Huaxiong Wang
Orcid: 0000-0002-7669-8922
According to our database1,
Huaxiong Wang
authored at least 291 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Efficient Key-Aggregate Cryptosystem With User Revocation for Selective Group Data Sharing in Cloud Storage.
IEEE Trans. Knowl. Data Eng., November, 2024
Explicit Low-Bandwidth Evaluation Schemes for Weighted Sums of Reed-Solomon-Coded Symbols.
IEEE Trans. Inf. Theory, August, 2024
J. Cryptogr. Eng., June, 2024
An Efficient FHE-Enabled Secure Cloud-Edge Computing Architecture for IoMT Data Protection With its Application to Pandemic Modeling.
IEEE Internet Things J., May, 2024
Comput. Stand. Interfaces, March, 2024
DeepDIST: A Black-Box Anti-Collusion Framework for Secure Distribution of Deep Models.
IEEE Trans. Circuits Syst. Video Technol., January, 2024
Querying Twice to Achieve Information-Theoretic Verifiability in Private Information Retrieval.
IEEE Trans. Inf. Forensics Secur., 2024
Enabling Threshold Functionality for Private Set Intersection Protocols in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2024
REKS: Role-Based Encrypted Keyword Search With Enhanced Access Control for Outsourced Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Theor. Comput. Sci., 2024
Constant-Size Unbounded Multi-Hop Fully Homomorphic Proxy Re-Encryption from Lattices.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
PSA: Private Set Alignment for Secure and Collaborative Analytics on Large-Scale Data.
CoRR, 2024
Proceedings of the Information Security - 27th International Conference, 2024
UPDATE: Mining User-News Engagement Patterns for Dual-Target Cross-Domain Fake News Detection.
Proceedings of the 11th IEEE International Conference on Data Science and Advanced Analytics, 2024
Two-Server Verifiable Federated Learning: Unconditional Security and Practical Efficiency.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
Comput. J., December, 2023
J. Inf. Secur. Appl., September, 2023
IEEE Trans. Inf. Theory, August, 2023
Multi-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrapping.
Theor. Comput. Sci., August, 2023
Engineering Practical Rank-Code-Based Cryptographic Schemes on Embedded Hardware. A Case Study on ROLLO.
IEEE Trans. Computers, July, 2023
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors.
J. Cryptol., July, 2023
J. Syst. Sci. Complex., February, 2023
BIB-MKS: Post-Quantum Secure Biometric Identity-Based Multi-Keyword Search Over Encrypted Data in Cloud Storage Systems.
IEEE Trans. Serv. Comput., 2023
An Accessional Signature Scheme With Unmalleable Transaction Implementation to Securely Redeem Cryptocurrencies.
IEEE Trans. Inf. Forensics Secur., 2023
Space-Efficient Storage Structure of Blockchain Transactions Supporting Secure Verification.
IEEE Trans. Cloud Comput., 2023
KA: Keyword-based auditing with frequency hiding and retrieval reliability for smart government.
J. Syst. Archit., 2023
IACR Cryptol. ePrint Arch., 2023
Fully Homomorphic Encryption-Based Protocols for Enhanced Private Set Intersection Functionalities.
IACR Cryptol. ePrint Arch., 2023
Des. Codes Cryptogr., 2023
Proceedings of the IEEE International Symposium on Information Theory, 2023
k-server Byzantine-Resistant PIR Scheme with Optimal Download Rate and Optimal File Size.
Proceedings of the IEEE International Symposium on Information Theory, 2023
Two-Server Private Information Retrieval with Optimized Download Rate and Result Verification.
Proceedings of the IEEE International Symposium on Information Theory, 2023
2022
DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Inf. Theory, 2022
IEEE Trans. Dependable Secur. Comput., 2022
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2022
Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key.
IEEE Trans. Dependable Secur. Comput., 2022
SecureAD: A Secure Video Anomaly Detection Framework on Convolutional Neural Network in Edge Computing Environment.
IEEE Trans. Cloud Comput., 2022
Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems.
J. Syst. Archit., 2022
Inf. Sci., 2022
IEEE Internet Things J., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Byzantine-Robust Private Information Retrieval with Low Communication and Efficient Decoding.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2021
Efficient Private Comparison Queries Over Encrypted Databases Using Fully Homomorphic Encryption With Finite Fields.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Theor. Comput. Sci., 2021
CIPPPA: Conditional Identity Privacy-Preserving Public Auditing for Cloud-Based WBANs Against Malicious Auditors.
IEEE Trans. Cloud Comput., 2021
Key-Leakage Resilient Encrypted Data Aggregation With Lightweight Verification in Fog-Assisted Smart Grids.
IEEE Internet Things J., 2021
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy.
IACR Cryptol. ePrint Arch., 2021
Volume-Hiding Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy.
IACR Cryptol. ePrint Arch., 2021
Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation.
CoRR, 2021
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021
2020
IEEE Trans. Inf. Theory, 2020
Theor. Comput. Sci., 2020
Compact Code-Based Signature for Reconfigurable Devices With Side Channel Resilience.
IEEE Trans. Circuits Syst. I Regul. Pap., 2020
Verifiable inner product computation on outsourced database for authenticated multi-user data sharing.
Inf. Sci., 2020
A new secret handshake scheme with multi-symptom intersection for mobile healthcare social networks.
Inf. Sci., 2020
Insecurity of the Public Key Encryption with Filtered Equality Test Proposed by Huang et al.
IACR Cryptol. ePrint Arch., 2020
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model.
IACR Cryptol. ePrint Arch., 2020
Intersection-policy private mutual authentication from authorized private set intersection.
Sci. China Inf. Sci., 2020
IEEE Access, 2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Proceedings of the 1st Conference on Information-Theoretic Cryptography, 2020
An Analysis of Blockchain Consistency in Asynchronous Networks: Deriving a Neat Bound.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
Theor. Comput. Sci., 2019
Lattice-based group signatures: Achieving full dynamicity (and deniability) with ease.
Theor. Comput. Sci., 2019
Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption.
Theor. Comput. Sci., 2019
Fully homomorphic encryption over the integers for non-binary plaintexts without the sparse subset sum problem.
Theor. Comput. Sci., 2019
Identity-based key-exposure resilient cloud storage public auditing scheme from lattices.
Inf. Sci., 2019
Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage.
Inf. Sci., 2019
Public key encryption with equality test from generic assumptions in the random oracle model.
Inf. Sci., 2019
Int. J. Found. Comput. Sci., 2019
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Future Gener. Comput. Syst., 2019
Des. Codes Cryptogr., 2019
Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation.
Comput. J., 2019
Further improvement of factoring N = p<sup>r</sup> q<sup>s</sup> with partial known bits.
Adv. Math. Commun., 2019
Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
Proceedings of the 2019 IEEE Information Theory Workshop, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
Optimized Polynomial Multiplier Over Commutative Rings on FPGAs: A Case Study on BIKE.
Proceedings of the International Conference on Field-Programmable Technology, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
2018
IEEE Trans. Dependable Secur. Comput., 2018
Theor. Comput. Sci., 2018
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017.
IACR Cryptol. ePrint Arch., 2018
The cycle structure of LFSR with arbitrary characteristic polynomial over finite fields.
Cryptogr. Commun., 2018
Cryptogr. Commun., 2018
2017
Sensors, 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
CoRR, 2017
IEEE Access, 2017
Proceedings of the Provable Security, 2017
2016
Theor. Comput. Sci., 2016
Semi-generic construction of public key encryption and identity-based encryption with equality test.
Inf. Sci., 2016
IACR Cryptol. ePrint Arch., 2016
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions.
IACR Cryptol. ePrint Arch., 2016
CCA2 Attack and Modification of Huang <i>et al</i>.'s Public Key Encryption with Authorized Equality Test.
Comput. J., 2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
2015
Inf. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Concurr. Comput. Pract. Exp., 2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
2014
Math. Comput., 2014
J. Inf. Hiding Multim. Signal Process., 2014
IACR Cryptol. ePrint Arch., 2014
Des. Codes Cryptogr., 2014
The relation and transformation between hierarchical inner product encryption and spatial encryption.
Des. Codes Cryptogr., 2014
Des. Codes Cryptogr., 2014
Cryptogr. Commun., 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
2013
IEEE Trans. Parallel Distributed Syst., 2013
IEEE Trans. Inf. Theory, 2013
IACR Cryptol. ePrint Arch., 2013
Cryptogr. Commun., 2013
Comput. Complex., 2013
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
J. Cryptol., 2012
J. Math. Cryptol., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable Zero-Knowledge Proofs.
IACR Cryptol. ePrint Arch., 2012
CoRR, 2012
Proceedings of the Provable Security - 6th International Conference, 2012
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
An Efficient and Information Theoretically Secure Rational Secret Sharing Scheme Based on Symmetric bivariate polynomials.
Int. J. Found. Comput. Sci., 2011
Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions.
Int. J. Comput. Math., 2011
An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem (Revised Version).
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
Proceedings of the Computing and Combinatorics - 17th Annual International Conference, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
Decomposition Construction for Secret Sharing Schemes with Graph Access Structures in Polynomial Time.
SIAM J. Discret. Math., 2010
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Topics in Cryptology, 2010
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
Secure Coprocessor-based Private Information Retrieval without Periodical Preprocessing.
Proceedings of the 8th Australasian Information Security Conference 2010, 2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
Int. J. Appl. Cryptogr., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Certified Pseudonyms Colligated with Master Secret Key.
Proceedings of the SECRYPT 2009, 2009
Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes.
Proceedings of the Cryptography and Coding, 2009
Proceedings of the Information, Security and Cryptology, 2009
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
2008
J. Comput. Syst. Sci., 2008
Int. J. Inf. Sec., 2008
IET Inf. Secur., 2008
IACR Cryptol. ePrint Arch., 2008
Finite Fields Their Appl., 2008
J. Res. Pract. Inf. Technol., 2008
An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data.
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008
A Fair e-Tendering Protocol.
Proceedings of the SECRYPT 2008, 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the Information Security Practice and Experience, 2008
Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
Proceedings of the Sixth Australasian Information Security Conference, 2008
Proceedings of the Advances in Cryptology, 2008
Improvement of a Dynamic Accumulator at ICICS 07 and Its Application in Multi-user Keyword-Based Retrieval on Encrypted Data.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
IEEE Trans. Inf. Theory, 2007
Int. J. Secur. Networks, 2007
Adv. Math. Commun., 2007
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels.
Proceedings of the Provable Security, 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature.
Proceedings of the Topics in Cryptology, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Int. J. Found. Comput. Sci., 2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Finite Fields Their Appl., 2006
Proceedings of the Public Key Cryptography, 2006
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the Information Security, 9th International Conference, 2006
Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006
2005
Des. Codes Cryptogr., 2005
Proceedings of the Internet and Network Economics, First International Workshop, 2005
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005
Proceedings of the Public Key Cryptography, 2005
Proceedings of the Computing and Combinatorics, 11th Annual International Conference, 2005
2004
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004
2003
Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures.
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003
Proceedings of the Topics in Cryptology, 2003
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
2002
Int. J. Comput. Math., 2002
Proceedings of the Security in Communication Networks, Third International Conference, 2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the Financial Cryptography, 6th International Conference, 2002
Proceedings of the Computing and Combinatorics, 8th Annual International Conference, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
J. Inf. Sci. Eng., 2001
Explicit Constructions of Perfect Hash Families from Algebraic Curves over Finite Fields.
J. Comb. Theory A, 2001
A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances.
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
IEEE Trans. Inf. Theory, 2000
Proceedings of the Progress in Cryptology, 2000
Proceedings of the CCS 2000, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
Inf. Comput., 1999
Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures.
Comput. J., 1999
Changing Thresholds in the Absence of Secure Channels.
Aust. Comput. J., 1999
Proceedings of the IEEE International Conference on Networks 1999, 1999
Proceedings of the Information Security and Cryptology, 1999
1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
Proceedings of the Advances in Cryptology, 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998