Leyou Zhang

Orcid: 0000-0003-4950-1140

According to our database1, Leyou Zhang authored at least 82 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Blockchain-Aided Anonymous Traceable and Revocable Access Control Scheme With Dynamic Policy Updating for the Cloud IoT.
IEEE Internet Things J., January, 2024

Heuristic Ideal Obfuscation Scheme based on LWE Problem, its Variants and Quantum Oracle.
IACR Cryptol. ePrint Arch., 2024

2023
BE-TRDSS: Blockchain-Enabled Secure and Efficient Traceable-Revocable Data-Sharing Scheme in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, November, 2023

SPMAC: Secure and privacy-preserving multi-authority access control for fog-enabled IoT cloud storage.
J. Syst. Archit., September, 2023

Collusion resistant multi-authority access control scheme with privacy protection for personal health records.
J. King Saud Univ. Comput. Inf. Sci., September, 2023

Collusion-resistant dynamic privacy-preserving attribute-access control scheme based on blockchain.
J. King Saud Univ. Comput. Inf. Sci., September, 2023

Accountable multi-authority attribute-based data access control in smart grids.
J. King Saud Univ. Comput. Inf. Sci., July, 2023

Redactable Blockchain-Enabled Hierarchical Access Control Framework for Data Sharing in Electronic Medical Records.
IEEE Syst. J., June, 2023

Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT.
IEEE Trans. Serv. Comput., 2023

Toward Secure Data Computation and Outsource for Multi-User Cloud-Based IoT.
IEEE Trans. Cloud Comput., 2023

Algebraic isomorphic spaces of ideal lattices, reduction of Ring-SIS problem, and new reduction of Ring-LWE problem.
IACR Cryptol. ePrint Arch., 2023

2022
Blockchain-enabled efficient distributed attribute-based access control framework with privacy-preserving in IoV.
J. King Saud Univ. Comput. Inf. Sci., November, 2022

Secure Outsourced Attribute-Based Sharing Framework for Lightweight Devices in Smart Health Systems.
IEEE Trans. Serv. Comput., 2022

Distributed Ciphertext-Policy Attribute-Based Encryption With Enhanced Collusion Resilience and Privacy Preservation.
IEEE Syst. J., 2022

Secure and Efficient General Circuits Attribute-Based Access Control in Cloud Computing.
IEEE Syst. J., 2022

A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth.
J. Syst. Archit., 2022

Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud.
J. Syst. Archit., 2022

A Secure and Efficient Decentralized Access Control Scheme Based on Blockchain for Vehicular Social Networks.
IEEE Internet Things J., 2022

Secure Decentralized Attribute-Based Sharing of Personal Health Records With Blockchain.
IEEE Internet Things J., 2022

BA-RMKABSE: Blockchain-aided Ranked Multi-keyword Attribute-based Searchable Encryption with Hiding Policy for Smart Health System.
Future Gener. Comput. Syst., 2022

2021
An Expressive "Test-Decrypt-Verify" Attribute-Based Encryption Scheme With Hidden Policy for Smart Medical Cloud.
IEEE Syst. J., 2021

A prospective evaluation of AI-augmented epidemiology to forecast COVID-19 in the USA and Japan.
npj Digit. Medicine, 2021

Multiauthority Access Control With Anonymous Authentication for Personal Health Record.
IEEE Internet Things J., 2021

Privacy-Preserving Flexible Access Control for Encrypted Data in Internet of Things.
IEEE Internet Things J., 2021

Secure and Privacy-Preserved Data Collection for IoT Wireless Sensors.
IEEE Internet Things J., 2021

Enhanced bitcoin with two-factor authentication.
Int. J. Inf. Comput. Secur., 2021

2020
Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing.
IEEE Syst. J., 2020

A Privacy-Preserving Data Sharing System with Decentralized Attribute-based Encryption Scheme.
Int. J. Netw. Secur., 2020

Efficient Anonymous Ciphertext-Policy Attribute-based Encryption for General Structures Supporting Leakage-Resilience.
Int. J. Netw. Secur., 2020

Secure Decentralized Access Control Policy for Data Sharing in Smart Grid.
IACR Cryptol. ePrint Arch., 2020

Interpretable Sequence Learning for COVID-19 Forecasting.
CoRR, 2020

Secure and Privacy-Preserving Attribute-Based Sharing Framework in Vehicles Ad Hoc Networks.
IEEE Access, 2020

Outsourcing Attributed-Based Ranked Searchable Encryption With Revocation for Cloud Storage.
IEEE Access, 2020

Privacy-Preserving Multi-Authority Attribute-Based Data Sharing Framework for Smart Grid.
IEEE Access, 2020

Improving the Leakage Rate of Ciphertext-Policy Attribute-Based Encryption for Cloud Computing.
IEEE Access, 2020

Secure Data Sharing With Lightweight Computation in E-Health.
IEEE Access, 2020

Interpretable Sequence Learning for Covid-19 Forecasting.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

2019
Improving Security in Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing.
KSII Trans. Internet Inf. Syst., 2019

Privacy-preserving decentralized ABE for secure sharing of personal health records in cloud storage.
J. Inf. Secur. Appl., 2019

Leakage-resilient Attribute-based Encryption with CCA2 Security.
Int. J. Netw. Secur., 2019

Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System.
IEEE Access, 2019

Hierarchical Identity-Based Signature over Verifiable Random Function.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

Improving File Hierarchy Attribute-Based Encryption Scheme with Multi-authority in Cloud.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

Analysis of Ciphertext Policy Hidden Attribute-Based Encryption and Its Improved Method.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

Anonymous Leakage-Resilient Ciphertext-Policy Attribute-Based Encryption Supporting Direct Revocation.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

2018
Recipient Anonymous Ciphertext-Policy Attribute-based Broadcast Encryption.
Int. J. Netw. Secur., 2018

Fully secure hierarchical inner product encryption for privacy preserving keyword searching in cloud.
Int. J. High Perform. Comput. Netw., 2018

Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption.
IEEE Access, 2018

Improving Privacy-Preserving CP-ABE with Hidden Access Policy.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Novel Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Anonymous Key Generation.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Novel Secure Privacy-Preserving Decentralized Attribute-Based Encryption.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018

2017
Anonymous CP-ABE against Side-channel Attacks in Cloud Computing.
J. Inf. Sci. Eng., 2017

Ciphertext policy attribute-based encryption with hierarchical domain authorities and users in cloud.
Int. J. High Perform. Comput. Netw., 2017

Revocable hierarchical identity-based encryption over lattice for pay-TV systems.
Int. J. Embed. Syst., 2017

Fuzzy Biometric-Based Encryption for Encrypted Data in the Cloud.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof System.
Comput. J., 2017

Security Analysis and Improvement of An Anonymous Attribute-Based Proxy Re-encryption.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Adaptively Secure Hierarchical Identity-Based Encryption over Lattice.
Proceedings of the Network and System Security - 11th International Conference, 2017

2016
Privacy-Preserving and Secure Sharing of PHR in the Cloud.
J. Medical Syst., 2016

Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys.
Comput. J., 2016

2015
Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2013
New Efficient Hierarchical Identity-based Signature.
J. Comput., 2013

New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2013

An Efficient Biometric Identity Based Signature Scheme.
KSII Trans. Internet Inf. Syst., 2013

An efficient group key agreement scheme for mobile ad-hoc networks.
Int. Arab J. Inf. Technol., 2013

A key-policy attribute-based broadcast encryption.
Int. Arab J. Inf. Technol., 2013

Anonymous Identity-Based Broadcast Encryption with Adaptive Security.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Hierarchical Identity-Based Signature with Short Public Keys.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups.
Math. Comput. Model., 2012

Direct CCA Secure Identity-Based Broadcast Encryption.
Proceedings of the Network and System Security - 6th International Conference, 2012

2011
CCA2 secure biometric identity based encryption with constant-size ciphertext.
J. Zhejiang Univ. Sci. C, 2011

New Constructions of Short Signatures in the Standard Model.
J. Softw., 2011

Secure Identity-based Threshold Broadcast Encryption in the Standard Model.
J. Networks, 2011

New Constructions of Identity-based Broadcast Encryption without Random Oracles.
KSII Trans. Internet Inf. Syst., 2011

2010
Particle Swarm Optimization for Semi-supervised Support Vector Machine.
J. Inf. Sci. Eng., 2010

Support Vector Regression Based on Adjustable Entropy Function Approach.
J. Inf. Sci. Eng., 2010

Identity-based Threshold Broadcast Encryption in the Standard Model.
KSII Trans. Internet Inf. Syst., 2010

Short Signature from the Bilinear Pairing.
Proceedings of the Information Computing and Applications - First International Conference, 2010

2009
New Construction of Short Hierarchical ID-Based Signature in the Standard Model.
Fundam. Informaticae, 2009

2008
An Identity-based Broadcast Encryption Protocol for Ad Hoc Networks.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

On the Computational Efficiency of XTR+.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2006
Hypersphere Support Vector Machines Based on Multiplicative Updates.
Proceedings of the Advances in Natural Computation, Second International Conference, 2006


  Loading...