Search

Your search keyword '"Zhenfu Cao"' showing total 84 results

Search Constraints

Start Over You searched for: Author "Zhenfu Cao" Remove constraint Author: "Zhenfu Cao" Topic public-key cryptography Remove constraint Topic: public-key cryptography
84 results on '"Zhenfu Cao"'

Search Results

1. EPMDA-FED: Efficient and Privacy-Preserving Multidimensional Data Aggregation Scheme With Fast Error Detection in Smart Grid

2. Efficient Privacy-Preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain

3. Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format

4. LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs

5. AP-PRE: Autonomous Path Proxy Re-Encryption and Its Applications

6. Designated Server-Aided Revocable Identity-based Keyword Search on Lattice

7. Unbounded Key-Policy Attribute-Based Encryption with Black-Box Traceability

8. Lightweight Privacy-Preserving Training and Evaluation for Discretized Neural Networks

9. Anonymous IBE from Quadratic Residuosity with Fast Encryption

10. Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud

11. Security and Privacy for Cloud-Based IoT: Challenges

12. PPSAS: Lightweight Privacy-preserving Spectrum Aggregation and Auction in Cognitive Radio Networks

13. Revocable Public Key Encryption with Authorized Keyword Search

14. Serial number based encryption and its application for mobile social networks

15. PVIDM: Privacy-preserving verifiable shape context based image denoising and matching with efficient outsourcing in the malicious setting

16. SDKSE:A Secure Dynamic Keyword Searchable Encryption Scheme for Email Systems

17. PPOIM: Privacy-Preserving Shape Context Based Image Denoising and Matching with Efficient Outsourcing

18. A Privacy Preserving Public-Key Searchable Encryption Scheme with Fast Keyword Search

19. Extended dual system group and shorter unbounded hierarchical identity based encryption

20. PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributedm-Healthcare Cloud Computing System

21. Accountable Multi-authority Ciphertext-Policy Attribute-Based Encryption Without Key Escrow and Key Abuse

22. PVOPM: Verifiable Privacy-preserving Pattern Matching with Efficient Outsourcing in the Malicious Setting

23. Certificate-based proxy decryption systems with revocability in the standard model

24. Efficient Trust Based Information Sharing Schemes over Distributed Collaborative Networks

25. Practical identity-based encryption in multiple private key generator (PKG) environments

26. New public key cryptosystems based on non-Abelian factorization problems

27. A comment on 'An efficient common-multiplicand-multiplication method to the Montgomery algorithm for speeding up exponentiation'

28. PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching

29. Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently

30. Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation

31. Fuzzy identity based signature with applications to biometric authentication

32. $\hbox{EP}^{2}\hbox{DF}$: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks

33. Multi-User Revocable Keyword Search Scheme for

34. Authenticated key exchange protocol with enhanced freshness properties

35. Proxy re-encryption with keyword search

36. Conjugate adjoining problem in braid groups and new design of braid-based signatures

37. EFFICIENT ID-BASED MULTI-RECEIVER THRESHOLD DECRYPTION

38. Simulatability and security of certificateless threshold signatures

39. Simple three-party key exchange protocol

40. Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts

41. Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model

42. Remarks on Wu–Hsu’s threshold signature scheme using self-certified public keys

43. Proxy signature scheme using self-certified public keys

44. Improved public key authentication scheme for non-repudiation

45. Remarks on a new key authentication scheme based on discrete logarithms

46. Comment: cryptanalysis of Lee–Hwang–Li’s key authentication scheme

47. Nonrepudiable proxy multi-signature scheme

48. A novel and efficient unlinkable secret handshakes scheme

49. Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol

50. Two-level path authentication in EPCglobal Network

Catalog

Books, media, physical & digital resources