sci., 2018

Cryptanalysis and Improvement for Certificateless Aggregate Signature.
Fundam. Inform., 2018

2017
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing.
IEEE Trans. Services Computing, 2017

KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage.
IEEE Trans. Services Computing, 2017

A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage.
IEEE Trans. Information Forensics and Security, 2017

Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length.
Security and Communication Networks, 2017

New Construction of Short Certificate-Based Signature against Existential Forgery Attacks.
TIIS, 2017

An Efficient Certificate-Based Authenticated Key Agreement Protocol without Bilinear Pairing.
ITC, 2017

Outsourced data modification algorithm with assistance of multi-assistants in cloud computing.
IJSNet, 2017

Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage.
Int. J. Communication Systems, 2017

Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model.
Comput. J., 2017

Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model.
Adv. in Math. of Comm., 2017

Efficient designated server identity-based encryption with conjunctive keyword search.
Annales des Télécommunications, 2017

Hierarchical Trust Level Evaluation for Pervasive Social Networking.
IEEE Access, 2017

2016
Provably secure certificateless proxy signature scheme in the standard model.
Theor. Comput. Sci., 2016

ABKS-CSC: attribute-based keyword search with constant-size ciphertexts.
Security and Communication Networks, 2016

Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage.
Security and Communication Networks, 2016

Hierarchical attribute-based encryption with continuous auxiliary inputs leakage.
Security and Communication Networks, 2016

Certificate-based encryption resilient to key leakage.
Journal of Systems and Software, 2016

Provably Secure Certificate-based Conditional Proxy Re-encryption.
J. Inf. Sci. Eng., 2016

Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing.
TIIS, 2016

Comment on a certificateless one-pass and two-party authenticated key agreement protocol.
Inf. Sci., 2016

A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model.
Inf. Sci., 2016

Continuous leakage-resilient certificate-based encryption.
Inf. Sci., 2016

Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption.
Inf. Sci., 2016

Improved certificate-based signature scheme without random oracles.
IET Information Security, 2016

Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks.
IACR Cryptology ePrint Archive, 2016

A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds.
Future Generation Comp. Syst., 2016

A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme.
Comput. J., 2016

Certificate-Based Key-Insulated Signature in the Standard Model.
Comput. J., 2016

An Efficient Certificate-Based Designated Verifier Signature Scheme.
Computing and Informatics, 2016

Outsourced Data Modification Algorithm with Assistance of Multi-assistants in Cloud Computing.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Leakage-resilient certificate-based encryption.
Security and Communication Networks, 2015

Certificateless online/offline signcryption scheme.
Security and Communication Networks, 2015

Efficiency and Privacy Enhancement for a Track and Trace System of RFID-Based Supply Chains.
Information, 2015

Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation.
Int. J. Inf. Sec., 2015

Certificate-Based Encryption Resilient to Key Leakage.
IACR Cryptology ePrint Archive, 2015

Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction.
IACR Cryptology ePrint Archive, 2015

A Forward-Secure Certificate-Based Signature Scheme.
Comput. J., 2015

An improved certificateless strong key-insulated signature scheme in the standard model.
Adv. in Math. of Comm., 2015

Private Certificate-Based Remote Data Integrity Checking in Public Clouds.
Proceedings of the Computing and Combinatorics - 21st International Conference, 2015

2014
Efficient Certificate-Based Encryption Scheme Secure Against Key Replacement Attacks in the Standard Model.
J. Inf. Sci. Eng., 2014

Provably Secure Certificate-Based Signcryption Scheme without Pairings.
TIIS, 2014

Efficient constructions of certificate-based key encapsulation mechanism.
IJIPT, 2014

Provably secure certificate-based key-insulated signature scheme.
Concurrency and Computation: Practice and Experience, 2014

Certificate-Based Conditional Proxy Re-Encryption.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
Parallel key-insulated signature scheme without random oracles.
Journal of Communications and Networks, 2013

Certificate-Based Encryption Scheme without Pairing.
TIIS, 2013

Provably Secure Forward Secure Certificateless Proxy Signature Scheme.
TIIS, 2013

Provably secure certificate-based signature scheme without pairings.
Inf. Sci., 2013

New forward-secure public-key encryption without random oracles.
Int. J. Comput. Math., 2013

Forward Secure Certificateless Proxy Signature Scheme.
Proceedings of the Network and System Security - 7th International Conference, 2013

Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

2012
An efficient short certificate-based signature scheme.
Journal of Systems and Software, 2012

Generic Construction of Forward-Secure Identity-Based Encryption.
JCP, 2012

Certificate-based signcryption with enhanced security features.
Computers & Mathematics with Applications, 2012

Certificate-Based Key-Insulated Signature.
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012

A Forward-Secure Certificate-Based Signature Scheme in the Standard Model.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2011
A Practical Forward-Secure Public-Key Encryption Scheme.
JNW, 2011

On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption.
J. Inf. Sci. Eng., 2011

Certificate-Based Signcryption: Security Model and Efficient Construction.
IACR Cryptology ePrint Archive, 2011

2010
Forward-Secure Certificate-Based Encryption and its Generic Construction.
JNW, 2010

Constructions of certificate-based signature secure against key replacement attacks.
Journal of Computer Security, 2010

Security Mediated Certificateless Signatures Without Pairing.
JCP, 2010

2009
Threshold Certificate-based Encryption.
JSW, 2009

Constructing Efficient Certificate-based Encryption with Paring.
JCP, 2009

Provably Secure Certificate-based Proxy Signature Schemes.
JCP, 2009

Authenticated Tree Based Group Key Agreement.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Forward-Secure Certificate-Based Encryption.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Cryptanalysis and improvement of an efficient certificateless signature scheme.
Journal of Communications and Networks, 2008

Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Generic Construction of Certificate-Based Encryption.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A General and Secure Certification-based Encryption Construction.
Proceedings of the Third ChinaGrid Annual Conference, ChinaGrid 2008, Dunhuang, Gansu, 2008

2007
New Efficient Proxy Blind Signature Scheme Using Verifiable Self-certified Public Key.
I. J. Network Security, 2007

Certificate-Based Signature: Security Model and Efficient Construction.
Proceedings of the Public Key Infrastructure, 2007

2006
Cryptanalysis on Generalization of Threshold Signature and Authenticated Encryption for Group Communications.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Improvement of Threshold Signature Scheme Using Self-Certified Public Key.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2003
Nonrepudiable Proxy Multi-Signature Scheme.
J. Comput. Sci. Technol., 2003


  Loading...