Qianhong Wu

Orcid: 0000-0002-6407-4194

Affiliations:
  • Beihang University, School of Cyber Science and Technology, Beijing, China
  • University of Rovira i Virgili, Department of Computer Science and Mathematics, Spain
  • Wuhan University, School of Computer, China
  • Wollongong University, Center for Computer and Information Security Research, NSW, Australia
  • Xidian University, State Key Laboratory Of Integrated Service Networks, Xi'an, China (PhD 2005)


According to our database1, Qianhong Wu authored at least 229 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A High-Efficiency and Incentive-Compatible Peer-to-Peer Energy Trading Mechanism.
IEEE Trans. Smart Grid, January, 2024

A Blockchain-Based Cross-Domain Authentication Management System for IoT Devices.
IEEE Trans. Netw. Sci. Eng., 2024

CHERUBIM: A Secure and Highly Parallel Cross-Shard Consensus Using Quadruple Pipelined Two-Phase Commit for Sharding Blockchains.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions.
Comput. Commun., May, 2023

A Flexible Sharding Blockchain Protocol Based on Cross-Shard Byzantine Fault Tolerance.
IEEE Trans. Inf. Forensics Secur., 2023

Achieving Fine-Grained Data Sharing for Hierarchical Organizations in Clouds.
IEEE Trans. Dependable Secur. Comput., 2023

Decentralized IoT Resource Monitoring and Scheduling Framework Based on Blockchain.
IEEE Internet Things J., 2023

Decentralized Finance (DeFi): A Survey.
IACR Cryptol. ePrint Arch., 2023

Blockchain-empowered security and privacy protection technologies for smart grid.
Comput. Stand. Interfaces, 2023

Lever: Making Intensive Validation Practical on Blockchain.
Proceedings of the Information Security Practice and Experience, 2023

BDTS: Blockchain-Based Data Trading System.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Subsidy Bridge: Rewarding Cross-Blockchain Relayers with Subsidy.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

IKE: Threshold Key Escrow Service with Intermediary Encryption.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

EduChain: A Blockchain-Based Privacy-Preserving Lifelong Education Platform.
Proceedings of the Database Systems for Advanced Applications, 2023

DCSS: A Smart Contract-based Data Continuous Storage Scheme.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

Cross-chain based Spectrum Resources Transfer Technology across Different Telecom Operators Towards 6G.
Proceedings of the IEEE International Conference on Blockchain, 2023

2022
Efficient Encrypted Data Search With Expressive Queries and Flexible Update.
IEEE Trans. Serv. Comput., 2022

Revocable Attribute-Based Data Storage in Mobile Clouds.
IEEE Trans. Serv. Comput., 2022

ROSE: Robust Searchable Encryption With Forward and Backward Security.
IEEE Trans. Inf. Forensics Secur., 2022

SSHC: A Secure and Scalable Hybrid Consensus Protocol for Sharding Blockchains With a Formal Security Framework.
IEEE Trans. Dependable Secur. Comput., 2022

Policy-Based Broadcast Access Authorization for Flexible Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2022

Machine learning for Internet of things anomaly detection under low-quality data.
Int. J. Distributed Sens. Networks, 2022

Multi-Party Electronic Contract Signing Protocol Based on Blockchain.
IEICE Trans. Inf. Syst., 2022

Practical AgentChain: A compatible cross-chain exchange system.
Future Gener. Comput. Syst., 2022

BDTS: A Blockchain-based Data Trading System with Fair Exchange.
CoRR, 2022

CyberRadar: A PUF-based Detecting and Mapping Framework for Physical Devices.
CoRR, 2022

CLTracer: A Cross-Ledger Tracing framework based on address relationships.
Comput. Secur., 2022

Squeezing Network Performance for Secure and Efficient PoW with Better Difficulty Adjustment.
Proceedings of the IEEE International Conference on Trust, 2022

PXCrypto: A Regulated Privacy-Preserving Cross-Chain Transaction Scheme.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022

Light-weight Unsupervised Anomaly Detection for Encrypted Malware Traffic.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2021
Privacy-Preserving Lightweight Data Monitoring in Internet of Things Environments.
Wirel. Pers. Commun., 2021

Practical Multi-Keyword and Boolean Search Over Encrypted E-mail in Cloud Server.
IEEE Trans. Serv. Comput., 2021

Log-Based Anomaly Detection With Robust Feature Extraction and Online Learning.
IEEE Trans. Inf. Forensics Secur., 2021

Themis: An accountable blockchain-based P2P cloud storage scheme.
Peer-to-Peer Netw. Appl., 2021

Dynamic threshold ECDSA signature and application to asset custody in blockchain.
J. Inf. Secur. Appl., 2021

Traceable ring signatures: general framework and post-quantum security.
Des. Codes Cryptogr., 2021

Making MA-ABE fully accountable: A blockchain-based approach for secure digital right management.
Comput. Networks, 2021

Fair and smart spectrum allocation scheme for IIoT based on blockchain.
Ad Hoc Networks, 2021

A Secure Cross-Shard View-Change Protocol for Sharding Blockchains.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud.
IEEE Trans. Inf. Forensics Secur., 2020

Secure Outsourced Medical Data against Unexpected Leakage with Flexible Access Control in a Cloud Storage System.
Secur. Commun. Networks, 2020

Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing.
KSII Trans. Internet Inf. Syst., 2020

Secure server-aided data sharing clique with attestation.
Inf. Sci., 2020

Flexible attribute-based proxy re-encryption for efficient data sharing.
Inf. Sci., 2020

Special Issue on Cryptographic Currency and Blockchain Technology.
Future Gener. Comput. Syst., 2020

A decentralized and secure blockchain platform for open fair data trading.
Concurr. Comput. Pract. Exp., 2020

An organization-friendly blockchain system.
Comput. Secur., 2020

A Secure Shard Reconfiguration Protocol for Sharding Blockchains Without a Randomness.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Experimental Comparisons of Verifiable Delay Functions.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

Cross-shard Transaction Processing in Sharding Blockchains.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

FleetChain: A Secure Scalable and Responsive Blockchain Achieving Optimal Sharding.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Traceable Ring Signatures with Post-quantum Security.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020

A Paid Message Forwarding Scheme Based on Social Network.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

Exploring the Security of Certificate Transparency in the Wild.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

A Blockchain-Based Resource Supervision Scheme for Edge Devices Under Cloud-Fog-End Computing Models.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
Efficient Scheduling of Weighted Coflows in Data Centers.
IEEE Trans. Parallel Distributed Syst., 2019

DA&FD-Deadline-Aware and Flow Duration-Based Rate Control for Mixed Flows in DCNs.
IEEE/ACM Trans. Netw., 2019

Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs.
IEEE Trans. Inf. Forensics Secur., 2019

Detecting Anomalous Behavior in Cloud Servers by Nested-Arc Hidden SEMI-Markov Model with State Summarization.
IEEE Trans. Big Data, 2019

Securing messaging services through efficient signcryption with designated equality test.
Inf. Sci., 2019

Lever: Breaking the Shackles of Scalable On-chain Validation.
IACR Cryptol. ePrint Arch., 2019

A secure versatile light payment system based on blockchain.
Future Gener. Comput. Syst., 2019

A secure large-scale instant payment system based on blockchain.
Comput. Secur., 2019

An analytic evaluation for the impact of uncle blocks by selfish and stubborn mining in an imperfect Ethereum network.
Comput. Secur., 2019

Achieving liability in anonymous communication: Auditing and tracing.
Comput. Commun., 2019

Searching With Direction Awareness: Multi-Objective Genetic Algorithm Based on Angle Quantization and Crowding Distance MOGA-AQCD.
IEEE Access, 2019

Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing.
IEEE Access, 2019

AgentChain: A Decentralized Cross-Chain Exchange System.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Practical Lattice-Based Sequential Aggregate Signature.
Proceedings of the Provable Security, 2019

Distributed Secure Storage System Based on Blockchain and TPA.
Proceedings of the Network and System Security - 13th International Conference, 2019

Privacy-Preserving Sequential Data Publishing.
Proceedings of the Network and System Security - 13th International Conference, 2019

Secure Stern Signatures in Quantum Random Oracle Model.
Proceedings of the Information Security - 22nd International Conference, 2019

Traceable Decentralized Anonymous E-Cash System Against Active Attackers.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

Two-Layer Group Signature and Application to E-Cash.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

A Flexible Instant Payment System Based on Blockchain.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection.
Wirel. Commun. Mob. Comput., 2018

Efficient subtree-based encryption for fuzzy-entity data sharing.
Soft Comput., 2018

Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures.
Peer-to-Peer Netw. Appl., 2018

Lightweight and Manageable Digital Evidence Preservation System on Bitcoin.
J. Comput. Sci. Technol., 2018

Secure pay-TV for chained hotels.
Int. J. Inf. Sec., 2018

Bitcoin-based fair payments for outsourcing computations of fog devices.
Future Gener. Comput. Syst., 2018

Privacy Preservation for Outsourced Medical Data With Flexible Access Control.
IEEE Access, 2018

A Social-Network-Based Cryptocurrency Wallet-Management Scheme.
IEEE Access, 2018

Auditable Hierarchy-Private Public-Key Encryption.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

Linkable Group Signature for Auditing Anonymous Communication.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Distributed Aggregate Privacy-Preserving Authentication in VANETs.
IEEE Trans. Intell. Transp. Syst., 2017

Online/Offline Provable Data Possession.
IEEE Trans. Inf. Forensics Secur., 2017

Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds.
IEEE Trans. Inf. Forensics Secur., 2017

Secure and Efficient Cloud Data Deduplication With Randomized Tag.
IEEE Trans. Inf. Forensics Secur., 2017

Secure joint Bitcoin trading with partially blind fuzzy signatures.
Soft Comput., 2017

A position-aware Merkle tree for dynamic cloud data integrity verification.
Soft Comput., 2017

Privacy-preserving identity-based file sharing in smart city.
Pers. Ubiquitous Comput., 2017

A Privacy-Preserving V2I Authentication Scheme Without Certificates.
J. Inf. Sci. Eng., 2017

Certificateless and identity-based authenticated asymmetric group key agreement.
Int. J. Inf. Sec., 2017

Confidentiality-Preserving Publicly Verifiable Computation.
Int. J. Found. Comput. Sci., 2017

Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security.
IACR Cryptol. ePrint Arch., 2017

T-DB: Toward Fully Functional Transparent Encrypted Databases in DBaaS Framework.
CoRR, 2017

Auditing Revocable Privacy-Preserving Access Control for EHRs in Clouds.
Comput. J., 2017

Verifiably Encrypted Group Signatures.
Proceedings of the Provable Security, 2017

Provably Secure Self-Extractable Encryption.
Proceedings of the Provable Security, 2017

TTP-free Fair Exchange of Digital Signatures with Bitcoin.
Proceedings of the Information Security Practice and Experience, 2017

Outsourcing Encrypted Excel Files.
Proceedings of the Information Security Practice and Experience, 2017

EyeSec: A Practical Shoulder-Surfing Resistant Gaze-Based Authentication System.
Proceedings of the Information Security Practice and Experience, 2017

Secure Communications in Unmanned Aerial Vehicle Network.
Proceedings of the Information Security Practice and Experience, 2017

Secure Role-Based Access Control over Outsourced EMRs Against Unwanted Leakage.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Efficient CCA2 Secure Revocable Multi-authority Large-Universe Attribute-Based Encryption.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable Ciphertext.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response.
IEEE Trans. Computers, 2016

Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email.
IEEE Trans. Computers, 2016

Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts.
IEEE Trans. Computers, 2016

DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments.
IEEE Trans. Computers, 2016

Scalable privacy-enhanced traffic monitoring in vehicular ad hoc networks.
Soft Comput., 2016

Threshold attribute-based signcryption and its application to authenticated key agreement.
Secur. Commun. Networks, 2016

SAKE: scalable authenticated key exchange for mobile e-health networks.
Secur. Commun. Networks, 2016

Survey on key security technologies for space information networks.
J. Commun. Inf. Networks, 2016

Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption.
Int. J. Inf. Sec., 2016

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing.
IACR Cryptol. ePrint Arch., 2016

Identity-based proxy re-encryption version 2: Making mobile access easy in cloud.
Future Gener. Comput. Syst., 2016

Batch Public Key Cryptosystem with batch multi-exponentiation.
Future Gener. Comput. Syst., 2016

Provably secure robust optimistic fair exchange of distributed signatures.
Future Gener. Comput. Syst., 2016

Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks.
Concurr. Comput. Pract. Exp., 2016

Efficient group key management for secure big data in predictable large-scale networks.
Concurr. Comput. Pract. Exp., 2016

Distributed Bitcoin Account Management.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Vulnerability analysis of iPhone 6.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Towards Certificate-Based Group Encryption.
Proceedings of the Provable Security, 2016

Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control.
Proceedings of the Computer Security - ESORICS 2016, 2016

Anonymous Role-Based Access Control on E-Health Records.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Accelerating Oblivious Transfer with Batch Multi-exponentiation.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Identity-Based Group Encryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Towards Efficient Fully Randomized Message-Locked Encryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications.
IEEE Trans. Inf. Forensics Secur., 2015

Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search.
IEEE Trans. Inf. Forensics Secur., 2015

TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2015

Practical (fully) distributed signatures provably secure in the standard model.
Theor. Comput. Sci., 2015

A distributed secret share update scheme with public verifiability for ad hoc network.
Secur. Commun. Networks, 2015

Batch Attribute-Based Encryption for Secure Clouds.
Inf., 2015

Flexible attribute-based encryption applicable to secure e-healthcare records.
Int. J. Inf. Sec., 2015

On the Security of MTA-OTIBASs (Multiple-TA One-Time Identity-Based Aggregate Signatures).
CoRR, 2015

On the Security of Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response.
CoRR, 2015

Practical secure and privacy-preserving scheme for value-added applications in VANETs.
Comput. Commun., 2015

Further ideal multipartite access structures from integer polymatroids.
Sci. China Inf. Sci., 2015

Flexible and Robust Privacy-Preserving Implicit Authentication.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Batch Blind Signatures on Elliptic Curves.
Proceedings of the Information Security Practice and Experience, 2015

Auditing and Revocation Enabled Role-Based Access Control over Outsourced Private EHRs.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Threshold Attribute-Based Signcryption in Standard Model.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Group-oriented Proofs of Storage.
Proceedings of the 10th ACM Symposium on Information, 2015

Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data.
Proceedings of the 10th ACM Symposium on Information, 2015

Privacy-Preserving Traffic Monitoring in Vehicular Ad Hoc Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

2014
FRR: Fair remote retrieval of outsourced private medical records in electronic health networks.
J. Biomed. Informatics, 2014

Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security.
Inf. Sci., 2014

Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts.
Inf. Sci., 2014

Identity-based remote data possession checking in public clouds.
IET Inf. Secur., 2014

Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks.
Proceedings of the Network and System Security - 8th International Conference, 2014

Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement.
Proceedings of the Information Security Practice and Experience, 2014

A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience.
Proceedings of the Information Security Practice and Experience, 2014

Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage.
Proceedings of the Computer Security - ESORICS 2014, 2014

Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test.
Proceedings of the Computer Security - ESORICS 2014, 2014

Who Is Touching My Cloud.
Proceedings of the Computer Security - ESORICS 2014, 2014

Practical Distributed Signatures in the Standard Model.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Hierarchical Identity-Based Broadcast Encryption.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
IEEE/ACM Trans. Netw., 2013

Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack.
IEEE Trans. Computers, 2013

Identity-based optimistic fair exchange in the standard model.
Secur. Commun. Networks, 2013

Simultaneous authentication and secrecy in identity-based data upload to cloud.
Clust. Comput., 2013

Light Weight Network Coding Based Key Distribution Scheme for MANETs.
Proceedings of the Network and System Security - 7th International Conference, 2013

Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

A Generic Construction of Proxy Signatures from Certificateless Signatures.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
Delegation of signing rights using certificateless proxy signatures.
Inf. Sci., 2012

Provably secure threshold public-key encryption with adaptive security and short ciphertexts.
Inf. Sci., 2012

Asymmetric homomorphisms for secure aggregation in heterogeneous scenarios.
Inf. Fusion, 2012

A New Identity Based Signcryption Scheme in the Standard Model.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Practical Privacy for Value-Added Applications in Vehicular Ad Hoc Networks.
Proceedings of the Internet and Distributed Computing Systems, 2012

2011
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol.
Inf. Sci., 2011

New receipt-free voting scheme using double-trapdoor commitment.
Inf. Sci., 2011

DPA Leakage Evaluation and Countermeasure Plug-in.
IACR Cryptol. ePrint Arch., 2011

Asymmetric group key agreement protocol for open networks and its application to broadcast encryption.
Comput. Networks, 2011

Fully Distributed Broadcast Encryption.
Proceedings of the Provable Security - 5th International Conference, 2011

APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks.
Proceedings of the Information Security, 14th International Conference, 2011

Toward Pairing-Free Certificateless Authenticated Key Exchanges.
Proceedings of the Information Security, 14th International Conference, 2011

Strong Security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Distributed Privacy-Preserving Secure Aggregation in Vehicular Communication.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Preserving Security and Privacy in Large-Scale VANETs.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Bridging Broadcast Encryption and Group Key Agreement.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
A Scalable Robust Authentication Protocol for Secure Vehicular Communications.
IEEE Trans. Veh. Technol., 2010

Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications.
IEEE Trans. Veh. Technol., 2010

Constructions of certificate-based signature secure against key replacement attacks.
J. Comput. Secur., 2010

Simulatable certificateless two-party authenticated key agreement protocol.
Inf. Sci., 2010

Identity-Based Authenticated Asymmetric Group Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2010

Efficient many-to-one authentication with certificateless aggregate signatures.
Comput. Networks, 2010

Design theory and method of multivariate hash function.
Sci. China Inf. Sci., 2010

Secure compression of privacy-preserving witnesses in vehicular ad hoc networks.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Authenticated Asymmetric Group Key Agreement Protocol and Its Application.
Proceedings of IEEE International Conference on Communications, 2010

Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Hierarchical Certificateless Signatures.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Ad hoc broadcast encryption.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
User-private information retrieval based on a peer-to-peer community.
Data Knowl. Eng., 2009

Identity-Based Verifiably Encrypted Signatures without Random Oracles.
Proceedings of the Provable Security, Third International Conference, 2009

Asymmetric Group Key Agreement.
Proceedings of the Advances in Cryptology, 2009

Safety and Privacy in Vehicular Communications.
Proceedings of the Privacy in Location-Based Applications, 2009

Novel Efficient Certificateless Aggregate Signatures.
Proceedings of the Applied Algebra, 2009

Certificateless One-Way Authenticated Two-Party Key Agreement Protocol.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Invited Talk Extended Abstract: Safety and Privacy in Vehicular Communications.
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008

Privacy for Private Key in Signatures.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Publicly Verifiable Privacy-Preserving Group Decryption.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
Short Group Signatures Without Random Oracles.
J. Comput. Sci. Technol., 2007

A knapsack-based probabilistic encryption scheme.
Inf. Sci., 2007

Group Decryption.
IACR Cryptol. ePrint Arch., 2007

Certificate-Based Signature: Security Model and Efficient Construction.
Proceedings of the Public Key Infrastructure, 2007

Compact E-Cash from Bounded Accumulator.
Proceedings of the Topics in Cryptology, 2007

Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
Ad Hoc Group Signatures.
Proceedings of the Advances in Information and Computer Security, 2006

Privately Retrieve Data from Large Databases.
Proceedings of the Information Security Practice and Experience, 2006

Efficient Partially Blind Signatures with Provable Security.
Proceedings of the Computational Science and Its Applications, 2006

Efficient Signcryption Without Random Oracles.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme).
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

2005
Extended Methodology of RS Design and Instances Based on GIP.
J. Comput. Sci. Technol., 2005

An Improved Nominative Proxy Signature for Mobile Communication.
IEICE Trans. Inf. Syst., 2005

<i>t</i>-Out-of-<i>n</i> String/Bit Oblivious Transfers Revisited.
Proceedings of the Information Security Practice and Experience, 2005

An Efficient Static Blind Ring Signature Scheme.
Proceedings of the Information Security and Cryptology, 2005

2004
A New Efficient Group Signature With Forward Security.
Informatica (Slovenia), 2004

Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group.
Proceedings of the Information Security, 7th International Conference, 2004

How to conduct a sealed bargain on the internet.
Proceedings of the 3rd International Conference on Information Security, 2004

Publicly Verifiable Auctions with Minimal Leakage.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

An Improved Nominative Proxy Signature Scheme for Mobile Communication.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
A Novel Efficient Group Signature Scheme with Forward Security.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Practical t-out-n Oblivious Transfer and Its Applications.
Proceedings of the Information and Communications Security, 5th International Conference, 2003


  Loading...