Xu An Wang

Affiliations:
  • Engineering University of Chinese Armed Police Force, Xi'an, China
  • Guizhou University, State Key Laboratory of Public Big Data, China


According to our database1, Xu An Wang authored at least 220 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Multi-key homomorphic encryption with tightened RGSW ciphertexts without relinearization for ciphertexts product.
J. King Saud Univ. Comput. Inf. Sci., December, 2023

An improved multi-copy cloud data auditing scheme and its application.
J. King Saud Univ. Comput. Inf. Sci., March, 2023

SM2-Based Offline/Online Efficient Data Integrity Verification Scheme for Multiple Application Scenarios.
Sensors, 2023

A secure data fitting scheme based on CKKS homomorphic encryption for medical IoT.
J. High Speed Networks, 2023

Traitor Tracing Revisited: New Attackers, Stronger Security Model and New Construction.
IACR Cryptol. ePrint Arch., 2023

An Improved Data Integrity Verification Scheme for Cloud Storage.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2023

On the Security of a Cloud Auditing Storage Protocol.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2023

Cryptanalysis of a Public Cloud Auditing Scheme.
Proceedings of the Advances in Internet, Data & Web Technologies, 2023

2022
Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2022

Efficient certificateless public integrity auditing of cloud data with designated verifier for batch audit.
J. King Saud Univ. Comput. Inf. Sci., 2022

IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability.
J. Ambient Intell. Humaniz. Comput., 2022

A privacy preserving homomorphic computing toolkit for predictive computation.
Inf. Process. Manag., 2022

Privacy preserving IoT-based crowd-sensing network with comparable homomorphic encryption and its application in combating COVID19.
Internet Things, 2022

Improved Secure Provable Data Possession Scheme for Cloud Storage.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

Toward Secure K-means Clustering Based on Homomorphic Encryption in Cloud.
Proceedings of the Advances in Internet, Data & Web Technologies, 2022

On the Insecurity of a Certificateless Public Verification Protocol for the Outsourced Data Integrity in Cloud Storage.
Proceedings of the Advances in Internet, Data & Web Technologies, 2022

2021
Improved Lightweight Cloud Storage Auditing Protocol for Shared Medical Data.
Wirel. Commun. Mob. Comput., 2021

Comments on "Privacy-Preserving Public Auditing Protocol for Regenerating-Code-Based Cloud Storage".
IEEE Trans. Inf. Forensics Secur., 2021

Improved Outsourced Provable Data Possession for Secure Cloud Storage.
Secur. Commun. Networks, 2021

Secure Data Set Operation Protocols for Outsourced Cloud Data to Protect User Privacy in Smart City.
J. Circuits Syst. Comput., 2021

Decentralized data outsourcing auditing protocol based on blockchain.
J. Ambient Intell. Humaniz. Comput., 2021

Outsourced Secure Face Recognition Based on CKKS Homomorphic Encryption in Cloud Computing.
Int. J. Mob. Comput. Multim. Commun., 2021

Improved publicly verifiable auditing protocol for cloud storage.
Concurr. Comput. Pract. Exp., 2021

Cryptanalysis of Double-trapdoor Hash Function and Multi-Trapdoor Hash Function Schemes.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

A Scheme for Checking Similarity and Its Application in Outsourced Image Processing.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

Cryptanalysis of a Privacy Preserving Ranked Multi-keyword Search Scheme in Cloud Computing.
Proceedings of the Advanced Information Networking and Applications, 2021

Improvement of the Matrix for Simple Matrix Encryption Scheme.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources".
IEEE Trans. Inf. Forensics Secur., 2020

Enhanced Certificateless Auditing Protocols for Cloud Data Management and Transformative Computation.
Inf. Process. Manag., 2020

Constant-size ring signature scheme using multilinear maps.
Int. J. Embed. Syst., 2020

Identification and addressing of internet of things based on distributed ID.
Int. J. Embed. Syst., 2020

New group user based privacy preserving cloud auditing protocol.
Future Gener. Comput. Syst., 2020

New public auditing protocol based on homomorphic tags for secure cloud storage.
Concurr. Comput. Pract. Exp., 2020

Privacy-Preserving Public Cloud Audit Scheme Supporting Dynamic Data for Unmanned Aerial Vehicles.
IEEE Access, 2020

Trusted Records Scheme in Scene Investigation.
Proceedings of the Advances in Networked-Based Information Systems, 2020

Credit Rating Based on Hybrid Sampling and Dynamic Ensemble.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems - The 12th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2020), Victoria, BC, Canada, 31 August, 2020

Identify-Based Outsourcing Data Auditing Scheme with Lattice.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

Secure Public Cloud Storage Auditing with Deduplication: More Efficient and Secure.
Proceedings of the Advances in Internet, 2020

Secure Public Storage Auditing Protocol for Privacy-Preserving Fog-to-Cloud Computing.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

Intrusion Detection Based on Cluster Analysis and Nonsymmetric Autoencoder.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

Design and Implementation of Secure File Transfer System Based on Java.
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2020

Secure Outsourcing Protocol Based on Paillier Algorithm for Cloud Computing.
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2020

2019
Improved secure fuzzy auditing protocol for cloud data storage.
Soft Comput., 2019

Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme.
J. Parallel Distributed Comput., 2019

Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation.
J. Ambient Intell. Humaniz. Comput., 2019

Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification.
Inf. Sci., 2019

A Secure and Efficient Code-Based Signature Scheme.
Int. J. Found. Comput. Sci., 2019

New provable data transfer from provable data possession and deletion for secure cloud storage.
Int. J. Distributed Sens. Networks, 2019

Improved publicly verifiable group sum evaluation over outsourced data streams in IoT setting.
Computing, 2019

Survey on Blockchain-Based Electronic Voting.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2019

A Basic Framework of Blockchain-Based Decentralized Verifiable Outsourcing.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2019

Large-Scale Electronic Voting Based on Conflux Consensus Mechanism.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

Blockchain-Based Public Auditing Scheme for Shared Data.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

Key Technologies of Anomaly Detection Using PCA-LSTM.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

Construction and Parallel Implementation of Homomorphic Arithmetic Unit Based on NuFHE.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019

A Survey of Malicious HID Devices.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

Power Consumption Attack Based on Improved Principal Component Analysis.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

Perception Mining of Network Protocol's Stealth Attack Behaviors.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

Preprocessing of Correlation Power Analysis Based on Improved Wavelet Packet.
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2019

Detection of Malicious Code Variants Based on a Flexible and Lightweight Net.
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2019

Dynamic public opinion evolvement modeling and supervision in social networks.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

2018
A privacy-preserving fuzzy interest matching protocol for friends finding in social networks.
Soft Comput., 2018

Secure Testing for Genetic Diseases on Encrypted Genomes with Homomorphic Encryption Scheme.
Secur. Commun. Networks, 2018

Privacy-Preserving Hybrid K-Means.
Int. J. Data Warehous. Min., 2018

PRE<sup>+</sup>: dual of proxy re-encryption for secure cloud data sharing service.
Int. J. Web Grid Serv., 2018

Fast elliptic curve algorithm using deformed Fibonacci-type series.
Int. J. Embed. Syst., 2018

TERS: a traffic efficient repair scheme for repairing multiple losses in erasure-coded distributed storage systems.
Int. J. Comput. Sci. Eng., 2018

Fast elliptic curve scalar multiplication for resisting against SPA.
Int. J. Comput. Sci. Eng., 2018

Improved outsourced private set intersection protocol based on polynomial interpolation.
Concurr. Comput. Pract. Exp., 2018

Improved group-oriented proofs of cloud storage in IoT setting.
Concurr. Comput. Pract. Exp., 2018

Improved functional proxy re-encryption schemes for secure cloud data sharing.
Comput. Sci. Inf. Syst., 2018

Privacy-Preserving All Convolutional Net Based on Homomorphic Encryption.
Proceedings of the Advances in Network-Based Information Systems, 2018

Improved Functional Encryption Schemes by Using Novel Techniques.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2018

Improved Provable Data Transfer from Provable Data Possession and Deletion in Cloud Storage.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2018

The CP-ABE with Full Verifiability Outsourced Decryption and White-Box Traceability.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Threshold Model Based on Relative Influence Weight of User.
Proceedings of the Advances in Internet, 2018

Publicly Verifiable 1-norm and 2-norm Operations over Outsourced Data Stream Under Single-Key Setting.
Proceedings of the Advances in Internet, 2018

Verifiable Outsourced Attribute Based Encryption Scheme with Fixed Key Size.
Proceedings of the Advances in Internet, 2018

Phishing Detection Research Based on PSO-BP Neural Network.
Proceedings of the Advances in Internet, 2018

Homomorphic Authentication Based on Rank-Based Merkle Hash Tree.
Proceedings of the Advances in Internet, 2018

An Improved Method for Voiceprint Recognition.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

Combining Vector Space Features and Convolution Neural Network for Text Sentiment Analysis.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

Improved Cooperative Spectrum Sensing Algorithm with Artificial Neural Network.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

Coupling Relationship Construction of Key Elements in Emergency Intelligence with Big Data.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

Network Malicious Behavior Detection Using Bidirectional LSTM.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

More Secure Outsource Protocol for Matrix Multiplication in Cloud Computing.
Proceedings of the Advances on P2P, 2018

On the Security of a CCA-Secure Timed-Release Conditional Proxy Broadcast Re-encryption Scheme.
Proceedings of the Advances on P2P, 2018

Outsourcing Online/offline Proxy Re-encryption for Mobile Cloud Storage Sharing.
Proceedings of the Advances on P2P, 2018

Mining and Utilizing Network Protocol's Stealth Attack Behaviors.
Proceedings of the Advances on P2P, 2018

2017
VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel.
Peer-to-Peer Netw. Appl., 2017

Reusable garbled gates for new fully homomorphic encryption service.
Int. J. Web Grid Serv., 2017

New efficient chosen ciphertext secure Elgamal encryption schemes for secure Cloud storage service.
Int. J. Web Grid Serv., 2017

An Insider Threat Detection Method Based on Business Process Mining.
Int. J. Bus. Data Commun. Netw., 2017

Cost-effective secure E-health cloud system using identity based cryptographic techniques.
Future Gener. Comput. Syst., 2017

An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model.
Sci. China Inf. Sci., 2017

Improved Online/Offline Attribute Based Encryption and More.
Proceedings of the Advances in Internetworking, 2017

On the Security of a Cloud Data Storage Auditing Protocol IPAD.
Proceedings of the Advances in Internetworking, 2017

Cyber-Attack Risks Analysis Based on Attack-Defense Trees.
Proceedings of the Advances in Internetworking, 2017

Outsourcing the Decryption of Ciphertexts for Predicate Encryption via Pallier Paradigm.
Proceedings of the Advances in Internetworking, 2017

Key Encapsulation Mechanism from Multilinear Maps.
Proceedings of the Advances in Internetworking, 2017

Improved Ant Colony RBF Spatial Interpolation of Ore Body Visualization Software Development.
Proceedings of the Advances on P2P, 2017

RBF Model Based on the KECDBN.
Proceedings of the Advances on P2P, 2017

2016
m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting.
J. Medical Syst., 2016

Unidirectional IBPRE scheme from lattice for cloud computation.
J. Ambient Intell. Humaniz. Comput., 2016

A Novel Video Steganography Algorithm Based on Trailing Coecients for H.264/AVC.
Informatica (Slovenia), 2016

D-S Evidence Theory Based Trust Detection Scheme in Wireless Sensor Networks.
Int. J. Technol. Hum. Interact., 2016

Security Analysis of Cipher ICEBERG against Bit-pattern Based Integral Attack.
Int. J. Technol. Hum. Interact., 2016

An Improved Security 3D Watermarking Method Using Computational Integral Imaging Cryptosystem.
Int. J. Technol. Hum. Interact., 2016

Efficient expanded mixed finite element method for the quasilinear elliptic problems.
Int. J. High Perform. Syst. Archit., 2016

A public cloud storage auditing scheme for resource-constrained clients.
Int. J. High Perform. Syst. Archit., 2016

Round-optimal ID-based dynamic authenticated group key agreement.
Int. J. High Perform. Syst. Archit., 2016

Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage.
Comput. Electr. Eng., 2016

Some Practical Properties of AP14.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

A Novel QoS-Aware Load Balancing Mechanism in Cloud Environment.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

The Research of Enhancing the Dependability of Cloud Services Using Self-Healing Mechanism.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Research on Failure Prognostics Method of Electronic System Based on Improved Fruit Fly Algorithm and Grey Fast Relevance Vector Machine.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

An Optimization Research on the Alternate Interval for Electronic Products.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

New Differential Fault Attack on Lightweight Cipher LBlock.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Identity Based Proxy Re-Encryption Scheme (IBPRE+) for Secure Cloud Data Sharing.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Non-transferable Unidirectional Proxy Re-Encryption Scheme for Secure Social Cloud Storage Sharing.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Intelligent SMS Spam Filtering Using Topic Model.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Intrusion Detection Techniques Based on Cutting-Based Real-Valued Negative Selection.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

A Novel Multi-class Classification Approach Based on Fruit Fly Optimization Algorithm and Relevance Vector Machine.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

A Rational Secret Sharing Relying on Reputation.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Bayesian Parameter Estimation of Weibull Mixtures Using Cuckoo Search.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Design and Implementation of Library Books Search and Management System Using RFID Technology.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Locality-Aware and Energy-Aware Job Pre-Assignment for Mapreduce.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

A Multi-replica Associated Deleting Scheme in Cloud.
Proceedings of the 10th International Conference on Complex, 2016

An ID-based Dynamic Authenticated Group Key Agreement Scheme with Optimal Round Complexity from Pairings.
Proceedings of the 10th International Conference on Complex, 2016

Hybrid Analysis for Mining Network Protocol's Hidden Behavior.
Proceedings of the 10th International Conference on Complex, 2016

Intelligent Management System for Small Gardens Based on Wireless Sensor Network.
Proceedings of the Advances on P2P, 2016

Asymmetric Searchable Encryption from Inner Product Encryption.
Proceedings of the Advances on P2P, 2016

Toward Construction of Encryption with Decryption Awareness Ability for Cloud Storage.
Proceedings of the Advances on P2P, 2016

Toward Construction of Efficient Privacy Preserving Reusable Garbled Circuits.
Proceedings of the Advances on P2P, 2016

A Study of the Internet Financial Interest Rate Risk Evaluation Index System in Context of Cloud Computing.
Proceedings of the Advances on P2P, 2016

Research on Decisive Mechanism of Internet Financial Interest Rate.
Proceedings of the Advances on P2P, 2016

An AHP Based Study of Coal-Mine Zero Harm Safety Culture Evaluation.
Proceedings of the Advances on P2P, 2016

Intrusion Detection for WSN Based on Kernel Fisher Discriminant and SVM.
Proceedings of the Advances on P2P, 2016

Queuing-Oriented Job Optimizing Scheduling In Cloud Mapreduce.
Proceedings of the Advances on P2P, 2016

2015
Security Analysis of Two Identity Based Proxy Re-encryption Schemes in Multi-user Networks.
Trans. Comput. Collect. Intell., 2015

Eroca: A Framework for Efficiently Recovering Outsourced Ciphertexts for Autonomous Vehicles.
Trans. Comput. Collect. Intell., 2015

New Construction of PVPKE Scheme and Its Application in Information Systems and Mobile Communication.
Mob. Inf. Syst., 2015

Comprehensive Improved Simulated Annealing Optimization for Floorplanning of Heterogeneous 3D Networks-on-Chip.
J. Interconnect. Networks, 2015

Guest Editor's Foreword.
J. Interconnect. Networks, 2015

Lattice-based Dynamical and Anonymous Broadcast Encryption Scheme for Wireless Ad Hoc Networks.
J. Interconnect. Networks, 2015

FE-brick: Re-definition and Re-design of FE Model in Next-Generation Router Architecture.
J. Interconnect. Networks, 2015

A new proxy re-encryption scheme for protecting critical information systems.
J. Ambient Intell. Humaniz. Comput., 2015

A Study on Components and Features in Face Detection.
Int. J. Inf. Technol. Web Eng., 2015

A High-Capacity Covering Code for Voice-Over-IP Steganography.
Int. J. Inf. Technol. Web Eng., 2015

Method for Improving Data Security in Register Files Based on Multiple Pipeline Restart.
Int. J. Inf. Technol. Web Eng., 2015

An Additively Homomorphic Encryption over Large Message Space.
Int. J. Inf. Technol. Web Eng., 2015

New signature schemes in the standard model based on publicly verifiable CCA-secure public key encryption.
Int. J. Inf. Commun. Technol., 2015

Data Owner Based Attribute Based Encryption.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

New Compact CCA Secure Elgamal Scheme in the Random Oracle Model.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

Efficient Numerical Simulation for the Quasilinear Elliptic Problems.
Proceedings of the 10th International Conference on P2P, 2015

Ring Signature Scheme from Multilinear Maps in the Standard Model.
Proceedings of the 10th International Conference on P2P, 2015

On Cloud Computing Middleware Architecture.
Proceedings of the 10th International Conference on P2P, 2015

Cascade Face Detection Based on Histograms of Oriented Gradients and Support Vector Machine.
Proceedings of the 10th International Conference on P2P, 2015

An Authentication Key Agreement Scheme for Heterogeneous Sensor Network Based on Improved Counting Bloom Filter.
Proceedings of the 10th International Conference on P2P, 2015

Lattice-Based Dynamical and Anonymous Broadcast Encryption Scheme.
Proceedings of the 10th International Conference on P2P, 2015

Outsourcing Decryption of Attribute Based Encryption with Energy Efficiency.
Proceedings of the 10th International Conference on P2P, 2015

Another Look at Ciphertext Updating Algorithms for Cloud Storage.
Proceedings of the 10th International Conference on P2P, 2015

Proxy Re-signature Supporting Conditional Delegation.
Proceedings of the 10th International Conference on P2P, 2015

Research on War Strategy Games on Mobile Phone Based on Cocos2d-JS.
Proceedings of the 10th International Conference on P2P, 2015

A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation.
Proceedings of the 10th International Conference on P2P, 2015

An Efficient VoIP Steganography Based on Random Binary Matrix.
Proceedings of the 10th International Conference on P2P, 2015

Deployment Method of Virtual Machine Cluster Based on Energy Minimization and Graph Cuts Theory.
Proceedings of the 10th International Conference on P2P, 2015

Research on Identification and Addressing of the Internet of Things.
Proceedings of the 10th International Conference on P2P, 2015

Research and Implementation on Visual Analysis of Geological Volume.
Proceedings of the 10th International Conference on P2P, 2015

SPA Resistant Scalar Multiplication Based on Addition and Tripling Indistinguishable on Elliptic Curve Cryptosystem.
Proceedings of the 10th International Conference on P2P, 2015

Fast and Secure Elliptic Curve Scalar Multiplication Algorithm Based on a Kind of Deformed Fibonacci-Type Series.
Proceedings of the 10th International Conference on P2P, 2015

Analysis and Improvement of a Verifiable Phrase Search over Encrypted Data in a Single Phrase.
Proceedings of the 10th International Conference on P2P, 2015

Extensional Schemes of Multipartite Non-interactive Key Exchange from Multilinear Maps.
Proceedings of the 10th International Conference on P2P, 2015

Instruction Clustering Analysis for Network Protocol's Abnormal Behavior.
Proceedings of the 10th International Conference on P2P, 2015

Analyze Network Protocol's Hidden Behavior.
Proceedings of the 10th International Conference on P2P, 2015

Software Data Plane and Flow Switching Plane Separation in Next-Generation Router Architecture.
Proceedings of the 10th International Conference on P2P, 2015

Enhanced Reliability Scheduling Method for the Data in Register File.
Proceedings of the 10th International Conference on P2P, 2015

2013
DDos Attack against Proxy in PRE and PRS.
J. Softw., 2013

CCA Secure Publicly Verifiable Public Key Encryption Without Pairings Nor Random Oracle and Its Applications.
J. Comput., 2013

Analysis and Improvements of Several (H)IBS/IBSC/PRBE Schemes.
J. Comput., 2013

Hybrid Proxy Re-encryption Between IBE And CBE.
J. Comput., 2013

Identity Based Proxy Re-encryption From BB1 IBE.
J. Comput., 2013

Identity Based Proxy Re-encryption Based on BB2 and SK IBE with the Help of PKG.
J. Comput., 2013

On the security of two multi-use CCA-secure proxy re-encryption schemes.
Int. J. Intell. Inf. Database Syst., 2013

New Construction of PVPKE Scheme Based on Signed Quadratic Residues.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Yet Another Way to Construct Digital Signature in the Standard Model.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Fully Secure Attribute-Based Encryption with Non-monotonic Access Structures.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Toward Construction of PVPKE in the Standard Model Based on Factoring Assumption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
Further observation on proxy re-encryption with keyword search.
J. Syst. Softw., 2012

Cryptanalysis of a Fuzzy Identity Based Encryption Scheme in the Standard Model.
Informatica, 2012

New Identity Based Encryption And Its Proxy Re-encryption.
IACR Cryptol. ePrint Arch., 2012

Security Analysis of a Multi-use Identity Based CCA-Secure Proxy Re-encryption Scheme.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

On the Security of a Multi-use CCA-Secure Proxy Re-encryption Scheme.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

Security Analysis of Several Chosen Ciphertext Secure Group-oriented Encryption Schemes.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2011
Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme.
J. Syst. Softw., 2011

Cryptanalysis of an identity based broadcast encryption scheme without random oracles.
Inf. Process. Lett., 2011

Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme.
IACR Cryptol. ePrint Arch., 2011

Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model.
Fundam. Informaticae, 2011

Proxy Re-encryption with Keyword Search from Anonymous Conditional Proxy Re-encryption.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

K-times Proxy Re-encryption.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Provable Secure Generalized Signcryption.
J. Comput., 2010

Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model.
IACR Cryptol. ePrint Arch., 2010

On the Insecurity of an Identity Based Proxy Re-encryption Scheme.
Fundam. Informaticae, 2010

Proxy Re-Encryption Schemes with Proxy Having Its Own Public/Private Keys.
Proceedings of the Second International Workshop on Database Technology and Applications, 2010

Proxy Re-encryption from CLE to CBE.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

New CCA-Secure Proxy Re-encryption Scheme without Random Oracles.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Proxy Re-encryption Scheme from IBE to CBE.
Proceedings of the First International Workshop on Database Technology and Applications, 2009

How to Solve Key Escrow Problem in Proxy Re-encryption from CBE to IBE.
Proceedings of the First International Workshop on Database Technology and Applications, 2009

On Security Notions for Verifiably Encrypted Signature.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Proxy Re-encryption Scheme Based on SK Identity Based Encryption.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

On DDos Attack against Proxy in Proxy Re-encryption and Proxy Re-signature.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings.
IACR Cryptol. ePrint Arch., 2008

On the Role of PKG for Proxy Re-encryption in Identity Based Setting.
IACR Cryptol. ePrint Arch., 2008

On Security Notions for Verifiable Encrypted Signature.
IACR Cryptol. ePrint Arch., 2008

Multi-Recipient Signcryption for Secure Wireless Group Communication.
IACR Cryptol. ePrint Arch., 2008

Further Observations on Certificateless Public Key Encryption.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
Provable Secure Generalized Signcryption.
IACR Cryptol. ePrint Arch., 2007

2004
New multi-signature and proxy multi-signature schemes from the Weil pairings.
Proceedings of the 3rd International Conference on Information Security, 2004


  Loading...