Mingwu Zhang

According to our database1, Mingwu Zhang authored at least 115 papers between 2007 and 2020.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Identity-based encryption with leakage-amplified chosen-ciphertext attacks security.
Theor. Comput. Sci., 2020

A Novel Privacy-Preserving Authentication Scheme for V2G Networks.
IEEE Systems Journal, 2020

An efficient aggregation scheme resisting on malicious data mining attacks for smart grid.
Inf. Sci., 2020

A Lightweight Privacy-Preserving Fair Meeting Location Determination Scheme.
IEEE Internet Things J., 2020

Updatable Lossy Trapdoor Functions Under Consecutive Leakage.
Comput. J., 2020

Obfuscating EVES Algorithm and Its Application in Fair Electronic Transactions in Public Clouds.
IEEE Systems Journal, 2019

Continuous After-the-Fact Leakage-Resilient Group Password-Authenticated Key Exchange.
I. J. Network Security, 2019

A Feasible Quantum Protocol for Private Set Intersection Cardinality.
IEEE Access, 2019

New Approach to Set Representation and Practical Private Set-Intersection Protocols.
IEEE Access, 2019

Development of an Early Warning System for Network Intrusion Detection Using Benford's Law Features.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

Provably Secure Proactive Secret Sharing Without the Adjacent Assumption.
Proceedings of the Provable Security, 2019

An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol.
Proceedings of the Network and System Security - 13th International Conference, 2019

A Fair and Efficient Secret Sharing Scheme Based on Cloud Assisting.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

A Fair (t, n)-Threshold Secret Sharing Scheme with Efficient Cheater Identifying.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019

Provably Secure Group Authentication in the Asynchronous Communication Model.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

A Method of Collecting Four Character Medicine Effect Phrases in TCM Patents Based on Semi-supervised Learning.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019

An Efficient Image Encryption Scheme for Industrial Internet-of-Things Devices.
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019

On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification.
IEEE Trans. Dependable Secur. Comput., 2018

After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange.
IEEE Systems Journal, 2018

A Semi-Automatic Annotation Method of Effect Clue Words for Chinese Patents Based on Co-Training.
IJDWM, 2018

Accountable mobile E-commerce scheme in intelligent cloud system transactions.
J. Ambient Intell. Humaniz. Comput., 2018

Secure and Fine-grained Electricity Consumption Aggregation Scheme for Smart Grid.
KSII Trans. Internet Inf. Syst., 2018

Certificate-based Smooth Projective Hashing and Its Applications.
I. J. Network Security, 2018

A publicly verifiable network coding scheme with null-space HMAC.
Int. J. Intell. Inf. Database Syst., 2018

ADR-lrABE: New Mechanism of Direct-revocable Attribute-Based Encryption with Continual-leakage Tolerances.
Fundam. Inform., 2018

An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection.
Comput. J., 2018

Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation.
Sci. China Inf. Sci., 2018

Tolerating Sensitive-Leakage With Larger Plaintext-Space and Higher Leakage-Rate in Privacy-Aware Internet-of-Things.
IEEE Access, 2018

Consecutive Leakage-Resilient and Updatable Lossy Trapdoor Functions and Application in Sensitive Big-Data Environments.
IEEE Access, 2018

Secure and Membership-Based Data Sharing Scheme in V2G Networks.
IEEE Access, 2018

An Efficient and Provably Secure Private Polynomial Evaluation Scheme.
Proceedings of the Information Security Practice and Experience, 2018

Cloud-Based Data-Sharing Scheme Using Verifiable and CCA-Secure Re-encryption from Indistinguishability Obfuscation.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart Grids.
IEEE Trans. Information Forensics and Security, 2017

Attribute-Based Hash Proof System Under Learning-With-Errors Assumption in Obfuscator-Free and Leakage-Resilient Environments.
IEEE Systems Journal, 2017

Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security.
J. Inf. Sci. Eng., 2017

Privacy-preserving Outsourcing Schemes of Modular Exponentiations Using Single Untrusted Cloud Server.
KSII Trans. Internet Inf. Syst., 2017

Continuous Leakage Resilient Lossy Trapdoor Functions.
Information, 2017

New efficient chosen ciphertext secure Elgamal encryption schemes for secure Cloud storage service.
IJWGS, 2017

Cost-effective secure E-health cloud system using identity based cryptographic techniques.
Future Gener. Comput. Syst., 2017

Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server.
IEEE Access, 2017

Provably Leakage-Resilient Password-Based Authenticated Key Exchange in the Standard Model.
IEEE Access, 2017

Reliable Homomorphic Matrix Disguising Scheme.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

Leakage-Resilient Password-Based Authenticated Key Exchange.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

An Efficient Identity-Based Homomorphic Signature Scheme for Network Coding.
Proceedings of the Advances in Internetworking, 2017

Continual key leakage tolerant encryption from extensible set delegation.
Security and Communication Networks, 2016

Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity.
Security and Communication Networks, 2016

Realizing secret sharing with general access structure.
Inf. Sci., 2016

An efficient resource-fair commit-prove-fair-open protocol.
IJESDF, 2016

Privacy-friendly weighted-reputation aggregation protocols against malicious adversaries in cloud services.
Int. J. Communication Systems, 2016

Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
IACR Cryptol. ePrint Arch., 2016

An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing.
Concurr. Comput. Pract. Exp., 2016

Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations.
Comput. J., 2016

Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage.
Proceedings of the Provable Security, 2016

One-Round Strong Oblivious Signature-Based Envelope.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization.
IEEE Trans. Information Forensics and Security, 2015

Security analysis of a homomorphic signature scheme for network coding.
Security and Communication Networks, 2015

基于Petri网的Web服务组合验证方法 (Verification Methods Based on Petri Networks for Web Services Composition).
计算机科学, 2015

基于服务组合模型结构特征的性能瓶颈定位方案 (Performance Bottlenecks Location Scheme Based on Structural Features of Service Composition Model).
计算机科学, 2015

Notes on Proxy Signcryption and Multi-proxy Signature Schemes.
I. J. Network Security, 2015

Functional Encryption Resilient to Hard-to-Invert Leakage.
Comput. J., 2015

Public Key Encryption with Delegated Equality Test in a Multi-User Setting.
Comput. J., 2015

Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model.
Comput. J., 2015

Program Obfuscator for Privacy-Carrying Unidirectional One-hop Re-encryption.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces.
J. Supercomput., 2014

Unbounded anonymous hierarchical IBE with continual-key-leakage tolerance.
Security and Communication Networks, 2014

An efficient fair UC-secure protocol for two-party computation.
Security and Communication Networks, 2014

PPGJ: A privacy-preserving general join for outsourced encrypted database.
Security and Communication Networks, 2014

Anonymous spatial encryption under affine space delegation functionality with full security.
Inf. Sci., 2014

CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction.
I. J. Network Security, 2014

Comments on FHH Anonymous Multireceiver Encryption.
I. J. Network Security, 2014

Fully secure constructions of spatial encryption with vector privacy.
Int. J. Communication Systems, 2014

Anonymous encryption with partial-order subset delegation and its application in privacy email systems.
IET Information Security, 2014

Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks.
Frontiers Comput. Sci., 2014

ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key Leakage.
Proceedings of the Information Security Practice and Experience, 2014

New Model and Construction of ABE: Achieving Key Resilient-Leakage and Attribute Direct-Revocation.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

Efficient Constructions of Anonymous Multireceiver Encryption Protocol and Their Deployment in Group E-mail Systems With Privacy Preservation.
IEEE Systems Journal, 2013

Efficient and adaptively secure broadcast encryption systems.
Security and Communication Networks, 2013

Identity-based partially blind signature in the standard model for electronic cash.
Math. Comput. Model., 2013

Public Key Replacement and Universal Forgery of a SCLS Scheme.
I. J. Network Security, 2013

Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction.
IACR Cryptol. ePrint Arch., 2013

Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate.
Comput. J., 2013

Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions.
Proceedings of the Information Security Practice and Experience, 2013

Reconciling and improving of multi-receiver signcryption protocols with threshold decryption.
Security and Communication Networks, 2012

Privacy-Preserving OLAP for Accurate Answer.
Journal of Circuits, Systems, and Computers, 2012

An ID-based cryptographic mechanisms based on GDLP and IFP.
Inf. Process. Lett., 2012

Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-delegatability and Non-transferability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Analysis and Improvement of a Secret Broadcast with Binding Encryption in Broadcasting Networks.
IEICE Trans. Inf. Syst., 2012

Combining AHP with GIS in synthetic evaluation of environmental suitability for living in China's 35 major cities.
Int. J. Geogr. Inf. Sci., 2012

Efficient signcryption in the standard model.
Concurr. Comput. Pract. Exp., 2012

LR-UESDE: A Continual-Leakage Resilient Encryption with Unbounded Extensible Set Delegation.
Proceedings of the Provable Security - 6th International Conference, 2012

A Robust Fuzzy Extractor without ECCs.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

Group-oriented setting's multisigncryption scheme with threshold designcryption.
Inf. Sci., 2011

Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor.
I. J. Network Security, 2011

Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings.
I. J. Network Security, 2011

Anonymous Encryption with Partial-Order Subset Delegation Functionality.
Proceedings of the Provable Security - 5th International Conference, 2011

Efficient Identity-Based Signcryption in the Standard Model.
Proceedings of the Provable Security - 5th International Conference, 2011

Dual-Verifiers DVS with Message Recovery for Tolerant Routing in Wireless Sensor Networks.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011

GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption Systems.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

A Classified Credential Selection Scheme with Disclosure-minimizing Privacy.
JDCTA, 2010

Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010

Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010

Ordered Semiring-based Trust Establish Model with Risk Evaluating.
I. J. Network Security, 2009

Analysis and Enhance of Anonymous Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2009

Analysis and Improvement of an ID-Based Anonymous Signcryption Model.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009

Interactive analysis of systems biology molecular expression data.
BMC Syst. Biol., 2008

Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy.
Proceedings of the Intelligence and Security Informatics, 2008

Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

Tracing Lineage Beyond Relational Operators.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

Using Trust Metric to Detect Malicious Behaviors in WSNs.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Trust-based Distributed Authentication Middleware in Ubiquitous Mobile Environments.
Proceedings of the Third International Conference on Natural Computation, 2007

Identifying Rare Classes with Sparse Training Data.
Proceedings of the Database and Expert Systems Applications, 18th International Conference, 2007

Tracing Lineage in Multi-version Scientific Databases.
Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, 2007

Efficient Identity-Based Signcryption Scheme for Multiple Receivers.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007