Qianhong Wu

According to our database1, Qianhong Wu authored at least 159 papers between 2003 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs.
IEEE Trans. Information Forensics and Security, 2019

Securing messaging services through efficient signcryption with designated equality test.
Inf. Sci., 2019

A secure versatile light payment system based on blockchain.
Future Generation Comp. Syst., 2019

A secure large-scale instant payment system based on blockchain.
Computers & Security, 2019

Searching With Direction Awareness: Multi-Objective Genetic Algorithm Based on Angle Quantization and Crowding Distance MOGA-AQCD.
IEEE Access, 2019

Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing.
IEEE Access, 2019

A Flexible Instant Payment System Based on Blockchain.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection.
Wireless Communications and Mobile Computing, 2018

Efficient subtree-based encryption for fuzzy-entity data sharing.
Soft Comput., 2018

Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures.
Peer-to-Peer Networking and Applications, 2018

Lightweight and Manageable Digital Evidence Preservation System on Bitcoin.
J. Comput. Sci. Technol., 2018

Secure pay-TV for chained hotels.
Int. J. Inf. Sec., 2018

Bitcoin-based fair payments for outsourcing computations of fog devices.
Future Generation Comp. Syst., 2018

Privacy Preservation for Outsourced Medical Data With Flexible Access Control.
IEEE Access, 2018

A Social-Network-Based Cryptocurrency Wallet-Management Scheme.
IEEE Access, 2018

Auditable Hierarchy-Private Public-Key Encryption.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

Linkable Group Signature for Auditing Anonymous Communication.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Distributed Aggregate Privacy-Preserving Authentication in VANETs.
IEEE Trans. Intelligent Transportation Systems, 2017

Online/Offline Provable Data Possession.
IEEE Trans. Information Forensics and Security, 2017

Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds.
IEEE Trans. Information Forensics and Security, 2017

Secure and Efficient Cloud Data Deduplication With Randomized Tag.
IEEE Trans. Information Forensics and Security, 2017

Secure joint Bitcoin trading with partially blind fuzzy signatures.
Soft Comput., 2017

A position-aware Merkle tree for dynamic cloud data integrity verification.
Soft Comput., 2017

Privacy-preserving identity-based file sharing in smart city.
Personal and Ubiquitous Computing, 2017

A Privacy-Preserving V2I Authentication Scheme Without Certificates.
J. Inf. Sci. Eng., 2017

Certificateless and identity-based authenticated asymmetric group key agreement.
Int. J. Inf. Sec., 2017

Confidentiality-Preserving Publicly Verifiable Computation.
Int. J. Found. Comput. Sci., 2017

Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security.
IACR Cryptology ePrint Archive, 2017

Auditing Revocable Privacy-Preserving Access Control for EHRs in Clouds.
Comput. J., 2017

Verifiably Encrypted Group Signatures.
Proceedings of the Provable Security, 2017

Provably Secure Self-Extractable Encryption.
Proceedings of the Provable Security, 2017

TTP-free Fair Exchange of Digital Signatures with Bitcoin.
Proceedings of the Information Security Practice and Experience, 2017

Outsourcing Encrypted Excel Files.
Proceedings of the Information Security Practice and Experience, 2017

EyeSec: A Practical Shoulder-Surfing Resistant Gaze-Based Authentication System.
Proceedings of the Information Security Practice and Experience, 2017

Secure Communications in Unmanned Aerial Vehicle Network.
Proceedings of the Information Security Practice and Experience, 2017

Secure Role-Based Access Control over Outsourced EMRs Against Unwanted Leakage.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Efficient CCA2 Secure Revocable Multi-authority Large-Universe Attribute-Based Encryption.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable Ciphertext.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response.
IEEE Trans. Computers, 2016

Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email.
IEEE Trans. Computers, 2016

Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts.
IEEE Trans. Computers, 2016

DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments.
IEEE Trans. Computers, 2016

Scalable privacy-enhanced traffic monitoring in vehicular ad hoc networks.
Soft Comput., 2016

Threshold attribute-based signcryption and its application to authenticated key agreement.
Security and Communication Networks, 2016

SAKE: scalable authenticated key exchange for mobile e-health networks.
Security and Communication Networks, 2016

Survey on key security technologies for space information networks.
J. Comm. Inform. Networks, 2016

Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption.
Int. J. Inf. Sec., 2016

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing.
IACR Cryptology ePrint Archive, 2016

Identity-based proxy re-encryption version 2: Making mobile access easy in cloud.
Future Generation Comp. Syst., 2016

Batch Public Key Cryptosystem with batch multi-exponentiation.
Future Generation Comp. Syst., 2016

Provably secure robust optimistic fair exchange of distributed signatures.
Future Generation Comp. Syst., 2016

Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks.
Concurrency and Computation: Practice and Experience, 2016

Efficient group key management for secure big data in predictable large-scale networks.
Concurrency and Computation: Practice and Experience, 2016

Distributed Bitcoin Account Management.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Vulnerability analysis of iPhone 6.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Towards Certificate-Based Group Encryption.
Proceedings of the Provable Security, 2016

Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control.
Proceedings of the Computer Security - ESORICS 2016, 2016

Anonymous Role-Based Access Control on E-Health Records.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Accelerating Oblivious Transfer with Batch Multi-exponentiation.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Identity-Based Group Encryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Towards Efficient Fully Randomized Message-Locked Encryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications.
IEEE Trans. Information Forensics and Security, 2015

Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search.
IEEE Trans. Information Forensics and Security, 2015

TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids.
IEEE Trans. Information Forensics and Security, 2015

Practical (fully) distributed signatures provably secure in the standard model.
Theor. Comput. Sci., 2015

A distributed secret share update scheme with public verifiability for ad hoc network.
Security and Communication Networks, 2015

Batch Attribute-Based Encryption for Secure Clouds.
Information, 2015

Flexible attribute-based encryption applicable to secure e-healthcare records.
Int. J. Inf. Sec., 2015

Practical secure and privacy-preserving scheme for value-added applications in VANETs.
Computer Communications, 2015

Further ideal multipartite access structures from integer polymatroids.
SCIENCE CHINA Information Sciences, 2015

Flexible and Robust Privacy-Preserving Implicit Authentication.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Batch Blind Signatures on Elliptic Curves.
Proceedings of the Information Security Practice and Experience, 2015

Auditing and Revocation Enabled Role-Based Access Control over Outsourced Private EHRs.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Threshold Attribute-Based Signcryption in Standard Model.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Group-oriented Proofs of Storage.
Proceedings of the 10th ACM Symposium on Information, 2015

Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data.
Proceedings of the 10th ACM Symposium on Information, 2015

Privacy-Preserving Traffic Monitoring in Vehicular Ad Hoc Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

2014
FRR: Fair remote retrieval of outsourced private medical records in electronic health networks.
Journal of Biomedical Informatics, 2014

Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security.
Inf. Sci., 2014

Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts.
Inf. Sci., 2014

Identity-based remote data possession checking in public clouds.
IET Information Security, 2014

Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks.
Proceedings of the Network and System Security - 8th International Conference, 2014

Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement.
Proceedings of the Information Security Practice and Experience, 2014

A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience.
Proceedings of the Information Security Practice and Experience, 2014

Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage.
Proceedings of the Computer Security - ESORICS 2014, 2014

Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test.
Proceedings of the Computer Security - ESORICS 2014, 2014

Who Is Touching My Cloud.
Proceedings of the Computer Security - ESORICS 2014, 2014

Practical Distributed Signatures in the Standard Model.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Hierarchical Identity-Based Broadcast Encryption.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
IEEE/ACM Trans. Netw., 2013

Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack.
IEEE Trans. Computers, 2013

Identity-based optimistic fair exchange in the standard model.
Security and Communication Networks, 2013

Simultaneous authentication and secrecy in identity-based data upload to cloud.
Cluster Computing, 2013

Light Weight Network Coding Based Key Distribution Scheme for MANETs.
Proceedings of the Network and System Security - 7th International Conference, 2013

Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

A Generic Construction of Proxy Signatures from Certificateless Signatures.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
Delegation of signing rights using certificateless proxy signatures.
Inf. Sci., 2012

Provably secure threshold public-key encryption with adaptive security and short ciphertexts.
Inf. Sci., 2012

Asymmetric homomorphisms for secure aggregation in heterogeneous scenarios.
Information Fusion, 2012

A New Identity Based Signcryption Scheme in the Standard Model.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Practical Privacy for Value-Added Applications in Vehicular Ad Hoc Networks.
Proceedings of the Internet and Distributed Computing Systems, 2012

2011
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol.
Inf. Sci., 2011

New receipt-free voting scheme using double-trapdoor commitment.
Inf. Sci., 2011

DPA Leakage Evaluation and Countermeasure Plug-in.
IACR Cryptology ePrint Archive, 2011

Asymmetric group key agreement protocol for open networks and its application to broadcast encryption.
Computer Networks, 2011

Fully Distributed Broadcast Encryption.
Proceedings of the Provable Security - 5th International Conference, 2011

APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks.
Proceedings of the Information Security, 14th International Conference, 2011

Toward Pairing-Free Certificateless Authenticated Key Exchanges.
Proceedings of the Information Security, 14th International Conference, 2011

Strong Security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Distributed Privacy-Preserving Secure Aggregation in Vehicular Communication.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Preserving Security and Privacy in Large-Scale VANETs.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Bridging Broadcast Encryption and Group Key Agreement.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
A Scalable Robust Authentication Protocol for Secure Vehicular Communications.
IEEE Trans. Vehicular Technology, 2010

Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications.
IEEE Trans. Vehicular Technology, 2010

Constructions of certificate-based signature secure against key replacement attacks.
Journal of Computer Security, 2010

Simulatable certificateless two-party authenticated key agreement protocol.
Inf. Sci., 2010

Efficient many-to-one authentication with certificateless aggregate signatures.
Computer Networks, 2010

Design theory and method of multivariate hash function.
SCIENCE CHINA Information Sciences, 2010

Secure compression of privacy-preserving witnesses in vehicular ad hoc networks.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Authenticated Asymmetric Group Key Agreement Protocol and Its Application.
Proceedings of IEEE International Conference on Communications, 2010

Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Hierarchical Certificateless Signatures.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Identity-Based Authenticated Asymmetric Group Key Agreement Protocol.
Proceedings of the Computing and Combinatorics, 16th Annual International Conference, 2010

Ad hoc broadcast encryption.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
User-private information retrieval based on a peer-to-peer community.
Data Knowl. Eng., 2009

Identity-Based Verifiably Encrypted Signatures without Random Oracles.
Proceedings of the Provable Security, Third International Conference, 2009

Asymmetric Group Key Agreement.
Proceedings of the Advances in Cryptology, 2009

Safety and Privacy in Vehicular Communications.
Proceedings of the Privacy in Location-Based Applications, 2009

Novel Efficient Certificateless Aggregate Signatures.
Proceedings of the Applied Algebra, 2009

Certificateless One-Way Authenticated Two-Party Key Agreement Protocol.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Invited Talk Extended Abstract: Safety and Privacy in Vehicular Communications.
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008

Privacy for Private Key in Signatures.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Publicly Verifiable Privacy-Preserving Group Decryption.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
Short Group Signatures Without Random Oracles.
J. Comput. Sci. Technol., 2007

A knapsack-based probabilistic encryption scheme.
Inf. Sci., 2007

Group Decryption.
IACR Cryptology ePrint Archive, 2007

Efficient Partially Blind Signatures with Provable Security.
Proceedings of the Computational Science and Its Applications, 2007

Certificate-Based Signature: Security Model and Efficient Construction.
Proceedings of the Public Key Infrastructure, 2007

Compact E-Cash from Bounded Accumulator.
Proceedings of the Topics in Cryptology, 2007

Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
Ad Hoc Group Signatures.
Proceedings of the Advances in Information and Computer Security, 2006

Privately Retrieve Data from Large Databases.
Proceedings of the Information Security Practice and Experience, 2006

Efficient Partially Blind Signatures with Provable Security.
Proceedings of the Computational Science and Its Applications, 2006

Efficient Signcryption Without Random Oracles.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme).
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

2005
Extended Methodology of RS Design and Instances Based on GIP.
J. Comput. Sci. Technol., 2005

A New Efficient Group Signature With Forward Security.
Informatica (Slovenia), 2005

An Improved Nominative Proxy Signature for Mobile Communication.
IEICE Transactions, 2005

t-Out-of-n String/Bit Oblivious Transfers Revisited.
Proceedings of the Information Security Practice and Experience, 2005

An Efficient Static Blind Ring Signature Scheme.
Proceedings of the Information Security and Cryptology, 2005

2004
A New Efficient Group Signature With Forward Security.
Informatica (Slovenia), 2004

Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group.
Proceedings of the Information Security, 7th International Conference, 2004

Publicly Verifiable Auctions with Minimal Leakage.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

An Improved Nominative Proxy Signature Scheme for Mobile Communication.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
A Novel Efficient Group Signature Scheme with Forward Security.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Practical t-out-n Oblivious Transfer and Its Applications.
Proceedings of the Information and Communications Security, 5th International Conference, 2003


  Loading...