Huaqun Wang

Orcid: 0000-0001-7254-6465

According to our database1, Huaqun Wang authored at least 132 papers between 2007 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Conditional privacy-preserving spectrum trading scheme based on traceable ring signature for DSS system.
J. Supercomput., January, 2025

2024
BAP: A Blockchain-Assisted Privacy-Preserving Authentication Protocol With User-Controlled Data Linkability for VANETs.
IEEE Trans. Intell. Veh., February, 2024

ATRC: An Anonymous Traceable and Revocable Credential System Using Blockchain for VANETs.
IEEE Trans. Veh. Technol., 2024

PUL-ABE: An Efficient and Quantum-Resistant CP-ABE With Policy Update in Cloud Storage.
IEEE Trans. Serv. Comput., 2024

Synchronous Blockchain-Based Distributed Provable Data Possession With Forward-Security.
IEEE Trans. Serv. Comput., 2024

Division of Regulatory Power: Collaborative Regulation for Privacy-Preserving Blockchains.
IEEE Trans. Inf. Forensics Secur., 2024

Puncturable Attribute-Based Encryption From Lattices for Classified Document Sharing.
IEEE Trans. Inf. Forensics Secur., 2024

Outsourced Privately Verifiable Proofs of Retrievability via Blockchain.
IEEE Trans. Dependable Secur. Comput., 2024

Pay-Per-Proof: Decentralized Outsourced Multi-User PoR for Cloud Storage Payment Using Blockchain.
IEEE Trans. Cloud Comput., 2024

A Succinct Range Proof for Polynomial-based Vector Commitment.
IACR Cryptol. ePrint Arch., 2024

2023
Fault-tolerant unicast using conditional local safe model in the data center network BCube.
J. Parallel Distributed Comput., November, 2023

An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks.
IEEE Trans. Intell. Veh., April, 2023

Privacy-Preserving Classification in Multiple Clouds eHealthcare.
IEEE Trans. Serv. Comput., 2023

Blockchain-Backed Searchable Proxy Signcryption for Cloud Personal Health Records.
IEEE Trans. Serv. Comput., 2023

Designated-Verifier Aggregate Signature Scheme With Sensitive Data Privacy Protection for Permissioned Blockchain-Assisted IIoT.
IEEE Trans. Inf. Forensics Secur., 2023

A Group Signature Scheme With Selective Linkability and Traceability for Blockchain-Based Data Sharing Systems in E-Health Services.
IEEE Internet Things J., 2023

2022
A Keyword-Grouping Inverted Index Based Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data.
IEEE Trans. Sustain. Comput., 2022

FASE: A Fast and Accurate Privacy-Preserving Multi-Keyword Top-k Retrieval Scheme Over Encrypted Cloud Data.
IEEE Trans. Serv. Comput., 2022

O³HSC: Outsourced Online/Offline Hybrid Signcryption for Wireless Body Area Networks.
IEEE Trans. Netw. Serv. Manag., 2022

VFL: A Verifiable Federated Learning With Privacy-Preserving for Big Data in Industrial IoT.
IEEE Trans. Ind. Informatics, 2022

Synchronized Provable Data Possession Based on Blockchain for Digital Twin.
IEEE Trans. Inf. Forensics Secur., 2022

Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics.
IEEE Trans. Dependable Secur. Comput., 2022

Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2022

NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users.
IEEE Trans. Big Data, 2022

The Security of Blockchain-Based Medical Systems: Research Challenges and Opportunities.
IEEE Syst. J., 2022

A Secure and Efficient Multiserver Authentication and Key Agreement Protocol for Internet of Vehicles.
IEEE Internet Things J., 2022

An Efficient Privacy-Preserving Aggregation Scheme for Multidimensional Data in IoT.
IEEE Internet Things J., 2022

Secure, Efficient, and Weighted Access Control for Cloud-Assisted Industrial IoT.
IEEE Internet Things J., 2022

Blockchain-Based Privacy-Preserving and Rewarding Private Data Sharing for IoT.
IEEE Internet Things J., 2022

Decentralized Attribute-Based Server-Aid Signature in the Internet of Things.
IEEE Internet Things J., 2022

A Blockchain-Assisted Privacy-Aware Authentication Scheme for Internet of Medical Things.
IEEE Internet Things J., 2022

Enabling Privacy-Preserving Parallel Outsourcing Matrix Inversion in IoT.
IEEE Internet Things J., 2022

Towards fully verifiable forward secure privacy preserving keyword search for IoT outsourced data.
Future Gener. Comput. Syst., 2022

An efficient blockchain-based batch verification scheme for vehicular ad hoc networks.
Trans. Emerg. Telecommun. Technol., 2022

Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges.
ACM Comput. Surv., 2022

2021
Provable Data Possession with Outsourced Data Transfer.
IEEE Trans. Serv. Comput., 2021

A Blockchain-Based Proxy Re-Encryption With Equality Test for Vehicular Communication Systems.
IEEE Trans. Netw. Sci. Eng., 2021

Fuzzy-Based Trustworthiness Evaluation Scheme for Privilege Management in Vehicular Ad Hoc Networks.
IEEE Trans. Fuzzy Syst., 2021

Blockchain-Based Private Provable Data Possession.
IEEE Trans. Dependable Secur. Comput., 2021

Blockchain-Based Secure Communication for Space Information Networks.
IEEE Netw., 2021

RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks.
J. Parallel Distributed Comput., 2021

Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system.
Inf. Sci., 2021

An efficient identity-based signature scheme with provable security.
Inf. Sci., 2021

Blockchain-based multi-party proof of assets with privacy preservation.
Inf. Sci., 2021

Application-Oriented Block Generation for Consortium Blockchain-Based IoT Systems With Dynamic Device Management.
IEEE Internet Things J., 2021

An Efficient and Privacy-Preserving Outsourced Support Vector Machine Training for Internet of Medical Things.
IEEE Internet Things J., 2021

Permissioned Blockchain-Based Anonymous and Traceable Aggregate Signature Scheme for Industrial Internet of Things.
IEEE Internet Things J., 2021

Toward Verifiable Phrase Search Over Encrypted Cloud-Based IoT Data.
IEEE Internet Things J., 2021

An efficient resource sharing scheme based on the linear feedback shift register.
Int. J. Sens. Networks, 2021

ABKS-SKGA: Attribute-based keyword search secure against keyword guessing attack.
Comput. Stand. Interfaces, 2021

Fully Discover the Balance of Lightning Network Payment Channels.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

2020
A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020

VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud.
IEEE Trans. Serv. Comput., 2020

SecureNLP: A System for Multi-Party Privacy-Preserving Natural Language Processing.
IEEE Trans. Inf. Forensics Secur., 2020

Blockchain-Based Anonymous Reporting Scheme With Anonymous Rewarding.
IEEE Trans. Engineering Management, 2020

Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain.
IEEE Trans. Dependable Secur. Comput., 2020

White-Box Implementation of Shamir's Identity-Based Signature Scheme.
IEEE Syst. J., 2020

RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection.
J. Netw. Comput. Appl., 2020

A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems.
J. Inf. Secur. Appl., 2020

Privacy-Preserving Federated Learning in Fog Computing.
IEEE Internet Things J., 2020

Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things.
IEEE Internet Things J., 2020

Privacy-Preserving and Distributed Algorithms for Modular Exponentiation in IoT With Edge Computing Assistance.
IEEE Internet Things J., 2020

Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography.
IET Inf. Secur., 2020

Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography.
Future Gener. Comput. Syst., 2020

VFL: A Verifiable Federated Learning with Privacy-Preserving for Big Data in Industrial IoT.
CoRR, 2020

Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage.
IEEE Access, 2020

A Privacy-Preserving and Verifiable Federated Learning Scheme.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Proxy Re-Encryption Scheme For Complicated Access Control Factors Description in Hybrid Cloud.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession.
IEEE Trans. Serv. Comput., 2019

A Distributed Access Control with Outsourced Computation in Fog Computing.
Secur. Commun. Networks, 2019

抗内部关键词猜测攻击的高效公钥可搜索加密方案 (Efficient Public-key Searchable Encryption Scheme Against Inside Keyword Guessing Attack).
计算机科学, 2019

Privacy-preserving incentive and rewarding scheme for crowd computing in social media.
Inf. Sci., 2019

BBARS: Blockchain-Based Anonymous Rewarding Scheme for V2G Networks.
IEEE Internet Things J., 2019

An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks.
IEEE Internet Things J., 2019

Fine-grained multi-authority access control in IoT-enabled mHealth.
Ann. des Télécommunications, 2019

Cloud-Assisted EHR Sharing With Security and Privacy Preservation via Consortium Blockchain.
IEEE Access, 2019

2018
An Anonymous Multireceiver with Online/Offline Identity-Based Encryption.
Wirel. Commun. Mob. Comput., 2018

Security and Privacy Challenges for Internet-of-Things and Fog Computing.
Wirel. Commun. Mob. Comput., 2018

Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems.
IEEE Trans. Ind. Informatics, 2018

A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network.
IEEE Trans. Dependable Secur. Comput., 2018

A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing.
Secur. Commun. Networks, 2018

Anonymous and secure aggregation scheme in fog-based public cloud computing.
Future Gener. Comput. Syst., 2018

PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds.
Future Gener. Comput. Syst., 2018

Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment.
Future Gener. Comput. Syst., 2018

Identity-based non-repudiable dynamic provable data possession in cloud storage.
Comput. Electr. Eng., 2018

Anonymous Data Sharing Scheme in Public Cloud and Its Application in E-Health Record.
IEEE Access, 2018

2017
Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography.
Wirel. Commun. Mob. Comput., 2017

Strong Key-Exposure Resilient Auditing for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2017

Optimized Charging Scheduling with Single Mobile Charger for Wireless Rechargeable Sensor Networks.
Symmetry, 2017

Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices.
Soft Comput., 2017

Large Branching Tree Based Dynamic Provable Data Possession Scheme.
J. Inf. Sci. Eng., 2017

Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage.
Inf. Sci., 2017

Balanced anonymity and traceability for outsourcing small-scale data linear aggregation in the smart grid.
IET Inf. Secur., 2017

Identity-based provable data possession revisited: Security analysis and generic construction.
Comput. Stand. Interfaces, 2017

Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography.
Comput. Networks, 2017

Privacy-preserving certificateless provable data possession scheme for big data storage on cloud.
Appl. Math. Comput., 2017

Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems.
IEEE Access, 2017

2016
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud.
IEEE Trans. Inf. Forensics Secur., 2016

A group key-policy attribute-based encryption with partial outsourcing decryption in wireless sensor networks.
Secur. Commun. Networks, 2016

Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography.
IET Commun., 2016

Remote Data Integrity Checking and Sharing in Cloud-Based Health Internet of Things.
IEICE Trans. Inf. Syst., 2016

Efficient Dynamic Provable Data Possession from Dynamic Binary Tree.
Proceedings of the Provable Security, 2016

An Efficient Dynamic Provable Data Possession Scheme in Cloud Storage.
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016

2015
Identity-Based Distributed Provable Data Possession in Multicloud Storage.
IEEE Trans. Serv. Comput., 2015

TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2015

Anonymous multi-receiver remote data retrieval for pay-TV in public clouds.
IET Inf. Secur., 2015

Private Certificate-Based Remote Data Integrity Checking in Public Clouds.
Proceedings of the Computing and Combinatorics - 21st International Conference, 2015

Proxy Provable Data Possession with General Access Structure in Public Clouds.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage.
IEEE Trans. Parallel Distributed Syst., 2014

Signer-admissible strong designated verifier signature from bilinear pairings.
Secur. Commun. Networks, 2014

An anonymous data aggregation scheme for smart grid systems.
Secur. Commun. Networks, 2014

FRR: Fair remote retrieval of outsourced private medical records in electronic health networks.
J. Biomed. Informatics, 2014

Identity-based remote data possession checking in public clouds.
IET Inf. Secur., 2014

Insecurity of 'Improved Anonymous Multi-Receiver Identity-Based Encryption'.
Comput. J., 2014

Authentic and confidential policy distribution in software defined wireless network.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience.
Proceedings of the Information Security Practice and Experience, 2014

Provably Secure Anonymous Multi-receiver Identity-Based Encryption with Shorter Ciphertext.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

2013
Proxy Provable Data Possession in Public Clouds.
IEEE Trans. Serv. Comput., 2013

Simultaneous authentication and secrecy in identity-based data upload to cloud.
Clust. Comput., 2013

2012
On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks.
IEEE Trans. Dependable Secur. Comput., 2012

Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme.
IET Inf. Secur., 2012

Improved one-to-many authentication scheme for access control in pay-TV systems.
IET Inf. Secur., 2012

Analysis and Improvements of Two Identity Based Anonymous Signcryption Schemes for Multiple Receivers.
Proceedings of the 11th IEEE International Conference on Trust, 2012

An Improved Binary Authentication Tree Algorithm for Vehicular Networks.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A New Identity Based Signcryption Scheme in the Standard Model.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
Cryptanalysis of an Efficient Threshold Self-Healing Key Distribution Scheme.
IEEE Trans. Wirel. Commun., 2011

Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme.
IACR Cryptol. ePrint Arch., 2011

Identity-Based Strong Key-Insulated Ring Signature Scheme in the Standard Model.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

2009
Cryptanalysis of a Generalized Ring Signature Scheme.
IEEE Trans. Dependable Secur. Comput., 2009

2008
Cryptanalysis of Two Ring Signcryption Schemes.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Cryptanalysis and Improvement of Shacham-Waters Ring Signature Scheme.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Key management based on elliptic curve Paillier scheme in ad hoc networks.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007


  Loading...