Xiangjun Xin

Orcid: 0000-0001-5383-6176

Affiliations:
  • Zhengzhou University of Light Industry, Department of Information and Computing Science, China
  • Xidian University, Department of Cryptography, Xi'an, China (PhD 2007)


According to our database1, Xiangjun Xin authored at least 18 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Secure quantum signature scheme without entangled state.
Quantum Inf. Process., February, 2024

Security analysis of the semi-quantum secret-sharing protocol of specific bits and its improvement.
Quantum Inf. Process., February, 2024

Cloud-Assisted Laconic Private Set Intersection Cardinality.
IEEE Trans. Cloud Comput., 2024

Efficient Verifiable Cloud-Assisted PSI Cardinality for Privacy-Preserving Contact Tracing.
IEEE Trans. Cloud Comput., 2024

2023
Privacy Preserving for Electronic Medical Record Sharing in Healthchain With Group Signature.
IEEE Syst. J., December, 2023

Efficient Privacy Preserving in IoMT With Blockchain and Lightweight Secret Sharing.
IEEE Internet Things J., 2023

2022
Provably secure arbitrated-quantum signature.
Quantum Inf. Process., 2022

Efficient chain-encryption-based quantum signature scheme with semi-trusted arbitrator.
Quantum Inf. Process., 2022

Quantum public-key designated verifier signature.
Quantum Inf. Process., 2022

2021
Security analysis and improvement of a quantum multi-signature protocol.
Quantum Inf. Process., 2021

2020
Quantum public-key signature scheme based on asymmetric quantum encryption with trapdoor information.
Quantum Inf. Process., 2020

Quantum designated verifier signature based on Bell states.
Quantum Inf. Process., 2020

2008
ID-based threshold proxy signcryption scheme from bilinear pairings.
Int. J. Secur. Networks, 2008

Indentity-based broadcast signcryption.
Comput. Stand. Interfaces, 2008

Digital Signature Scheme with a (t, l) Threshold Subliminal Channel Based on RSA Signature Scheme.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

An Enhanced Deniable Authentication Protocol.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Key management in ad hoc networks using self-certified public key system.
Int. J. Mob. Commun., 2007

2006
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption.
Int. J. Netw. Secur., 2006


  Loading...