Jing Qin

Orcid: 0000-0003-2380-0396

Affiliations:
  • Shandong University, School of Mathematics, Jinan, China (PhD 2004)


According to our database1, Jing Qin authored at least 54 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Key-aggregate based access control encryption for flexible cloud data sharing.
Comput. Stand. Interfaces, March, 2024

Privacy leakage of certificateless public key authenticated searchable encryption via frequency analysis: Attacks and revises.
Comput. Stand. Interfaces, January, 2024

2023
Security-enhanced public-key authenticated searchable encryption.
Inf. Sci., November, 2023

Privacy-preserving healthcare monitoring for IoT devices under edge computing.
Comput. Secur., November, 2023

Key-aggregate searchable encryption supporting conjunctive queries for flexible data sharing in the cloud.
Inf. Sci., October, 2023

Efficient and Flexible Multiauthority Attribute-Based Authentication for IoT Devices.
IEEE Internet Things J., August, 2023

Privacy-preserving certificateless public auditing supporting different auditing frequencies.
Comput. Secur., May, 2023

A Verifiable Symmetric Searchable Encryption Scheme Based on the AVL Tree.
Comput. J., January, 2023

Multi-Keyword Ranked Searchable Encryption with the Wildcard Keyword for Data Sharing in Cloud Computing.
Comput. J., January, 2023

Verifiable Key-Aggregate Searchable Encryption With a Designated Server in Multi-Owner Setting.
IEEE Trans. Serv. Comput., 2023

Efficient Verifiable Unbounded-Size Database From Authenticated Matrix Commitment.
IEEE Trans. Dependable Secur. Comput., 2023

Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward Security.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

The Analysis of Schnorr Multi-Signatures and the Application to AI.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database.
IEEE Trans. Dependable Secur. Comput., 2022

Publicly Verifiable Shared Dynamic Electronic Health Record Databases With Functional Commitment Supporting Privacy-Preserving Integrity Auditing.
IEEE Trans. Cloud Comput., 2022

Divertible Searchable Symmetric Encryption for Secure Cloud Storage.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Outsourced Decentralized Multi-Authority Attribute Based Signature and Its Application in IoT.
IEEE Trans. Cloud Comput., 2021

Data Integrity Auditing without Private Key Storage for Secure Cloud Storage.
IEEE Trans. Cloud Comput., 2021

Practical wildcard searchable encryption with tree-based index.
Int. J. Intell. Syst., 2021

2020
A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security.
Secur. Commun. Networks, 2020

Verifiable inner product computation on outsourced database for authenticated multi-user data sharing.
Inf. Sci., 2020

EVA: Efficient Versatile Auditing Scheme for IoT-Based Datamarket in Jointcloud.
IEEE Internet Things J., 2020

An Efficient Public Batch Auditing Scheme for Data Integrity in Standard Model.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

2019
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2019

Fuzzy matching: multi-authority attribute searchable encryption without central authority.
Soft Comput., 2019

A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks.
Sensors, 2019

A Secure Data Sharing Scheme with Designated Server.
Secur. Commun. Networks, 2019

A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Payment.
Secur. Commun. Networks, 2019

Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious Cloud.
Int. J. Digit. Crime Forensics, 2019

An improved scheme for outsourced computation with attribute-based encryption.
Concurr. Comput. Pract. Exp., 2019

2018
Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication.
Secur. Commun. Networks, 2018

2017
Confidentiality-Preserving Publicly Verifiable Computation.
Int. J. Found. Comput. Sci., 2017

Key negotiation schemes for body sensor networks on the surface of the human body.
Int. J. Auton. Adapt. Commun. Syst., 2017

A confidentiality preserving publicly verifiable computation for multivariate polynomials.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017

The Public Verifiability of Public Key Encryption with Keyword Search.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

Securely Outsourcing Decentralized Multi-authority Attribute Based Signature.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
Threshold attribute-based signcryption and its application to authenticated key agreement.
Secur. Commun. Networks, 2016

Secure searches in the cloud: A survey.
Future Gener. Comput. Syst., 2016

A secure biometric authentication based on PEKS.
Concurr. Comput. Pract. Exp., 2016

2015
Multi-Authority Attribute-Based Encryption Scheme from Lattices.
J. Univers. Comput. Sci., 2015

Lattice-based threshold cryptography and its applications in distributed cloud computing.
Int. J. High Perform. Comput. Netw., 2015

Securing Body Sensor Networks with Biometric Methods: A New Key Negotiation Method and a Key Sampling Method for Linear Interpolation Encryption.
Int. J. Distributed Sens. Networks, 2015

Threshold Attribute-Based Signcryption in Standard Model.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
A new Lagrange solution to the privacy-preserving general geometric intersection problem.
J. Netw. Comput. Appl., 2014

A Function Private Attribute-Based Encryption.
Int. J. Distributed Sens. Networks, 2014

A general transformation from KP-ABE to searchable encryption.
Future Gener. Comput. Syst., 2014

2013
An Energy Efficient Key Management Scheme for Body Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2013

A Key Management Scheme between Body Sensor Networks and the Base Station.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
A General Construction of Sequences with Good Autocorrelation over the 16-QAM Constellation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Simulatable Oblivious Transfer Protocols Based on Blind Signature.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Hash Chains Based Key Management Scheme for Wireless Sensor Networks.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2010
k out of n Oblivious Transfer Protocols from Bilinear Pairings.
J. Softw., 2010

2008
Converters for Designing Applied Cryptographic Protocols.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008


  Loading...