default search action
Huaxiong Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j132]Cong Zuo, Shangqi Lai, Shi-Feng Sun, Xingliang Yuan, Joseph K. Liu, Jun Shao, Huaxiong Wang, Liehuang Zhu, Shujie Cui:
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy. Proc. Priv. Enhancing Technol. 2025(1): 440-455 (2025) - 2024
- [j131]Jinlu Liu, Jing Qin, Wenchao Wang, Lin Mei, Huaxiong Wang:
Key-aggregate based access control encryption for flexible cloud data sharing. Comput. Stand. Interfaces 88: 103800 (2024) - [j130]Linru Zhang, Xiangning Wang, Jiabo Wang, Rachael Pung, Huaxiong Wang, Kwok-Yan Lam:
An Efficient FHE-Enabled Secure Cloud-Edge Computing Architecture for IoMT Data Protection With its Application to Pandemic Modeling. IEEE Internet Things J. 11(9): 15272-15284 (2024) - [j129]Jingwei Hu, Wen Wang, Kris Gaj, Donglong Chen, Huaxiong Wang:
Universal Gaussian elimination hardware for cryptographic purposes. J. Cryptogr. Eng. 14(2): 383-397 (2024) - [j128]Khoa Nguyen, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang, Yanhong Xu, Neng Zeng:
Group encryption: Full dynamicity, message filtering and code-based instantiation. Theor. Comput. Sci. 1007: 114678 (2024) - [j127]Hang Cheng, Xibin Li, Huaxiong Wang, Xinpeng Zhang, Ximeng Liu, Meiqing Wang, Fengyong Li:
DeepDIST: A Black-Box Anti-Collusion Framework for Secure Distribution of Deep Models. IEEE Trans. Circuits Syst. Video Technol. 34(1): 97-109 (2024) - [j126]Yinbin Miao, Feng Li, Xiaohua Jia, Huaxiong Wang, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
REKS: Role-Based Encrypted Keyword Search With Enhanced Access Control for Outsourced Cloud Data. IEEE Trans. Dependable Secur. Comput. 21(4): 3247-3261 (2024) - [j125]Kwok-Yan Lam, Xianhui Lu, Linru Zhang, Xiangning Wang, Huaxiong Wang, Si Qi Goh:
Efficient FHE-Based Privacy-Enhanced Neural Network for Trustworthy AI-as-a-Service. IEEE Trans. Dependable Secur. Comput. 21(5): 4451-4468 (2024) - [j124]Jingwei Hu, Yongjun Zhao, Benjamin Hong Meng Tan, Khin Mi Mi Aung, Huaxiong Wang:
Enabling Threshold Functionality for Private Set Intersection Protocols in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 19: 6184-6196 (2024) - [j123]Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang, Liang Feng Zhang:
Querying Twice to Achieve Information-Theoretic Verifiability in Private Information Retrieval. IEEE Trans. Inf. Forensics Secur. 19: 8172-8187 (2024) - [j122]Han Mao Kiah, Wilton Kim, Stanislav Kruglik, San Ling, Huaxiong Wang:
Explicit Low-Bandwidth Evaluation Schemes for Weighted Sums of Reed-Solomon-Coded Symbols. IEEE Trans. Inf. Theory 70(8): 5552-5565 (2024) - [j121]Jinlu Liu, Jing Qin, Xi Zhang, Huaxiong Wang:
Efficient Key-Aggregate Cryptosystem With User Revocation for Selective Group Data Sharing in Cloud Storage. IEEE Trans. Knowl. Data Eng. 36(11): 6042-6055 (2024) - [c153]Haofei Wang, Li-Ping Wang, Liang Feng Zhang, Huaxiong Wang:
Two-Server Verifiable Federated Learning: Unconditional Security and Practical Efficiency. CSCWD 2024: 163-168 - [c152]Xuankai Yang, Yan Wang, Xiuzhen Zhang, Shoujin Wang, Huaxiong Wang, Kwok-Yan Lam:
UPDATE: Mining User-News Engagement Patterns for Dual-Target Cross-Domain Fake News Detection. DSAA 2024: 1-10 - [c151]Feixiang Zhao, Huaxiong Wang, Jian Weng:
Constant-Size Unbounded Multi-hop Fully Homomorphic Proxy Re-encryption from Lattices. ESORICS (3) 2024: 238-258 - [c150]Yan Xu, Li-Ping Wang, Huaxiong Wang:
Amortized Functional Bootstrapping for Homomorphic Evaluation of Encrypted Functions. ICICS (2) 2024: 107-127 - [c149]Yan Xu, Guizhen Zhu, Huaxiong Wang, Li-Ping Wang:
Large-Plaintext Functional Bootstrapping with Small Parameters for BGV Encoding. ISC (1) 2024: 252-272 - [c148]San Ling, Khoa Nguyen, Duong Hieu Phan, Khai Hanh Tang, Huaxiong Wang, Yanhong Xu:
Fully Dynamic Attribute-Based Signatures for Circuits from Codes. Public Key Cryptography (1) 2024: 37-73 - [c147]San Ling, Khai Hanh Tang, Khu Vu, Huaxiong Wang, Yingfei Yan:
Succinct Non-subsequence Arguments. SCN (1) 2024: 24-45 - [i94]Jiabo Wang, Elmo Xuyun Huang, Pu Duan, Huaxiong Wang, Kwok-Yan Lam:
PSA: Private Set Alignment for Secure and Collaborative Analytics on Large-Scale Data. CoRR abs/2410.04746 (2024) - [i93]San Ling, Khoa Nguyen, Duong Hieu Phan, Khai Hanh Tang, Huaxiong Wang, Yanhong Xu:
Fully Dynamic Attribute-Based Signatures for Circuits from Codes. IACR Cryptol. ePrint Arch. 2024: 22 (2024) - [i92]Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang, Liang Feng Zhang:
Verifiable Information-Theoretic Function Secret Sharing. IACR Cryptol. ePrint Arch. 2024: 453 (2024) - [i91]Feixiang Zhao, Huaxiong Wang, Jian Weng:
Constant-Size Unbounded Multi-Hop Fully Homomorphic Proxy Re-Encryption from Lattices. IACR Cryptol. ePrint Arch. 2024: 1023 (2024) - [i90]San Ling, Khai Hanh Tang, Khu Vu, Huaxiong Wang, Yingfei Yan:
Succinct Non-Subsequence Arguments. IACR Cryptol. ePrint Arch. 2024: 1264 (2024) - 2023
- [j120]Kexin Xu, Benjamin Hong Meng Tan, Li-Ping Wang, Khin Mi Mi Aung, Huaxiong Wang:
Threshold Homomorphic Encryption From Provably Secure NTRU. Comput. J. 66(12): 2861-2873 (2023) - [j119]Jian Ding, Changlu Lin, Fuchun Lin, Huaxiong Wang:
Full threshold change range of threshold changeable secret sharing. Des. Codes Cryptogr. 91(7): 2421-2447 (2023) - [j118]Kexin Xu, Benjamin Hong Meng Tan, Li-Ping Wang, Khin Mi Mi Aung, Huaxiong Wang:
Privacy-preserving outsourcing decision tree evaluation from homomorphic encryption. J. Inf. Secur. Appl. 77: 103582 (2023) - [j117]Benoît Libert, San Ling, Khoa Nguyen, Huaxiong Wang:
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors. J. Cryptol. 36(3): 23 (2023) - [j116]Jian Ding, Pinhui Ke, Changlu Lin, Huaxiong Wang:
Ramp Scheme Based on CRT for Polynomial Ring over Finite Field. J. Syst. Sci. Complex. 36(1): 129-150 (2023) - [j115]Jingting Xue, Shuqin Luo, Qinfang Deng, Lingjie Shi, Xiaojun Zhang, Huaxiong Wang:
KA: Keyword-based auditing with frequency hiding and retrieval reliability for smart government. J. Syst. Archit. 138: 102856 (2023) - [j114]Jingwei Hu, Wen Wang, Kris Gaj, Liping Wang, Huaxiong Wang:
Engineering Practical Rank-Code-Based Cryptographic Schemes on Embedded Hardware. A Case Study on ROLLO. IEEE Trans. Computers 72(7): 2094-2110 (2023) - [j113]Xiaoqin Feng, Jianfeng Ma, Huaxiong Wang, Sheng Wen, Yang Xiang, Yinbin Miao:
Space-Efficient Storage Structure of Blockchain Transactions Supporting Secure Verification. IEEE Trans. Cloud Comput. 11(3): 2631-2645 (2023) - [j112]Kexin Xu, Benjamin Hong Meng Tan, Li-Ping Wang, Khin Mi Mi Aung, Huaxiong Wang:
Multi-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrapping. Theor. Comput. Sci. 968: 114026 (2023) - [j111]Xiaoqin Feng, Jianfeng Ma, Huaxiong Wang, Yinbin Miao, Ximeng Liu, Zhongyuan Jiang:
An Accessional Signature Scheme With Unmalleable Transaction Implementation to Securely Redeem Cryptocurrencies. IEEE Trans. Inf. Forensics Secur. 18: 4144-4156 (2023) - [j110]Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan:
Revisiting Modular Inversion Hidden Number Problem and Its Applications. IEEE Trans. Inf. Theory 69(8): 5337-5356 (2023) - [j109]Xiaojun Zhang, Chao Huang, Dawu Gu, Jingwei Zhang, Huaxiong Wang:
BIB-MKS: Post-Quantum Secure Biometric Identity-Based Multi-Keyword Search Over Encrypted Data in Cloud Storage Systems. IEEE Trans. Serv. Comput. 16(1): 122-133 (2023) - [c146]Gongxian Zeng, Junzuo Lai, Zhengan Huang, Linru Zhang, Xiangning Wang, Kwok-Yan Lam, Huaxiong Wang, Jian Weng:
Non-interactive Zero-Knowledge Functional Proofs. ASIACRYPT (5) 2023: 236-268 - [c145]Stanislav Kruglik, Gaojun Luo, Wilton Kim, Shubhransh Singhvi, Han Mao Kiah, San Ling, Huaxiong Wang:
Repair of Reed-Solomon Codes in the Presence of Erroneous Nodes. ISIT 2023: 1003-1008 - [c144]Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang:
Two-Server Private Information Retrieval with Optimized Download Rate and Result Verification. ISIT 2023: 1354-1359 - [c143]Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang:
k-server Byzantine-Resistant PIR Scheme with Optimal Download Rate and Optimal File Size. ISIT 2023: 1532-1537 - [c142]Han Mao Kiah, Wilton Kim, Stanislav Kruglik, San Ling, Huaxiong Wang:
Explicit Low-Bandwidth Evaluation Schemes for Weighted Sums of Reed-Solomon-Coded Symbols. ISIT 2023: 1973-1978 - [i89]Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang:
Two-Server Private Information Retrieval with Optimized Download Rate and Result Verification. CoRR abs/2301.11730 (2023) - [i88]Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang:
k-server Byzantine-Resistant PIR Scheme with Optimal Download Rate and Optimal File Size. CoRR abs/2302.02230 (2023) - [i87]Stanislav Kruglik, Gaojun Luo, Wilton Kim, Shubhransh Singhvi, Han Mao Kiah, San Ling, Huaxiong Wang:
Repair of Reed-Solomon Codes in the Presence of Erroneous Nodes. CoRR abs/2305.03442 (2023) - [i86]Kwok-Yan Lam, Xianhui Lu, Linru Zhang, Xiangning Wang, Huaxiong Wang, Si Qi Goh:
Efficient FHE-based Privacy-Enhanced Neural Network for AI-as-a-Service. IACR Cryptol. ePrint Arch. 2023: 647 (2023) - [i85]Jingwei Hu, Junyan Chen, Wangchen Dai, Huaxiong Wang:
Fully Homomorphic Encryption-Based Protocols for Enhanced Private Set Intersection Functionalities. IACR Cryptol. ePrint Arch. 2023: 1407 (2023) - [i84]Gongxian Zeng, Junzuo Lai, Zhengan Huang, Linru Zhang, Xiangning Wang, Kwok-Yan Lam, Huaxiong Wang, Jian Weng:
Non-Interactive Zero-Knowledge Functional Proofs. IACR Cryptol. ePrint Arch. 2023: 1759 (2023) - 2022
- [j108]Shaoquan Jiang, Yeow Meng Chee, San Ling, Huaxiong Wang, Chaoping Xing:
A new framework for deniable secure key exchange. Inf. Comput. 285(Part): 104866 (2022) - [j107]Chenyu Huang, Yongjun Zhao, Huangxun Chen, Xu Wang, Qian Zhang, Yanjiao Chen, Huaxiong Wang, Kwok-Yan Lam:
ZkRep: A Privacy-Preserving Scheme for Reputation-Based Blockchain System. IEEE Internet Things J. 9(6): 4330-4342 (2022) - [j106]Jian Ding, Pinhui Ke, Changlu Lin, Huaxiong Wang:
Bivariate polynomial-based secret sharing schemes with secure secret reconstruction. Inf. Sci. 593: 398-414 (2022) - [j105]Yanhong Xu, Reihaneh Safavi-Naini, Khoa Nguyen, Huaxiong Wang:
Traceable policy-based signatures and instantiation from lattices. Inf. Sci. 607: 1286-1310 (2022) - [j104]Xiaojun Zhang, Chao Huang, Dawu Gu, Jingwei Zhang, Jingting Xue, Huaxiong Wang:
Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems. J. Syst. Archit. 127: 102508 (2022) - [j103]Hang Cheng, Ximeng Liu, Huaxiong Wang, Yan Fang, Meiqing Wang, Xiaopeng Zhao:
SecureAD: A Secure Video Anomaly Detection Framework on Convolutional Neural Network in Edge Computing Environment. IEEE Trans. Cloud Comput. 10(2): 1413-1427 (2022) - [j102]Chenyu Wang, Ding Wang, Yi Tu, Guoai Xu, Huaxiong Wang:
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks. IEEE Trans. Dependable Secur. Comput. 19(1): 507-523 (2022) - [j101]Haining Yang, Ye Su, Jing Qin, Huaxiong Wang:
Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database. IEEE Trans. Dependable Secur. Comput. 19(2): 1320-1337 (2022) - [j100]Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang, Xiaorong Ke, Yining Liu:
Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key. IEEE Trans. Dependable Secur. Comput. 19(5): 2934-2951 (2022) - [j99]Jian Ding, Changlu Lin, Huaxiong Wang, Chaoping Xing:
Communication Efficient Secret Sharing With Small Share Size. IEEE Trans. Inf. Theory 68(1): 659-669 (2022) - [j98]Xiaojun Zhang, Jie Zhao, Chunxiang Xu, Huaxiong Wang, Yuan Zhang:
DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage. IEEE Trans. Serv. Comput. 15(1): 334-345 (2022) - [c141]Liang Feng Zhang, Huaxiong Wang, Li-Ping Wang:
Byzantine-Robust Private Information Retrieval with Low Communication and Efficient Decoding. AsiaCCS 2022: 1079-1085 - [c140]Jun Xu, Santanu Sarkar, Huaxiong Wang, Lei Hu:
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange. ASIACRYPT (3) 2022: 771-799 - [c139]Khin Mi Mi Aung, Enhui Lim, Sim Jun Jie, Benjamin Hong Meng Tan, Huaxiong Wang, Sze Ling Yeo:
Field Instruction Multiple Data. EUROCRYPT (1) 2022: 611-641 - [c138]Liang Feng Zhang, Huaxiong Wang:
Multi-Server Verifiable Computation of Low-Degree Polynomials. SP 2022: 596-613 - [i83]Han Mao Kiah, Wilton Kim, Stanislav Kruglik, San Ling, Huaxiong Wang:
Explicit Low-Bandwidth Evaluation Schemes for Weighted Sums of Reed-Solomon-Coded Symbols. CoRR abs/2209.03251 (2022) - [i82]Khin Mi Mi Aung, Enhui Lim, Sim Jun Jie, Benjamin Hong Meng Tan, Huaxiong Wang, Sze Ling Yeo:
Field Instruction Multiple Data. IACR Cryptol. ePrint Arch. 2022: 771 (2022) - [i81]Jingwei Hu, Wen Wang, Kris Gaj, Donglong Chen, Huaxiong Wang:
Universal Gaussian Elimination Hardware for Cryptographic Purposes. IACR Cryptol. ePrint Arch. 2022: 928 (2022) - [i80]Jun Xu, Santanu Sarkar, Huaxiong Wang, Lei Hu:
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange. IACR Cryptol. ePrint Arch. 2022: 1239 (2022) - 2021
- [j97]Xiaojun Zhang, Chao Huang, Chunxiang Xu, Yuan Zhang, Jingwei Zhang, Huaxiong Wang:
Key-Leakage Resilient Encrypted Data Aggregation With Lightweight Verification in Fog-Assisted Smart Grids. IEEE Internet Things J. 8(10): 8234-8245 (2021) - [j96]Zuling Chang, Martianus Frederic Ezerman, Adamas Aqsa Fahreza, San Ling, Janusz Szmidt, Huaxiong Wang:
Binary de Bruijn Sequences via Zech's Logarithms. SN Comput. Sci. 2(4): 314 (2021) - [j95]Xiaojun Zhang, Jie Zhao, Chunxiang Xu, Hongwei Li, Huaxiong Wang, Yuan Zhang:
CIPPPA: Conditional Identity Privacy-Preserving Public Auditing for Cloud-Based WBANs Against Malicious Auditors. IEEE Trans. Cloud Comput. 9(4): 1362-1375 (2021) - [j94]Benoît Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen, Huaxiong Wang:
Adaptive oblivious transfer with access control from lattice assumptions. Theor. Comput. Sci. 891: 210-229 (2021) - [j93]Xiaojun Zhang, Chunxiang Xu, Huaxiong Wang, Yuan Zhang, Shixiong Wang:
FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things. IEEE Trans. Dependable Secur. Comput. 18(3): 1019-1032 (2021) - [j92]Hang Cheng, Huaxiong Wang, Ximeng Liu, Yan Fang, Meiqing Wang, Xiaojun Zhang:
Person Re-Identification over Encrypted Outsourced Surveillance Videos. IEEE Trans. Dependable Secur. Comput. 18(3): 1456-1473 (2021) - [j91]Benjamin Hong Meng Tan, Hyung Tae Lee, Huaxiong Wang, Shu Qin Ren, Khin Mi Mi Aung:
Efficient Private Comparison Queries Over Encrypted Databases Using Fully Homomorphic Encryption With Finite Fields. IEEE Trans. Dependable Secur. Comput. 18(6): 2861-2874 (2021) - [c137]Khoa Nguyen, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang, Yanhong Xu, Neng Zeng:
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation. Public Key Cryptography (2) 2021: 678-708 - [c136]San Ling, Khoa Nguyen, Duong Hieu Phan, Hanh Tang, Huaxiong Wang:
Zero-Knowledge Proofs for Committed Symmetric Boolean Functions. PQCrypto 2021: 339-359 - [e13]Mehdi Tibouchi, Huaxiong Wang:
Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part I. Lecture Notes in Computer Science 13090, Springer 2021, ISBN 978-3-030-92061-6 [contents] - [e12]Mehdi Tibouchi, Huaxiong Wang:
Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part II. Lecture Notes in Computer Science 13091, Springer 2021, ISBN 978-3-030-92074-6 [contents] - [e11]Mehdi Tibouchi, Huaxiong Wang:
Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part III. Lecture Notes in Computer Science 13092, Springer 2021, ISBN 978-3-030-92077-7 [contents] - [e10]Mehdi Tibouchi, Huaxiong Wang:
Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part IV. Lecture Notes in Computer Science 13093, Springer 2021, ISBN 978-3-030-92067-8 [contents] - [i79]Jenn-Bing Ong, Wee Keong Ng, Ivan Tjuawinata, Chao Li, Jielin Yang, Sai None Myne, Huaxiong Wang, Kwok-Yan Lam, C.-C. Jay Kuo:
Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation. CoRR abs/2101.04194 (2021) - [i78]Khoa Nguyen, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang, Yanhong Xu, Neng Zeng:
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation. IACR Cryptol. ePrint Arch. 2021: 226 (2021) - [i77]Yongjun Zhao, Huaxiong Wang, Kwok-Yan Lam:
Volume-Hiding Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy. IACR Cryptol. ePrint Arch. 2021: 786 (2021) - [i76]Cong Zuo, Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Jun Shao, Huaxiong Wang:
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy. IACR Cryptol. ePrint Arch. 2021: 1585 (2021) - 2020
- [j90]Jinhua Ma, Shih-Ya Lin, Xin Chen, Hung-Min Sun, Yeh-Cheng Chen, Huaxiong Wang:
A Blockchain-Based Application System for Product Anti-Counterfeiting. IEEE Access 8: 77642-77652 (2020) - [j89]Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou:
Advances in security research in the Asiacrypt region. Commun. ACM 63(4): 76-81 (2020) - [j88]Yamin Wen, Fangguo Zhang, Huaxiong Wang, Yinbin Miao, Zheng Gong:
Intersection-policy private mutual authentication from authorized private set intersection. Sci. China Inf. Sci. 63(2): 122101 (2020) - [j87]Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang, Taek-Young Youn:
Public key encryption with equality test in the standard model. Inf. Sci. 516: 89-108 (2020) - [j86]Yamin Wen, Fangguo Zhang, Huaxiong Wang, Zheng Gong, Yinbin Miao, Yuqiao Deng:
A new secret handshake scheme with multi-symptom intersection for mobile healthcare social networks. Inf. Sci. 520: 142-154 (2020) - [j85]Haining Yang, Ye Su, Jing Qin, Huaxiong Wang, Yongcheng Song:
Verifiable inner product computation on outsourced database for authenticated multi-user data sharing. Inf. Sci. 539: 295-311 (2020) - [j84]Jingwei Hu, Marco Baldi, Paolo Santini, Neng Zeng, San Ling, Huaxiong Wang:
Lightweight Key Encapsulation Using LDPC Codes on FPGAs. IEEE Trans. Computers 69(3): 327-341 (2020) - [j83]Jingwei Hu, Yao Liu, Ray C. C. Cheung, Shivam Bhasin, San Ling, Huaxiong Wang:
Compact Code-Based Signature for Reconfigurable Devices With Side Channel Resilience. IEEE Trans. Circuits Syst. I Regul. Pap. 67-I(7): 2305-2316 (2020) - [j82]Yongcheng Song, Xinyi Huang, Yi Mu, Wei Wu, Huaxiong Wang:
A code-based signature scheme from the Lyubashevsky framework. Theor. Comput. Sci. 835: 15-30 (2020) - [j81]Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen, Huaxiong Wang:
Provably Secure Group Signature Schemes From Code-Based Assumptions. IEEE Trans. Inf. Theory 66(9): 5754-5773 (2020) - [c135]Jun Zhao, Jing Tang, Zengxiang Li, Huaxiong Wang, Kwok-Yan Lam, Kaiping Xue:
An Analysis of Blockchain Consistency in Asynchronous Networks: Deriving a Neat Bound. ICDCS 2020: 179-189 - [c134]Fuchun Lin, Mahdi Cheraghchi, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang:
Leakage-Resilient Secret Sharing in Non-Compartmentalized Models. ITC 2020: 7:1-7:24 - [c133]Haining Yang, Ye Su, Jing Qin, Jinhua Ma, Huaxiong Wang:
An Efficient Public Batch Auditing Scheme for Data Integrity in Standard Model. ML4CS (1) 2020: 578-592 - [c132]Shaoquan Jiang, Guang Gong, Jingnan He, Khoa Nguyen, Huaxiong Wang:
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model. Public Key Cryptography (1) 2020: 396-427 - [e9]Shiho Moriai, Huaxiong Wang:
Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12491, Springer 2020, ISBN 978-3-030-64836-7 [contents] - [e8]Shiho Moriai, Huaxiong Wang:
Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12492, Springer 2020, ISBN 978-3-030-64833-6 [contents] - [e7]Shiho Moriai, Huaxiong Wang:
Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part III. Lecture Notes in Computer Science 12493, Springer 2020, ISBN 978-3-030-64839-8 [contents] - [e6]Khoa Nguyen, Wenling Wu, Kwok-Yan Lam, Huaxiong Wang:
Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020, Proceedings. Lecture Notes in Computer Science 12505, Springer 2020, ISBN 978-3-030-62575-7 [contents] - [i75]Yanhong Xu, Reihaneh Safavi-Naini, Khoa Nguyen, Huaxiong Wang:
Traceable Policy-Based Signatures and Instantiation from Lattices. CoRR abs/2007.00033 (2020) - [i74]Shaoquan Jiang, Guang Gong, Jingnan He, Khoa Nguyen, Huaxiong Wang:
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model. IACR Cryptol. ePrint Arch. 2020: 140 (2020) - [i73]Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang:
Insecurity of the Public Key Encryption with Filtered Equality Test Proposed by Huang et al. IACR Cryptol. ePrint Arch. 2020: 749 (2020)
2010 – 2019
- 2019
- [j80]Myungsun Kim, Hyung Tae Lee, San Ling, Shu Qin Ren, Benjamin Hong Meng Tan, Huaxiong Wang:
Search Condition-Hiding Query Evaluation on Encrypted Databases. IEEE Access 7: 161283-161295 (2019) - [j79]Shixiong Wang, Longjiang Qu, Chao Li, Huaxiong Wang:
Further improvement of factoring N = pr qs with partial known bits. Adv. Math. Commun. 13(1): 121-135 (2019) - [j78]