Leyou Zhang
Orcid: 0000-0003-4950-1140
According to our database1,
Leyou Zhang
authored at least 90 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Publicly Accountable Data-Sharing Scheme Supporting Privacy Protection for Fog-Enabled VANETs.
IEEE Trans. Veh. Technol., June, 2024
Blockchain-Aided Anonymous Traceable and Revocable Access Control Scheme With Dynamic Policy Updating for the Cloud IoT.
IEEE Internet Things J., January, 2024
Flexibly expressive and revocable multi-authority KP-ABE scheme from RLWE for Internet of Medical Things.
J. Syst. Archit., 2024
An anonymous and large-universe data-sharing scheme with traceability for medical cloud storage.
J. Syst. Archit., 2024
Enhanced Secure Attribute-Based Dynamic Data Sharing Scheme With Efficient Access Policy Hiding and Policy Updating for IoMT.
IEEE Internet Things J., 2024
IACR Cryptol. ePrint Arch., 2024
Inner Product Ring LWE Problem, Reduction, New Trapdoor Algorithm for Inner Product Ring LWE Problem and Ring SIS Problem.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Heuristic Ideal Obfuscation Scheme based on LWE Problem, its Variants and Quantum Oracle.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024
2023
BE-TRDSS: Blockchain-Enabled Secure and Efficient Traceable-Revocable Data-Sharing Scheme in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, November, 2023
SPMAC: Secure and privacy-preserving multi-authority access control for fog-enabled IoT cloud storage.
J. Syst. Archit., September, 2023
Collusion resistant multi-authority access control scheme with privacy protection for personal health records.
J. King Saud Univ. Comput. Inf. Sci., September, 2023
Collusion-resistant dynamic privacy-preserving attribute-access control scheme based on blockchain.
J. King Saud Univ. Comput. Inf. Sci., September, 2023
J. King Saud Univ. Comput. Inf. Sci., July, 2023
Redactable Blockchain-Enabled Hierarchical Access Control Framework for Data Sharing in Electronic Medical Records.
IEEE Syst. J., June, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Cloud Comput., 2023
Algebraic isomorphic spaces of ideal lattices, reduction of Ring-SIS problem, and new reduction of Ring-LWE problem.
IACR Cryptol. ePrint Arch., 2023
2022
Blockchain-enabled efficient distributed attribute-based access control framework with privacy-preserving in IoV.
J. King Saud Univ. Comput. Inf. Sci., November, 2022
Secure Outsourced Attribute-Based Sharing Framework for Lightweight Devices in Smart Health Systems.
IEEE Trans. Serv. Comput., 2022
Distributed Ciphertext-Policy Attribute-Based Encryption With Enhanced Collusion Resilience and Privacy Preservation.
IEEE Syst. J., 2022
Secure and Efficient General Circuits Attribute-Based Access Control in Cloud Computing.
IEEE Syst. J., 2022
A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth.
J. Syst. Archit., 2022
Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud.
J. Syst. Archit., 2022
A Secure and Efficient Decentralized Access Control Scheme Based on Blockchain for Vehicular Social Networks.
IEEE Internet Things J., 2022
Secure Decentralized Attribute-Based Sharing of Personal Health Records With Blockchain.
IEEE Internet Things J., 2022
BA-RMKABSE: Blockchain-aided Ranked Multi-keyword Attribute-based Searchable Encryption with Hiding Policy for Smart Health System.
Future Gener. Comput. Syst., 2022
2021
An Expressive "Test-Decrypt-Verify" Attribute-Based Encryption Scheme With Hidden Policy for Smart Medical Cloud.
IEEE Syst. J., 2021
A prospective evaluation of AI-augmented epidemiology to forecast COVID-19 in the USA and Japan.
npj Digit. Medicine, 2021
Multiauthority Access Control With Anonymous Authentication for Personal Health Record.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
2020
IEEE Syst. J., 2020
A Privacy-Preserving Data Sharing System with Decentralized Attribute-based Encryption Scheme.
Int. J. Netw. Secur., 2020
Efficient Anonymous Ciphertext-Policy Attribute-based Encryption for General Structures Supporting Leakage-Resilience.
Int. J. Netw. Secur., 2020
IACR Cryptol. ePrint Arch., 2020
Secure and Privacy-Preserving Attribute-Based Sharing Framework in Vehicles Ad Hoc Networks.
IEEE Access, 2020
Outsourcing Attributed-Based Ranked Searchable Encryption With Revocation for Cloud Storage.
IEEE Access, 2020
Privacy-Preserving Multi-Authority Attribute-Based Data Sharing Framework for Smart Grid.
IEEE Access, 2020
Improving the Leakage Rate of Ciphertext-Policy Attribute-Based Encryption for Cloud Computing.
IEEE Access, 2020
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
2019
Improving Security in Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing.
KSII Trans. Internet Inf. Syst., 2019
Privacy-preserving decentralized ABE for secure sharing of personal health records in cloud storage.
J. Inf. Secur. Appl., 2019
Int. J. Netw. Secur., 2019
Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System.
IEEE Access, 2019
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019
Improving File Hierarchy Attribute-Based Encryption Scheme with Multi-authority in Cloud.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019
Analysis of Ciphertext Policy Hidden Attribute-Based Encryption and Its Improved Method.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019
Anonymous Leakage-Resilient Ciphertext-Policy Attribute-Based Encryption Supporting Direct Revocation.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019
2018
Int. J. Netw. Secur., 2018
Fully secure hierarchical inner product encryption for privacy preserving keyword searching in cloud.
Int. J. High Perform. Comput. Netw., 2018
Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption.
IEEE Access, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
A Novel Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Anonymous Key Generation.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018
2017
J. Inf. Sci. Eng., 2017
Ciphertext policy attribute-based encryption with hierarchical domain authorities and users in cloud.
Int. J. High Perform. Comput. Netw., 2017
Int. J. Embed. Syst., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Comput. J., 2017
Security Analysis and Improvement of An Anonymous Attribute-Based Proxy Re-encryption.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
2016
Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys.
Comput. J., 2016
2015
Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
2013
New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2013
KSII Trans. Internet Inf. Syst., 2013
Int. Arab J. Inf. Technol., 2013
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
2012
Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups.
Math. Comput. Model., 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
2011
J. Zhejiang Univ. Sci. C, 2011
J. Networks, 2011
KSII Trans. Internet Inf. Syst., 2011
2010
J. Inf. Sci. Eng., 2010
J. Inf. Sci. Eng., 2010
KSII Trans. Internet Inf. Syst., 2010
Proceedings of the Information Computing and Applications - First International Conference, 2010
2009
Fundam. Informaticae, 2009
2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
2006
Proceedings of the Advances in Natural Computation, Second International Conference, 2006