default search action
Baodong Qin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j48]Xianyun Mei, Liangliang Wang, Baodong Qin, Kai Zhang, Yu Long:
EFTA: An Efficient and Fault-Tolerant Data Aggregation Scheme without TTP in Smart Grid. Comput. J. 67(6): 2368-2378 (2024) - [j47]Yongli Tang, Menghao Guo, Yachao Huo, Zongqu Zhao, Jinxia Yu, Baodong Qin:
An MLWE-Based Cut-and-Choose Oblivious Transfer Protocol. Entropy 26(9): 793 (2024) - [j46]Gang Han, Le Li, Baodong Qin, Dong Zheng:
Pairing-free Proxy Re-Encryption scheme with Equality Test for data security of IoT. J. King Saud Univ. Comput. Inf. Sci. 36(6): 102105 (2024) - [j45]Min Liu, Liangliang Wang, Kai Zhang, Yu Long, Baodong Qin:
A pairing-free certificate-based key-insulated aggregate signature scheme for wireless medical sensor networks. Peer Peer Netw. Appl. 17(2): 685-700 (2024) - [j44]Qinglan Zhao, Pan Li, Dong Zheng, Luyang Li, Baodong Qin:
Further construction of even-variable balanced rotation symmetric Boolean functions with optimal algebraic immunity. Theor. Comput. Sci. 1012: 114731 (2024) - 2023
- [j43]Le Li, Dong Zheng, Haoyu Zhang, Baodong Qin:
Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search. IEEE Access 11: 28688-28698 (2023) - [j42]Qinglan Zhao, Mengran Li, Zhixiong Chen, Baodong Qin, Dong Zheng:
A unified construction of weightwise perfectly balanced Boolean functions. Discret. Appl. Math. 337: 190-201 (2023) - [j41]Hui Cui, Zhiguo Wan, Huayi Qi, Baodong Qin, Xun Yi:
Password-authenticated proofs of retrievability for multiple devices checking cloud data. J. Inf. Secur. Appl. 75: 103480 (2023) - [j40]Yajun Fan, Baodong Qin, Dong Zheng:
A lattice-based designated-server public-key authenticated encryption with keyword search. J. Syst. Archit. 145: 103031 (2023) - [j39]Yidi Hao, Baodong Qin, Yitian Sun:
Privacy-Preserving Decision-Tree Evaluation with Low Complexity for Communication. Sensors 23(5): 2624 (2023) - [j38]Hui Cui, Xuechao Yang, Wencheng Yang, Baodong Qin, Xun Yi:
Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks. IEEE Trans. Netw. Sci. Eng. 10(4): 2347-2357 (2023) - [i7]Qinglan Zhao, Mengran Li, Zhixiong Chen, Baodong Qin, Dong Zheng:
A unified construction of weightwise perfectly balanced Boolean functions. IACR Cryptol. ePrint Arch. 2023: 460 (2023) - 2022
- [j37]Yanqi Zhao, Xiaoyi Yang, Yong Yu, Baodong Qin, Xiaojiang Du, Mohsen Guizani:
Blockchain-Based Auditable Privacy-Preserving Data Classification for Internet of Things. IEEE Internet Things J. 9(4): 2468-2484 (2022) - [j36]Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow:
Non-Malleable Functions and their Applications. J. Cryptol. 35(2): 11 (2022) - [j35]Gang Han, Xue Bai, Shengling Geng, Baodong Qin:
Efficient two-party SM2 signing protocol based on secret sharing. J. Syst. Archit. 132: 102738 (2022) - 2021
- [j34]Wenzheng Zhang, Baodong Qin, Xinfeng Dong, Aikui Tian:
Public-key encryption with bidirectional keyword search and its application to encrypted emails. Comput. Stand. Interfaces 78: 103542 (2021) - [c21]Baodong Qin, Xue Bai, Dong Zheng, Hui Cui, Yiyuan Luo:
Forward-Secure Revocable Identity-Based Encryption. ICICS (2) 2021: 321-340 - [c20]Baodong Qin, Hui Cui, Xiaokun Zheng, Dong Zheng:
Improved Security Model for Public-Key Authenticated Encryption with Keyword Search. ProvSec 2021: 19-38 - 2020
- [j33]Baodong Qin, Ximeng Liu, Zhuo Wei, Dong Zheng:
Space efficient revocable IBE for mobile devices in cloud computing. Sci. China Inf. Sci. 63(3) (2020) - [j32]Baodong Qin, Yu Chen, Qiong Huang, Ximeng Liu, Dong Zheng:
Public-key authenticated encryption with keyword search revisited: Security model and constructions. Inf. Sci. 516: 515-528 (2020) - [j31]Hui Cui, Robert H. Deng, Baodong Qin, Jian Weng:
Key regeneration-free ciphertext-policy attribute-based encryption and its application. Inf. Sci. 517: 217-229 (2020) - [j30]Hui Cui, Baodong Qin, Willy Susilo, Surya Nepal:
Robust digital signature revisited. Theor. Comput. Sci. 844: 87-96 (2020) - [j29]Dong Zheng, Baodong Qin, Yannan Li, Aikui Tian:
Cloud-Assisted Attribute-Based Data Sharing with Efficient User Revocation in the Internet of Things. IEEE Wirel. Commun. 27(3): 18-23 (2020) - [j28]Tianyu Chi, Baodong Qin, Dong Zheng:
An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted Medical Internet of Things. Wirel. Commun. Mob. Comput. 2020: 8816172:1-8816172:11 (2020)
2010 – 2019
- 2019
- [j27]Baodong Qin, Dong Zheng:
Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing. IEEE Access 7: 42331-42342 (2019) - [j26]Qinglan Zhao, Dong Zheng, Baodong Qin, Rui Guo:
Constructions of 2-Rotation Symmetric Semi-Bent Functions with Degree Bigger than 2. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(11): 1497-1503 (2019) - [j25]Baodong Qin, Qinglan Zhao, Dong Zheng, Hui Cui:
(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance. Inf. Sci. 490: 74-92 (2019) - [j24]Baodong Qin:
Tightly Secure Lossy Trapdoor Functions: Constructions and Applications. Secur. Commun. Networks 2019: 3636759:1-3636759:13 (2019) - [j23]Qinglan Zhao, Shuntong Yang, Dong Zheng, Baodong Qin:
A QR Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things. Secur. Commun. Networks 2019: 8105787:1-8105787:8 (2019) - 2018
- [j22]Huige Wang, Kefei Chen, Baodong Qin, Ziyuan Hu:
LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF. Sci. China Inf. Sci. 61(5): 058101:1-058101:3 (2018) - [j21]Gang Han, Hui Li, Baodong Qin, Dong Zheng:
Chameleon all-but-one extractable hash proof and its applications. Sci. China Inf. Sci. 61(9): 099103:1-099103:3 (2018) - [j20]Baodong Qin, Qinglan Zhao, Dong Zheng:
Bounded Revocable and Outsourceable ABE for Secure Data Sharing. Comput. J. 61(8): 1259-1268 (2018) - [j19]Shuai Han, Shengli Liu, Baodong Qin, Dawu Gu:
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness. Des. Codes Cryptogr. 86(3): 517-554 (2018) - [j18]Yu Chen, Baodong Qin, Haiyang Xue:
Regular lossy functions and their applications in leakage-resilient cryptography. Theor. Comput. Sci. 739: 13-38 (2018) - [c19]Yu Chen, Baodong Qin, Haiyang Xue:
Regularly Lossy Functions and Applications. CT-RSA 2018: 491-511 - [i6]Yu Chen, Baodong Qin, Haiyang Xue:
Regularly Lossy Functions and Their Applications. IACR Cryptol. ePrint Arch. 2018: 21 (2018) - 2017
- [j17]Huige Wang, Kefei Chen, Baodong Qin, Xuejia Lai, Yunhua Wen:
A new construction on randomized message-locked encryption in the standard model via UCEs. Sci. China Inf. Sci. 60(5): 52101 (2017) - [j16]Xu An Wang, Jianfeng Ma, Fatos Xhafa, Baodong Qin, Mingwu Zhang:
New efficient chosen ciphertext secure Elgamal encryption schemes for secure Cloud storage service. Int. J. Web Grid Serv. 13(3): 246-269 (2017) - [j15]Baodong Qin, Shengli Liu, Shifeng Sun, Robert H. Deng, Dawu Gu:
Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman. Inf. Sci. 406: 1-11 (2017) - [j14]Shifeng Sun, Dawu Gu, Udaya Parampalli, Yu Yu, Baodong Qin:
Public key encryption resilient to leakage and tampering attacks. J. Comput. Syst. Sci. 89: 142-156 (2017) - [j13]Ximeng Liu, Baodong Qin, Robert H. Deng, Yingjiu Li:
An Efficient Privacy-Preserving Outsourced Computation over Public Data. IEEE Trans. Serv. Comput. 10(5): 756-770 (2017) - [c18]Baodong Qin, Qinglan Zhao, Dong Zheng, Hui Cui:
Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure. CANS 2017: 504-514 - [c17]Hui Cui, Man Ho Au, Baodong Qin, Robert H. Deng, Xun Yi:
Fuzzy Public-Key Encryption Based on Biometric Data. ProvSec 2017: 400-409 - 2016
- [j12]Shifeng Sun, Joseph K. Liu, Yu Yu, Baodong Qin, Dawu Gu:
RKA-Secure Public Key Encryptions Against Efficiently Invertible Functions. Comput. J. 59(11): 1637-1658 (2016) - [j11]Hui Cui, Guilin Wang, Robert H. Deng, Baodong Qin:
Escrow free attribute-based signature with self-revealability. Inf. Sci. 367-368: 660-672 (2016) - [j10]Huige Wang, Kefei Chen, Baodong Qin, Liangliang Wang:
Certificateless encryption secure against selective opening attack. Secur. Commun. Networks 9(18): 5600-5614 (2016) - [j9]Ximeng Liu, Baodong Qin, Robert H. Deng, Rongxing Lu, Jianfeng Ma:
A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains. IEEE Trans. Computers 65(12): 3567-3579 (2016) - [j8]Ximeng Liu, Robert H. Deng, Wenxiu Ding, Rongxing Lu, Baodong Qin:
Privacy-Preserving Outsourced Calculation on Floating Point Numbers. IEEE Trans. Inf. Forensics Secur. 11(11): 2513-2527 (2016) - [j7]Ximeng Liu, Rongxing Lu, Jianfeng Ma, Le Chen, Baodong Qin:
Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification. IEEE J. Biomed. Health Informatics 20(2): 655-668 (2016) - [c16]Baodong Qin, Shuai Han, Yu Chen, Shengli Liu, Zhuo Wei:
How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks. Inscrypt 2016: 150-165 - [c15]Hui Cui, Robert H. Deng, Yingjiu Li, Baodong Qin:
Server-Aided Revocable Attribute-Based Encryption. ESORICS (2) 2016: 570-587 - [c14]Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow:
Non-Malleable Functions and Their Applications. Public Key Cryptography (2) 2016: 386-416 - 2015
- [j6]Zhengan Huang, Shengli Liu, Baodong Qin, Kefei Chen:
Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited. Int. J. Appl. Math. Comput. Sci. 25(2): 415-430 (2015) - [j5]Baodong Qin, Shengli Liu, Kefei Chen:
Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience. IET Inf. Secur. 9(1): 32-42 (2015) - [j4]Baodong Qin, Robert H. Deng, Shengli Liu, Siqi Ma:
Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption. IEEE Trans. Inf. Forensics Secur. 10(7): 1384-1393 (2015) - [c13]Baodong Qin, Robert H. Deng, Yingjiu Li, Shengli Liu:
Server-Aided Revocable Identity-Based Encryption. ESORICS (1) 2015: 286-304 - [c12]Xiaofang Huang, Qi Tao, Baodong Qin, ZhiQin Liu:
Multi-Authority Attribute Based Encryption Scheme with Revocation. ICCCN 2015: 1-5 - [c11]Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen:
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security. Public Key Cryptography 2015: 557-578 - [i5]Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen:
Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security. IACR Cryptol. ePrint Arch. 2015: 3 (2015) - [i4]Baodong Qin, Shengli Liu:
Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing. IACR Cryptol. ePrint Arch. 2015: 272 (2015) - [i3]Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow:
Non-Malleable Functions and Their Applications. IACR Cryptol. ePrint Arch. 2015: 1253 (2015) - 2014
- [c10]Baodong Qin, Shengli Liu:
Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing. Public Key Cryptography 2014: 19-36 - 2013
- [j3]Baodong Qin, Shengli Liu:
Efficient chosen ciphertext secure public-key encryption under factoring assumption. Secur. Commun. Networks 6(3): 351-360 (2013) - [c9]Baodong Qin, Shengli Liu, Zhengan Huang:
Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem. ACISP 2013: 136-151 - [c8]Baodong Qin, Shengli Liu:
Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter. ASIACRYPT (2) 2013: 381-400 - [c7]Baodong Qin, Shengli Liu, Kefei Chen, Manuel Charlemagne:
Leakage-resilient lossy trapdoor functions and public-key encryption. AsiaPKC@AsiaCCS 2013: 3-12 - [c6]Zhengan Huang, Shengli Liu, Baodong Qin, Kefei Chen:
Fixing the Sender-Equivocable Encryption Scheme in Eurocrypt 2010. INCoS 2013: 366-372 - [c5]Zhengan Huang, Shengli Liu, Baodong Qin:
Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited. Public Key Cryptography 2013: 369-385 - [i2]Baodong Qin, Shengli Liu:
Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter. IACR Cryptol. ePrint Arch. 2013: 654 (2013) - 2012
- [i1]Zhengan Huang, Shengli Liu, Baodong Qin:
Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited. IACR Cryptol. ePrint Arch. 2012: 473 (2012)
2000 – 2009
- 2009
- [j2]Baodong Qin, Ming Li, Fanyu Kong, Daxing Li:
New left-to-right minimal weight signed-digit radix-r representation. Comput. Electr. Eng. 35(1): 150-158 (2009) - 2008
- [j1]Baodong Qin, Ming Li, Fanyu Kong:
Cryptanalysis of a Type of CRT-Based RSA Algorithms. J. Comput. Sci. Technol. 23(2): 214-221 (2008) - 2007
- [c4]Fanyu Kong, Jia Yu, Baodong Qin, Daxing Li:
Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005. ATC 2007: 52-60 - [c3]Ming Li, Baodong Qin, Fanyu Kong, Daxing Li:
Wide-w-NAF Method for Scalar Multiplication on Köblitz Curves. SNPD (2) 2007: 143-148 - [c2]Baodong Qin, Ming Li, Fanyu Kong, Daxing Li:
Security Analysis of wrNAF and SPA Resistant Scalar Multiplication. SNPD (3) 2007: 279-284 - [c1]Fanyu Kong, Jia Yu, Baodong Qin, Ming Li, Daxing Li:
Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme. SNPD (3) 2007: 923-926
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint