Juyan Li

According to our database1, Juyan Li authored at least 14 papers between 2016 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls for IoT.
Entropy, April, 2023

Revocable IBE with En-DKER from Lattices: A Novel Approach for Lattice Basis Delegation.
IACR Cryptol. ePrint Arch., 2023

Revocable IBE with En-DKER from Lattices: A Novel Approach for Lattice Basis Delegation.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
Asymmetric Group Key Agreement Protocol Based on Blockchain and Attribute for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022

A Novel Deterministic Threshold Proxy Re-Encryption Scheme From Lattices.
Int. J. Inf. Secur. Priv., 2022

2021
A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing.
Sensors, 2021

2020
A Novel DIBR 3D Image Hashing Scheme Based on Pixel Grouping and NMF.
Wirel. Commun. Mob. Comput., 2020

Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting.
Int. J. Found. Comput. Sci., 2020

2019
A Novel Lattice-Based CP-ABPRE Scheme for Cloud Sharing.
Symmetry, 2019

Unidirectional FHPRE Scheme from Lattice for Cloud Computing.
Int. J. Netw. Secur., 2019

A Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud Sharing.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

2017
A Flexible Fully Homomorphic Encryption.
Wirel. Pers. Commun., 2017

Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment.
Int. J. Found. Comput. Sci., 2017

2016
A Homomorphic Proxy Re-encryption from Lattices.
Proceedings of the Provable Security, 2016


  Loading...