Lihua Liu

Orcid: 0000-0002-2111-3384

Affiliations:
  • Shanghai Maritime University, Department of Mathematics, Shanghai, China
  • Shanghai Jiaotong University, Department of Mathematics, Shanghai, China (PhD 2006)


According to our database1, Lihua Liu authored at least 113 papers between 2004 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A Note on One Authentication and Key Agreement Scheme for UAV-Assisted VANETs for Emergency Rescue.
IACR Cryptol. ePrint Arch., 2025

Insecurity of One Ring Signature Scheme with Batch Verification for Applications in VANETs.
IACR Cryptol. ePrint Arch., 2025

On the security of one certificateless aggregate signature scheme with dynamic revocation in vehicular ad-hoc networks.
IACR Cryptol. ePrint Arch., 2025

A Note on "CABC: A Cross-Domain Authentication Method Combining Blockchain with Certificateless Signature for IIoT".
IACR Cryptol. ePrint Arch., 2025

Analysis of One Privacy-Preserving Electricity Data Classification Scheme Based on CNN Model With Fully Homomorphism.
IACR Cryptol. ePrint Arch., 2025

A Note on "CB-DA: Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid".
IACR Cryptol. ePrint Arch., 2025

Insecurity of One Decentralized Attribute-based Signature Scheme for Social Co-governance.
IACR Cryptol. ePrint Arch., 2025

Analysis of One Certificateless Authentication and Key Agreement Scheme for Wireless Body Area Network.
IACR Cryptol. ePrint Arch., 2025

On the Anonymity in "A Practical Lightweight Anonymous Authentication and Key Establishment Scheme for Resource-Asymmetric Smart Environments".
IACR Cryptol. ePrint Arch., 2025

A Security-Enhanced Pairing-Free Certificateless Aggregate Signature for Vehicular Ad-Hoc Networks, Revisited.
IACR Cryptol. ePrint Arch., 2025

A note on "industrial blockchain threshold signatures in federated learning for unified space-air-ground-sea model training".
IACR Cryptol. ePrint Arch., 2025

2024
A Note on "An Anonymous and Certificateless Identity Authentication Protocol for Mobile Edge Computing".
IEEE Syst. J., December, 2024

A Note on "Privacy Preserving n-Party Scalar Product Protocol".
IACR Cryptol. ePrint Arch., 2024

Simplification Issues of An Authentication and Key Agreement Scheme for Smart Grid.
IACR Cryptol. ePrint Arch., 2024

A Note on "Privacy-Preserving and Secure Cloud Computing: A Case of Large-Scale Nonlinear Programming".
IACR Cryptol. ePrint Arch., 2024

On the Anonymity of One Authentication and Key Agreement Scheme for Peer-to-Peer Cloud.
IACR Cryptol. ePrint Arch., 2024

The Zeros of Zeta Function Revisited.
IACR Cryptol. ePrint Arch., 2024

Design issues of "an anonymous authentication and key agreement protocol in smart living".
IACR Cryptol. ePrint Arch., 2024

On the anonymity of one authenticated key agreement scheme for mobile vehicles-assisted precision agricultural IoT networks.
IACR Cryptol. ePrint Arch., 2024

A Note on "Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things".
IACR Cryptol. ePrint Arch., 2024

Analysis of One Scheme for User Authentication and Session Key Agreement in Wireless Sensor Network Using Smart Card.
IACR Cryptol. ePrint Arch., 2024

A note on "a novel authentication protocol for IoT-enabled devices".
IACR Cryptol. ePrint Arch., 2024

A Note on " Provably Secure and Lightweight Authentication Key Agreement Scheme for Smart Meters".
IACR Cryptol. ePrint Arch., 2024

A Note on "Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain".
IACR Cryptol. ePrint Arch., 2024

A note on "a new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE".
IACR Cryptol. ePrint Arch., 2024

A note on "a lightweight mutual and transitive authentication mechanism for IoT network".
IACR Cryptol. ePrint Arch., 2024

The Practical Advantage of RSA over ECC and Pairings.
IACR Cryptol. ePrint Arch., 2024

A note on "intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era".
IACR Cryptol. ePrint Arch., 2024

2023
A note on "SCPUAK: smart card-based secure protocol for remote user authentication and key agreement".
IACR Cryptol. ePrint Arch., 2023

A Note on "A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0".
IACR Cryptol. ePrint Arch., 2023

Analysis of one semi-quantum-honest key agreement scheme in MSTSA structure without entanglement.
IACR Cryptol. ePrint Arch., 2023

A Note on "a two-factor security authentication scheme for wireless sensor networks in IoT environments".
IACR Cryptol. ePrint Arch., 2023

A note on "authenticated key agreement protocols for dew-assisted IoT systems".
IACR Cryptol. ePrint Arch., 2023

A note on "ISG-SLAS: secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor".
IACR Cryptol. ePrint Arch., 2023

A note on "blockchain-assisted authentication and key agreement scheme for fog-based smart grid".
IACR Cryptol. ePrint Arch., 2023

A Note on "Authenticated Key Agreement Protocol for Secure Communication Establishment in Vehicle-to-Grid Environment With FPGA Implementation".
IACR Cryptol. ePrint Arch., 2023

A Note on "A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment".
IACR Cryptol. ePrint Arch., 2023

A note on "a multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function".
IACR Cryptol. ePrint Arch., 2023

A note on "LAKAF: lightweight authentication and key agreement framework for smart grid network".
IACR Cryptol. ePrint Arch., 2023

A Note on "Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems".
IACR Cryptol. ePrint Arch., 2023

A Note on "On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System".
IACR Cryptol. ePrint Arch., 2023

A Note on "A Secure Anonymous D2D Mutual Authentication and Key Agreement Protocol for IoT".
IACR Cryptol. ePrint Arch., 2023

A note on "a lightweight mutual authentication and key agreement protocol for remote surgery application in Tactile Internet environment".
IACR Cryptol. ePrint Arch., 2023

A note on "faster and efficient cloud-server-aided data de-duplication scheme with an authenticated key agreement for Industrial Internet-of-Things".
IACR Cryptol. ePrint Arch., 2023

A Note on "Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT".
IACR Cryptol. ePrint Arch., 2023

2022
A Note on the Insecurity of Cryptosystems Based on Chebyshev Polynomials.
Int. J. Bifurc. Chaos, 2022

2021
One privacy-preserving multi-keyword ranked search scheme revisited.
Int. J. Inf. Comput. Secur., 2021

2020
A Note On One Secure Data Self-Destructing Scheme In Cloud Computing.
Int. J. Netw. Secur., 2020

A Note on One Popular Non-Interactive Zero-Knowledge Proof System.
Int. J. Netw. Secur., 2020

Run-based Modular Reduction Method.
Int. J. Netw. Secur., 2020

Evaluation Methods for Chebyshev Polynomials.
IACR Cryptol. ePrint Arch., 2020

Factoring Algorithm Based on Parameterized Newton Method.
IACR Cryptol. ePrint Arch., 2020

2019
Comment on "Highly Efficient Linear Regression Outsourcing to a Cloud".
IEEE Trans. Cloud Comput., 2019

2018
Analysis of One Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data.
Int. J. Netw. Secur., 2018

Analysis of Deutsch-Jozsa Quantum Algorithm.
IACR Cryptol. ePrint Arch., 2018

A Note On Clauser-Horne-Shimony-Holt Inequality.
IACR Cryptol. ePrint Arch., 2018

A Note On Groth-Ostrovsky-Sahai Non-Interactive Zero-Knowledge Proof System.
IACR Cryptol. ePrint Arch., 2018

Remarks on Bell's Inequality.
IACR Cryptol. ePrint Arch., 2018

New Algorithms for Subset Sum Problem.
CoRR, 2018

Analysis of Nederlof's algorithm for subset sum.
CoRR, 2018

A Note on "New techniques for noninteractive zero-knowledge".
CoRR, 2018

2017
Analysis of One Scheme for Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates.
Int. J. Netw. Secur., 2017

The Paillier's Cryptosystem and Some Variants Revisited.
Int. J. Netw. Secur., 2017

A Note on Two Schemes for Secure Outsourcing of Linear Programming.
Int. J. Netw. Secur., 2017

2016
Comment on "Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations".
IEEE Trans. Parallel Distributed Syst., 2016

An Improved Lindell-Waisbard Private Web Search Scheme.
Int. J. Netw. Secur., 2016

On Two Kinds of Flaws in Some Server-Aided Verification Schemes.
Int. J. Netw. Secur., 2016

The Reason Why Some Divide-and-Conquer Algorithms Cannot Be Efficiently Implemented.
IACR Cryptol. ePrint Arch., 2016

A Note on One Privacy-Preserving Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data.
IACR Cryptol. ePrint Arch., 2016

A Note on One Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud.
IACR Cryptol. ePrint Arch., 2016

A Note on "Outsourcing Large Matrix Inversion Computation to a Public Cloud".
IACR Cryptol. ePrint Arch., 2016

A Note On One Realization of a Scalable Shor Algorithm.
CoRR, 2016

A Note on the Alon-Kleitman Argument for Sum-free Subset Theorem.
CoRR, 2016

A note on "achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud".
CoRR, 2016

A Note on "Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization".
CoRR, 2016

2015
Improvement of Green-Hohenberger Adaptive Oblivious Transfer: A Review.
Int. J. Netw. Secur., 2015

Comment on "Realization of a scalable Shor algorithm".
IACR Cryptol. ePrint Arch., 2015

A Note on the Lindell-Waisbard Private Web Search Scheme.
IACR Cryptol. ePrint Arch., 2015

On the Disadvantages of Pairing-based Cryptography.
IACR Cryptol. ePrint Arch., 2015

Comment on Demonstrations of Shor's Algorithm in the Past Decades.
IACR Cryptol. ePrint Arch., 2015

A Note on "Efficient Algorithms for Secure Outsourcing of Bilinear Pairings".
CoRR, 2015

Comment on Two schemes for Secure Outsourcing of Linear Programming.
CoRR, 2015

On the Weakness of Fully Homomorphic Encryption.
CoRR, 2015

A Note On Boneh-Gentry-Waters Broadcast Encryption Scheme and Its Like.
CoRR, 2015

A fast string matching algorithm based on lowlight characters in the pattern.
Proceedings of the Seventh International Conference on Advanced Computational Intelligence, 2015

2014
Remarks on the Cryptographic Primitive of Attribute-based Encryption.
IACR Cryptol. ePrint Arch., 2014

A Note on the Bellare-Rivest Protocol for Translucent Cryptography.
IACR Cryptol. ePrint Arch., 2014

Analysis of Lewko-Sahai-Waters Revocation System.
IACR Cryptol. ePrint Arch., 2014

Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm.
IACR Cryptol. ePrint Arch., 2014

The Barth-Boneh-Waters Private Broadcast Encryption Scheme Revisited.
CoRR, 2014

A Note on the Quantum Modular Exponentiation Method Used in Shor's Factoring Algorithm.
CoRR, 2014

Remarks on AKS Primality Testing Algorithm and A Flaw in the Definition of P.
CoRR, 2014

A Fast String Matching Algorithm Based on Lowlight Characters in the Pattern.
CoRR, 2014

2013
A Note on Bilinear Groups of a Large Composite Order.
IACR Cryptol. ePrint Arch., 2013

Improvement of Lin-Tzeng Solution to Yao's Millionaires Problem and Its Cheating Advantage Analysis.
IACR Cryptol. ePrint Arch., 2013

Improvement of One Adaptive Oblivious Transfer Scheme.
IACR Cryptol. ePrint Arch., 2013

Improvement of One Anonymous Identity-Based Encryption.
IACR Cryptol. ePrint Arch., 2013

Ordered Probability Mass Function.
CoRR, 2013

Improved Randomized Algorithm for Square Root Extraction.
Proceedings of the Information Computing and Applications - 4th International Conference, 2013

2010
Improvement of one escrow-free identity-based signature.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2009
Generalized Greedy Algorithm for Shortest Superstring.
Proceedings of the Complex Sciences, 2009

Analysis of Two Signature Schemes from CIS'2006.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

A General Attack against Several Group Signatures.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Security Analysis of One Verifiable Encryption Scheme.
Proceedings of the Software Engineering, 2008

A Group Key Agreement Scheme Revisited.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
A Strong RSA Signature Scheme and Its Application.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Boudot's Range-Bounded Commitment Scheme Revisited.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

2006
On computing ord<sub>N</sub>(2) and its application.
Inf. Comput., 2006

Explicit constructions of separating hash families from algebraic curves over finite fields.
Des. Codes Cryptogr., 2006

Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

2005
On the Security of a Group Signature Scheme with Strong Separability.
IACR Cryptol. ePrint Arch., 2005

2004
Universal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al.
IACR Cryptol. ePrint Arch., 2004

Untraceability of Wang-Fu Group Signature Scheme.
IACR Cryptol. ePrint Arch., 2004


  Loading...