Xinyi Huang

Orcid: 0000-0003-0070-1707

Affiliations:
  • Fujian Normal University, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, China
  • University of Wollongong, School of Computer Science and Software Engineering, Australia (PhD 2009)


According to our database1, Xinyi Huang authored at least 296 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Robust and Secure Data Access Scheme for Satellite-Assisted Internet of Things With Content Adaptive Addressing.
IEEE Internet Things J., April, 2024

New tag-based signatures and their applications on linearly homomorphic signatures.
Comput. Stand. Interfaces, March, 2024

A Privacy-Preserving and Redactable Healthcare Blockchain System.
IEEE Trans. Serv. Comput., 2024

Single-Server Public-Key Authenticated Encryption With Keyword Search and Its Application in IIoT.
IEEE Trans. Netw. Sci. Eng., 2024

Anonymity-Enhancing Multi-Hop Locks for Monero-Enabled Payment Channel Networks.
IEEE Trans. Inf. Forensics Secur., 2024

P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection.
IEEE Trans. Inf. Forensics Secur., 2024

Robust and Secure Federated Learning Against Hybrid Attacks: A Generic Architecture.
IEEE Trans. Inf. Forensics Secur., 2024

OLBS: Oblivious Location-Based Services.
IEEE Trans. Inf. Forensics Secur., 2024

Parameter-Hiding Order-Revealing Encryption without Pairings.
IACR Cryptol. ePrint Arch., 2024

Parameter-Hiding Order-Revealing Encryption Without Pairings.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

2023
LedgerMaze: An Efficient Privacy-Preserving Noninteractive Zero-Knowledge Scheme Over Account-Model Blockchain.
IEEE Trans. Computers, December, 2023

A Security-Enhanced Certificateless Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., October, 2023

Faster Implementation of Ideal Lattice-Based Cryptography Using AVX512.
ACM Trans. Embed. Comput. Syst., September, 2023

EPRICE: An Efficient and Privacy-Preserving Real-Time Incentive System for Crowdsensing in Industrial Internet of Things.
IEEE Trans. Computers, September, 2023

VRBC: A Verifiable Redactable Blockchain With Efficient Query and Integrity Auditing.
IEEE Trans. Computers, July, 2023

SAPFS: An Efficient Symmetric-Key Authentication Key Agreement Scheme With Perfect Forward Secrecy for Industrial Internet of Things.
IEEE Internet Things J., June, 2023

Lightweight Authentication Scheme for Data Dissemination in Cloud-Assisted Healthcare IoT.
IEEE Trans. Computers, May, 2023

High-Performance Implementation of the Identity-Based Signature Scheme in IEEE P1363 on GPU.
ACM Trans. Embed. Comput. Syst., March, 2023

Statistical zero-knowledge and analysis of rank-metric zero-knowledge proofs of knowledge.
Theor. Comput. Sci., March, 2023

Securing Fine-Grained Data Sharing and Erasure in Outsourced Storage Systems.
IEEE Trans. Parallel Distributed Syst., February, 2023

Key Extraction Using Ambient Sounds for Smart Devices.
ACM Trans. Sens. Networks, February, 2023

Authenticated Data Sharing With Privacy Protection and Batch Verification for Healthcare IoT.
IEEE Trans. Sustain. Comput., 2023

Exploring Dynamic Task Loading in SGX-Based Distributed Computing.
IEEE Trans. Serv. Comput., 2023

Secure Updatable Storage Access Control System for EHRs in the Cloud.
IEEE Trans. Serv. Comput., 2023

Catch me if you can: A Secure Bilateral Access Control System With Anonymous Credentials.
IEEE Trans. Serv. Comput., 2023

Efficient Blockchain-Based Electronic Medical Record Sharing With Anti-Malicious Propagation.
IEEE Trans. Serv. Comput., 2023

Efficient Construction of Verifiable Timed Signatures and Its Application in Scalable Payments.
IEEE Trans. Inf. Forensics Secur., 2023

AADEC: Anonymous and Auditable Distributed Access Control for Edge Computing Services.
IEEE Trans. Inf. Forensics Secur., 2023

Dual-Server Boolean Data Retrieval for Highly-Scalable Secure File Sharing Services.
IEEE Trans. Inf. Forensics Secur., 2023

Secure Cloud-Assisted Data Pub/Sub Service With Fine-Grained Bilateral Access Control.
IEEE Trans. Inf. Forensics Secur., 2023

An Adaptively Secure and Efficient Data Sharing System for Dynamic User Groups in Cloud.
IEEE Trans. Inf. Forensics Secur., 2023

Accountable and Fine-Grained Controllable Rewriting in Blockchains.
IEEE Trans. Inf. Forensics Secur., 2023

A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control.
IEEE Trans. Dependable Secur. Comput., 2023

Hercules: Boosting the Performance of Privacy-Preserving Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity.
IEEE Trans. Dependable Secur. Comput., 2023

ACA: Anonymous, Confidential and Auditable Transaction Systems for Blockchain.
IEEE Trans. Dependable Secur. Comput., 2023

EBCPA: Efficient Blockchain-Based Conditional Privacy-Preserving Authentication for VANETs.
IEEE Trans. Dependable Secur. Comput., 2023

Towards Strong Privacy Protection for Association Rule Mining and Query in the Cloud.
IEEE Trans. Cloud Comput., 2023

Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Instant and Secure Channel Key Extraction Scheme Among Wireless Devices.
Proceedings of the IEEE Global Communications Conference, 2023

Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

Blockwise Rank Decoding Problem and LRPC Codes: Cryptosystems with Smaller Sizes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs.
IEEE Trans. Serv. Comput., 2022

Data Access Control in Cloud Computing: Flexible and Receiver Extendable.
IEEE Trans. Serv. Comput., 2022

Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2022

Redactable Blockchain in Decentralized Setting.
IEEE Trans. Inf. Forensics Secur., 2022

VILS: A Verifiable Image Licensing System.
IEEE Trans. Inf. Forensics Secur., 2022

Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing.
IEEE Trans. Dependable Secur. Comput., 2022

Untouchable Once Revoking: A Practical and Secure Dynamic EHR Sharing System via Cloud.
IEEE Trans. Dependable Secur. Comput., 2022

Differentially Oblivious Data Analysis With Intel SGX: Design, Optimization, and Evaluation.
IEEE Trans. Dependable Secur. Comput., 2022

Secure Anonymous Communication on Corrupted Machines With Reverse Firewalls.
IEEE Trans. Dependable Secur. Comput., 2022

Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage.
IEEE Trans. Dependable Secur. Comput., 2022

Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage.
IEEE Trans. Dependable Secur. Comput., 2022

Dual Access Control for Cloud-Based Data Storage and Sharing.
IEEE Trans. Dependable Secur. Comput., 2022

Authenticated Data Redaction With Accountability and Transparency.
IEEE Trans. Dependable Secur. Comput., 2022

SecRec: A Privacy-Preserving Method for the Context-Aware Recommendation System.
IEEE Trans. Dependable Secur. Comput., 2022

Universal product learning with errors: A new variant of LWE for lattice-based cryptography.
Theor. Comput. Sci., 2022

Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT.
IEEE Trans. Cloud Comput., 2022

An Efficient Privacy-Preserving Credit Score System Based on Noninteractive Zero-Knowledge Proof.
IEEE Syst. J., 2022

Convex invariants of <i>M</i>-fuzzifying convex spaces.
J. Intell. Fuzzy Syst., 2022

Controllable software licensing system for sub-licensing.
J. Inf. Secur. Appl., 2022

Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts.
Inf. Sci., 2022

Certificate-Based Anonymous Authentication With Efficient Aggregation for Wireless Medical Sensor Networks.
IEEE Internet Things J., 2022

A Physical-Layer Key Generation Approach Based on Received Signal Strength in Smart Homes.
IEEE Internet Things J., 2022

Blockchain-Based Secure and Lightweight Authentication for Internet of Things.
IEEE Internet Things J., 2022

Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs.
IEEE Internet Things J., 2022

New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead.
IACR Cryptol. ePrint Arch., 2022

Efficiency Boosting of Secure Cross-platform Recommender Systems over Sparse Data.
CoRR, 2022

New Secure Sparse Inner Product with Applications to Machine Learning.
CoRR, 2022

Forward-Secure Edge Authentication for Graphs.
Comput. J., 2022

Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9.
Comput. J., 2022

How to Attack and Generate Honeywords.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Efficient Hash-Based Redactable Signature for Smart Grid Applications.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Efficient and Adaptive Procurement Protocol with Purchasing Privacy.
IEEE Trans. Serv. Comput., 2021

Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities.
ACM Trans. Internet Techn., 2021

Publicly Verifiable Databases With All Efficient Updating Operations.
IEEE Trans. Knowl. Data Eng., 2021

BCPPA: A Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2021

K-Time Modifiable and Epoch-Based Redactable Blockchain.
IEEE Trans. Inf. Forensics Secur., 2021

Server-Aided Bilateral Access Control for Secure Data Sharing With Dynamic User Groups.
IEEE Trans. Inf. Forensics Secur., 2021

APGS: An Efficient Source-Accountable and Metadata-Private Protocol in the Network Layer.
IEEE Trans. Inf. Forensics Secur., 2021

OBFP: Optimized Blockchain-Based Fair Payment for Outsourcing Computations in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2021

RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud.
IEEE Trans. Dependable Secur. Comput., 2021

Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud.
IEEE Trans. Dependable Secur. Comput., 2021

Authenticated Medical Documents Releasing with Privacy Protection and Release Control.
IEEE Trans. Dependable Secur. Comput., 2021

Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control.
IEEE Trans. Computers, 2021

PPChain: A Privacy-Preserving Permissioned Blockchain Architecture for Cryptocurrency and Other Regulated Applications.
IEEE Syst. J., 2021

Verifiable single-server private information retrieval from LWE with binary errors.
Inf. Sci., 2021

Cost-Effective Authenticated Data Redaction With Privacy Protection in IoT.
IEEE Internet Things J., 2021

Secure and Privacy-Preserved Data Collection for IoT Wireless Sensors.
IEEE Internet Things J., 2021

An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile.
IACR Cryptol. ePrint Arch., 2021

Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved.
IACR Cryptol. ePrint Arch., 2021

Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE.
IACR Cryptol. ePrint Arch., 2021

Verifiable database supporting keyword searches with forward security.
Comput. Stand. Interfaces, 2021

Privacy-Enhancing Decentralized Anonymous Credential in Smart Grids.
Comput. Stand. Interfaces, 2021

Privacy-Aware Image Authentication from Cryptographic Primitives.
Comput. J., 2021

Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog Computing.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021

Linearly Homomorphic Signatures with Designated Combiner.
Proceedings of the Provable and Practical Security, 2021

Ring Trapdoor Redactable Signatures from Lattice.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

Category of CFR(Y)C and Weak Topos.
Proceedings of the Fuzzy Systems and Data Mining VII, 2021

LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing.
IEEE Trans. Sustain. Comput., 2020

Indoor device-free passive localization with DCNN for location-based services.
J. Supercomput., 2020

DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain.
IEEE Trans. Inf. Forensics Secur., 2020

Authenticated Data Redaction with Fine-Grained Control.
IEEE Trans. Emerg. Top. Comput., 2020

A code-based signature scheme from the Lyubashevsky framework.
Theor. Comput. Sci., 2020

Blockchain-based system for secure outsourcing of bilinear pairings.
Inf. Sci., 2020

A Hybrid Key Agreement Scheme for Smart Homes Using the Merkle Puzzle.
IEEE Internet Things J., 2020

HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes.
IEEE Internet Things J., 2020

ME-TLS: Middlebox-Enhanced TLS for Internet-of-Things Devices.
IEEE Internet Things J., 2020

Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography.
IET Inf. Secur., 2020

White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IEICE Trans. Inf. Syst., 2020

Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2020

Indistinguishability and unextractablility of password-based authentication in blockchain.
Future Gener. Comput. Syst., 2020

Secure and efficient sharing of authenticated energy usage data with privacy preservation.
Comput. Secur., 2020

A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks.
Comput. J., 2020

Linearly Homomorphic Signatures from Lattices.
Comput. J., 2020

Special focus on security and privacy in blockchain-based applications.
Sci. China Inf. Sci., 2020

An improved Durandal signature scheme.
Sci. China Inf. Sci., 2020

Efficient and secure image authentication with robustness and versatility.
Sci. China Inf. Sci., 2020

Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020

Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment.
Proceedings of the Computer Security - ESORICS 2020, 2020

An Efficient Blind Signature Scheme Based on SM2 Signature Algorithm.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
A lightweight authentication scheme for vehicular ad hoc networks based on MSR.
Veh. Commun., 2019

Functional broadcast encryption with applications to data sharing for cloud storage.
Inf. Sci., 2019

Fine-grained information flow control using attributes.
Inf. Sci., 2019

A Key Agreement Scheme for Smart Homes Using the Secret Mismatch Problem.
IEEE Internet Things J., 2019

Guest Editorial Special Issue on Secure Embedded IoT Devices for Resilient Critical Infrastructures.
IEEE Internet Things J., 2019

A new privacy-preserving authentication protocol for anonymous web browsing.
Concurr. Comput. Pract. Exp., 2019

On the Security of an Efficient and Robust Certificateless Signature Scheme for IIoT Environments.
IEEE Access, 2019

Fully Secure Lightweight Certificateless Signature Scheme for IIoT.
IEEE Access, 2019

A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality.
IEEE Access, 2019

An Adaptive Physical Layer Key Extraction Scheme for Smart Homes.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Typo-Tolerant Password Authentication Scheme with Targeted Error Correction.
Proceedings of the 18th IEEE International Conference On Trust, 2019

An Adaptive Secret Key Establishment Scheme in Smart Home Environments.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

The Degree of Arity ≤ n About M-Fuzzifying Convex Space.
Proceedings of the Fuzzy Systems and Data Mining V, 2019

Security and Privacy Techniques for the Industrial Internet of Things.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

Data Authentication with Privacy Protection.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2018
Privacy-Preserving Collaborative Model Learning: The Case of Word Vector Training.
IEEE Trans. Knowl. Data Eng., 2018

Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions.
IEEE Trans. Inf. Forensics Secur., 2018

Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures.
Peer-to-Peer Netw. Appl., 2018

BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0.
J. Netw. Comput. Appl., 2018

A matrix-based cross-layer key establishment protocol for smart homes.
Inf. Sci., 2018

Secure data uploading scheme for a smart home system.
Inf. Sci., 2018

White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IACR Cryptol. ePrint Arch., 2018

Certain types of M-fuzzifying matroids: A fundamental look at the security protocols in RFID and IoT.
Future Gener. Comput. Syst., 2018

Bitcoin-based fair payments for outsourcing computations of fog devices.
Future Gener. Comput. Syst., 2018

Security and privacy in cloud-assisted cyber-physical systems.
Comput. Networks, 2018

Security and Privacy for the Internet of Drones: Challenges and Solutions.
IEEE Commun. Mag., 2018

Matrix FHE and Its Application in Optimizing Bootstrapping.
Comput. J., 2018

A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems.
IEEE Access, 2018

An Improved Lightweight RFID Authentication Protocol for Internet of Things.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

A Security Analysis of Honeywords.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

A New Design of Online/Offline Signatures Based on Lattice.
Proceedings of the Information Security Practice and Experience, 2018

Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases.
Proceedings of the Computer Security, 2018

Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Network Coding Based Converge-Cast Scheme in Wireless Sensor Networks.
Wirel. Pers. Commun., 2017

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2017

Zipf's Law in Passwords.
IEEE Trans. Inf. Forensics Secur., 2017

An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data.
IEEE Trans. Inf. Forensics Secur., 2017

Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices.
IEEE Trans. Inf. Forensics Secur., 2017

Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design.
ACM Trans. Embed. Comput. Syst., 2017

Universally Composable RFID Mutual Authentication.
IEEE Trans. Dependable Secur. Comput., 2017

On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age.
IEEE Trans. Dependable Secur. Comput., 2017

A Generic Table Recomputation-Based Higher-Order Masking.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2017

Dual trapdoor identity-based encryption with keyword search.
Soft Comput., 2017

Self-adaptive trust management based on game theory in fuzzy large-scale networks.
Soft Comput., 2017

Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks.
IEEE Syst. J., 2017

Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length.
Secur. Commun. Networks, 2017

Erratum to: Special issue on security and privacy for smart cities.
Pers. Ubiquitous Comput., 2017

Special issue on security and privacy for smart cities.
Pers. Ubiquitous Comput., 2017

A new universal designated verifier transitive signature scheme for big graph data.
J. Comput. Syst. Sci., 2017

A general framework for secure sharing of personal health records in cloud system.
J. Comput. Syst. Sci., 2017

Supporting dynamic updates in storage clouds with the Akl-Taylor scheme.
Inf. Sci., 2017

Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security.
Int. J. Found. Comput. Sci., 2017

Provably secure authenticated key agreement scheme for distributed mobile cloud computing services.
Future Gener. Comput. Syst., 2017

Offline/online attribute-based encryption with verifiable outsourced decryption.
Concurr. Comput. Pract. Exp., 2017

Editorial: Special issue on security data science and cyber threat management.
Comput. Secur., 2017

A Practical Authentication Protocol for Anonymous Web Browsing.
Proceedings of the Information Security Practice and Experience, 2017

Linearly Homomorphic Signatures with Designated Entities.
Proceedings of the Information Security Practice and Experience, 2017

Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

A Cross-Layer Key Establishment Model for Wireless Devices in Cyber-Physical Systems.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

Understanding Human-Chosen PINs: Characteristics, Distribution and Security.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Password-Authenticated Group Key Exchange: A Cross-Layer Design.
ACM Trans. Internet Techn., 2016

Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services.
IEEE Trans. Inf. Forensics Secur., 2016

Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data.
IEEE Trans. Inf. Forensics Secur., 2016

Server-Aided Public Key Encryption With Keyword Search.
IEEE Trans. Inf. Forensics Secur., 2016

Cryptographic Hierarchical Access Control for Dynamic Structures.
IEEE Trans. Inf. Forensics Secur., 2016

Hierarchical and Shared Access Control.
IEEE Trans. Inf. Forensics Secur., 2016

Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing.
IEEE Trans. Computers, 2016

Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity.
Secur. Commun. Networks, 2016

Provably secure user authentication and key agreement scheme for wireless sensor networks.
Secur. Commun. Networks, 2016

Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption.
Inf. Sci., 2016

Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing.
Future Gener. Comput. Syst., 2016

Improved handover authentication and key pre-distribution for wireless mesh networks.
Concurr. Comput. Pract. Exp., 2016

Practical Attribute-based Signature: Traceability and Revocability.
Comput. J., 2016

Trust Enhancement over Range Search for Encrypted Data.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Anonymizing Bitcoin Transaction.
Proceedings of the Information Security Practice and Experience, 2016

Targeted Online Password Guessing: An Underestimated Threat.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Accelerating Oblivious Transfer with Batch Multi-exponentiation.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Time-Bound Anonymous Authentication for Roaming Networks.
IEEE Trans. Inf. Forensics Secur., 2015

An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2015

New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations.
IEEE Trans. Inf. Forensics Secur., 2015

Cross-layer design in wireless multi-hop networks: a bargaining game theoretic analysis.
Telecommun. Syst., 2015

New Publicly Verifiable Databases with Efficient Updates.
IEEE Trans. Dependable Secur. Comput., 2015

A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid.
IEEE Trans. Cloud Comput., 2015

k-Times Attribute-Based Anonymous Access Control for Cloud Computing.
IEEE Trans. Computers, 2015

Verifiable Auditing for Outsourced Database in Cloud Computing.
IEEE Trans. Computers, 2015

Secure Distributed Deduplication Systems with Improved Reliability.
IEEE Trans. Computers, 2015

Cost-Effective Authentic and Anonymous Data Sharing with Forward Security.
IEEE Trans. Computers, 2015

Universal designated verifier transitive signatures for graph-based big data.
Inf. Sci., 2015

New attribute-based authentication and its application in anonymous cloud access service.
Int. J. Web Grid Serv., 2015

Security and privacy of electronic health information systems.
Int. J. Inf. Sec., 2015

Batch public auditing for distributed mobile cloud computing.
Int. J. High Perform. Comput. Netw., 2015

Cooperative attribute-based access control for enterprise computing system.
Int. J. Embed. Syst., 2015

Matrix-based key pre-distribution schemes in WMNs using pre and post deployment knowledge.
Int. J. Ad Hoc Ubiquitous Comput., 2015

Certificate-Based Encryption Resilient to Key Leakage.
IACR Cryptol. ePrint Arch., 2015

Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption.
Future Gener. Comput. Syst., 2015

A Forward-Secure Certificate-Based Signature Scheme.
Comput. J., 2015

A trustworthy access control model for mobile cloud computing based on reputation and mechanism design.
Ad Hoc Networks, 2015

Revocable Threshold Attribute-Based Signature against Signing Key Exposure.
Proceedings of the Information Security Practice and Experience, 2015

Group-oriented Proofs of Storage.
Proceedings of the 10th ACM Symposium on Information, 2015

Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Provably Secure Group Key Management Approach Based upon Hyper-Sphere.
IEEE Trans. Parallel Distributed Syst., 2014

Securely Outsourcing Attribute-Based Encryption with Checkability.
IEEE Trans. Parallel Distributed Syst., 2014

Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2014

Secure Outsourced Attribute-Based Signatures.
IEEE Trans. Parallel Distributed Syst., 2014

Special issue on applied cryptography for information and communication networks.
Secur. Commun. Networks, 2014

A secure remote data integrity checking cloud storage system from threshold encryption.
J. Ambient Intell. Humaniz. Comput., 2014

SA<sup>3</sup>: Self-adaptive anonymous authentication for dynamic authentication policies.
Future Gener. Comput. Syst., 2014

Advances in secure and intelligent data processing.
Concurr. Comput. Pract. Exp., 2014

Ticket-based handoff authentication for wireless mesh networks.
Comput. Networks, 2014

GO-ABE: Group-Oriented Attribute-Based Encryption.
Proceedings of the Network and System Security - 8th International Conference, 2014

Identity-Based Transitive Signcryption.
Proceedings of the Network and System Security - 8th International Conference, 2014

A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014

New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
A Matrix-Based Pairwise Key Establishment Scheme for Wireless Mesh Networks Using Pre Deployment Knowledge.
IEEE Trans. Emerg. Top. Comput., 2013

Forgeability of Wang-Zhu-Feng-Yau's Attribute-Based Signature with Policy-and-Endorsement Mechanism.
J. Comput. Sci. Technol., 2013

Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes.
IACR Cryptol. ePrint Arch., 2013

Data dynamics for remote data possession checking in cloud storage.
Comput. Electr. Eng., 2013

A Secure Cloud Storage System from Threshold Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Attribute-Based Signatures with Efficient Revocation.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Matrix-Based Pairwise Key Establishment with Pre and Post Deployment Knowledge for Wireless Mesh Networks.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Matrix-based pairwise key establishment in wireless mesh networks using deployment knowledge.
Proceedings of IEEE International Conference on Communications, 2013

2012
Enhanced authentication for commercial video services.
Secur. Commun. Networks, 2012

Further observation on proxy re-encryption with keyword search.
J. Syst. Softw., 2012

Strongly secure certificateless short signatures.
J. Syst. Softw., 2012

An efficient short certificate-based signature scheme.
J. Syst. Softw., 2012

A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption.
Comput. J., 2012

Certificateless Signatures: New Schemes and Security Models.
Comput. J., 2012

Efficient Escrow-Free Identity-Based Signature.
Proceedings of the Provable Security - 6th International Conference, 2012

Forward Secure Attribute-Based Signatures.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Verifier-local revocation group signatures with time-bound keys.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Dynamic Secure Cloud Storage with Provenance.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2011

Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures.
IEEE Trans. Inf. Forensics Secur., 2011

Optimistic Fair Exchange with Strong Resolution-Ambiguity.
IEEE J. Sel. Areas Commun., 2011

Provably secure server-aided verification signatures.
Comput. Math. Appl., 2011

2010
Constructions of certificate-based signature secure against key replacement attacks.
J. Comput. Secur., 2010

Certificateless threshold signature scheme from bilinear maps.
Inf. Sci., 2010

Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks.
Int. J. Secur. Networks, 2010

Cryptanalysis on Two Certificateless Signature Schemes.
Int. J. Comput. Commun. Control, 2010

Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting.
Proceedings of the Public Key Cryptography, 2010

2009
Certificate-based Signatures Revisited.
J. Univers. Comput. Sci., 2009

An efficient anonymous proxy signature scheme with provable security.
Comput. Stand. Interfaces, 2009

2008
Cryptanalysis and improvement of an efficient certificateless signature scheme.
J. Commun. Networks, 2008

Short Designated Verifier Signature Scheme and Its Identity-based Variant.
Int. J. Netw. Secur., 2008

Secure universal designated verifier signature without random oracles.
Int. J. Inf. Sec., 2008

Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Server-Aided Verification Signatures: Definitions and New Constructions.
Proceedings of the Provable Security, Second International Conference, 2008

Identity-Based On-Line/Off-Line Signcryption.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Further Observations on Certificateless Public Key Encryption.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Efficient and Short Certificateless Signature.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004.
J. Comput. Sci. Technol., 2007

Nominative Signature: Application, Security Model and Construction.
IACR Cryptol. ePrint Arch., 2007

Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length.
Proceedings of the Pairing-Based Cryptography, 2007

Formal Definition and Construction of Nominative Signature.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Certificate-Based Signature: Security Model and Efficient Construction.
Proceedings of the Public Key Infrastructure, 2007

Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

A Generic Construction for Universally-Convertible Undeniable Signatures.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

Efficient Identity-Based Signcryption Scheme for Multiple Receivers.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Identity-Based Proxy Signature from Pairings.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Certificateless Signature Revisited.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security.
IACR Cryptol. ePrint Arch., 2006

Restricted Universal Designated Verifier Signature.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Proxy Signature Without Random Oracles.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Short (Identity-Based) Strong Designated Verifier Signature Schemes.
Proceedings of the Information Security Practice and Experience, 2006

Universal Designated Verifier Signature Without Delegatability.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Certificateless Designated Verifier Signature Schemes.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Breaking and Repairing Trapdoor-free Group Signature Schemes from Asiacrypt 2004.
IACR Cryptol. ePrint Arch., 2005

Efficient Broadcast from Trapdoor Functions.
Proceedings of the Applied Public Key Infrastructure, 2005

A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Short Designated Verifier Proxy Signature from Pairings.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

On the Security of Certificateless Signature Schemes from Asiacrypt 2003.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005


  Loading...