Yichen Zhang

Orcid: 0000-0002-0907-7827

Affiliations:
  • Fujian Normal University, Fuzhou, China
  • Hohai University, Nanjing, China (PhD 2015)


According to our database1, Yichen Zhang authored at least 84 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
OABS: Efficient Outsourced Attribute-Based Signature Scheme With Constant Size.
IEEE Internet Things J., December, 2024

Efficient Revocable Attribute-Based Encryption With Verifiable Data Integrity.
IEEE Internet Things J., March, 2024

2023
TFS-ABS: Traceable and Forward-Secure Attribute-Based Signature Scheme With Constant-Size.
IEEE Trans. Knowl. Data Eng., September, 2023

Multiauthority Attribute-Based Encryption for Assuring Data Deletion.
IEEE Syst. J., June, 2023

Efficient Hierarchical Signature Scheme With Batch Verification Function Suitable for ADS-B System.
IEEE Trans. Aerosp. Electron. Syst., April, 2023

2022
Efficient Attribute Based Server-Aided Verification Signature.
IEEE Trans. Serv. Comput., 2022

Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT.
IEEE Trans. Cloud Comput., 2022

Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage.
IEEE Trans. Cloud Comput., 2022

Efficient CP-ABE Scheme With Shared Decryption in Cloud Storage.
IEEE Trans. Computers, 2022

Key escrow-free attribute based encryption with user revocation.
Inf. Sci., 2022

Decentralized Attribute-Based Server-Aid Signature in the Internet of Things.
IEEE Internet Things J., 2022

Andes_gym: A Versatile Environment for Deep Reinforcement Learning in Power Systems.
CoRR, 2022

2021
Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks.
IEEE Trans. Serv. Comput., 2021

Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage.
IEEE Trans. Serv. Comput., 2021

Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing.
IEEE Trans. Emerg. Top. Comput., 2021

Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage.
IEEE Syst. J., 2021

An efficient identity-based signature scheme with provable security.
Inf. Sci., 2021

ABKS-SKGA: Attribute-based keyword search secure against keyword guessing attack.
Comput. Stand. Interfaces, 2021

Encoding Frequency Constraints in Preventive Unit Commitment Using Deep Learning with Region-of-Interest Active Sampling.
CoRR, 2021

2020
Cryptanalysis and Improvement of Batch Verification Certificateless Signature Scheme for VANETs.
Wirel. Pers. Commun., 2020

Full Verifiability for Outsourced Decryption in Attribute Based Encryption.
IEEE Trans. Serv. Comput., 2020

Anonymous Certificate-Based Broadcast Encryption With Personalized Messages.
IEEE Trans. Broadcast., 2020

A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation.
Soft Comput., 2020

Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext.
Soft Comput., 2020

Remote Data Checking With a Designated Verifier in Cloud Storage.
IEEE Syst. J., 2020

Adaptively secure certificate-based broadcast encryption and its application to cloud storage service.
Inf. Sci., 2020

Privacy-Preserving and Pairing-Free Multirecipient Certificateless Encryption With Keyword Search for Cloud-Assisted IIoT.
IEEE Internet Things J., 2020

Hybrid Imitation Learning for Real-Time Service Restoration in Resilient Distribution Systems.
CoRR, 2020

Deep Active Learning for Solvability Prediction in Power Systems.
CoRR, 2020

Adaptive Switching Control of Wind Turbine Generators for Necessary Frequency Response.
CoRR, 2020

On the Modeling and Simulation of Anti-Windup Proportional-Integral Controller.
CoRR, 2020

Robust Synthesis of Wind Turbine Generators to Support Microgrid Frequency Considering Linearization-Induced Uncertainty.
CoRR, 2020

Approximating Trajectory Constraints with Machine Learning - Microgrid Islanding with Frequency Constraints.
CoRR, 2020

Review on Set-Theoretic Methods for Safety Verification and Control of Power System.
CoRR, 2020

2019
Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service.
KSII Trans. Internet Inf. Syst., 2019

Key-policy attribute-based encryption against continual auxiliary input leakage.
Inf. Sci., 2019

Hierarchical attribute based encryption with continuous leakage-resilience.
Inf. Sci., 2019

Constant Size Ciphertext Distributed CP-ABE Scheme With Privacy Protection and Fully Hiding Access Structure.
IEEE Access, 2019

SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search.
IEEE Access, 2019

A Dispersed Multi-Value Attribute-Based Encryption With Mediated Obfuscation.
IEEE Access, 2019

2018
Provably secure certificate-based encryption with leakage resilience.
Theor. Comput. Sci., 2018

User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage.
IEEE Syst. J., 2018

Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key.
Secur. Commun. Networks, 2018

Improving Security and Privacy-Preserving in Multi-Authorities Ciphertext-Policy Attribute-Based Encryption.
KSII Trans. Internet Inf. Syst., 2018

Identity-based broadcast encryption with continuous leakage resilience.
Inf. Sci., 2018

Anonymous certificate-based broadcast encryption with constant decryption cost.
Inf. Sci., 2018

Cryptanalysis and Improvement for Certificateless Aggregate Signature.
Fundam. Informaticae, 2018

Set Theory-Based Safety Supervisory Control for Wind Turbines to Ensure Adequate Frequency Response.
CoRR, 2018

2017
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing.
IEEE Trans. Serv. Comput., 2017

KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage.
IEEE Trans. Serv. Comput., 2017

A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2017

Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length.
Secur. Commun. Networks, 2017

Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage.
Int. J. Commun. Syst., 2017

2016
Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage.
Secur. Commun. Networks, 2016

Hierarchical attribute-based encryption with continuous auxiliary inputs leakage.
Secur. Commun. Networks, 2016

Certificate-based encryption resilient to key leakage.
J. Syst. Softw., 2016

Provably Secure Certificate-based Conditional Proxy Re-encryption.
J. Inf. Sci. Eng., 2016

Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing.
KSII Trans. Internet Inf. Syst., 2016

Continuous leakage-resilient certificate-based encryption.
Inf. Sci., 2016

Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks.
IACR Cryptol. ePrint Arch., 2016

Emulated Inertia and Damping of Converter-Interfaced Power Source.
CoRR, 2016

A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme.
Comput. J., 2016

Certificate-Based Key-Insulated Signature in the Standard Model.
Comput. J., 2016

An Efficient Certificate-Based Designated Verifier Signature Scheme.
Comput. Informatics, 2016

2015
Leakage-resilient certificate-based encryption.
Secur. Commun. Networks, 2015

Certificateless online/offline signcryption scheme.
Secur. Commun. Networks, 2015

无证书强指定验证者签名方案 (Certificateless Strong Designated Verifier Signature Scheme).
计算机科学, 2015

Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation.
Int. J. Inf. Sec., 2015

A Forward-Secure Certificate-Based Signature Scheme.
Comput. J., 2015

2014
Provably secure certificate-based key-insulated signature scheme.
Concurr. Comput. Pract. Exp., 2014

Certificate-Based Conditional Proxy Re-Encryption.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
Certificate-Based Encryption Scheme without Pairing.
KSII Trans. Internet Inf. Syst., 2013

Provably Secure Forward Secure Certificateless Proxy Signature Scheme.
KSII Trans. Internet Inf. Syst., 2013

Provably secure certificate-based signature scheme without pairings.
Inf. Sci., 2013

Forward Secure Certificateless Proxy Signature Scheme.
Proceedings of the Network and System Security - 7th International Conference, 2013

Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

2012
An efficient short certificate-based signature scheme.
J. Syst. Softw., 2012

Certificate-based signcryption with enhanced security features.
Comput. Math. Appl., 2012

Certificate-Based Key-Insulated Signature.
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012

A Forward-Secure Certificate-Based Signature Scheme in the Standard Model.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2009
Provably Secure Certificate-based Proxy Signature Schemes.
J. Comput., 2009

2006
Improvement of Threshold Signature Scheme Using Self-Certified Public Key.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2004
Security analysis and improvement of some proxy signature schemes.
Proceedings of the 3rd International Conference on Information Security, 2004

2003
Nonrepudiable Proxy Multi-Signature Scheme.
J. Comput. Sci. Technol., 2003


  Loading...