Runhua Shi

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2023
Privacy-Preserving Range Query Quantum Scheme With Single Photons in Edge-Based Internet of Things.
IEEE Trans. Netw. Serv. Manag., December, 2023

Verifiable outsourcing EMRs scheme with attribute-based encryption in cloud-edge environments.
J. Inf. Secur. Appl., August, 2023

VC-DCPS: Verifiable Cross-Domain Data Collection and Privacy-Persevering Sharing Scheme Based on Lattice in Blockchain-Enhanced Smart Grids.
IEEE Internet Things J., July, 2023

A dual auditing protocol for fine-grained access control in the edge-cloud-based smart home.
Comput. Networks, June, 2023

Quantum Secret Permutating Protocol.
IEEE Trans. Computers, May, 2023

Measurement-device-independent quantum protocol for E-payment based on blockchain.
Quantum Inf. Process., January, 2023

Comment on "Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data".
IEEE Trans. Cloud Comput., 2023

A Flexible and Efficient Privacy-Preserving Range Query Scheme for Blockchain-Enhanced IoT.
IEEE Internet Things J., 2023

2022
Anonymous Quantum Sealed-Bid Auction.
IEEE Trans. Circuits Syst. II Express Briefs, 2022

Quantum Protocol for Secure Multiparty Logical AND With Application to Multiparty Private Set Intersection Cardinality.
IEEE Trans. Circuits Syst. I Regul. Pap., 2022

Quantum Private Set Intersection Cardinality Protocol With Application to Privacy-Preserving Condition Query.
IEEE Trans. Circuits Syst. I Regul. Pap., 2022

A secure quantum sealed-bid auction protocol based on quantum public key encryption.
Quantum Inf. Process., 2022

Measurement-device-independent quantum secure multiparty summation.
Quantum Inf. Process., 2022

A privacy-preserving quantum sealed-bid auction protocol with EPR pairs.
Quantum Inf. Process., 2022

A novel privacy-preserving multi-level aggregate signcryption and query scheme for Smart Grid via mobile fog computing.
J. Inf. Secur. Appl., 2022

Multiple access control scheme for EHRs combining edge computing with smart contracts.
Future Gener. Comput. Syst., 2022

Attribute-based data access control scheme with secure revocation in fog computing for smart grid.
Clust. Comput., 2022

2021
Quantum Multiparty Privacy Set Intersection Cardinality.
IEEE Trans. Circuits Syst. II Express Briefs, 2021

Quantum Sealed-Bid Auction Without a Trusted Third Party.
IEEE Trans. Circuits Syst. I Regul. Pap., 2021

Quantum-based anonymity and secure veto.
Quantum Inf. Process., 2021

Secure two-party integer comparison protocol without any third party.
Quantum Inf. Process., 2021

A novel quantum E-payment protocol based on blockchain.
Quantum Inf. Process., 2021

Authenticated Quantum Sortition and Application in "Picking at Random" Problems.
IEEE Commun. Lett., 2021

A lightweight privacy-preserving and sharing scheme with dual-blockchain for intelligent pricing system of smart grid.
Comput. Secur., 2021

A Novel Edge Computing Offloading and Privacy-preserving Scheme for Energy Internet.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021

2020
Comment on "Controlled mutual quantum entity authentication with an untrusted third party".
Quantum Inf. Process., 2020

A generic quantum protocol for one-sided secure two-party classical computations.
Quantum Inf. Process., 2020

Useful Equations About Bell States and Their Applications to Quantum Secret Sharing.
IEEE Commun. Lett., 2020

A RMF and AHP-Based Approach to Risk Assessment of Power Internet of Things.
Proceedings of the IEEE Intl Conf on Dependable, 2020

2019
Two quantum protocols for secure hamming distance computation.
Quantum Inf. Process., 2019

A Dynamic Location Privacy Protection Scheme Based on Cloud Storage.
Int. J. Netw. Secur., 2019

A Feasible Quantum Protocol for Private Set Intersection Cardinality.
IEEE Access, 2019

A Location Privacy Protection Scheme Based on Hybrid Encryption.
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019

2018
An economic and feasible Quantum Sealed-bid Auction protocol.
Quantum Inf. Process., 2018

A novel quantum solution to secure two-party distance computation.
Quantum Inf. Process., 2018

An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks.
Inf. Sci., 2018

An efficient remote anonymous authentication scheme with user revocation.
Int. J. Secur. Networks, 2018

An adaptive high-fidelity steganographic scheme using edge detection and hybrid hamming codes.
Displays, 2018

Efficient Quantum Protocol for Private Set Intersection Cardinality.
IEEE Access, 2018

2017
Nearest private query based on quantum oblivious key distribution.
Quantum Inf. Process., 2017

Quantum solution to a class of two-party private summation problems.
Quantum Inf. Process., 2017

Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query.
Quantum Inf. Process., 2017

A novel quantum scheme for secure two-party distance computation.
Quantum Inf. Process., 2017

An Efficient ID-based Online/Offline Signature Scheme without Key Escrow.
Int. J. Netw. Secur., 2017

2016
Many-to-one homomorphic encryption scheme.
Secur. Commun. Networks, 2016

An efficient quantum scheme for Private Set Intersection.
Quantum Inf. Process., 2016

基于编码和同态加密的高效SMP方案 (Efficient Solution to SMP Based on Coding and Homomorphic Encryption).
计算机科学, 2016

A Novel Authenticated Group Key Distribution Scheme.
KSII Trans. Internet Inf. Syst., 2016

Quantum private set intersection cardinality and its application to anonymous authentication.
Inf. Sci., 2016

Keyword search protocol with privacy preservation using ID-based proxy reencryption.
Int. J. Secur. Networks, 2016

Privacy-enhanced distance computation with applications.
Int. J. Electron. Secur. Digit. Forensics, 2016

Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016

2015
Comments on two schemes of identity-based user authentication and key agreement for mobile client-server networks.
J. Supercomput., 2015

A novel one-to-many and many-to-one asymmetric encryption model and its algorithms.
Secur. Commun. Networks, 2015

An Efficient SDN Load Balancing Scheme Based on Variance Analysis for Massive Mobile Users.
Mob. Inf. Syst., 2015

A New AES S-Box Equation System Based on BES.
J. Inf. Hiding Multim. Signal Process., 2015

Related-key cryptanalysis on 7-round AES-128/192.
Int. J. Electron. Secur. Digit. Forensics, 2015

2014
A novel anonymous authentication scheme without cryptography.
Trans. Emerg. Telecommun. Technol., 2014

2013
Secret sharing based on quantum Fourier transform.
Quantum Inf. Process., 2013

Quantum state sharing against the controller's cheating.
Quantum Inf. Process., 2013

Erratum to: Multi-party quantum key agreement with Bell states and Bell measurements.
Quantum Inf. Process., 2013

Multi-party quantum key agreement with bell states and bell measurements.
Quantum Inf. Process., 2013

2012
Multiparty quantum secret sharing with the pure entangled two-photon states.
Quantum Inf. Process., 2012

A novel anonymous secret sharing scheme based on BP Artificial Neural Network.
Proceedings of the Eighth International Conference on Natural Computation, 2012

Secure two-party computation of the quadratic function's extreme minimal value.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

2011
Multi-party quantum state sharing of an arbitrary two-qubit state with Bell states.
Quantum Inf. Process., 2011

Asymmetric multi-party quantum state sharing of an arbitrary <i>m</i>-qubit state.
Quantum Inf. Process., 2011

An Efficient Multiparty Quantum Secret Sharing with Pure Entangled Two Photon States.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

2010
A Secure Scheme for Data Statistics.
Proceedings of the International Conference on E-Business and E-Government, 2010

2008
An Efficient (t, n)-Threshold Multi-Secret Sharing Scheme.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

A Threshold Multi-secret Sharing Scheme.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

2007
A (t, n)-threshold verified multi-secret sharing scheme based on ECDLP.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

2005
Two New Fast Methods for Simultaneous Scalar Multiplication in Elliptic Curve Cryptosystems.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005


  Loading...