Rong Hao

According to our database1, Rong Hao authored at least 40 papers between 2006 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 




Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage.
IEEE Trans. Information Forensics and Security, 2019

Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction.
Inf. Sci., 2018

Provable Multiple-Replica Dynamic Data Possession for Big Data Storage in Cloud Computing.
I. J. Network Security, 2018

Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage.
Cluster Computing, 2018

Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing.
IEEE Access, 2018

A hybrid differential evolution and estimation of distribution algorithm for the multi-point dynamic aggregation problem.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018

How to securely outsource the inversion modulo a large composite number.
Journal of Systems and Software, 2017

Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium.
J. Network and Computer Applications, 2017

An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage.
J. Internet Serv. Inf. Secur., 2017

Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data.
Inf. Sci., 2017

Remote data possession checking with privacy-preserving authenticators for cloud storage.
Future Generation Comp. Syst., 2017

Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments.
Wireless Personal Communications, 2016

Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability.
Journal of Systems and Software, 2016

Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data.
TIIS, 2016

IRIBE: Intrusion-resilient identity-based encryption.
Inf. Sci., 2016

A public cloud storage auditing scheme for resource-constrained clients.
IJHPSA, 2016

A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model".
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation.
Proceedings of the 10th International Conference on P2P, 2015

A Novel Privacy Preserving Keyword Search Scheme over Encrypted Cloud Data.
Proceedings of the 10th International Conference on P2P, 2015

One forward-secure signature scheme using bilinear maps and its applications.
Inf. Sci., 2014

Key-insulated aggregate signature.
Frontiers Comput. Sci., 2014

Security analysis and improvement of two verifiable multi-secret sharing schemes.
IJSN, 2013

Intrusion-resilient identity-based signature: Security definition and construction.
Journal of Systems and Software, 2012

Non-Interactive Forward-Secure Threshold Signature without Random Oracles.
J. Inf. Sci. Eng., 2012

Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Inform., 2012

New Forward-Secure Signature Scheme with Untrusted Update.
J. Inf. Sci. Eng., 2011

Forward-secure identity-based signature: Security notions and construction.
Inf. Sci., 2011

Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Inform., 2011

Two Protocols for Member Revocation in Secret Sharing Schemes.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011

Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes.
JNW, 2010

A Forward Secure Threshold Signature Scheme Based on the Structure of Binary Tree.
JSW, 2009

How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme.
JCM, 2008

Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures.
JCM, 2008

A Publicly Verifiable Dynamic Sharing Protocol for Data Secure Storage.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005.
Proceedings of the Provable Security, Second International Conference, 2008

Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps.
Proceedings of the Provable Security, Second International Conference, 2008

How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme.
Proceedings of the Intelligence and Security Informatics, 2008

Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Publicly Verifiable Secret Sharing with Enrollment Ability.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Forward Secure Threshold Signature Scheme from Bilinear Pairings.
Proceedings of the Computational Intelligence and Security, International Conference, 2006