Zhenhua Chen
Orcid: 0000-0001-5708-8064Affiliations:
- Xi'an University of Science and Technology, School of Computer Science and Technology, China
- Guilin University of Electronic Technology, Guangxi Key Laboratory of Cryptography and Information Security, China
- Shaanxi Normal University, Xi'an, China (PhD 2014)
According to our database1,
Zhenhua Chen
authored at least 19 papers
between 2012 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
An Asymmetric Searchable Encryption Scheme Supporting Shortest Distance Query in Internet of Vehicles.
IEEE Internet Things J., July, 2025
Two Practical Attribute-Based Encryption Schemes for Privacy-Preserving Mobile Location-Sharing Applications.
IEEE Internet Things J., March, 2025
A New Functional Encryption Scheme Supporting Privacy-Preserving Maximum Similarity for Web Service Platforms.
IEEE Trans. Inf. Forensics Secur., 2025
2024
IEEE Trans. Serv. Comput., 2024
2023
Comput. J., September, 2023
IEEE Trans. Serv. Comput., 2023
2020
Privacy-preserving polynomial interpolation and its applications on predictive analysis.
Inf. Sci., 2020
2016
Int. J. Netw. Secur., 2016
A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage.
Concurr. Comput. Pract. Exp., 2016
2015
A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem.
Secur. Commun. Networks, 2015
A distributed secret share update scheme with public verifiability for ad hoc network.
Secur. Commun. Networks, 2015
计算机科学, 2015
2014
A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing.
Proceedings of the Network and System Security - 8th International Conference, 2014
2013
Secur. Commun. Networks, 2013
Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction.
IACR Cryptol. ePrint Arch., 2013
Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions.
Proceedings of the Information Security Practice and Experience, 2013
2012
Two Constructions of Multireceiver Encryption Supporting Constant Keys, Short Ciphertexts, and Identity Privacy.
Int. J. Netw. Secur., 2012
Conjunctive Keywords Searchable Encryption with Efficient Pairing, Constant Ciphertext and Short Trapdoor.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012