Xiaolei Dong

Orcid: 0000-0002-5844-0223

According to our database1, Xiaolei Dong authored at least 135 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
OpenSE: Efficient Verifiable Searchable Encryption With Access and Search Pattern Hidden for Cloud-IoT.
IEEE Internet Things J., April, 2024

EMPSI: Efficient multiparty private set intersection (with cardinality).
Frontiers Comput. Sci., February, 2024

DMPSI: Efficient Scalable Delegated Multiparty PSI and PSI-CA With Oblivious PRF.
IEEE Trans. Serv. Comput., 2024

LSE: Efficient Symmetric Searchable Encryption Based on Labeled PSI.
IEEE Trans. Serv. Comput., 2024

IPO-PEKS: Effective Inner Product Outsourcing Public Key Searchable Encryption From Lattice in the IoT.
IEEE Access, 2024

2023
dMCLAEKS: Pairing-free designated-tester multi-recipient certificateless authenticated encryption with keyword search for concealing search patterns.
J. Syst. Archit., November, 2023

LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search.
Inf. Sci., November, 2023

Dynamic identity-based broadcast proxy re-encryption for data sharing in autonomous vehicles.
Trans. Emerg. Telecommun. Technol., November, 2023

IXT: Improved searchable encryption for multi-word queries based on PSI.
Frontiers Comput. Sci., October, 2023

Criteria for entanglement and separability of discrete quantum states.
Quantum Inf. Comput., May, 2023

EPNS: Efficient Privacy-Preserving Intelligent Traffic Navigation From Multiparty Delegated Computation in Cloud-Assisted VANETs.
IEEE Trans. Mob. Comput., March, 2023

Generalized Autonomous Path Proxy Re-Encryption Scheme to Support Branch Functionality.
IEEE Trans. Inf. Forensics Secur., 2023

A Differentially Private Federated Learning Model Against Poisoning Attacks in Edge Computing.
IEEE Trans. Dependable Secur. Comput., 2023

Lightweight Privacy-Preserving Distributed Recommender System Using Tag-Based Multikey Fully Homomorphic Data Encapsulation.
IEEE Trans. Dependable Secur. Comput., 2023

BLDSS: A Blockchain-Based Lightweight Searchable Data Sharing Scheme in Vehicular Social Networks.
IEEE Internet Things J., 2023

Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations.
IACR Cryptol. ePrint Arch., 2023

SVFL: Secure Vertical Federated Learning on Linear Models.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

MCVDSSE: Secure Multi-client Verifiable Dynamic Symmetric Searchable Encryption.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI Cardinality.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning.
Proceedings of the Information Security Practice and Experience, 2023

2022
SAVE: Efficient Privacy-Preserving Location-Based Service Bundle Authentication in Self-Organizing Vehicular Social Networks.
IEEE Trans. Intell. Transp. Syst., 2022

Efficient Privacy-Preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain.
IEEE Trans. Cloud Comput., 2022

Generalized Goldwasser and Micali's Type Cryptosystem.
J. Comput. Sci. Technol., 2022

EPMDA-FED: Efficient and Privacy-Preserving Multidimensional Data Aggregation Scheme With Fast Error Detection in Smart Grid.
IEEE Internet Things J., 2022

A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid.
Frontiers Comput. Sci., 2022

Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds.
IEEE Access, 2022

Multi-interest Sequence Modeling for Recommendation with Causal Embedding.
Proceedings of the 2022 SIAM International Conference on Data Mining, 2022

2021
Two Secure and Efficient Lightweight Data Aggregation Schemes for Smart Grid.
IEEE Trans. Smart Grid, 2021

CryptCloud$^+$+: Secure and Expressive Data Access Control for Cloud Storage.
IEEE Trans. Serv. Comput., 2021

PVOPM: Verifiable Privacy-Preserving Pattern Matching with Efficient Outsourcing in the Malicious Setting.
IEEE Trans. Dependable Secur. Comput., 2021

SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts.
Secur. Commun. Networks, 2021

PADP: Efficient Privacy-Preserving Data Aggregation and Dynamic Pricing for Vehicle-to-Grid Networks.
IEEE Internet Things J., 2021

Improved RSA lossy trapdoor function and applications.
Int. J. Inf. Comput. Secur., 2021

Designated server-aided revocable identity-based keyword search on lattice.
EURASIP J. Wirel. Commun. Netw., 2021

Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity.
Des. Codes Cryptogr., 2021

Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory.
Comput. J., 2021

DPFDT: Decentralized Privacy-preserving Fair Data Trading System.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

RTPoW: A Proof-of-Work Consensus Scheme with Real-Time Difficulty Adjustment Algorithm.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

PSSBP: A Privacy-preserving Scope-query Searchable Encryption Scheme Based on Blockchain for Parking Lots Sharing in Vehicular Networks.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

PKMark: A Robust Zero-distortion Blind Reversible Scheme for Watermarking Relational Databases.
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021

2020
Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search.
IEEE Trans. Serv. Comput., 2020

LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs.
IEEE Trans. Inf. Forensics Secur., 2020

Blockchain-Based Lightweight Certificate Authority for Efficient Privacy-Preserving Location-Based Service in Vehicular Social Networks.
IEEE Internet Things J., 2020

Lightweight Privacy-Preserving Training and Evaluation for Discretized Neural Networks.
IEEE Internet Things J., 2020

Anonymous IBE From Quadratic Residue With Fast Encryption.
IACR Cryptol. ePrint Arch., 2020

New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol.
IACR Cryptol. ePrint Arch., 2020

Tight Security Analysis of 3-Round Key-Alternating Cipher with A Single Permutation.
IACR Cryptol. ePrint Arch., 2020

A Generalization of Paillier's Public-Key System With Fast Decryption.
IACR Cryptol. ePrint Arch., 2020

VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage.
IACR Cryptol. ePrint Arch., 2020

PVIDM: Privacy-preserving verifiable shape context based image denoising and matching with efficient outsourcing in the malicious setting.
Comput. Secur., 2020

Anonymous IBE from Quadratic Residuosity with Fast Encryption.
Proceedings of the Information Security - 23rd International Conference, 2020

Forward Secure Dynamic Searchable Symmetric Encryption with Lighter Storage.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020

Blockchain Based Digital Evidence Chain of Custody.
Proceedings of the ICBCT'20: The 2nd International Conference on Blockchain Technology, 2020

A Blockchain-Based Privacy-Preserving Scheme for Smart Grids.
Proceedings of the ICBCT'20: The 2nd International Conference on Blockchain Technology, 2020

2019
Secure and efficient encrypted keyword search for multi-user setting in cloud computing.
Peer-to-Peer Netw. Appl., 2019

Privacy-preserving outsourced image feature extraction.
J. Inf. Secur. Appl., 2019

Identity-Based Encryption from e-th Power Residue Symbols.
IACR Cryptol. ePrint Arch., 2019

GTSIM-POP: Game theory based secure incentive mechanism and patient-optimized privacy-preserving packet forwarding scheme in m-healthcare social networks.
Future Gener. Comput. Syst., 2019

Improved Fault-Tolerant Aggregate Signatures.
Comput. J., 2019

All-But-Many Lossy Trapdoor Functions under Decisional RSA Subgroup Assumption and Application.
Comput. J., 2019

Secure key-aggregation authorized searchable encryption.
Sci. China Inf. Sci., 2019

DMU-ABSE: Dynamic Multi-user Attribute-Based Searchable Encryption with File Deletion and User Revocation.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

SDKSE-KGA: A Secure Dynamic Keyword Searchable Encryption Scheme Against Keyword Guessing Attacks.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019

A Verifiable Dynamic Multi-user Searchable Encryption Scheme without Trusted Third Parties.
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019

An Effective Verifiable Symmetric Searchable Encryption Scheme in Cloud Computing.
Proceedings of the ICIT 2019, 2019

PPSAS: Lightweight Privacy-preserving Spectrum Aggregation and Auction in Cognitive Radio Networks.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

2018
Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2018

White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively.
IEEE Trans. Dependable Secur. Comput., 2018

Proof of Multicopy via Proof of File Position in Cloud.
Fundam. Informaticae, 2018

Secure and Efficient Attribute-Based Encryption with Keyword Search.
Comput. J., 2018

Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols.
Comput. J., 2018

Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation.
Sci. China Inf. Sci., 2018

VEPP: A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix Multiplication.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

SDKSE: A Secure Dynamic Keyword Searchable Encryption Scheme for Email Systems.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

PPOIM: Privacy-Preserving Shape Context Based Image Denoising and Matching with Efficient Outsourcing.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product Functional Encryption.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2017
Fault Activity Aware Service Delivery in Wireless Sensor Networks for Smart Cities.
Wirel. Commun. Mob. Comput., 2017

Efficient Attribute-Based Secure Keyword Search on the Cloud Storage.
IACR Cryptol. ePrint Arch., 2017

Security and Privacy for Cloud-Based IoT: Challenges.
IEEE Commun. Mag., 2017

Availability Based Multiservice Delivery for Wireless Sensor Networks in Adversarial Environments.
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017

2016
Secure and privacy-preserving pattern matching in outsourced computing.
Secur. Commun. Networks, 2016

Cloud-based privacy-preserving aggregation architecture in multi-domain wireless networks.
Secur. Commun. Networks, 2016

Secure and efficient fine-grained multiple file sharing in cloud-assisted crowd sensing networks.
Peer-to-Peer Netw. Appl., 2016

Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting.
IACR Cryptol. ePrint Arch., 2016

Efficient privacy-preserving temporal and spacial data aggregation for smart grid communications.
Concurr. Comput. Pract. Exp., 2016

Traceable and revocable CP-ABE with shorter ciphertexts.
Sci. China Inf. Sci., 2016

PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching.
Proceedings of the Computer Security - ESORICS 2016, 2016

Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions.
IEEE Wirel. Commun., 2015

PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributedm-Healthcare Cloud Computing System.
IEEE Trans. Parallel Distributed Syst., 2015

Secure and privacy preserving protocol for cloud-based vehicular DTNs.
IEEE Trans. Inf. Forensics Secur., 2015

White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes.
IEEE Trans. Inf. Forensics Secur., 2015

Fault-aware flow control and multi-path routing in VANETs.
Peer-to-Peer Netw. Appl., 2015

PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems.
IEEE J. Sel. Top. Signal Process., 2015

4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks.
Inf. Sci., 2015

Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud.
IACR Cryptol. ePrint Arch., 2015

Almost-tight Identity Based Encryption against Selective Opening Attack.
IACR Cryptol. ePrint Arch., 2015

Extended Nested Dual System Groups, Revisited.
IACR Cryptol. ePrint Arch., 2015

TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

EVOC: More efficient verifiable outsourced computation from any one-way trapdoor function.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid.
IEEE Syst. J., 2014

Security and privacy for storage and computation in cloud computing.
Inf. Sci., 2014

4P_VES: A Collusion-Resistant Accountable Virtual Economy System.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

User self-controllable profile matching for privacy-preserving mobile social networks.
Proceedings of the IEEE International Conference on Communication Systems, 2014

An ElGamal-based efficient and privacy-preserving data aggregation scheme for smart grid.
Proceedings of the IEEE Global Communications Conference, 2014

Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Securing m-healthcare social networks: challenges, countermeasures and future directions.
IEEE Wirel. Commun., 2013

Secure identity-based multisignature schemes under quadratic residue assumptions.
Secur. Commun. Networks, 2013

New Efficient Identity-Based Encryption From Factorization.
IACR Cryptol. ePrint Arch., 2013

More Efficient Cryptosystems From k-th Power Residues.
IACR Cryptol. ePrint Arch., 2013

Fault-Aware Flow Control and Multi-Path Routing in Wireless Sensor Networks.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

BDK: Secure and Efficient Biometric based Deterministic Key Agreement in Wireless Body Area Networks.
Proceedings of the 8th International Conference on Body Area Networks, 2013

2011
: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2011

Threshold proxy re-signature.
J. Syst. Sci. Complex., 2011

An Efficient Privacy Preserving Data Aggregation Scheme with Constant Communication Overheads for Wireless Sensor Networks.
IEEE Commun. Lett., 2011

Identity based signature scheme based on cubic residues.
Sci. China Inf. Sci., 2011

Fuzzy identity based signature with applications to biometric authentication.
Comput. Electr. Eng., 2011

2010
Efficient certificateless threshold signatures without random oracles.
J. Syst. Sci. Complex., 2010

2009
Provably secure RSA-type signature based on conic curve.
Wirel. Commun. Mob. Comput., 2009

Certificateless Threshold Signature for Data Report Authentication in Mobile Ad Hoc Network.
Proceedings of the Third International Conference on Network and System Security, 2009

2008
Fuzzy Identity Based Signature.
IACR Cryptol. ePrint Arch., 2008

Designing efficient proxy signature schemes for mobile communication.
Sci. China Ser. F Inf. Sci., 2008

New designing of cryptosystems based on quadratic fields.
Sci. China Ser. F Inf. Sci., 2008

Multi-Receiver Identity-Based Encryption in Multiple PKG Environment.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
Efficient ID-Based Multi-Receiver Threshold Decryption.
Int. J. Found. Comput. Sci., 2007

New Public Key Cryptosystems Using Polynomials over Non-commutative Rings.
IACR Cryptol. ePrint Arch., 2007

A New Practical Limited Identity-Based Encryption Scheme.
Fundam. Informaticae, 2007

Identity-based signature scheme based on quadratic residues.
Sci. China Ser. F Inf. Sci., 2007

2006
Authenticated encryption protocol with perfect forward secrecy for mobile communication.
Wirel. Commun. Mob. Comput., 2006

New Public Key Authentication Frameworks with Lite Certification Authority.
IACR Cryptol. ePrint Arch., 2006

Group Oriented Deniable Authentication Protocol.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Designated Verifier Proxy Signature Scheme from Bilinear Pairings.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006


  Loading...