Hu Xiong

Orcid: 0000-0001-6137-6667

According to our database1, Hu Xiong authored at least 176 papers between 2007 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Efficient and provably secured puncturable attribute-based signature for Web 3.0.
Future Gener. Comput. Syst., 2025

2024
When Federated Learning Meets Privacy-Preserving Computation.
ACM Comput. Surv., December, 2024

A Conditional Privacy-Preserving Mutual Authentication Protocol With Fine-Grained Forward and Backward Security in IoV.
IEEE Trans. Intell. Transp. Syst., November, 2024

Traceable Attribute-Based Encryption With Equality Test for Cloud Enabled E-Health System.
IEEE J. Biomed. Health Informatics, September, 2024

Efficient plaintext checkable identity-based signcryption in cyber-physical systems towards IIoT.
Trans. Emerg. Telecommun. Technol., June, 2024

Heterogeneous Signcryption Scheme With Group Equality Test for Satellite-Enabled IoVs.
IEEE Internet Things J., March, 2024

Efficient Blockchain-Assisted Distributed Identity-Based Signature Scheme for Integrating Consumer Electronics in Metaverse.
IEEE Trans. Consumer Electron., February, 2024

Blockchain-Enabled Privacy-Preserving Authentication Mechanism for Transportation CPS With Cloud-Edge Computing.
IEEE Trans. Engineering Management, 2024

Heterogeneous and plaintext checkable signcryption for integrating IoT in healthcare system.
J. Syst. Archit., 2024

Industrial blockchain threshold signatures in federated learning for unified space-air-ground-sea model training.
J. Ind. Inf. Integr., 2024

Cross-modal interaction and multi-source visual fusion for video generation in fetal cardiac screening.
Inf. Fusion, 2024

Proxy re-encryption with plaintext checkable encryption for integrating digital twins into IIoT.
Comput. Electr. Eng., 2024

Secure personal-health-records searching in edge-based Internet of Medical Things through plaintext checkable encryption.
Comput. Electr. Eng., 2024

Pairing-free certificateless public key encryption with equality test for Internet of Vehicles.
Comput. Electr. Eng., 2024

Decoding the third dimension in the metaverse: A comprehensive method for reconstructing 2D NFT portraits into 3D models.
Appl. Soft Comput., 2024

2023
Attribute-Based Data Sharing Scheme With Flexible Search Functionality for Cloud-Assisted Autonomous Transportation System.
IEEE Trans. Ind. Informatics, November, 2023

Safety and security of autonomous vehicles.
Trans. Emerg. Telecommun. Technol., November, 2023

Revocable and Unbounded Attribute-Based Encryption Scheme With Adaptive Security for Integrating Digital Twins in Internet of Things.
IEEE J. Sel. Areas Commun., October, 2023

An Efficient Online/Offline Heterogeneous Signcryption Scheme With Equality Test for IoVs.
IEEE Trans. Veh. Technol., September, 2023

MSDP: multi-scheme privacy-preserving deep learning via differential privacy.
Pers. Ubiquitous Comput., April, 2023

FABRIC: Fast and Secure Unbounded Cross-System Encrypted Data Sharing in Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2023

Expressive Data Sharing and Self-Controlled Fine-Grained Data Deletion in Cloud-Assisted IoT.
IEEE Trans. Dependable Secur. Comput., 2023

Share Your Data Carefree: An Efficient, Scalable and Privacy-Preserving Data Sharing Service in Cloud Computing.
IEEE Trans. Cloud Comput., 2023

Efficient Revocable Storage Attribute-based Encryption With Arithmetic Span Programs in Cloud-Assisted Internet of Things.
IEEE Trans. Cloud Comput., 2023

Scalable and Revocable Attribute-Based Data Sharing With Short Revocation List for IIoT.
IEEE Internet Things J., 2023

Revocable Attribute-Based Encryption Scheme with Cryptographic Reverse Firewalls.
Proceedings of the Big Data Technologies and Applications, 2023

2022
Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities.
IEEE Trans. Serv. Comput., 2022

On the Design of Blockchain-Based ECDSA With Fault-Tolerant Batch Verification Protocol for Blockchain-Enabled IoMT.
IEEE J. Biomed. Health Informatics, 2022

Conditional Privacy-Preserving Authentication Protocol With Dynamic Membership Updating for VANETs.
IEEE Trans. Dependable Secur. Comput., 2022

Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing.
IEEE Trans. Big Data, 2022

An Anonymous Authentication Protocol With Delegation and Revocation for Content Delivery Networks.
IEEE Syst. J., 2022

Efficient Unbounded Fully Attribute Hiding Inner Product Encryption in Cloud-Aided WBANs.
IEEE Syst. J., 2022

Heterogeneous Signcryption Scheme From IBC to PKI With Equality Test for WBANs.
IEEE Syst. J., 2022

Proxy-based public-key cryptosystem for secure and efficient IoT-based cloud data sharing in the smart city.
Multim. Tools Appl., 2022

A survey on Attribute-Based Signatures.
J. Syst. Archit., 2022

PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system.
J. Ambient Intell. Humaniz. Comput., 2022

A survey on multi-authority and decentralized attribute-based encryption.
J. Ambient Intell. Humaniz. Comput., 2022

A Survey of Public-Key Encryption With Search Functionality for Cloud-Assisted IoT.
IEEE Internet Things J., 2022

Burn After Reading: Adaptively Secure Puncturable Identity-Based Proxy Re-Encryption Scheme for Securing Group Message.
IEEE Internet Things J., 2022

Unbounded and Efficient Revocable Attribute-Based Encryption With Adaptive Security for Cloud-Assisted Internet of Things.
IEEE Internet Things J., 2022

Secure and Authenticated Data Access and Sharing Model for Smart Wearable Systems.
IEEE Internet Things J., 2022

Proxy re-encryption with equality test for secure data sharing in Internet of Things-based healthcare systems.
Trans. Emerg. Telecommun. Technol., 2022

Guest editorial: Introduction to the special section on sustainable security solutions for Internet of Vehicles (VSI-iov).
Comput. Electr. Eng., 2022

Network Intrusion Detection Based on Hybrid Neural Network.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

2021
Equality test with an anonymous authorization in cloud computing.
Wirel. Networks, 2021

An Efficient Certificateless Authenticated Key Exchange Protocol Resistant to Ephemeral Key Leakage Attack for V2V Communication in IoV.
IEEE Trans. Veh. Technol., 2021

A Fuzzy Authentication System Based on Neural Network Learning and Extreme Value Statistics.
IEEE Trans. Fuzzy Syst., 2021

On the Security of Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-Owner Setting.
IEEE Trans. Dependable Secur. Comput., 2021

Comment on "Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data".
IEEE Trans. Cloud Comput., 2021

A Novel Multiserver Authentication Scheme Using Proxy Resignature With Scalability and Strong User Anonymity.
IEEE Syst. J., 2021

Efficient Certificateless Aggregate Signature With Conditional Privacy Preservation in IoV.
IEEE Syst. J., 2021

Efficient access control with traceability and user revocation in IoT.
Multim. Tools Appl., 2021

Efficient Proxy Re-encryption Scheme for E-Voting System.
KSII Trans. Internet Inf. Syst., 2021

Accountable Attribute-based Encryption with Public Auditing and User Revocation in the Personal Health Record System.
KSII Trans. Internet Inf. Syst., 2021

Heterogeneous Signcryption With Equality Test for IIoT Environment.
IEEE Internet Things J., 2021

Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen Key Attacks for Industrial Internet of Things.
IEEE Internet Things J., 2021

Heterogeneous Signcryption Scheme Supporting Equality Test from PKI to CLC toward IoT.
Trans. Emerg. Telecommun. Technol., 2021

A novel authentication and key-agreement scheme for satellite communication network.
Trans. Emerg. Telecommun. Technol., 2021

The Internet of vehicles and smart cities.
Ann. des Télécommunications, 2021

A Certificateless and Privacy-Preserving Authentication with Fault-Tolerance for Vehicular Sensor Networks.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

Toward Blockchain-Enabled IoV with Edge Computing: Efficient and Privacy-Preserving Vehicular Communication and Dynamic Updating.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
PKE-ET-HS: Public Key Encryption with Equality Test for Heterogeneous Systems in IoT.
Wirel. Pers. Commun., 2020

Secure message classification services through identity-based signcryption with equality test towards the Internet of vehicles.
Veh. Commun., 2020

A Secure Flexible and Tampering-Resistant Data Sharing System for Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020

Server-Aided Attribute-Based Signature Supporting Expressive Access Structures for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2020

A multi-use unidirectional certificateless proxy re-signature scheme.
Telecommun. Syst., 2020

Security and Privacy in IoT-Cloud-Based e-Health Systems - A Comprehensive Review.
Symmetry, 2020

Efficient and Provably Secure Certificateless Parallel Key-Insulated Signature Without Pairing for IIoT Environments.
IEEE Syst. J., 2020

A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments.
Peer-to-Peer Netw. Appl., 2020

An efficient certificateless public key cryptography with authorized equality test in IIoT.
J. Ambient Intell. Humaniz. Comput., 2020

A Secure and Efficient Identity-Based Proxy Signcryption in Cloud Data Sharing.
KSII Trans. Internet Inf. Syst., 2020

A secure and efficient certificateless batch verification scheme with invalid signature identification for the internet of things.
J. Inf. Secur. Appl., 2020

Mobile access and flexible search over encrypted cloud data in heterogeneous systems.
Inf. Sci., 2020

Efficient and Privacy-Preserving Authentication Protocol for Heterogeneous Systems in IIoT.
IEEE Internet Things J., 2020

Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-Oriented Smart Health.
IEEE Internet Things J., 2020

Comments on "Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0".
IEEE Internet Things J., 2020

Identity Based Key-Insulated Encryption with Outsourced Equality Test.
Int. J. Netw. Secur., 2020

Chaintegrity: blockchain-enabled large-scale e-voting system with robustness and universal verifiability.
Int. J. Inf. Sec., 2020

Revocable Attribute-based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoT.
IACR Cryptol. ePrint Arch., 2020

An enhanced authentication protocol for client server environment.
Frontiers Comput. Sci., 2020

An efficient certificateless aggregate signature scheme for the Internet of Vehicles.
Trans. Emerg. Telecommun. Technol., 2020

Multi-Authority Ciphertext-Policy Attribute Based Encryption With Accountability.
CoRR, 2020

Identity-based encryption with authorized equivalence test for cloud-assisted IoT.
Clust. Comput., 2020

2019
Flexible, Efficient, and Secure Access Delegation in Cloud Computing.
ACM Trans. Manag. Inf. Syst., 2019

Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing.
IEEE Syst. J., 2019

Public Key Encryption with Equality Test for Heterogeneous Systems in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2019

A New Provably Secure Certificateless Signature with Revocation in the Standard Model.
Informatica, 2019

Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing.
Future Gener. Comput. Syst., 2019

A Survey of Group Key Agreement Protocols with Constant Rounds.
ACM Comput. Surv., 2019

Laocoön: Scalable and Portable Receipt-free E-voting Protocol without Untappable Channels.
CoRR, 2019

An efficient and revocable storage CP-ABE scheme in the cloud computing.
Computing, 2019

Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles.
IEEE Access, 2019

Lightweight Attribute-Based Keyword Search with Policy Protection for Cloud-Assisted IoT.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

2018
Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario.
Secur. Commun. Networks, 2018

Comments on "A secure anti-collusion data sharing scheme for dynamic groups in the cloud".
Inf. Process. Lett., 2018

Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority CP-ABE Scheme with Dual-Revocation.
Int. J. Netw. Secur., 2018

Ciphertext-Policy Attribute-Based Encryption With Delegated Equality Test in Cloud Computing.
IEEE Access, 2018

Attribute-Hiding Predicate Encryption With Equality Test in Cloud Computing.
IEEE Access, 2018

Ciphertext-Policy Attribute-Based Signcryption With Verifiable Outsourced Designcryption for Sharing Personal Health Records.
IEEE Access, 2018

2017
Comments on "Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing".
IEEE Trans. Dependable Secur. Comput., 2017

Flexible and Lightweight Access Control for Online Healthcare Social Networks in the Context of the Internet of Things.
Mob. Inf. Syst., 2017

Comments on "Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation".
Inf. Process. Lett., 2017

Attribute-based Encryption with Non-Monotonic Access Structures Supporting Fine-Grained Attribute Revocation in M-healthcare.
Int. J. Netw. Secur., 2017

A Key-insulated Proxy Re-encryption Scheme for Data Sharing in a Cloud Environment.
Int. J. Netw. Secur., 2017

An Efficient and Provably Secure Certificateless Key Insulated Encryption with Applications to Mobile Internet.
Int. J. Netw. Secur., 2017

Revocable ABE with Bounded Ciphertext in Cloud Computing.
Int. J. Netw. Secur., 2017

A Certificateless Strong Designated Verifier Signature Scheme with Non-delegatability.
Int. J. Netw. Secur., 2017

Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme.
Int. J. Netw. Secur., 2017

A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing.
Comput. Stand. Interfaces, 2017

Enabling Telecare Medical Information Systems With Strong Authentication and Anonymity.
IEEE Access, 2017

2016
Fuzzy certificateless signature.
Secur. Commun. Networks, 2016

A noise immunity controlled quantum teleportation protocol.
Quantum Inf. Process., 2016

A Robust and Anonymous Two Factor Authentication and Key Agreement Protocol for Telecare Medicine Information Systems.
J. Medical Syst., 2016

On the security of two identity-based signature schemes based on pairings.
Inf. Process. Lett., 2016

Secure mobile agent-based English auction protocol using identity-based signature scheme.
Int. J. Secur. Networks, 2016

An ElGamal Encryption with Fuzzy Keyword Search on Cloud Environment.
Int. J. Netw. Secur., 2016

Anonymous Pairing-Free and Certificateless Key Exchange Protocol for DRM System.
Int. J. Netw. Secur., 2016

Certificateless Key Insulated Encryption: Cryptographic Primitive for Achieving Key-escrow free and Key-exposure Resilience.
IACR Cryptol. ePrint Arch., 2016

Measuring Trust in Online Social Networks.
Proceedings of the Artificial Intelligence Research and Development, 2016

2015
Compact Leakage-Free ID-Based Signature Scheme with Applications to Secret Handshakes.
Wirel. Pers. Commun., 2015

Characterization of Complex Networks for Epidemics Modeling.
Wirel. Pers. Commun., 2015

Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks.
IEEE Trans. Inf. Forensics Secur., 2015

A Pairing-free Key-insulated Certificate-based Signature Scheme with Provable Security.
KSII Trans. Internet Inf. Syst., 2015

Analysis and Improvement of Patient Self-controllable Multi-level Privacy-preserving Cooperative Authentication Scheme.
Int. J. Netw. Secur., 2015

Cryptanalysis of Attribute-based Ring Signcryption Scheme.
Int. J. Netw. Secur., 2015

On the Security of a Provably Secure Certificate Based Ring Signature Without Pairing.
Int. J. Netw. Secur., 2015

Strongly secure certificateless key-insulated signature secure in the standard model.
Ann. des Télécommunications, 2015

Cubic Unbalance Oil and Vinegar Signature Scheme.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

Strongly Secure and Cost-Effective Certificateless Proxy Re-encryption Scheme for Data Sharing in Cloud Computing.
Proceedings of the Big Data Computing and Communications - First International Conference, 2015

2014
Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model.
Wirel. Pers. Commun., 2014

On the Security of an Efficient and Non-interactive Hierarchical Key Agreement Protocol.
Wirel. Pers. Commun., 2014

Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol.
IEEE Trans. Inf. Forensics Secur., 2014

Certificate-free ad hoc anonymous authentication.
Inf. Sci., 2014

Privacy-enhanced Designated Confirmer Signature without Random Oracles.
Int. J. Netw. Secur., 2014

A Provably Secure Certificate Based Ring Signature Without Pairing.
Int. J. Netw. Secur., 2014

Simultaneous community discovery and user interests extraction in social network based on probabilistic model.
Int. J. Intell. Inf. Database Syst., 2014

Toward Certificateless Signcryption Scheme Without Random Oracles.
IACR Cryptol. ePrint Arch., 2014

Analysis and improvement of a provable secure fuzzy identity-based signature scheme.
Sci. China Inf. Sci., 2014

2013
New identity-based three-party authenticated key agreement protocol with provable security.
J. Netw. Comput. Appl., 2013

Certificateless threshold signature secure in the standard model.
Inf. Sci., 2013

An efficient certificateless aggregate signature with constant pairing computations.
Inf. Sci., 2013

Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys.
Inf. Sci., 2013

Broadcast revocation scheme in composite-order bilinear group and its application to attribute-based encryption.
Int. J. Secur. Networks, 2013

Security Flaw of an ECC-based Signcryption Scheme with Anonymity.
Int. J. Netw. Secur., 2013

An Expressive Decentralizing KP-ABE Scheme with Constant-Size Ciphertext.
Int. J. Netw. Secur., 2013

Efficient communication scheme with confidentiality and privacy for vehicular networks.
Comput. Electr. Eng., 2013

2012
Efficient privacy-preserving authentication protocol for vehicular communications with trustworthy.
Secur. Commun. Networks, 2012

Provably secure and efficient certificateless authenticated tripartite key agreement protocol.
Math. Comput. Model., 2012

Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications.
Int. J. Netw. Secur., 2012

Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme.
IET Inf. Secur., 2012

Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Bidder-anonymous English auction protocol based on revocable ring signature.
Expert Syst. Appl., 2012

Efficient and multi-level privacy-preserving communication protocol for VANET.
Comput. Electr. Eng., 2012

Efficient Revocable Key-Policy Attribute Based Encryption with Full Security.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2011
A Certificateless Proxy Ring Signature Scheme with Provable Security.
Int. J. Netw. Secur., 2011

Efficient three-party authenticated key agreement protocol in certificateless cryptography.
Int. J. Comput. Math., 2011

Cryptanalysis of an Identity Based Signcryption without Random Oracles.
Fundam. Informaticae, 2011

On the security of an identity based multi-proxy signature scheme.
Comput. Electr. Eng., 2011

Toward Pairing-Free Certificateless Authenticated Key Exchanges.
Proceedings of the Information Security, 14th International Conference, 2011

Mobile Browser as a Second Factor for Web Authentication.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011

Strong Security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

A traceable privacy-preserving authentication protocol for VANETs based on proxy re-signature.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

A Traceable Certificateless Threshold Proxy Signature Scheme from Bilinear Pairings.
Proceedings of the Web Technologies and Applications - 13th Asia-Pacific Web Conference, 2011

Need for Symmetry: Addressing Privacy Risks in Online Social Networks.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography.
Informatica, 2010

Identity-based Threshold Signature Secure in the Standard Model.
Int. J. Netw. Secur., 2010

Privacy-Preserving English Auction Protocol with Round Efficiency
CoRR, 2010

Efficient Privacy-Preserving Authentication Protocol for Vehicular Communications with Trustworthy
CoRR, 2010

Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communication.
Proceedings of IEEE International Conference on Communications, 2010

A Hybrid Movie Recommender Based on Ontology and Neural Networks.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

2009
An Anonymous Sealed-bid Electronic Auction Based on Ring Signature.
Int. J. Netw. Secur., 2009

Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications
CoRR, 2009

DCSMS: A Mobicast-Based Dynamic Clustering Secure Mobile Multicast Scheme for Large-Scale Sensornets.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

2008
An Improved Certificateless Signature Scheme Secure in the Standard Model.
Fundam. Informaticae, 2008

Simulatability and Security of Certificateless Threshold Signatures without Random Oracles.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
First results of GNSS-R coastal experiment in China.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2007


  Loading...