Qiong Huang

Orcid: 0000-0002-7666-8985

Affiliations:
  • South China Agricultural University, Guangzhou, China


According to our database1, Qiong Huang authored at least 143 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud.
Cybersecur., December, 2024

Controllable forward secure identity-based encryption with equality test in privacy-preserving text similarity analysis.
Inf. Sci., March, 2024

A lightweight open-world pest image classifier using ResNet8-based matching network and NT-Xent loss function.
Expert Syst. Appl., March, 2024

Post-quantum secure group signature with verifier local revocation and backward unlinkability.
Comput. Stand. Interfaces, March, 2024

A fully secure lattice-based signcryption with designated equality test in standard model.
Inf. Sci., February, 2024

Revocable Public Key Encryption with Equality Test without Pairing in Cloud Storage.
Comput. J., February, 2024

A two-stage robust reversible watermarking using polar harmonic transform for high robustness and capacity.
Inf. Sci., January, 2024

A lattice-based public key encryption scheme with delegated equality test.
Comput. Stand. Interfaces, January, 2024

An Identity-Based Encryption with Equality Test scheme for healthcare social apps.
Comput. Stand. Interfaces, January, 2024

FASTEN: Fast Ensemble Learning for Improved Adversarial Robustness.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Multiparty Secure Broad Learning System for Privacy Preserving.
IEEE Trans. Cybern., October, 2023

Secure channel free public key authenticated encryption with multi-keyword search on healthcare systems.
Future Gener. Comput. Syst., August, 2023

FS-IBEKS: Forward secure identity-based encryption with keyword search from lattice.
Comput. Stand. Interfaces, August, 2023

A more efficient public-key authenticated encryption scheme with keyword search.
J. Syst. Archit., April, 2023

An identity-based traceable ring signatures based on lattice.
Peer Peer Netw. Appl., March, 2023

A Novel Encryption-Then-Lossy-Compression Scheme of Color Images Using Customized Residual Dense Spatial Network.
IEEE Trans. Multim., 2023

MTER: An Efficient Multi-User Threshold Equality Retrieval for Double Auction in Smart Grid Market.
IEEE Trans. Inf. Forensics Secur., 2023

Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search.
IEEE Trans. Inf. Forensics Secur., 2023

Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security.
Inf., 2023

A Lattice-Based Certificateless Traceable Ring Signature Scheme.
Inf., 2023

Forward Secure Online/Offline Key Policy Attribute-Based Encryption with Keyword Search.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
A fully dynamic forward-secure group signature from lattice.
Cybersecur., December, 2022

Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities.
IEEE Trans. Serv. Comput., 2022

Blockchain Based Multi-Authority Fine-Grained Access Control System With Flexible Revocation.
IEEE Trans. Serv. Comput., 2022

Attribute-Based Hierarchical Access Control With Extendable Policy.
IEEE Trans. Inf. Forensics Secur., 2022

Blockchain Assisted Multi-Copy Provable Data Possession With Faults Localization in Multi-Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2022

Efficient Public Key Encryption With Outsourced Equality Test for Cloud-Based IoT Environments.
IEEE Trans. Inf. Forensics Secur., 2022

A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search.
IEEE Trans. Dependable Secur. Comput., 2022

An Anonymous Authentication System for Pay-As-You-Go Cloud Computing$^*$*.
IEEE Trans. Dependable Secur. Comput., 2022

A novel identity-based multi-signature scheme over NTRU lattices.
Theor. Comput. Sci., 2022

Multi-party Secure Broad Learning System for Privacy Preserving.
CoRR, 2022

Secure-Channel Free Certificateless Searchable Public Key Authenticated Encryption with Keyword Search.
Proceedings of the Provable and Practical Security, 2022

CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
Private Set Intersection With Authorization Over Outsourced Encrypted Datasets.
IEEE Trans. Inf. Forensics Secur., 2021

Efficient functional encryption for inner product with simulation-based security.
Cybersecur., 2021

CCA-Almost-Full Anonymous Group Signature with Verifier Local Revocation in the Standard Model.
Comput. J., 2021

On Enabling Attribute-Based Encryption to Be Traceable Against Traitors.
Comput. J., 2021

Efficient Group ID-Based Encryption With Equality Test Against Insider Attack.
Comput. J., 2021

Functional signatures: new definition and constructions.
Sci. China Inf. Sci., 2021

A CCA-Full-Anonymous Group Signature with Verifiable Controllable Linkability in the Standard Model.
Proceedings of the Provable and Practical Security, 2021

Public Key Encryption with Fuzzy Matching.
Proceedings of the Provable and Practical Security, 2021

A Novel Certificateless Multi-signature Scheme over NTRU Lattices.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

Broadcast Authenticated Encryption with Keyword Search.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Public-key authenticated encryption with keyword search revisited: Security model and constructions.
Inf. Sci., 2020

Group public key encryption with equality test against offline message recovery attack.
Inf. Sci., 2020

Leakage-resilient group signature: Definitions and constructions.
Inf. Sci., 2020

Privacy-preserving polynomial interpolation and its applications on predictive analysis.
Inf. Sci., 2020

A New Framework of IND-CCA Secure Public Key Encryption with Keyword Search.
Comput. J., 2020

Plaintext-Verifiably-Checkable Encryption and Its Extension in Dual-Server Setting.
IEEE Access, 2020

Improving Multi-Histogram-Based Reversible Watermarking Using Optimized Features and Adaptive Clustering Number.
IEEE Access, 2020

A New MRF-Based Lossy Compression for Encrypted Binary Images.
IEEE Access, 2020

Attribute-Based Equality Test Over Encrypted Data Without Random Oracles.
IEEE Access, 2020

Decentralized and Privacy-Preserving Public Auditing for Cloud Storage Based on Blockchain.
IEEE Access, 2020

Reducing Sensor Failure and Ensuring Scheduling Fairness for Online Charging in Heterogeneous Rechargeable Sensor Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

2019
Leakage-resilient ring signature schemes.
Theor. Comput. Sci., 2019

Signature Scheme from Trapdoor Functions.
J. Internet Serv. Inf. Secur., 2019

Designated-server identity-based authenticated encryption with keyword search for encrypted emails.
Inf. Sci., 2019

Leakage-Resilient Group Signature: Definitions and Constructions.
IACR Cryptol. ePrint Arch., 2019

Public Key Authenticated Encryption With Designated Equality Test and its Applications in Diagnostic Related Groups.
IEEE Access, 2019

Optimizing the Sensor Movement for Barrier Coverage in a Sink-Based Deployed Mobile Sensor Network.
IEEE Access, 2019

Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage.
IEEE Access, 2019

Plaintext-Verifiably-Checkable Encryption.
Proceedings of the Provable Security, 2019

Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search.
Proceedings of the Provable Security, 2019

Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model.
Proceedings of the Information Security Practice and Experience, 2019

Secure, Efficient and Searchable File System on Distributed Clouds.
Proceedings of the Data Science, 2019

Group ID-Based Encryption with Equality Test.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Efficient Compression of Encrypted Binary Images Using the Markov Random Field.
IEEE Trans. Inf. Forensics Secur., 2018

Multi-authority fine-grained access control with accountability and its application in cloud.
J. Netw. Comput. Appl., 2018

Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes.
Inf. Sci., 2018

Black-box constructions of signature schemes in the bounded leakage setting.
Inf. Sci., 2018

Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification.
IACR Cryptol. ePrint Arch., 2018

Leakage-Resilient Dual-Form Signatures.
Comput. J., 2018

Authorized Function Homomorphic Signature.
Comput. J., 2018

A General Two-Server Framework for Ciphertext-Checkable Encryption Against Offline Message Recovery Attack.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Secure File Storage System Among Distributed Public Clouds.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Outsourced Ciphertext-Policy Attribute-Based Encryption with Equality Test.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Privacy-Preserving Location Sharing Services for Social Networks.
IEEE Trans. Serv. Comput., 2017

Generic Construction of Privacy-Preserving Optimistic Fair Exchange Protocols.
J. Internet Serv. Inf. Secur., 2017

Sequence aware functional encryption and its application in searchable encryption.
J. Inf. Secur. Appl., 2017

An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks.
Inf. Sci., 2017

A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting.
Int. J. Found. Comput. Sci., 2017

2016
A Joint Random Secret Sharing Scheme with Public Verifiability.
Int. J. Netw. Secur., 2016

Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange revisited and more.
Int. J. Inf. Sec., 2016

A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage.
Concurr. Comput. Pract. Exp., 2016

A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model.
Proceedings of the Provable Security, 2016

2015
User-Defined Privacy Grid System for Continuous Location-Based Services.
IEEE Trans. Mob. Comput., 2015

Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization.
IEEE Trans. Inf. Forensics Secur., 2015

Concurrent signature without random oracles.
Theor. Comput. Sci., 2015

Ambiguous optimistic fair exchange: Definition and constructions.
Theor. Comput. Sci., 2015

A new encryption-then-compression algorithm using the rate-distortion optimization.
Signal Process. Image Commun., 2015

A distributed secret share update scheme with public verifiability for ad hoc network.
Secur. Commun. Networks, 2015

How to protect privacy in Optimistic Fair Exchange of digital signatures.
Inf. Sci., 2015

A Summary of the Special Issue "Cybersecurity and Cryptography".
Inf., 2015

Public Key Encryption with Delegated Equality Test in a Multi-User Setting.
Comput. J., 2015

2014
Extending concurrent signature to multiple parties.
Theor. Comput. Sci., 2014

Sakai-Ohgishi-Kasahara Non-Interactive Identity-Based Key Exchange Scheme, Revisited.
IACR Cryptol. ePrint Arch., 2014

Digital provenance: Enabling secure data forensics in cloud computing.
Future Gener. Comput. Syst., 2014

P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Short and efficient convertible undeniable signature schemes without random oracles.
Theor. Comput. Sci., 2013

Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures.
IEEE Trans. Computers, 2013

The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles.
Inf. Sci., 2013

Ambiguous One-Move Nominative Signature Without Random Oracles.
IACR Cryptol. ePrint Arch., 2013

A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release.
IACR Cryptol. ePrint Arch., 2013

2012
A new efficient optimistic fair exchange protocol without random oracles.
Int. J. Inf. Sec., 2012

Multi-Committer Threshold Commitment Scheme from Lattice.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012

Privacy-Preserving Noisy Keyword Search in Cloud Computing.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
Efficient Designated Confirmer Signature and DCS-Based Ambiguous Optimistic Fair Exchange.
IEEE Trans. Inf. Forensics Secur., 2011

Identity-based strong designated verifier signature revisited.
J. Syst. Softw., 2011

Group-oriented fair exchange of signatures.
Inf. Sci., 2011

Efficient strong designated verifier signature schemes without random oracle or with non-delegatability.
Int. J. Inf. Sec., 2011

Efficient Multicast Key Distribution Using HOWF-based Access Control Structures.
IACR Cryptol. ePrint Arch., 2011

Heterogeneous Signcryption with Key Privacy.
Comput. J., 2011

Concurrent Signatures with Fully Negotiable Binding Control.
Proceedings of the Provable Security - 5th International Conference, 2011

An Efficient Construction of Time-Selective Convertible Undeniable Signatures.
Proceedings of the Information Security, 14th International Conference, 2011

Short Convertible Undeniable Signature in the Standard Model.
Proceedings of the Information Security Practice and Experience, 2011

Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles.
Proceedings of the Computer Security - ESORICS 2011, 2011

Multi-authority ciphertext-policy attribute-based encryption with accountability.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Universal authentication protocols for anonymous wireless communications.
IEEE Trans. Wirel. Commun., 2010

Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model.
J. Comput. Sci. Technol., 2010

Oblivious Transfer with Access Control : Realizing Disjunction without Duplication.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange - (Extended Abstract).
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

Probabilistic Public Key Encryption with Equality Test.
Proceedings of the Topics in Cryptology, 2010

2009
Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability.
IACR Cryptol. ePrint Arch., 2009

New Constructions of Convertible Undeniable Signature Schemes without Random Oracles.
IACR Cryptol. ePrint Arch., 2009

Non-delegatable Identity-based Designated Verifier Signature.
IACR Cryptol. ePrint Arch., 2009

Escrowed Deniable Identification Schemes.
Proceedings of the Security Technology, 2009

Efficient Non-interactive Range Proof.
Proceedings of the Computing and Combinatorics, 15th Annual International Conference, 2009

2008
Generic Transformation from Weakly to Strongly Unforgeable Signatures.
J. Comput. Sci. Technol., 2008

Efficient lattice-based signature scheme.
Int. J. Appl. Cryptogr., 2008

On the relation among various security models for certificateless cryptography.
Int. J. Appl. Cryptogr., 2008

An efficient one-move Nominative Signature scheme.
Int. J. Appl. Cryptogr., 2008

Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles.
Proceedings of the Topics in Cryptology, 2008

Ambiguous Optimistic Fair Exchange.
Proceedings of the Advances in Cryptology, 2008

Traceable and Retrievable Identity-Based Encryption.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
A New Security Definition for Public Key Encryption Schemes and Its Applications.
IACR Cryptol. ePrint Arch., 2007

Nominative Signature: Application, Security Model and Construction.
IACR Cryptol. ePrint Arch., 2007

Generic Certificateless Encryption in the Standard Model.
IACR Cryptol. ePrint Arch., 2007

Time Capsule Signature: Efficient and Provably Secure Constructions.
IACR Cryptol. ePrint Arch., 2007

Formal Definition and Construction of Nominative Signature.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Generic Certificateless Key Encapsulation Mechanism.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Generic Transformation to Strongly Unforgeable Signatures.
IACR Cryptol. ePrint Arch., 2006


  Loading...