Gengran Hu

Orcid: 0000-0002-3061-2388

According to our database1, Gengran Hu authored at least 35 papers between 2012 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
From accuracy to approximation: A survey on approximate homomorphic encryption and its applications.
Comput. Sci. Rev., 2025

2024
EBDTS: An Efficient BCoT-Based Data Trading System Using PUF for Authentication.
IEEE Trans. Netw. Serv. Manag., October, 2024

Secure and Efficient Biometric-Based Anonymous Authentication Scheme for Mobile-Edge Computing.
IEEE Internet Things J., October, 2024

On the SVP for low-dimensional circulant lattices.
J. Comb. Optim., July, 2024

A novel biometric authentication scheme with privacy protection based on SVM and ZKP.
Comput. Secur., 2024

BIAS: A novel secure and efficient biometric-based anonymous authentication scheme.
Comput. Networks, 2024

2023
LRS_PKI: A novel blockchain-based PKI framework using linkable ring signatures.
Comput. Networks, December, 2023

A Novel Linkable Ring Signature on Ideal Lattices.
Entropy, February, 2023

An Improved Model on the Vague Sets-Based DPoS's Voting Phase in Blockchain.
IEEE Trans. Netw. Sci. Eng., 2023

An Improved Model of PBFT with Anonymity and Proxy Based on Linkable Ring Signature.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

A Multi-server Authentication Scheme Based on Fuzzy Extractor.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

Pairing Compression on Some Elliptic Curves with Subgroups of Embedding Degree 6 and Its Applications to Pairing-Based Cryptography.
Proceedings of the Emerging Information Security and Applications, 2023

2022
An Efficient and Robust Multidimensional Data Aggregation Scheme for Smart Grid Based on Blockchain.
IEEE Trans. Netw. Serv. Manag., December, 2022

Efficient Privacy-Preserving Forensic Method for Camera Model Identification.
IEEE Trans. Inf. Forensics Secur., 2022

Secure Two-party Computation Approach for NTRUEncrypt.
IACR Cryptol. ePrint Arch., 2022

Cuproof: Range Proof with Constant Size.
Entropy, 2022

A novel insurance claim blockchain scheme based on zero-knowledge proof technology.
Comput. Commun., 2022

2021
An Ultra-Highly Parallel Polynomial Multiplier for the Bootstrapping Algorithm in a Fully Homomorphic Encryption Scheme.
J. Signal Process. Syst., 2021

A Novel Machine Learning-Based Analysis Model for Smart Contract Vulnerability.
Secur. Commun. Networks, 2021

A Blockchain-Based Hierarchical Authentication Scheme for Multiserver Architecture.
Secur. Commun. Networks, 2021

Fuzzy Identity-Based Ring Signature from Lattices.
Secur. Commun. Networks, 2021

Biometric key generation based on generated intervals and two-layer error correcting technique.
Pattern Recognit., 2021

Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing.
KSII Trans. Internet Inf. Syst., 2021

Cuproof: A Novel Range Proof with Constant Size.
IACR Cryptol. ePrint Arch., 2021

Random Integer Lattice Generation via the Hermite Normal Form.
Entropy, 2021

Two Efficient Constructions for Biometric-Based Signature in Identity-Based Setting Using Bilinear Pairings.
IEEE Access, 2021

2020
Finding the maximal adversary structure from any given access structure.
Inf. Sci., 2020

Random Integer Lattice Generation via HNF.
IACR Cryptol. ePrint Arch., 2020

2019
Fully Homomorphic Encryption with k-bit Arithmetic Operations.
IACR Cryptol. ePrint Arch., 2019

2015
Relations Between Minkowski-Reduced Basis and \theta -orthogonal Basis of Lattice.
Proceedings of the Image and Graphics - 8th International Conference, 2015

2014
Solving Random Subset Sum Problem by l<sub>p</sub>-norm SVP Oracle.
IACR Cryptol. ePrint Arch., 2014

Solving Random Subset Sum Problem by l p -norm SVP Oracle.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

2013
A Three-Level Sieve Algorithm for the Shortest Vector Problem.
IACR Cryptol. ePrint Arch., 2013

Improvements on Reductions among Different Variants of SVP and CVP.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

2012
A New Reduction from Search SVP to Optimization SVP
CoRR, 2012


  Loading...