Jiguo Li
Orcid: 0000-0002-6532-2081Affiliations:
- Fujian Normal University, College of Mathematics and Informatics, Fuzhou, China
- Hohai University, College of Computer and Information, Nanjing, China
- Harbin Institute of Technology, China (PhD)
According to our database1,
Jiguo Li
authored at least 141 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Internet Things J., December, 2024
Fine-Grained and Sanitizable Access Control Service for IoT-Based Digital Subscriptions.
IEEE Internet Things J., October, 2024
Lightweight Searchable and Equality-Testable Certificateless Authenticated Encryption for Encrypted Cloud Data.
IEEE Trans. Mob. Comput., August, 2024
IEEE Internet Things J., March, 2024
IEEE Trans. Inf. Forensics Secur., 2024
PAESS: Public-Key Authentication Encryption With Similar Data Search for Pay-Per-Query.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
2023
Toward Forward and Backward Private Dynamic Searchable Symmetric Encryption Supporting Data Deduplication and Conjunctive Queries.
IEEE Internet Things J., October, 2023
TFS-ABS: Traceable and Forward-Secure Attribute-Based Signature Scheme With Constant-Size.
IEEE Trans. Knowl. Data Eng., September, 2023
Revocable Blockchain-Aided Attribute-Based Encryption With Escrow-Free in Cloud Storage.
IEEE Trans. Computers, July, 2023
IEEE Syst. J., June, 2023
Efficient Hierarchical Signature Scheme With Batch Verification Function Suitable for ADS-B System.
IEEE Trans. Aerosp. Electron. Syst., April, 2023
Privacy-Preserving and Forward Public Key Encryption With Field-Free Multi-Keyword Search for Cloud Encrypted Data.
IEEE Trans. Cloud Comput., 2023
2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
Lightweight Public Key Authenticated Encryption With Keyword Search Against Adaptively-Chosen-Targets Adversaries for Mobile Devices.
IEEE Trans. Mob. Comput., 2022
Lightweight Public/Private Auditing Scheme for Resource-Constrained End Devices in Cloud Storage.
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Computers, 2022
Toward Secure and Privacy-Preserving Cloud Data Sharing: Online/Offline Multiauthority CP-ABE With Hidden Policy.
IEEE Syst. J., 2022
Secur. Commun. Networks, 2022
IEEE Internet Things J., 2022
2021
Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks.
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Serv. Comput., 2021
Pairing-Free Certificate-Based Searchable Encryption Supporting Privacy-Preserving Keyword Search Function for IIoTs.
IEEE Trans. Ind. Informatics, 2021
Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing.
IEEE Trans. Emerg. Top. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Syst. J., 2021
Comput. Stand. Interfaces, 2021
Proceedings of the Cyberspace Safety and Security - 13th International Symposium, 2021
2020
Cryptanalysis and Improvement of Batch Verification Certificateless Signature Scheme for VANETs.
Wirel. Pers. Commun., 2020
IEEE Trans. Serv. Comput., 2020
IEEE Trans. Emerg. Top. Comput., 2020
IEEE Trans. Broadcast., 2020
A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation.
Soft Comput., 2020
Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext.
Soft Comput., 2020
IEEE Syst. J., 2020
Secur. Commun. Networks, 2020
Adaptively secure certificate-based broadcast encryption and its application to cloud storage service.
Inf. Sci., 2020
Privacy-Preserving and Pairing-Free Multirecipient Certificateless Encryption With Keyword Search for Cloud-Assisted IIoT.
IEEE Internet Things J., 2020
Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage.
IEEE Access, 2020
Expressive Public-Key Encryption With Keyword Search: Generic Construction From KP-ABE and an Efficient Scheme Over Prime-Order Groups.
IEEE Access, 2020
2019
Hybrid Keyword-Field Search With Efficient Key Management for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2019
Frontiers Inf. Technol. Electron. Eng., 2019
A Forward-Secure Certificate-Based Signature Scheme with Enhanced Security in the Standard Model.
KSII Trans. Internet Inf. Syst., 2019
Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service.
KSII Trans. Internet Inf. Syst., 2019
Keyword guessing attacks on a public key encryption with keyword search scheme without random oracle and its improvement.
Inf. Sci., 2019
Inf. Sci., 2019
Inf. Sci., 2019
Constructing designated server public key encryption with keyword search schemes withstanding keyword guessing attacks.
Int. J. Commun. Syst., 2019
Int. Arab J. Inf. Technol., 2019
Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems.
Clust. Comput., 2019
IEEE Access, 2019
Constant Size Ciphertext Distributed CP-ABE Scheme With Privacy Protection and Fully Hiding Access Structure.
IEEE Access, 2019
SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search.
IEEE Access, 2019
IEEE Access, 2019
2018
Theor. Comput. Sci., 2018
Soft Comput., 2018
User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage.
IEEE Syst. J., 2018
Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key.
Secur. Commun. Networks, 2018
Improving Security and Privacy-Preserving in Multi-Authorities Ciphertext-Policy Attribute-Based Encryption.
KSII Trans. Internet Inf. Syst., 2018
On Security of a Secure Channel Free Public Key Encryption with Conjunctive Field Keyword Search Scheme.
Inf. Technol. Control., 2018
Inf. Sci., 2018
Inf. Sci., 2018
Fundam. Informaticae, 2018
2017
IEEE Trans. Serv. Comput., 2017
KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage.
IEEE Trans. Serv. Comput., 2017
IEEE Trans. Inf. Forensics Secur., 2017
Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length.
Secur. Commun. Networks, 2017
New Construction of Short Certificate-Based Signature against Existential Forgery Attacks.
KSII Trans. Internet Inf. Syst., 2017
An Efficient Certificate-Based Authenticated Key Agreement Protocol without Bilinear Pairing.
Inf. Technol. Control., 2017
Outsourced data modification algorithm with assistance of multi-assistants in cloud computing.
Int. J. Sens. Networks, 2017
Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage.
Int. J. Commun. Syst., 2017
Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model.
Comput. J., 2017
Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model.
Adv. Math. Commun., 2017
Efficient designated server identity-based encryption with conjunctive keyword search.
Ann. des Télécommunications, 2017
IEEE Access, 2017
2016
Theor. Comput. Sci., 2016
Secur. Commun. Networks, 2016
Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
J. Inf. Sci. Eng., 2016
KSII Trans. Internet Inf. Syst., 2016
Comment on a certificateless one-pass and two-party authenticated key agreement protocol.
Inf. Sci., 2016
A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model.
Inf. Sci., 2016
Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption.
Inf. Sci., 2016
IET Inf. Secur., 2016
Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks.
IACR Cryptol. ePrint Arch., 2016
A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds.
Future Gener. Comput. Syst., 2016
Comput. Informatics, 2016
2015
计算机科学, 2015
Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation.
Int. J. Inf. Sec., 2015
Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction.
IACR Cryptol. ePrint Arch., 2015
An improved certificateless strong key-insulated signature scheme in the standard model.
Adv. Math. Commun., 2015
Proceedings of the Computing and Combinatorics - 21st International Conference, 2015
2014
Efficient Certificate-Based Encryption Scheme Secure Against Key Replacement Attacks in the Standard Model.
J. Inf. Sci. Eng., 2014
KSII Trans. Internet Inf. Syst., 2014
Int. J. Internet Protoc. Technol., 2014
Concurr. Comput. Pract. Exp., 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
2013
J. Commun. Networks, 2013
KSII Trans. Internet Inf. Syst., 2013
KSII Trans. Internet Inf. Syst., 2013
Int. J. Comput. Math., 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure.
Proceedings of the Information and Communications Security - 15th International Conference, 2013
2012
Comput. Math. Appl., 2012
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
2011
On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption.
J. Inf. Sci. Eng., 2011
IACR Cryptol. ePrint Arch., 2011
2010
J. Networks, 2010
J. Comput. Secur., 2010
2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
J. Commun. Networks, 2008
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the Third ChinaGrid Annual Conference, ChinaGrid 2008, Dunhuang, Gansu, 2008
2007
Proceedings of the Public Key Infrastructure, 2007
2006
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
2004
Proceedings of the 3rd International Conference on Information Security, 2004
2003