Zhenhua Liu

Affiliations:
  • Xidian University, School of Mathematics and Statistics, Xi'an, China


According to our database1, Zhenhua Liu authored at least 45 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Perfect Data Protection, Storage, and Reputation Management Scheme for Ride-Sharing Services.
IEEE Syst. J., September, 2023

Black-Box Accountable Authority CP-ABE Scheme for Cloud-Assisted E-Health System.
IEEE Syst. J., March, 2023

Forward and backward secure updatable ElGamal encryption scheme for cloud storage.
J. Syst. Archit., 2023

2022
Efficient and Automatic Pseudonym Management Scheme for VANET with Blockchain.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022

Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022

Updatable Hybrid Encryption Scheme with No-Directional Key Update for Cloud Storage.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

2021
Efficient Small-Batch Verification and Identification Scheme With Invalid Signatures in VANETs.
IEEE Trans. Veh. Technol., 2021

Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption.
KSII Trans. Internet Inf. Syst., 2021

2020
Randomized deduplication with ownership management and data sharing in cloud storage.
J. Inf. Secur. Appl., 2020

Verifiable Attribute-based Keyword Search Encryption with Attribute Revocation for Electronic Health Record System.
Int. J. Netw. Secur., 2020

Secure and Efficient Client-Side Data Deduplication with Public Auditing in Cloud Storage.
Int. J. Netw. Secur., 2020

Constant-size ring signature scheme using multilinear maps.
Int. J. Embed. Syst., 2020

A Physically Secure, Lightweight Three-Factor and Anonymous User Authentication Protocol for IoT.
IEEE Access, 2020

2019
Effective Privacy Preservation and Fast Signature Verification in Bitcoin Transaction.
Int. J. Netw. Secur., 2019

Provably Secure Searchable Attribute-Based Authenticated Encryption Scheme.
Int. J. Netw. Secur., 2019

Secure deduplication of encrypted data in online and offline environments.
Int. J. High Perform. Comput. Netw., 2019

Large universe multi-authority attribute-based PHR sharing with user revocation.
Int. J. Comput. Sci. Eng., 2019

Traceable-then-revocable ciphertext-policy attribute-based encryption scheme.
Future Gener. Comput. Syst., 2019

Revocable Attribute-Based Encryption Scheme With Efficient Deduplication for Ehealth Systems.
IEEE Access, 2019

Updatable Ciphertext-Policy Attribute-Based Encryption Scheme With Traceability and Revocability.
IEEE Access, 2019

Privacy-Preserving Attribute-Based Multi-keyword Search Encryption Scheme with User Tracing.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Searchable Attribute-Based Signcryption Scheme for Electronic Personal Health Record.
IEEE Access, 2018

Sharing Economy Protocol with Privacy Preservation and Fairness Based on Blockchain.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Secure Data Deduplication with Ownership Management and Sharing in Cloud Storage.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018

Verifiable and Authenticated Searchable Encryption Scheme with Aggregate Key in Cloud Storage.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

2017
Lattice-based strongly-unforgeable forward-secure identity-based signature scheme with flexible key update.
KSII Trans. Internet Inf. Syst., 2017

Directly Revocable and Verifiable Key-Policy Attribute-based Encryption for Large Universe.
Int. J. Netw. Secur., 2017

Expressive ciphertext-policy attribute-based encryption with direct user revocation.
Int. J. Embed. Syst., 2017

Verifiable Attribute-Based Multi-keyword Search over Encrypted Cloud Data in Multi-owner Setting.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Privacy-Preserving Multi-authority Ciphertext-Policy Attribute-Based Encryption with Revocation.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

2016
Short and provable secure lattice-based signature scheme in the standard model.
Secur. Commun. Networks, 2016

Revocable and strongly unforgeable identity-based signature scheme in the standard model.
Secur. Commun. Networks, 2016

Flexible Attribute-Based Keyword Search via Two Access Policies.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Security Analysis and Improvement of A Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Large Universe Revocable Fine-Grained Encryption with Public Auditing.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

A privacy-preserving personal health record with searchability and revocability using attribute-based encryption.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
Revocable Identity-based Signcryption Scheme Without Random Oracles.
Int. J. Netw. Secur., 2015

Ring Signature Scheme from Multilinear Maps in the Standard Model.
Proceedings of the 10th International Conference on P2P, 2015

2013
Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model.
Secur. Commun. Networks, 2013

Post-quantum Strongly Unforgeable Identity-Based Signature Scheme from Lattices without Random Oracles.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
A trust region SQP-filter method for nonlinear second-order cone programming.
Comput. Math. Appl., 2012

2011
Provably secure multi-proxy signature scheme with revocation in the standard model.
Comput. Commun., 2011

2010
A non-interior-point smoothing method for variational inequality problem.
J. Comput. Appl. Math., 2010

Certificateless signcryption scheme in the standard model.
Inf. Sci., 2010

2008
Secure Proxy Multi-signature Scheme in the Standard Model.
Proceedings of the Provable Security, Second International Conference, 2008


  Loading...