2024
Efficient Key-Aggregate Cryptosystem With User Revocation for Selective Group Data Sharing in Cloud Storage.
IEEE Trans. Knowl. Data Eng., November, 2024
Key-aggregate based access control encryption for flexible cloud data sharing.
Comput. Stand. Interfaces, March, 2024
Privacy leakage of certificateless public key authenticated searchable encryption via frequency analysis: Attacks and revises.
Comput. Stand. Interfaces, January, 2024
Secure, Dynamic, and Efficient Keyword Search With Flexible Merging for Cloud Storage.
IEEE Trans. Serv. Comput., 2024
ESVFL: Efficient and secure verifiable federated learning with privacy-preserving.
Inf. Fusion, 2024
Certificateless cloud storage auditing supporting data ownership transfer.
Comput. Secur., 2024
SDTA: Secure Decentralized Trading Alliance for Electronic Medical Data.
Comput. J., 2024
2023
Security-enhanced public-key authenticated searchable encryption.
Inf. Sci., November, 2023
Privacy-preserving healthcare monitoring for IoT devices under edge computing.
Comput. Secur., November, 2023
Key-aggregate searchable encryption supporting conjunctive queries for flexible data sharing in the cloud.
Inf. Sci., October, 2023
Efficient and Flexible Multiauthority Attribute-Based Authentication for IoT Devices.
IEEE Internet Things J., August, 2023
Privacy-preserving certificateless public auditing supporting different auditing frequencies.
Comput. Secur., May, 2023
A Verifiable Symmetric Searchable Encryption Scheme Based on the AVL Tree.
Comput. J., January, 2023
Multi-Keyword Ranked Searchable Encryption with the Wildcard Keyword for Data Sharing in Cloud Computing.
Comput. J., January, 2023
Verifiable Key-Aggregate Searchable Encryption With a Designated Server in Multi-Owner Setting.
IEEE Trans. Serv. Comput., 2023
Efficient Verifiable Unbounded-Size Database From Authenticated Matrix Commitment.
IEEE Trans. Dependable Secur. Comput., 2023
Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward Security.
Proceedings of the Artificial Intelligence Security and Privacy, 2023
The Analysis of Schnorr Multi-Signatures and the Application to AI.
Proceedings of the Artificial Intelligence Security and Privacy, 2023
2022
Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database.
IEEE Trans. Dependable Secur. Comput., 2022
Publicly Verifiable Shared Dynamic Electronic Health Record Databases With Functional Commitment Supporting Privacy-Preserving Integrity Auditing.
IEEE Trans. Cloud Comput., 2022
Divertible Searchable Symmetric Encryption for Secure Cloud Storage.
Proceedings of the IEEE Global Communications Conference, 2022
2021
Outsourced Decentralized Multi-Authority Attribute Based Signature and Its Application in IoT.
IEEE Trans. Cloud Comput., 2021
Data Integrity Auditing without Private Key Storage for Secure Cloud Storage.
IEEE Trans. Cloud Comput., 2021
Practical wildcard searchable encryption with tree-based index.
Int. J. Intell. Syst., 2021
2020
A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security.
Secur. Commun. Networks, 2020
Verifiable inner product computation on outsourced database for authenticated multi-user data sharing.
Inf. Sci., 2020
EVA: Efficient Versatile Auditing Scheme for IoT-Based Datamarket in Jointcloud.
IEEE Internet Things J., 2020
An Efficient Public Batch Auditing Scheme for Data Integrity in Standard Model.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
2019
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2019
Fuzzy matching: multi-authority attribute searchable encryption without central authority.
Soft Comput., 2019
A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks.
Sensors, 2019
A Secure Data Sharing Scheme with Designated Server.
Secur. Commun. Networks, 2019
A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Payment.
Secur. Commun. Networks, 2019
Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious Cloud.
Int. J. Digit. Crime Forensics, 2019
An improved scheme for outsourced computation with attribute-based encryption.
Concurr. Comput. Pract. Exp., 2019
2018
Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication.
Secur. Commun. Networks, 2018
2017
Confidentiality-Preserving Publicly Verifiable Computation.
Int. J. Found. Comput. Sci., 2017
Key negotiation schemes for body sensor networks on the surface of the human body.
Int. J. Auton. Adapt. Commun. Syst., 2017
A confidentiality preserving publicly verifiable computation for multivariate polynomials.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017
The Public Verifiability of Public Key Encryption with Keyword Search.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
Securely Outsourcing Decentralized Multi-authority Attribute Based Signature.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
2016
Threshold attribute-based signcryption and its application to authenticated key agreement.
Secur. Commun. Networks, 2016
Secure searches in the cloud: A survey.
Future Gener. Comput. Syst., 2016
A secure biometric authentication based on PEKS.
Concurr. Comput. Pract. Exp., 2016
2015
Multi-Authority Attribute-Based Encryption Scheme from Lattices.
J. Univers. Comput. Sci., 2015
Lattice-based threshold cryptography and its applications in distributed cloud computing.
Int. J. High Perform. Comput. Netw., 2015
Securing Body Sensor Networks with Biometric Methods: A New Key Negotiation Method and a Key Sampling Method for Linear Interpolation Encryption.
Int. J. Distributed Sens. Networks, 2015
Threshold Attribute-Based Signcryption in Standard Model.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
A new Lagrange solution to the privacy-preserving general geometric intersection problem.
J. Netw. Comput. Appl., 2014
A Function Private Attribute-Based Encryption.
Int. J. Distributed Sens. Networks, 2014
A general transformation from KP-ABE to searchable encryption.
Future Gener. Comput. Syst., 2014
2013
An Energy Efficient Key Management Scheme for Body Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2013
A Key Management Scheme between Body Sensor Networks and the Base Station.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
2012
A General Construction of Sequences with Good Autocorrelation over the 16-QAM Constellation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Simulatable Oblivious Transfer Protocols Based on Blind Signature.
Proceedings of the 11th IEEE International Conference on Trust, 2012
A Hash Chains Based Key Management Scheme for Wireless Sensor Networks.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
2010
k out of n Oblivious Transfer Protocols from Bilinear Pairings.
J. Softw., 2010
2008
Converters for Designing Applied Cryptographic Protocols.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008