


default search action
Lihua Wang 0001
Person information
- unicode name: 王立華
- affiliation: National Institute of Information and Communications Technology (NICT), Tokyo, Japan
- affiliation (PhD 2006): University of Tsukuba, Ibaraki, Japan
Other persons with the same name
- Lihua Wang (aka: Li-hua Wang, Li-Hua Wang) — disambiguation page
- Lihua Wang 0002
— Harbin Medical University, Department of Neurology, China
- Lihua Wang 0003 (aka: Li-hua Wang 0003) — Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China
- Lihua Wang 0004 — City University of Hong Kong, Department of Computer, Hong Kong
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Le Trieu Phong, Tran Thi Phuong, Lihua Wang, Seiichi Ozawa:
Frameworks for Privacy-Preserving Federated Learning. IEICE Trans. Inf. Syst. 107(1): 2-12 (2024) - [c28]Ryousuke Wakabayashi, Lihua Wang, Ryo Nojima, Atsushi Waseda:
Security Evaluation of Decision Tree Meets Data Anonymization. ICISSP 2024: 853-860 - [c27]Haruto Yokomitsu, Ryo Nojima, Lihua Wang:
Simple Privacy-Preserving Federated Learning with Different Encryption Keys. ISITA 2024: 115-119 - 2023
- [c26]Ryo Nojima
, Lihua Wang
:
Differential Private (Random) Decision Tree Without Adding Noise. ICONIP (9) 2023: 162-174 - 2022
- [j24]Fuki Yamamoto
, Seiichi Ozawa
, Lihua Wang
:
eFL-Boost: Efficient Federated Learning for Gradient Boosting Decision Trees. IEEE Access 10: 43954-43963 (2022) - [j23]Sachiko Kanamori, Taeko Abe, Takuma Ito, Keita Emura, Lihua Wang, Shuntaro Yamamoto, Le Trieu Phong, Kaien Abe, Sangwook Kim, Ryo Nojima, Seiichi Ozawa, Shiho Moriai:
Privacy-Preserving Federated Learning for Detecting Fraudulent Financial Transactions in Japanese Banks. J. Inf. Process. 30: 789-795 (2022) - [c25]Septiviana Savitri Asrori, Lihua Wang
, Seiichi Ozawa:
Permissioned Blockchain-Based XGBoost for Multi Banks Fraud Detection. ICONIP (3) 2022: 683-692 - 2021
- [c24]Kengo Itokazu, Lihua Wang, Seiichi Ozawa:
Outlier Detection by Privacy-Preserving Ensemble Decision Tree U sing Homomorphic Encryption. IJCNN 2021: 1-7 - 2020
- [j22]Arinjita Paul, Lihua Wang, S. Sharmila Deva Selvi, C. Pandu Rangan:
Non-transferability in Proxy Re-Encryption Revisited. J. Internet Serv. Inf. Secur. 10(3): 1-30 (2020) - [c23]Fuki Yamamoto
, Lihua Wang
, Seiichi Ozawa
:
New Approaches to Federated XGBoost Learning for Privacy-Preserving Data Analysis. ICONIP (2) 2020: 558-569 - [c22]Lihua Wang, Tushar Kanti Saha
, Yoshinori Aono, Takeshi Koshiba
, Shiho Moriai:
Enhanced Secure Comparison Schemes Using Homomorphic Encryption. NBiS 2020: 211-224
2010 – 2019
- 2019
- [j21]Jing Li
, Licheng Wang, Lihua Wang, Xianmin Wang
, Zhengan Huang, Jin Li:
Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios. Concurr. Comput. Pract. Exp. 31(22) (2019) - [c21]Takehiro Tezuka, Lihua Wang, Takuya Hayashi
, Seiichi Ozawa:
A Fast Privacy-Preserving Multi-Layer Perceptron Using Ring-LWE-Based Homomorphic Encryption. ICDM Workshops 2019: 37-44 - 2018
- [j20]Licheng Wang, Zonghua Zhang
, Mianxiong Dong, Lihua Wang, Zhenfu Cao
, Yixian Yang:
Securing Named Data Networking: Attribute-Based Encryption and Beyond. IEEE Commun. Mag. 56(11): 76-81 (2018) - [j19]Yoshinori Aono, Takuya Hayashi
, Le Trieu Phong, Lihua Wang:
Efficient Homomorphic Encryption with Key Rotation and Security Update. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 39-50 (2018) - [j18]Le Trieu Phong
, Yoshinori Aono, Takuya Hayashi
, Lihua Wang
, Shiho Moriai:
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption. IEEE Trans. Inf. Forensics Secur. 13(5): 1333-1345 (2018) - [c20]Sangwook Kim, Masahiro Omori, Takuya Hayashi
, Toshiaki Omori, Lihua Wang, Seiichi Ozawa:
Privacy-Preserving Naive Bayes Classification Using Fully Homomorphic Encryption. ICONIP (4) 2018: 349-358 - 2017
- [j17]Yoshinori Aono, Takuya Hayashi
, Le Trieu Phong, Lihua Wang:
Input and Output Privacy-Preserving Linear Regression. IEICE Trans. Inf. Syst. 100-D(10): 2339-2347 (2017) - [c19]Le Trieu Phong, Yoshinori Aono, Takuya Hayashi
, Lihua Wang, Shiho Moriai:
Privacy-Preserving Deep Learning: Revisited and Enhanced. ATIS 2017: 100-110 - [c18]Lihua Wang
, Yoshinori Aono, Le Trieu Phong:
A New Secure Matrix Multiplication from Ring-LWE. CANS 2017: 93-111 - [c17]Yoshinori Aono, Takuya Hayashi
, Le Trieu Phong, Lihua Wang:
Efficient Key-Rotatable and Security-Updatable Homomorphic Encryption. SCC@AsiaCCS 2017: 35-42 - [c16]Lihua Wang, Takuya Hayashi
, Yoshinori Aono, Le Trieu Phong:
A Generic yet Efficient Method for Secure Inner Product. NSS 2017: 217-232 - [c15]Shohei Kuri, Takuya Hayashi
, Toshiaki Omori, Seiichi Ozawa, Yoshinori Aono, Le Trieu Phong, Lihua Wang, Shiho Moriai:
Privacy preserving extreme learning machine using additively homomorphic encryption. SSCI 2017: 1-8 - [i10]Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai:
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2017: 715 (2017) - 2016
- [j16]Yoshinori Aono, Takuya Hayashi
, Le Trieu Phong, Lihua Wang:
Privacy-Preserving Logistic Regression with Distributed Data Sources via Homomorphic Encryption. IEICE Trans. Inf. Syst. 99-D(8): 2079-2089 (2016) - [c14]Yoshinori Aono, Takuya Hayashi
, Le Trieu Phong, Lihua Wang:
Scalable and Secure Logistic Regression via Homomorphic Encryption. CODASPY 2016: 142-144 - [i9]Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang:
Scalable and Secure Logistic Regression via Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2016: 111 (2016) - [i8]Le Trieu Phong, Lihua Wang, Yoshinori Aono, Manh Ha Nguyen, Xavier Boyen:
Proxy Re-Encryption Schemes with Key Privacy from LWE. IACR Cryptol. ePrint Arch. 2016: 327 (2016) - 2015
- [c13]Lihua Wang, Ryo Nojima, Shiho Moriai:
A Secure Automobile Information Sharing System. IoTPTS@AsiaCCS 2015: 19-26 - [c12]Lihua Wang, Takuya Hayashi
, Sachiko Kanamori, Atsushi Waseda, Ryo Nojima, Shiho Moriai:
POSTER: PRINCESS: A Secure Cloud File Storage System for Managing Data with Hierarchical Levels of Sensitivity. CCS 2015: 1684-1686 - [i7]Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang:
Fast and Secure Linear Regression and Biometric Authentication with Security Update. IACR Cryptol. ePrint Arch. 2015: 692 (2015) - [i6]Yoshinori Aono, Le Trieu Phong, Lihua Wang:
Hardness Estimation of LWE via Band Pruning. IACR Cryptol. ePrint Arch. 2015: 1026 (2015) - 2014
- [j15]Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan, Yixian Yang:
Efficient threshold public key encryption with full security based on dual pairing vector spaces. Int. J. Commun. Syst. 27(12): 4059-4077 (2014) - 2013
- [j14]Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan, Yixian Yang:
Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie-Hellman Assumption. Comput. J. 56(10): 1249-1257 (2013) - [j13]Ping Pan, Licheng Wang, Yixian Yang, Yuanju Gan, Lihua Wang, Chengqian Xu:
Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups. Fundam. Informaticae 126(1): 103-119 (2013) - [j12]Yuanju Gan
, Lihua Wang, Licheng Wang, Ping Pan, Yixian Yang:
Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks. Int. J. Distributed Sens. Networks 9 (2013) - [j11]Lihua Wang, Jun Shao, Zhenfu Cao
, Masahiro Mambo, Akihiro Yamamura
, Licheng Wang:
Certificate-based proxy decryption systems with revocability in the standard model. Inf. Sci. 247: 188-201 (2013) - [c11]Yoshinori Aono, Xavier Boyen, Le Trieu Phong, Lihua Wang:
Key-Private Proxy Re-encryption under LWE. INDOCRYPT 2013: 1-18 - 2012
- [j10]Lihua Wang, Licheng Wang, Masahiro Mambo, Eiji Okamoto:
Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 70-88 (2012) - [j9]Takuya Hayashi
, Naoyuki Shinohara, Lihua Wang, Shin'ichiro Matsuo, Masaaki Shirase, Tsuyoshi Takagi:
Solving a 676-Bit Discrete Logarithm Problem in GF(36n). IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 204-212 (2012) - [j8]Ping Pan, Lihua Wang, Licheng Wang, Lixiang Li
, Yixian Yang:
CSP-DHIES: a new public-key encryption scheme from matrix conjugation. Secur. Commun. Networks 5(7): 809-822 (2012) - 2011
- [j7]Licheng Wang, Lihua Wang, Yun Pan, Zonghua Zhang, Yixian Yang:
Discrete logarithm based additively homomorphic encryption and secure data aggregation. Inf. Sci. 181(16): 3308-3322 (2011) - 2010
- [j6]Licheng Wang, Lihua Wang, Zhenfu Cao
, Yixian Yang, Xinxin Niu:
Conjugate adjoining problem in braid groups and new design of braid-based signatures. Sci. China Inf. Sci. 53(3): 524-536 (2010) - [c10]Lihua Wang, Licheng Wang, Zhenfu Cao
, Eiji Okamoto, Jun Shao:
New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems. Inscrypt 2010: 1-17 - [c9]Lihua Wang, Licheng Wang, Masahiro Mambo, Eiji Okamoto:
Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities. ICICS 2010: 383-400 - [c8]Lihua Wang, Licheng Wang, Masahiro Mambo, Eiji Okamoto:
New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks. Pairing 2010: 327-346 - [c7]Takuya Hayashi
, Naoyuki Shinohara, Lihua Wang, Shin'ichiro Matsuo, Masaaki Shirase, Tsuyoshi Takagi:
Solving a 676-Bit Discrete Logarithm Problem in GF(36n). Public Key Cryptography 2010: 351-367 - [i5]Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shin'ichiro Matsuo, Masaaki Shirase, Tsuyoshi Takagi:
Solving a 676-bit Discrete Logarithm Problem in GF(36n). IACR Cryptol. ePrint Arch. 2010: 90 (2010)
2000 – 2009
- 2009
- [j5]Shengbao Wang, Zhenfu Cao
, Kim-Kwang Raymond Choo
, Lihua Wang:
An improved identity-based key agreement protocol and its security proof. Inf. Sci. 179(3): 307-318 (2009) - [c6]Licheng Wang, Lihua Wang, Yun Pan, Zonghua Zhang, Yixian Yang:
Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation. ICICS 2009: 493-502 - [i4]Licheng Wang, Lihua Wang, Zhenfu Cao, Eiji Okamoto, Jun Shao:
New Cryptosystems From CSP-Based Self-Distributive Systems. IACR Cryptol. ePrint Arch. 2009: 566 (2009) - 2008
- [j4]Shengbao Wang, Zhenfu Cao
, Maurizio Adriano Strangio, Lihua Wang:
Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol. IEEE Commun. Lett. 12(2): 149-151 (2008) - [i3]Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo, Lihua Wang:
Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol. IACR Cryptol. ePrint Arch. 2008: 1 (2008) - 2007
- [j3]Lihua Wang, Eiji Okamoto, Ying Miao, Takeshi Okamoto, Hiroshi Doi:
An ID-SP-M4M Scheme and Its Security Analysis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 91-100 (2007) - [c5]Junji Nakazato, Lihua Wang, Akihiro Yamamura
:
Privacy Enhancing Credentials. ASIAN 2007: 55-61 - [c4]Lihua Wang, Jun Shao, Zhenfu Cao
, Masahiro Mambo, Akihiro Yamamura
:
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. INDOCRYPT 2007: 297-311 - [i2]Shengbao Wang, Zhenfu Cao, Maurizio Adriano Strangio, Lihua Wang:
Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol. IACR Cryptol. ePrint Arch. 2007: 26 (2007) - 2006
- [j2]Lihua Wang, Zhenfu Cao, Takeshi Okamoto, Ying Miao, Eiji Okamoto:
Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 106-114 (2006) - [i1]Lihua Wang, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto:
A Subject-Delegated Decryption Scheme with "Tightly" Limited Authority. IACR Cryptol. ePrint Arch. 2006: 344 (2006) - 2005
- [j1]Gennian Ge, Ying Miao, Lihua Wang:
Combinatorial Constructions for Optimal Splitting Authentication Codes. SIAM J. Discret. Math. 18(4): 663-678 (2005) - [c3]Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto:
Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys. CIS (2) 2005: 198-203 - [c2]Lihua Wang, Eiji Okamoto, Ying Miao, Takeshi Okamoto, Hiroshi Doi:
ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps. WCC 2005: 291-303 - 2004
- [c1]Lihua Wang, Zhenfu Cao, Eiji Okamoto, Ying Miao, Takeshi Okamoto:
Transformation-free proxy cryptosystems and their applications to electronic commerce. InfoSecu 2004: 92-98
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-03 00:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint