Zhenhua Chen

Orcid: 0000-0001-5708-8064

Affiliations:
  • Xi'an University of Science and Technology, School of Computer Science and Technology, China
  • Guilin University of Electronic Technology, Guangxi Key Laboratory of Cryptography and Information Security, China
  • Shaanxi Normal University, Xi'an, China (PhD 2014)


According to our database1, Zhenhua Chen authored at least 19 papers between 2012 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
An Asymmetric Searchable Encryption Scheme Supporting Shortest Distance Query in Internet of Vehicles.
IEEE Internet Things J., July, 2025

Two Practical Attribute-Based Encryption Schemes for Privacy-Preserving Mobile Location-Sharing Applications.
IEEE Internet Things J., March, 2025

A New Functional Encryption Scheme Supporting Privacy-Preserving Maximum Similarity for Web Service Platforms.
IEEE Trans. Inf. Forensics Secur., 2025

2024
Attribute-Hiding Fuzzy Encryption for Privacy-Preserving Data Evaluation.
IEEE Trans. Serv. Comput., 2024

2023
Geometric Searchable Encryption Without False Positive And Its Applications.
Comput. J., September, 2023

Geometric Searchable Encryption for Privacy-Preserving Location-Based Services.
IEEE Trans. Serv. Comput., 2023

2020
Privacy-preserving polynomial interpolation and its applications on predictive analysis.
Inf. Sci., 2020

2016
A Joint Random Secret Sharing Scheme with Public Verifiability.
Int. J. Netw. Secur., 2016

A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage.
Concurr. Comput. Pract. Exp., 2016

2015
A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem.
Secur. Commun. Networks, 2015

A distributed secret share update scheme with public verifiability for ad hoc network.
Secur. Commun. Networks, 2015

基本初等函数的保密云计算服务协议 (Secure Cloud Computing Service Protocols of Elementary Functions).
计算机科学, 2015

2014
Comments on FHH Anonymous Multireceiver Encryption.
Int. J. Netw. Secur., 2014

A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
Efficient and adaptively secure broadcast encryption systems.
Secur. Commun. Networks, 2013

Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction.
IACR Cryptol. ePrint Arch., 2013

Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions.
Proceedings of the Information Security Practice and Experience, 2013

2012
Two Constructions of Multireceiver Encryption Supporting Constant Keys, Short Ciphertexts, and Identity Privacy.
Int. J. Netw. Secur., 2012

Conjunctive Keywords Searchable Encryption with Efficient Pairing, Constant Ciphertext and Short Trapdoor.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012


  Loading...