Yinxia Sun

Orcid: 0000-0001-6004-0985

According to our database1, Yinxia Sun authored at least 29 papers between 2007 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization.
IEEE Trans. Serv. Comput., 2022

Efficient Identity-Based Encryption With Revocation for Data Privacy in Internet of Things.
IEEE Internet Things J., 2022

2021
Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system.
Inf. Sci., 2021

Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system.
IET Inf. Secur., 2021

2020
Revocable identity-based encryption with server-aided ciphertext evolution.
Theor. Comput. Sci., 2020

CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution.
Int. J. Found. Comput. Sci., 2020

2019
Nonce-Based Key Agreement Protocol Against Bad Randomness.
Int. J. Found. Comput. Sci., 2019

Pairing-free certificateless signature with revocation.
Int. J. Comput. Sci. Eng., 2019

2018
Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server.
J. Netw. Comput. Appl., 2018

A revocable certificateless encryption scheme with high performance.
Int. J. High Perform. Comput. Netw., 2018

Secure and privacy-preserving 3D vehicle positioning schemes for vehicular ad hoc network.
EURASIP J. Wirel. Commun. Netw., 2018

CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud.
IEEE Access, 2018

Revocable Certificateless Encryption with Ciphertext Evolution.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
An efficient revocable ID-based encryption scheme in the standard model.
Int. J. Embed. Syst., 2017

2016
A Revocable Certificateless Signature Scheme Without Pairing.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Efficient revocable certificateless encryption against decryption key exposure.
IET Inf. Secur., 2015

2014
A Revocable Certificateless Signature Scheme.
J. Comput., 2014

Cryptanalysis and improvement on a certificateless encryption scheme in the standard model.
Int. J. Inf. Comput. Secur., 2014

Efficient Revocable Certificateless Encryption Secure in the Standard Model.
Comput. J., 2014

2013
A revocable certificateless signature scheme.
IACR Cryptol. ePrint Arch., 2013

Efficient leakage-resilient public key encryption from DDH assumption.
Clust. Comput., 2013

Revocable Identity-Based Signature without Pairing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
On security of a Certificateless Aggregate Signature Scheme.
IACR Cryptol. ePrint Arch., 2012

Cryptanalysis of a Certificateless Encryption Scheme in the Standard Model.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A New Variant of the Cramer-Shoup Leakage-Resilient Public Key Encryption.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2010
Short-ciphertext and BDH-based CCA2 secure certificateless encryption.
Sci. China Inf. Sci., 2010

Efficient signcryption between TPKC and IDPKC and its multi-receiver construction.
Sci. China Inf. Sci., 2010

2008
Secure Certificateless Public Key Encryption without Redundancy.
IACR Cryptol. ePrint Arch., 2008

2007
Strongly Secure Certificateless Public Key Encryption Without Pairing.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007


  Loading...