


Остановите войну!
for scientists:


default search action
Xinyi Huang 0001
黄欣沂
Person information

- unicode name: 黄欣沂
- affiliation: Fujian Normal University, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, China
- affiliation (PhD 2009): University of Wollongong, School of Computer Science and Software Engineering, Australia
Other persons with the same name
- Xinyi Huang (aka: Xin-yi Huang, Xin-Yi Huang) — disambiguation page
- Xinyi (Lisa) Huang (aka: Xinyi Huang 0002) — University of Waterloo, Waterloo, ON, Canada
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j180]Shengmin Xu
, Jianting Ning
, Yingjiu Li
, Yinghui Zhang
, Guowen Xu
, Xinyi Huang
, Robert H. Deng
:
A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control. IEEE Trans. Dependable Secur. Comput. 20(1): 53-67 (2023) - [j179]Xinyi Huang, Debiao He
, Min Luo, Cong Peng, Qi Feng, Xinyi Huang:
High-Performance Implementation of the Identity-Based Signature Scheme in IEEE P1363 on GPU. ACM Trans. Embed. Comput. Syst. 22(2): 25:1-25:35 (2023) - [j178]Xinyi Huang, Debiao He
, Min Luo, Cong Peng, Qi Feng, Xinyi Huang:
High-Performance Implementation of the Identity-Based Signature Scheme in IEEE P1363 on GPU. ACM Trans. Embed. Comput. Syst. 22(2): 25:1-25:35 (2023) - [j177]Shengmin Xu
, Xinyi Huang
, Jiaming Yuan, Yingjiu Li
, Robert H. Deng
:
Accountable and Fine-Grained Controllable Rewriting in Blockchains. IEEE Trans. Inf. Forensics Secur. 18: 101-116 (2023) - [j176]Xiaotong Zhou, Debiao He
, Jianting Ning
, Min Luo
, Xinyi Huang
:
AADEC: Anonymous and Auditable Distributed Access Control for Edge Computing Services. IEEE Trans. Inf. Forensics Secur. 18: 290-303 (2023) - [j175]Kai Zhang
, Xiwen Wang
, Jianting Ning
, Xinyi Huang
:
Dual-Server Boolean Data Retrieval for Highly-Scalable Secure File Sharing Services. IEEE Trans. Inf. Forensics Secur. 18: 449-462 (2023) - [j174]Jianghong Wei
, Xiaofeng Chen
, Jianfeng Wang
, Xinyi Huang
, Willy Susilo
:
Securing Fine-Grained Data Sharing and Erasure in Outsourced Storage Systems. IEEE Trans. Parallel Distributed Syst. 34(2): 552-566 (2023) - [j173]Pengfei Wu
, Jianting Ning
, Wu Luo, Xinyi Huang
, Debiao He
:
Exploring Dynamic Task Loading in SGX-Based Distributed Computing. IEEE Trans. Serv. Comput. 16(1): 288-301 (2023) - [j172]Fei Zhu
, Xun Yi
, Alsharif Abuadbba, Ibrahim Khalil
, Surya Nepal
, Xinyi Huang:
Authenticated Data Sharing With Privacy Protection and Batch Verification for Healthcare IoT. IEEE Trans. Sustain. Comput. 8(1): 32-42 (2023) - 2022
- [j171]Fei Zhu
, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil
, Surya Nepal, Xinyi Huang:
Forward-Secure Edge Authentication for Graphs. Comput. J. 65(7): 1653-1665 (2022) - [j170]Jianchang Lai, Xinyi Huang, Debiao He, Wei Wu:
Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9. Comput. J. 65(7): 1692-1701 (2022) - [j169]Xu Yang
, Xuechao Yang
, Xun Yi
, Ibrahim Khalil
, Xiaotong Zhou, Debiao He
, Xinyi Huang, Surya Nepal
:
Blockchain-Based Secure and Lightweight Authentication for Internet of Things. IEEE Internet Things J. 9(5): 3321-3332 (2022) - [j168]Hong Zhao
, Yuexin Zhang
, Xinyi Huang
, Yang Xiang
, Chunhua Su
:
A Physical-Layer Key Generation Approach Based on Received Signal Strength in Smart Homes. IEEE Internet Things J. 9(7): 4917-4927 (2022) - [j167]Fei Zhu
, Xun Yi
, Alsharif Abuadbba, Ibrahim Khalil
, Surya Nepal
, Xinyi Huang
, Xingfu Yan
:
Certificate-Based Anonymous Authentication With Efficient Aggregation for Wireless Medical Sensor Networks. IEEE Internet Things J. 9(14): 12209-12218 (2022) - [j166]Xu Yang
, Xun Yi
, Ibrahim Khalil
, Junwei Luo, Elisa Bertino
, Surya Nepal
, Xinyi Huang
:
Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs. IEEE Internet Things J. 9(14): 12563-12572 (2022) - [j165]Jianchang Lai, Fuchun Guo, Willy Susilo
, Peng Jiang, Guomin Yang
, Xinyi Huang:
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts. Inf. Sci. 613: 966-981 (2022) - [j164]Manli Yuan
, Yi Mu
, Fatemeh Rezaeibagha
, Li Xu
, Xinyi Huang
:
Controllable software licensing system for sub-licensing. J. Inf. Secur. Appl. 64: 103061 (2022) - [j163]Shaojun Yang, Xinyi Huang:
Convex invariants of M-fuzzifying convex spaces. J. Intell. Fuzzy Syst. 43(1): 1077-1090 (2022) - [j162]Chao Lin
, Min Luo
, Xinyi Huang
, Kim-Kwang Raymond Choo
, Debiao He
:
An Efficient Privacy-Preserving Credit Score System Based on Noninteractive Zero-Knowledge Proof. IEEE Syst. J. 16(1): 1592-1601 (2022) - [j161]Jiguo Li
, Yichen Zhang, Jianting Ning
, Xinyi Huang
, Geong Sen Poh
, Debang Wang
:
Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT. IEEE Trans. Cloud Comput. 10(2): 762-773 (2022) - [j160]Shaojun Yang, Xinyi Huang:
Universal product learning with errors: A new variant of LWE for lattice-based cryptography. Theor. Comput. Sci. 915: 90-100 (2022) - [j159]Jinhua Ma
, Xinyi Huang
, Yi Mu
, Robert H. Deng
:
Authenticated Data Redaction With Accountability and Transparency. IEEE Trans. Dependable Secur. Comput. 19(1): 149-160 (2022) - [j158]Jianting Ning
, Xinyi Huang
, Willy Susilo
, Kaitai Liang
, Ximeng Liu
, Yinghui Zhang
:
Dual Access Control for Cloud-Based Data Storage and Sharing. IEEE Trans. Dependable Secur. Comput. 19(2): 1036-1048 (2022) - [j157]Shengmin Xu
, Jianting Ning
, Yingjiu Li
, Yinghui Zhang
, Guowen Xu
, Xinyi Huang
, Robert H. Deng
:
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing. IEEE Trans. Dependable Secur. Comput. 19(2): 1064-1077 (2022) - [j156]Jianting Ning
, Geong Sen Poh
, Xinyi Huang
, Robert H. Deng
, Shuwei Cao, Ee-Chien Chang:
Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage. IEEE Trans. Dependable Secur. Comput. 19(2): 1164-1180 (2022) - [j155]Jinrong Chen
, Lin Liu
, Rongmao Chen
, Wei Peng
, Xinyi Huang
:
SecRec: A Privacy-Preserving Method for the Context-Aware Recommendation System. IEEE Trans. Dependable Secur. Comput. 19(5): 3168-3182 (2022) - [j154]Pengfei Wu
, Qi Li
, Jianting Ning
, Xinyi Huang
, Wei Wu
:
Differentially Oblivious Data Analysis With Intel SGX: Design, Optimization, and Evaluation. IEEE Trans. Dependable Secur. Comput. 19(6): 3741-3758 (2022) - [j153]Shengmin Xu
, Jianting Ning
, Xinyi Huang
, Yingjiu Li
, Guowen Xu
:
Untouchable Once Revoking: A Practical and Secure Dynamic EHR Sharing System via Cloud. IEEE Trans. Dependable Secur. Comput. 19(6): 3759-3773 (2022) - [j152]Yi Wang, Rongmao Chen
, Xinyi Huang
, Baosheng Wang:
Secure Anonymous Communication on Corrupted Machines With Reverse Firewalls. IEEE Trans. Dependable Secur. Comput. 19(6): 3837-3854 (2022) - [j151]Guohua Tian
, Yunhan Hu, Jianghong Wei
, Zheli Liu
, Xinyi Huang
, Xiaofeng Chen
, Willy Susilo
:
Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage. IEEE Trans. Dependable Secur. Comput. 19(6): 3941-3954 (2022) - [j150]Jinhua Ma
, Shengmin Xu
, Jianting Ning
, Xinyi Huang
, Robert H. Deng
:
Redactable Blockchain in Decentralized Setting. IEEE Trans. Inf. Forensics Secur. 17: 1227-1242 (2022) - [j149]Haixia Chen
, Xinyi Huang
, Jianting Ning
, Futai Zhang
, Chao Lin
:
VILS: A Verifiable Image Licensing System. IEEE Trans. Inf. Forensics Secur. 17: 1420-1434 (2022) - [j148]Kai Zhang
, Zhe Jiang
, Jianting Ning
, Xinyi Huang
:
Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage. IEEE Trans. Inf. Forensics Secur. 17: 1771-1784 (2022) - [j147]Jianchang Lai
, Fuchun Guo
, Willy Susilo
, Xinyi Huang
, Peng Jiang
, Futai Zhang
:
Data Access Control in Cloud Computing: Flexible and Receiver Extendable. IEEE Trans. Serv. Comput. 15(5): 2658-2670 (2022) - [j146]Xu Yang
, Xun Yi
, Surya Nepal
, Ibrahim Khalil
, Xinyi Huang, Jian Shen
:
Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs. IEEE Trans. Serv. Comput. 15(5): 2728-2741 (2022) - [c75]Liang Zhao
, Ze Chen, Liqun Chen, Xinyi Huang:
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile. ACNS 2022: 45-64 - [c74]Jiaojiao Wu, Jianfeng Wang, Xinwei Yong, Xinyi Huang, Xiaofeng Chen:
New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead. ESORICS (1) 2022: 346-366 - [c73]Fei Zhu
, Xun Yi, Alsharif Abuadbba, Junwei Luo, Surya Nepal, Xinyi Huang:
Efficient Hash-Based Redactable Signature for Smart Grid Applications. ESORICS (3) 2022: 554-573 - [c72]Ding Wang, Yunkai Zou, Qiying Dong, Yuanming Song, Xinyi Huang:
How to Attack and Generate Honeywords. IEEE Symposium on Security and Privacy 2022: 966-983 - [e7]Xiaofeng Chen, Xinyi Huang, Miroslaw Kutylowski
:
Security and Privacy in Social Networks and Big Data - 8th International Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings. Communications in Computer and Information Science 1663, Springer 2022, ISBN 978-981-19-7241-6 [contents] - [i14]Guowen Xu, Xingshuo Han, Shengmin Xu, Tianwei Zhang, Hongwei Li, Xinyi Huang, Robert H. Deng:
Hercules: Boosting the Performance of Privacy-preserving Federated Learning. CoRR abs/2207.04620 (2022) - [i13]Guowen Xu, Shengmin Xu, Jianting Ning, Tianwei Zhang, Xinyi Huang, Hongwei Li, Rongxing Lu:
New Secure Sparse Inner Product with Applications to Machine Learning. CoRR abs/2210.08421 (2022) - [i12]Hao Ren, Guowen Xu, Tianwei Zhang, Jianting Ning, Xinyi Huang, Hongwei Li, Rongxing Lu:
Efficiency Boosting of Secure Cross-platform Recommender Systems over Sparse Data. CoRR abs/2212.01537 (2022) - [i11]Jiaojiao Wu, Jianfeng Wang, Xinwei Yong, Xinyi Huang, Xiaofeng Chen:
New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead. IACR Cryptol. ePrint Arch. 2022: 1028 (2022) - 2021
- [j145]Haixia Chen, Xinyi Huang, Wei Wu, Yi Mu:
Privacy-Aware Image Authentication from Cryptographic Primitives. Comput. J. 64(8): 1178-1192 (2021) - [j144]Chao Lin, Debiao He
, Hongjie Zhang, Lisong Shao, Xinyi Huang:
Privacy-Enhancing Decentralized Anonymous Credential in Smart Grids. Comput. Stand. Interfaces 75: 103505 (2021) - [j143]Meixia Miao, Yunling Wang, Jianfeng Wang, Xinyi Huang:
Verifiable database supporting keyword searches with forward security. Comput. Stand. Interfaces 77: 103491 (2021) - [j142]Fei Zhu
, Xun Yi
, Alsharif Abuadbba, Ibrahim Khalil
, Surya Nepal
, Xinyi Huang
:
Cost-Effective Authenticated Data Redaction With Privacy Protection in IoT. IEEE Internet Things J. 8(14): 11678-11689 (2021) - [j141]Fatemeh Rezaeibagha
, Yi Mu
, Ke Huang
, Leyou Zhang
, Xinyi Huang
:
Secure and Privacy-Preserved Data Collection for IoT Wireless Sensors. IEEE Internet Things J. 8(24): 17669-17677 (2021) - [j140]Liang Zhao
, Xingfeng Wang, Xinyi Huang:
Verifiable single-server private information retrieval from LWE with binary errors. Inf. Sci. 546: 897-923 (2021) - [j139]Chao Lin
, Debiao He
, Xinyi Huang
, Xiang Xie, Kim-Kwang Raymond Choo
:
PPChain: A Privacy-Preserving Permissioned Blockchain Architecture for Cryptocurrency and Other Regulated Applications. IEEE Syst. J. 15(3): 4367-4378 (2021) - [j138]Jianghua Liu
, Jingyu Hou
, Wenjie Yang
, Yang Xiang
, Wanlei Zhou
, Wei Wu
, Xinyi Huang
:
Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control. IEEE Trans. Computers 70(7): 1120-1131 (2021) - [j137]Jianghua Liu
, Jinhua Ma
, Yang Xiang
, Wanlei Zhou
, Xinyi Huang
:
Authenticated Medical Documents Releasing with Privacy Protection and Release Control. IEEE Trans. Dependable Secur. Comput. 18(1): 448-459 (2021) - [j136]Haijiang Wang
, Jianting Ning
, Xinyi Huang
, Guiyi Wei
, Geong Sen Poh
, Ximeng Liu
:
Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud. IEEE Trans. Dependable Secur. Comput. 18(3): 1307-1319 (2021) - [j135]Jianghong Wei
, Xiaofeng Chen
, Xinyi Huang
, Xuexian Hu
, Willy Susilo
:
RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud. IEEE Trans. Dependable Secur. Comput. 18(5): 2301-2315 (2021) - [j134]Yusheng Xia
, Jinshu Su
, Rongmao Chen
, Xinyi Huang
:
APGS: An Efficient Source-Accountable and Metadata-Private Protocol in the Network Layer. IEEE Trans. Inf. Forensics Secur. 16: 1245-1260 (2021) - [j133]Chao Lin
, Debiao He
, Xinyi Huang
, Kim-Kwang Raymond Choo
:
OBFP: Optimized Blockchain-Based Fair Payment for Outsourcing Computations in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 16: 3241-3253 (2021) - [j132]Shengmin Xu
, Jianting Ning
, Jinhua Ma, Xinyi Huang
, Robert H. Deng
:
K-Time Modifiable and Epoch-Based Redactable Blockchain. IEEE Trans. Inf. Forensics Secur. 16: 4507-4520 (2021) - [j131]Shengmin Xu
, Jianting Ning
, Xinyi Huang
, Jianying Zhou
, Robert H. Deng
:
Server-Aided Bilateral Access Control for Secure Data Sharing With Dynamic User Groups. IEEE Trans. Inf. Forensics Secur. 16: 4746-4761 (2021) - [j130]Chao Lin
, Debiao He
, Xinyi Huang
, Neeraj Kumar
, Kim-Kwang Raymond Choo
:
BCPPA: A Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 22(12): 7408-7420 (2021) - [j129]Xiaofeng Chen
, Hui Li
, Jin Li
, Qian Wang
, Xinyi Huang
, Willy Susilo
, Yang Xiang
:
Publicly Verifiable Databases With All Efficient Updating Operations. IEEE Trans. Knowl. Data Eng. 33(12): 3729-3740 (2021) - [j128]Chao Lin, Debiao He, Sherali Zeadally, Xinyi Huang, Zhe Liu:
Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities. ACM Trans. Internet Techn. 21(2): 40:1-40:21 (2021) - [j127]Peng Jiang
, Fuchun Guo
, Willy Susilo
, Man Ho Au
, Xinyi Huang
, Joseph K. Liu
:
Efficient and Adaptive Procurement Protocol with Purchasing Privacy. IEEE Trans. Serv. Comput. 14(3): 683-694 (2021) - [c71]Yi Wang, Rongmao Chen, Xinyi Huang, Jianting Ning, Baosheng Wang, Moti Yung:
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-Secure IBE. ASIACRYPT (2) 2021: 427-455 - [c70]Jianting Ning, Xinyi Huang, Geong Sen Poh, Jiaming Yuan
, Yingjiu Li, Jian Weng, Robert H. Deng
:
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset. CCS 2021: 2307-2320 - [c69]Yi Wang, Rongmao Chen, Guomin Yang
, Xinyi Huang, Baosheng Wang, Moti Yung:
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved. CRYPTO (4) 2021: 270-300 - [c68]Shao-Jun Yang, Xinyi Huang:
Category of CFR(Y)C and Weak Topos. FSDM 2021: 226-235 - [c67]Shao-Jun Yang, Xinyi Huang, Mingmei Zheng, Jinhua Ma:
Ring Trapdoor Redactable Signatures from Lattice. ISPEC 2021: 190-208 - [c66]Cheng-Jun Lin, Rui Xue, Xinyi Huang:
Linearly Homomorphic Signatures with Designated Combiner. ProvSec 2021: 327-345 - [c65]Shengmin Xu, Jianting Ning, Jinhua Ma, Xinyi Huang, HweeHwa Pang
, Robert H. Deng
:
Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog Computing. SACMAT 2021: 143-154 - [c64]Xu Yang, Xun Yi, Surya Nepal, Ibrahim Khalil
, Xinyi Huang, Jian Shen
:
Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs. SERVICES 2021: 11 - [i10]Yi Wang, Rongmao Chen, Guomin Yang, Xinyi Huang, Baosheng Wang, Moti Yung:
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved. IACR Cryptol. ePrint Arch. 2021: 862 (2021) - [i9]Yi Wang, Rongmao Chen, Xinyi Huang, Jianting Ning, Baosheng Wang, Moti Yung:
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE. IACR Cryptol. ePrint Arch. 2021: 1261 (2021) - [i8]Liang Zhao, Ze Chen, Liqun Chen, Xinyi Huang:
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile. IACR Cryptol. ePrint Arch. 2021: 1534 (2021) - 2020
- [j126]Yongcheng Song, Xinyi Huang, Yi Mu, Wei Wu:
An improved Durandal signature scheme. Sci. China Inf. Sci. 63(3) (2020) - [j125]Sheng Zhong, Xinyi Huang:
Special focus on security and privacy in blockchain-based applications. Sci. China Inf. Sci. 63(3) (2020) - [j124]Haixia Chen, Xinyi Huang, Wei Wu, Yi Mu:
Efficient and secure image authentication with robustness and versatility. Sci. China Inf. Sci. 63(12) (2020) - [j123]Wenjie Yang, Jian Weng, Xinyi Huang, Anjia Yang:
A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks. Comput. J. 63(8): 1139-1147 (2020) - [j122]Cheng-Jun Lin, Rui Xue, Shao-Jun Yang, Xinyi Huang, Shimin Li:
Linearly Homomorphic Signatures from Lattices. Comput. J. 63(12): 1871-1885 (2020) - [j121]Jianghua Liu, Jingyu Hou, Xinyi Huang, Yang Xiang, Tianqing Zhu
:
Secure and efficient sharing of authenticated energy usage data with privacy preservation. Comput. Secur. 92: 101756 (2020) - [j120]Xinyi Huang, Yuexin Zhang:
Indistinguishability and unextractablility of password-based authentication in blockchain. Future Gener. Comput. Syst. 112: 561-566 (2020) - [j119]Yudi Zhang, Debiao He, Xinyi Huang, Ding Wang, Kim-Kwang Raymond Choo
, Jing Wang:
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography. IEICE Trans. Inf. Syst. 103-D(2): 188-195 (2020) - [j118]Qi Feng, Debiao He
, Huaqun Wang
, Ding Wang
, Xinyi Huang:
Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography. IET Inf. Secur. 14(6): 724-732 (2020) - [j117]Chao Lin
, Debiao He
, Neeraj Kumar
, Xinyi Huang
, Pandi Vijayakumar
, Kim-Kwang Raymond Choo
:
HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes. IEEE Internet Things J. 7(2): 818-829 (2020) - [j116]Yuexin Zhang
, Xinyi Huang
, Xiaofeng Chen
, Leo Yu Zhang
, Jun Zhang
, Yang Xiang
:
A Hybrid Key Agreement Scheme for Smart Homes Using the Merkle Puzzle. IEEE Internet Things J. 7(2): 1061-1071 (2020) - [j115]Jie Li
, Rongmao Chen
, Jinshu Su, Xinyi Huang
, Xiaofeng Wang
:
ME-TLS: Middlebox-Enhanced TLS for Internet-of-Things Devices. IEEE Internet Things J. 7(2): 1216-1229 (2020) - [j114]Chao Lin, Debiao He
, Xinyi Huang, Xiang Xie, Kim-Kwang Raymond Choo
:
Blockchain-based system for secure outsourcing of bilinear pairings. Inf. Sci. 527: 590-601 (2020) - [j113]Yongcheng Song, Xinyi Huang, Yi Mu, Wei Wu, Huaxiong Wang:
A code-based signature scheme from the Lyubashevsky framework. Theor. Comput. Sci. 835: 15-30 (2020) - [j112]Jinhua Ma
, Jianghua Liu
, Xinyi Huang
, Yang Xiang
, Wei Wu
:
Authenticated Data Redaction with Fine-Grained Control. IEEE Trans. Emerg. Top. Comput. 8(2): 291-302 (2020) - [j111]Chao Lin
, Debiao He
, Xinyi Huang
, Muhammad Khurram Khan
, Kim-Kwang Raymond Choo
:
DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain. IEEE Trans. Inf. Forensics Secur. 15: 2440-2452 (2020) - [j110]Lingjun Zhao
, Chunhua Su, Zeyang Dai, Huakun Huang
, Shuxue Ding, Xinyi Huang, Zhaoyang Han:
Indoor device-free passive localization with DCNN for location-based services. J. Supercomput. 76(11): 8432-8449 (2020) - [j109]Jian Shen
, Dengzhi Liu, Debiao He
, Xinyi Huang
, Yang Xiang
:
Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing. IEEE Trans. Sustain. Comput. 5(2): 161-173 (2020) - [c63]Rongmao Chen, Xinyi Huang, Moti Yung:
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption. ASIACRYPT (2) 2020: 98-128 - [c62]Yudi Zhang, Debiao He, Fangguo Zhang, Xinyi Huang, Dawei Li:
An Efficient Blind Signature Scheme Based on SM2 Signature Algorithm. Inscrypt 2020: 368-384 - [c61]Jianting Ning, Xinyi Huang, Geong Sen Poh, Shengmin Xu, Jia-Ch'ng Loh
, Jian Weng, Robert H. Deng
:
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment. ESORICS (1) 2020: 3-22 - [c60]Fei Zhu
, Xun Yi, Sharif Abuadbba, Ibrahim Khalil, Xu Yang, Surya Nepal, Xinyi Huang:
Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments. ProvSec 2020: 145-165 - [i7]Rongmao Chen, Xinyi Huang, Moti Yung:
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption. IACR Cryptol. ePrint Arch. 2020: 1079 (2020)
2010 – 2019
- 2019
- [j108]Kai He
, Yijun Mao, Jianting Ning, Kaitai Liang
, Xinyi Huang, Emmanouil Panaousis
, George Loukas
:
A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality. IEEE Access 7: 50658-50668 (2019) - [j107]Wenjie Yang
, Shangpeng Wang, Xinyi Huang, Yi Mu:
On the Security of an Efficient and Robust Certificateless Signature Scheme for IIoT Environments. IEEE Access 7: 91074-91079 (2019) - [j106]Fatemeh Rezaeibagha
, Yi Mu
, Xinyi Huang, Wenjie Yang
, Ke Huang:
Fully Secure Lightweight Certificateless Signature Scheme for IIoT. IEEE Access 7: 144433-144443 (2019) - [j105]Xu Yang
, Xun Yi, Ibrahim Khalil
, Hui Cui
, Xuechao Yang
, Surya Nepal
, Xinyi Huang, Yali Zeng:
A new privacy-preserving authentication protocol for anonymous web browsing. Concurr. Comput. Pract. Exp. 31(21) (2019) - [j104]Cristina Alcaraz, Mike Burmester
, Jorge Cuéllar, Xinyi Huang
, Panayiotis Kotzanikolaou
, Mihalis Psarakis
:
Guest Editorial Special Issue on Secure Embedded IoT Devices for Resilient Critical Infrastructures. IEEE Internet Things J. 6(5): 7988-7991 (2019) - [j103]Yuexin Zhang
, Hong Zhao, Yang Xiang
, Xinyi Huang, Xiaofeng Chen
:
A Key Agreement Scheme for Smart Homes Using the Secret Mismatch Problem. IEEE Internet Things J. 6(6): 10251-10260 (2019) - [j102]Jinguang Han
, Liqun Chen
, Willy Susilo
, Xinyi Huang, Aniello Castiglione
, Kaitai Liang
:
Fine-grained information flow control using attributes. Inf. Sci. 484: 167-182 (2019) - [j101]Huige Wang
, Yuan Zhang
, Kefei Chen, Guangye Sui, Yunlei Zhao, Xinyi Huang:
Functional broadcast encryption with applications to data sharing for cloud storage. Inf. Sci. 502: 109-124 (2019) - [j100]Xu Yang, Xun Yi, Ibrahim Khalil
, Yali Zeng, Xinyi Huang, Surya Nepal
, Xuechao Yang
, Hui Cui
:
A lightweight authentication scheme for vehicular ad hoc networks based on MSR. Veh. Commun. 15: 16-27 (2019) - [c59]