


Остановите войну!
for scientists:


default search action
Huaxiong Wang
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j119]Jian Ding, Changlu Lin
, Fuchun Lin, Huaxiong Wang:
Full threshold change range of threshold changeable secret sharing. Des. Codes Cryptogr. 91(7): 2421-2447 (2023) - [j118]Kexin Xu
, Benjamin Hong Meng Tan
, Li-Ping Wang, Khin Mi Mi Aung
, Huaxiong Wang:
Privacy-preserving outsourcing decision tree evaluation from homomorphic encryption. J. Inf. Secur. Appl. 77: 103582 (2023) - [j117]Benoît Libert, San Ling, Khoa Nguyen
, Huaxiong Wang:
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors. J. Cryptol. 36(3): 23 (2023) - [j116]Jian Ding, Pinhui Ke, Changlu Lin, Huaxiong Wang:
Ramp Scheme Based on CRT for Polynomial Ring over Finite Field. J. Syst. Sci. Complex. 36(1): 129-150 (2023) - [j115]Jingting Xue, Shuqin Luo
, Qinfang Deng, Lingjie Shi, Xiaojun Zhang, Huaxiong Wang:
KA: Keyword-based auditing with frequency hiding and retrieval reliability for smart government. J. Syst. Archit. 138: 102856 (2023) - [j114]Jingwei Hu
, Wen Wang
, Kris Gaj
, Liping Wang, Huaxiong Wang
:
Engineering Practical Rank-Code-Based Cryptographic Schemes on Embedded Hardware. A Case Study on ROLLO. IEEE Trans. Computers 72(7): 2094-2110 (2023) - [j113]Xiaoqin Feng
, Jianfeng Ma
, Huaxiong Wang
, Sheng Wen
, Yang Xiang
, Yinbin Miao
:
Space-Efficient Storage Structure of Blockchain Transactions Supporting Secure Verification. IEEE Trans. Cloud Comput. 11(3): 2631-2645 (2023) - [j112]Kexin Xu, Benjamin Hong Meng Tan, Li-Ping Wang, Khin Mi Mi Aung, Huaxiong Wang:
Multi-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrapping. Theor. Comput. Sci. 968: 114026 (2023) - [j111]Xiaoqin Feng
, Jianfeng Ma
, Huaxiong Wang
, Yinbin Miao
, Ximeng Liu
, Zhongyuan Jiang
:
An Accessional Signature Scheme With Unmalleable Transaction Implementation to Securely Redeem Cryptocurrencies. IEEE Trans. Inf. Forensics Secur. 18: 4144-4156 (2023) - [j110]Jun Xu
, Santanu Sarkar
, Lei Hu
, Huaxiong Wang
, Yanbin Pan
:
Revisiting Modular Inversion Hidden Number Problem and Its Applications. IEEE Trans. Inf. Theory 69(8): 5337-5356 (2023) - [j109]Xiaojun Zhang
, Chao Huang
, Dawu Gu
, Jingwei Zhang, Huaxiong Wang
:
BIB-MKS: Post-Quantum Secure Biometric Identity-Based Multi-Keyword Search Over Encrypted Data in Cloud Storage Systems. IEEE Trans. Serv. Comput. 16(1): 122-133 (2023) - [c145]Stanislav Kruglik, Gaojun Luo, Wilton Kim, Shubhransh Singhvi, Han Mao Kiah, San Ling, Huaxiong Wang:
Repair of Reed-Solomon Codes in the Presence of Erroneous Nodes. ISIT 2023: 1003-1008 - [c144]Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang:
Two-Server Private Information Retrieval with Optimized Download Rate and Result Verification. ISIT 2023: 1354-1359 - [c143]Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang:
k-server Byzantine-Resistant PIR Scheme with Optimal Download Rate and Optimal File Size. ISIT 2023: 1532-1537 - [c142]Han Mao Kiah, Wilton Kim, Stanislav Kruglik, San Ling, Huaxiong Wang:
Explicit Low-Bandwidth Evaluation Schemes for Weighted Sums of Reed-Solomon-Coded Symbols. ISIT 2023: 1973-1978 - [i88]Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang:
Two-Server Private Information Retrieval with Optimized Download Rate and Result Verification. CoRR abs/2301.11730 (2023) - [i87]Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang:
k-server Byzantine-Resistant PIR Scheme with Optimal Download Rate and Optimal File Size. CoRR abs/2302.02230 (2023) - [i86]Stanislav Kruglik, Gaojun Luo, Wilton Kim, Shubhransh Singhvi, Han Mao Kiah, San Ling, Huaxiong Wang:
Repair of Reed-Solomon Codes in the Presence of Erroneous Nodes. CoRR abs/2305.03442 (2023) - [i85]Kwok-Yan Lam, Xianhui Lu, Linru Zhang, Xiangning Wang, Huaxiong Wang, Si Qi Goh:
Efficient FHE-based Privacy-Enhanced Neural Network for AI-as-a-Service. IACR Cryptol. ePrint Arch. 2023: 647 (2023) - [i84]Jingwei Hu, Junyan Chen, Wangchen Dai, Huaxiong Wang:
Fully Homomorphic Encryption-Based Protocols for Enhanced Private Set Intersection Functionalities. IACR Cryptol. ePrint Arch. 2023: 1407 (2023) - 2022
- [j108]Shaoquan Jiang, Yeow Meng Chee, San Ling, Huaxiong Wang, Chaoping Xing:
A new framework for deniable secure key exchange. Inf. Comput. 285(Part): 104866 (2022) - [j107]Chenyu Huang, Yongjun Zhao
, Huangxun Chen, Xu Wang, Qian Zhang
, Yanjiao Chen
, Huaxiong Wang
, Kwok-Yan Lam
:
ZkRep: A Privacy-Preserving Scheme for Reputation-Based Blockchain System. IEEE Internet Things J. 9(6): 4330-4342 (2022) - [j106]Jian Ding, Pinhui Ke, Changlu Lin, Huaxiong Wang:
Bivariate polynomial-based secret sharing schemes with secure secret reconstruction. Inf. Sci. 593: 398-414 (2022) - [j105]Yanhong Xu
, Reihaneh Safavi-Naini, Khoa Nguyen
, Huaxiong Wang:
Traceable policy-based signatures and instantiation from lattices. Inf. Sci. 607: 1286-1310 (2022) - [j104]Xiaojun Zhang, Chao Huang, Dawu Gu, Jingwei Zhang, Jingting Xue, Huaxiong Wang:
Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems. J. Syst. Archit. 127: 102508 (2022) - [j103]Hang Cheng
, Ximeng Liu
, Huaxiong Wang
, Yan Fang, Meiqing Wang
, Xiaopeng Zhao:
SecureAD: A Secure Video Anomaly Detection Framework on Convolutional Neural Network in Edge Computing Environment. IEEE Trans. Cloud Comput. 10(2): 1413-1427 (2022) - [j102]Chenyu Wang, Ding Wang
, Yi Tu
, Guoai Xu
, Huaxiong Wang
:
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks. IEEE Trans. Dependable Secur. Comput. 19(1): 507-523 (2022) - [j101]Haining Yang
, Ye Su
, Jing Qin
, Huaxiong Wang
:
Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database. IEEE Trans. Dependable Secur. Comput. 19(2): 1320-1337 (2022) - [j100]Zhen Liu
, Guomin Yang
, Duncan S. Wong, Khoa Nguyen
, Huaxiong Wang
, Xiaorong Ke, Yining Liu:
Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key. IEEE Trans. Dependable Secur. Comput. 19(5): 2934-2951 (2022) - [j99]Jian Ding
, Changlu Lin
, Huaxiong Wang
, Chaoping Xing:
Communication Efficient Secret Sharing With Small Share Size. IEEE Trans. Inf. Theory 68(1): 659-669 (2022) - [j98]Xiaojun Zhang
, Jie Zhao
, Chunxiang Xu
, Huaxiong Wang
, Yuan Zhang
:
DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage. IEEE Trans. Serv. Comput. 15(1): 334-345 (2022) - [c141]Liang Feng Zhang, Huaxiong Wang, Li-Ping Wang:
Byzantine-Robust Private Information Retrieval with Low Communication and Efficient Decoding. AsiaCCS 2022: 1079-1085 - [c140]Jun Xu
, Santanu Sarkar
, Huaxiong Wang
, Lei Hu
:
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange. ASIACRYPT (3) 2022: 771-799 - [c139]Khin Mi Mi Aung
, Enhui Lim
, Sim Jun Jie
, Benjamin Hong Meng Tan
, Huaxiong Wang
, Sze Ling Yeo:
Field Instruction Multiple Data. EUROCRYPT (1) 2022: 611-641 - [c138]Liang Feng Zhang, Huaxiong Wang:
Multi-Server Verifiable Computation of Low-Degree Polynomials. SP 2022: 596-613 - [i83]Han Mao Kiah, Wilton Kim, Stanislav Kruglik, San Ling, Huaxiong Wang:
Explicit Low-Bandwidth Evaluation Schemes for Weighted Sums of Reed-Solomon-Coded Symbols. CoRR abs/2209.03251 (2022) - [i82]Khin Mi Mi Aung, Enhui Lim, Sim Jun Jie, Benjamin Hong Meng Tan, Huaxiong Wang, Sze Ling Yeo:
Field Instruction Multiple Data. IACR Cryptol. ePrint Arch. 2022: 771 (2022) - [i81]Jingwei Hu, Wen Wang, Kris Gaj, Donglong Chen, Huaxiong Wang:
Universal Gaussian Elimination Hardware for Cryptographic Purposes. IACR Cryptol. ePrint Arch. 2022: 928 (2022) - [i80]Jun Xu, Santanu Sarkar, Huaxiong Wang, Lei Hu:
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange. IACR Cryptol. ePrint Arch. 2022: 1239 (2022) - 2021
- [j97]Xiaojun Zhang
, Chao Huang, Chunxiang Xu
, Yuan Zhang
, Jingwei Zhang, Huaxiong Wang
:
Key-Leakage Resilient Encrypted Data Aggregation With Lightweight Verification in Fog-Assisted Smart Grids. IEEE Internet Things J. 8(10): 8234-8245 (2021) - [j96]Zuling Chang
, Martianus Frederic Ezerman
, Adamas Aqsa Fahreza
, San Ling
, Janusz Szmidt, Huaxiong Wang
:
Binary de Bruijn Sequences via Zech's Logarithms. SN Comput. Sci. 2(4): 314 (2021) - [j95]Xiaojun Zhang
, Jie Zhao, Chunxiang Xu
, Hongwei Li
, Huaxiong Wang, Yuan Zhang
:
CIPPPA: Conditional Identity Privacy-Preserving Public Auditing for Cloud-Based WBANs Against Malicious Auditors. IEEE Trans. Cloud Comput. 9(4): 1362-1375 (2021) - [j94]Benoît Libert, San Ling
, Fabrice Mouhartem, Khoa Nguyen
, Huaxiong Wang:
Adaptive oblivious transfer with access control from lattice assumptions. Theor. Comput. Sci. 891: 210-229 (2021) - [j93]Xiaojun Zhang, Chunxiang Xu
, Huaxiong Wang
, Yuan Zhang
, Shixiong Wang:
FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things. IEEE Trans. Dependable Secur. Comput. 18(3): 1019-1032 (2021) - [j92]Hang Cheng
, Huaxiong Wang
, Ximeng Liu
, Yan Fang, Meiqing Wang
, Xiaojun Zhang
:
Person Re-Identification over Encrypted Outsourced Surveillance Videos. IEEE Trans. Dependable Secur. Comput. 18(3): 1456-1473 (2021) - [j91]Benjamin Hong Meng Tan
, Hyung Tae Lee
, Huaxiong Wang
, Shu Qin Ren, Khin Mi Mi Aung
:
Efficient Private Comparison Queries Over Encrypted Databases Using Fully Homomorphic Encryption With Finite Fields. IEEE Trans. Dependable Secur. Comput. 18(6): 2861-2874 (2021) - [c137]Khoa Nguyen
, Reihaneh Safavi-Naini, Willy Susilo
, Huaxiong Wang, Yanhong Xu
, Neng Zeng:
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation. Public Key Cryptography (2) 2021: 678-708 - [c136]San Ling, Khoa Nguyen
, Duong Hieu Phan
, Hanh Tang, Huaxiong Wang:
Zero-Knowledge Proofs for Committed Symmetric Boolean Functions. PQCrypto 2021: 339-359 - [e13]Mehdi Tibouchi
, Huaxiong Wang
:
Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part I. Lecture Notes in Computer Science 13090, Springer 2021, ISBN 978-3-030-92061-6 [contents] - [e12]Mehdi Tibouchi
, Huaxiong Wang
:
Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part II. Lecture Notes in Computer Science 13091, Springer 2021, ISBN 978-3-030-92074-6 [contents] - [e11]Mehdi Tibouchi
, Huaxiong Wang
:
Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part III. Lecture Notes in Computer Science 13092, Springer 2021, ISBN 978-3-030-92077-7 [contents] - [e10]Mehdi Tibouchi
, Huaxiong Wang
:
Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part IV. Lecture Notes in Computer Science 13093, Springer 2021, ISBN 978-3-030-92067-8 [contents] - [i79]Jenn-Bing Ong, Wee Keong Ng, Ivan Tjuawinata, Chao Li, Jielin Yang, Sai None Myne, Huaxiong Wang, Kwok-Yan Lam, C.-C. Jay Kuo:
Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation. CoRR abs/2101.04194 (2021) - [i78]Khoa Nguyen, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang, Yanhong Xu, Neng Zeng:
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation. IACR Cryptol. ePrint Arch. 2021: 226 (2021) - [i77]Yongjun Zhao, Huaxiong Wang, Kwok-Yan Lam:
Volume-Hiding Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy. IACR Cryptol. ePrint Arch. 2021: 786 (2021) - [i76]Cong Zuo, Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Jun Shao, Huaxiong Wang:
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy. IACR Cryptol. ePrint Arch. 2021: 1585 (2021) - 2020
- [j90]Jinhua Ma
, Shih-Ya Lin
, Xin Chen
, Hung-Min Sun
, Yeh-Cheng Chen
, Huaxiong Wang
:
A Blockchain-Based Application System for Product Anti-Counterfeiting. IEEE Access 8: 77642-77652 (2020) - [j89]Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith
, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan
, Josef Pieprzyk
, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou
:
Advances in security research in the Asiacrypt region. Commun. ACM 63(4): 76-81 (2020) - [j88]Yamin Wen, Fangguo Zhang, Huaxiong Wang, Yinbin Miao, Zheng Gong:
Intersection-policy private mutual authentication from authorized private set intersection. Sci. China Inf. Sci. 63(2): 122101 (2020) - [j87]Hyung Tae Lee, San Ling
, Jae Hong Seo, Huaxiong Wang, Taek-Young Youn:
Public key encryption with equality test in the standard model. Inf. Sci. 516: 89-108 (2020) - [j86]Yamin Wen, Fangguo Zhang
, Huaxiong Wang, Zheng Gong
, Yinbin Miao
, Yuqiao Deng:
A new secret handshake scheme with multi-symptom intersection for mobile healthcare social networks. Inf. Sci. 520: 142-154 (2020) - [j85]Haining Yang
, Ye Su, Jing Qin, Huaxiong Wang, Yongcheng Song:
Verifiable inner product computation on outsourced database for authenticated multi-user data sharing. Inf. Sci. 539: 295-311 (2020) - [j84]Jingwei Hu
, Marco Baldi
, Paolo Santini
, Neng Zeng
, San Ling
, Huaxiong Wang:
Lightweight Key Encapsulation Using LDPC Codes on FPGAs. IEEE Trans. Computers 69(3): 327-341 (2020) - [j83]Jingwei Hu
, Yao Liu
, Ray C. C. Cheung
, Shivam Bhasin
, San Ling
, Huaxiong Wang
:
Compact Code-Based Signature for Reconfigurable Devices With Side Channel Resilience. IEEE Trans. Circuits Syst. I Regul. Pap. 67-I(7): 2305-2316 (2020) - [j82]Yongcheng Song, Xinyi Huang, Yi Mu, Wei Wu, Huaxiong Wang:
A code-based signature scheme from the Lyubashevsky framework. Theor. Comput. Sci. 835: 15-30 (2020) - [j81]Martianus Frederic Ezerman
, Hyung Tae Lee
, San Ling
, Khoa Nguyen
, Huaxiong Wang
:
Provably Secure Group Signature Schemes From Code-Based Assumptions. IEEE Trans. Inf. Theory 66(9): 5754-5773 (2020) - [c135]Jun Zhao, Jing Tang
, Zengxiang Li, Huaxiong Wang, Kwok-Yan Lam, Kaiping Xue:
An Analysis of Blockchain Consistency in Asynchronous Networks: Deriving a Neat Bound. ICDCS 2020: 179-189 - [c134]Fuchun Lin, Mahdi Cheraghchi
, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang:
Leakage-Resilient Secret Sharing in Non-Compartmentalized Models. ITC 2020: 7:1-7:24 - [c133]Haining Yang
, Ye Su
, Jing Qin
, Jinhua Ma
, Huaxiong Wang
:
An Efficient Public Batch Auditing Scheme for Data Integrity in Standard Model. ML4CS (1) 2020: 578-592 - [c132]Shaoquan Jiang, Guang Gong, Jingnan He, Khoa Nguyen
, Huaxiong Wang:
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model. Public Key Cryptography (1) 2020: 396-427 - [e9]Shiho Moriai, Huaxiong Wang
:
Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12491, Springer 2020, ISBN 978-3-030-64836-7 [contents] - [e8]Shiho Moriai, Huaxiong Wang
:
Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12492, Springer 2020, ISBN 978-3-030-64833-6 [contents] - [e7]Shiho Moriai, Huaxiong Wang
:
Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part III. Lecture Notes in Computer Science 12493, Springer 2020, ISBN 978-3-030-64839-8 [contents] - [e6]Khoa Nguyen
, Wenling Wu, Kwok-Yan Lam, Huaxiong Wang:
Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020, Proceedings. Lecture Notes in Computer Science 12505, Springer 2020, ISBN 978-3-030-62575-7 [contents] - [i75]Yanhong Xu, Reihaneh Safavi-Naini, Khoa Nguyen
, Huaxiong Wang:
Traceable Policy-Based Signatures and Instantiation from Lattices. CoRR abs/2007.00033 (2020) - [i74]Shaoquan Jiang, Guang Gong, Jingnan He, Khoa Nguyen, Huaxiong Wang:
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model. IACR Cryptol. ePrint Arch. 2020: 140 (2020) - [i73]Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang:
Insecurity of the Public Key Encryption with Filtered Equality Test Proposed by Huang et al. IACR Cryptol. ePrint Arch. 2020: 749 (2020)
2010 – 2019
- 2019
- [j80]Myungsun Kim
, Hyung Tae Lee
, San Ling
, Shu Qin Ren, Benjamin Hong Meng Tan
, Huaxiong Wang:
Search Condition-Hiding Query Evaluation on Encrypted Databases. IEEE Access 7: 161283-161295 (2019) - [j79]Shixiong Wang, Longjiang Qu, Chao Li, Huaxiong Wang:
Further improvement of factoring N = pr qs with partial known bits. Adv. Math. Commun. 13(1): 121-135 (2019) - [j78]San Ling
, Khoa Nguyen
, Huaxiong Wang, Juanyang Zhang:
Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation. Comput. J. 62(12): 1849-1862 (2019) - [j77]Zuling Chang, Martianus Frederic Ezerman
, San Ling
, Huaxiong Wang:
On binary de Bruijn sequences from LFSRs with arbitrary characteristic polynomials. Des. Codes Cryptogr. 87(5): 1137-1160 (2019) - [j76]Yali Liu, Martianus Frederic Ezerman
, Huaxiong Wang:
Double verification protocol via secret sharing for low-cost RFID tags. Future Gener. Comput. Syst. 90: 118-128 (2019) - [j75]Yong Yu, Guomin Yang
, Huaxiong Wang:
Preface: Special Issue Cryptography and Provable Security. Int. J. Found. Comput. Sci. 30(4): 489-492 (2019) - [j74]Xiaojun Zhang, Huaxiong Wang, Chunxiang Xu:
Identity-based key-exposure resilient cloud storage public auditing scheme from lattices. Inf. Sci. 472: 223-234 (2019) - [j73]Xiaojun Zhang, Yao Tang, Huaxiong Wang, Chunxiang Xu, Yinbin Miao
, Hang Cheng:
Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage. Inf. Sci. 494: 193-207 (2019) - [j72]Hyung Tae Lee, San Ling
, Jae Hong Seo
, Huaxiong Wang:
Public key encryption with equality test from generic assumptions in the random oracle model. Inf. Sci. 500: 15-33 (2019) - [j71]Kai Zhang
, Jie Chen, Hyung Tae Lee
, Haifeng Qian, Huaxiong Wang:
Efficient public key encryption with equality test in the standard model. Theor. Comput. Sci. 755: 65-80 (2019) - [j70]Benoît Libert, San Ling
, Fabrice Mouhartem, Khoa Nguyen
, Huaxiong Wang:
Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption. Theor. Comput. Sci. 759: 72-97 (2019) - [j69]Khin Mi Mi Aung
, Hyung Tae Lee
, Benjamin Hong Meng Tan
, Huaxiong Wang:
Fully homomorphic encryption over the integers for non-binary plaintexts without the sparse subset sum problem. Theor. Comput. Sci. 771: 49-70 (2019) - [j68]San Ling
, Khoa Nguyen
, Huaxiong Wang, Yanhong Xu
:
Lattice-based group signatures: Achieving full dynamicity (and deniability) with ease. Theor. Comput. Sci. 783: 71-94 (2019) - [j67]Myungsun Kim
, Hyung Tae Lee
, San Ling
, Benjamin Hong Meng Tan
, Huaxiong Wang:
Private Compound Wildcard Queries Using Fully Homomorphic Encryption. IEEE Trans. Dependable Secur. Comput. 16(5): 743-756 (2019) - [c131]Khoa Nguyen
, Hanh Tang, Huaxiong Wang, Neng Zeng:
New Code-Based Privacy-Preserving Cryptographic Constructions. ASIACRYPT (2) 2019: 25-55 - [c130]Shixiong Wang, Juanyang Zhang, Jingnan He, Huaxiong Wang, Chao Li:
Simplified Revocable Hierarchical Identity-Based Encryption from Lattices. CANS 2019: 99-119 - [c129]Fuchun Lin, San Ling
, Huaxiong Wang, Neng Zeng:
Threshold Changeable Ramp Secret Sharing. CANS 2019: 308-327 - [c128]Jun Xu, Santanu Sarkar
, Lei Hu, Huaxiong Wang, Yanbin Pan:
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator. CRYPTO (1) 2019: 297-321 - [c127]San Ling
, Khoa Nguyen
, Huaxiong Wang, Yanhong Xu
:
Accountable Tracing Signatures from Lattices. CT-RSA 2019: 556-576 - [c126]Zhen Liu, Khoa Nguyen
, Guomin Yang
, Huaxiong Wang, Duncan S. Wong:
A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses. ESORICS (1) 2019: 726-746 - [c125]Zhen Liu, Guomin Yang
, Duncan S. Wong, Khoa Nguyen
, Huaxiong Wang:
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. EuroS&P 2019: 215-230 - [c124]Jingwei Hu, Wen Wang, Ray C. C. Cheung, Huaxiong Wang:
Optimized Polynomial Multiplier Over Commutative Rings on FPGAs: A Case Study on BIKE. FPT 2019: 231-234 - [c123]Fuchun Lin, Mahdi Cheraghchi
, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang:
Secret Sharing with Binary Shares. ITCS 2019: 53:1-53:20 - [c122]Fuchun Lin, Reihaneh Safavi-Naini, Mahdi Cheraghchi
, Huaxiong Wang:
Non-Malleable Codes against Active Physical Layer Adversary. ISIT 2019: 2753-2757 - [c121]Fuchun Lin, San Ling
, Reihaneh Safavi-Naini, Huaxiong Wang:
Non-malleable Coding for Arbitrary Varying Channels. ITW 2019: 1-5 - [c120]Benoît Libert, Khoa Nguyen
, Benjamin Hong Meng Tan, Huaxiong Wang:
Zero-Knowledge Elementary Databases with More Expressive Queries. Public Key Cryptography (1) 2019: 255-285 - [c119]San Ling
, Khoa Nguyen
, Huaxiong Wang, Yanhong Xu
:
Forward-Secure Group Signatures from Lattices. PQCrypto 2019: 44-64 - [c118]Chenyu Wang, Ding Wang
, Haowei Wang, Guoai Xu, Jing Sun, Huaxiong Wang:
Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things. SocialSec 2019: 95-109 - [i72]San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu:
Accountable Tracing Signatures from Lattices. CoRR abs/1901.00240 (2019) - [i71]Fuchun Lin, Mahdi Cheraghchi, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang:
Non-Malleable Secret Sharing against Affine Tampering. CoRR abs/1902.06195 (2019) - [i70]Fuchun Lin, San Ling, Reihaneh Safavi-Naini, Huaxiong Wang:
Non-malleable Coding for Arbitrary Varying Channels. CoRR abs/1906.11066 (2019) - [i69]Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen, Huaxiong Wang:
Provably Secure Group Signature Schemes from Code-Based Assumptions. CoRR abs/1909.04472 (2019) - [i68]Jun Zhao, Jing Tang, Zengxiang Li, Huaxiong Wang, Kwok-Yan Lam, Kaiping Xue:
An Analysis of Blockchain Consistency in Asynchronous Networks: Deriving a Neat Bound. CoRR abs/1909.06587 (2019) - [i67]Benjamin Hong Meng Tan, Hyung Tae Lee, Huaxiong Wang, Shu Qin Ren, Khin Mi Mi Aung:
Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields. IACR Cryptol. ePrint Arch. 2019: 332 (2019) - [i66]