• Publications
  • Influence
An efficient certificateless aggregate signature with constant pairing computations
TLDR
An aggregate signature scheme enables an algorithm to aggregate n signatures of n distinct messages from n users into a single short signature. Expand
Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks
  • Hu Xiong, Z. Qin
  • Computer Science
  • IEEE Transactions on Information Forensics and…
  • 18 March 2015
TLDR
This paper proposes a certificateless anonymous remote authentication protocol featured with nonrepudiation, client anonymity, key escrow resistance, and revocability for extra-body communication in the WBANs. Expand
An Improved Certificateless Signature Scheme Secure in the Standard Model
TLDR
In ASIACCS 2007, Liu et al proposed a certificateless signature scheme which is provably secure in the standard model. Expand
A Certificateless Strong Designated Verifier Signature Scheme with Non-delegatability
TLDR
We propose the first certificateless strong designated verifier signature scheme with non-delegatability. Expand
Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol
  • Hu Xiong
  • Computer Science
  • IEEE Transactions on Information Forensics and…
  • 1 December 2014
TLDR
This paper efficiently addresses these challenges by devising a scalable certificateless remote authentication protocol with anonymity and forward security. Expand
Efficient and multi-level privacy-preserving communication protocol for VANET
TLDR
In this paper, we introduce an efficient and multi-level conditional privacy preservation authentication protocol in vehicular ad hoc networks (VANETs) based on ring signature. Expand
Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme
TLDR
In 2010, Fan et al. presented an anonymous multi-receiver identity-based encryption scheme where they adopt Lagrange interpolating polynomial mechanism. Expand
Cubic Unbalance Oil and Vinegar Signature Scheme
TLDR
We propose a cubic UOV scheme by adopting the stepwise iteration method in this paper. Expand
Bidder-anonymous English auction protocol based on revocable ring signature
TLDR
This paper introduces an efficient and spontaneous privacy-preserving English auction protocol based on revocable ring signature. Expand
Efficient and Provably Secure Certificateless Parallel Key-Insulated Signature Without Pairing for IIoT Environments
TLDR
This paper proposes the first CL-PKIS scheme without pairing, which reduces the risk of secret key disclosure in the IIoT environment. Expand
...
1
2
3
4
5
...