- Cryptography and Data Security
- Complexity and Algorithms in Graphs
- Cryptographic Implementations and Security
- Privacy-Preserving Technologies in Data
- Advanced Authentication Protocols Security
- Cryptography and Residue Arithmetic
- Cloud Data Security Solutions
- Chaos-based Image/Signal Encryption
- Security in Wireless Sensor Networks
- Coding theory and cryptography
- Access Control and Trust
- graph theory and CDMA systems
- Environmental Changes in China
- Diverse Musicological Studies
- Freezing and Crystallization Processes
- Network Security and Intrusion Detection
- Musicology and Musical Analysis
- Forest, Soil, and Plant Ecology in China
- Asian Culture and Media Studies
- Martial Arts: Techniques, Psychology, and Education
- Wireless Signal Modulation Classification
- Vehicular Ad Hoc Networks (VANETs)
- Simulation and Modeling Applications
- Central Asia Education and Culture
- Human Motion and Animation
Nanjing Normal University
2006-2025
Herzen University
2021
Hohai University
2009-2019
University of Tennessee at Knoxville
2019
Ecosystem (Spain)
2013-2014
Jiangnan University
2011-2012
Hunan City University
2009
PLA Army Engineering University
2008
Southwest University of Science and Technology
2008
University of Languages and International Studies
2006
Nowadays, cloud-assisted Industrial Internet of Things (IIoT) has become pervasive in modern enterprises, because it supplies a promising way to transform the operation mode existing industrial facilities, enhancing production efficiency and lowering manufacturing cost. In order preserve privacy sensitive data needs be encrypted prior being uploaded cloud. Recently, certificateless encryption with keyword search (CLKS) was introduced resolve problem retrieval IIoT. However, CLKS schemes only...
Searchable public key encryption (SPKE) is a useful cryptographic primitive that allows user to perform keyword searches over publicly encrypted messages on an untrusted storage server while guaranteeing the privacy of original as well search keywords. However, most previously proposed SPKE frameworks suffer from security vulnerability caused by guessing attack and some other weaknesses. Inspired ideas certificate-based cryptography signcryption, we present new framework called searchable...
As a practical application of the Internet Things (IoT) in modern industry, industrial IoT (IIoT) enables enterprises to accelerate development. Nowadays, cloud computing technology has been applied data storage and processing IIoTs, but how protect privacy become challenge technical issue. Recently, certificate-based encryption with keyword search (CBEKS) was presented handle ciphertext retrieval. By CBEKS, one can get back all desired ciphertexts from without decrypting or leaking...
Cloud storage services have grown extensively in recent years. For security and privacy purposes, sensitive data need to be outsourced clouds encrypted form. Searchable public key encryption (SPKE) enables ciphertexts retrieved by keyword(s) without decryption. Unfortunately, most of the existing SPKE schemes cannot withstand keyword guessing attack. To combat such attack, authenticated with search (PAEKS) was presented. However, PAEKS were proven secure under a designated-targets model,...
The situation for post-challenge continuous auxiliary input leakage has not been considered in the cryptography schemes previous literature. We present a semantic-security model with inputs identity-based encryption. In this model, adversary is permitted to obtain some information of private keys constantly and query more after seeing challenge ciphertext through side-channel attacks. Furthermore, we an encryption scheme resilient under composite order groups. Our secure against input,...
In order to alleviate key escrow issue, the notion of multiauthority attribute-based encryption (MA-ABE) was presented, which widely applied in cloud storage environment. data sharing environment, secure deletion is very crucial and challenging issue. Hence, this article, we concentrate on verification operation, i.e., assuring deletion. To solve problem, put forward a system model, formal definition security model MA-ABE for Furthermore, design scheme deletion, more practicable than single...
Public key encryption with equality test (PKE-ET) is a novel cryptosystem to deal the problem of multi-public-key encrypted data computing. It can be used verify if different ciphertexts are encryptions same plaintext under public keys without decryption. As an extension PKE-ET, certificateless (CLE-ET) has merits no escrow and certificate. However, existing CLE-ET schemes vulnerable message recovery (MR) attack suffer from low efficiency due using computationally expensive bilinear pairing....
In order to guarantee security and privacy of sensitive data, attribute-based keyword search (ABKS) enables data owners upload their encrypted cloud servers, authorizes intended users retrieve it. Meanwhile, ABKS outsources heavy work which makes adaptive mobile computing environment. However, as servers can both generate ciphertexts run algorithm, the existing most schemes are vulnerable guessing attack. this paper, we show fundamental cause that do not resist attack is any entity...
The certificate-based encryption (CBE) is a new PKC paradigm which combines traditional public-key (PKE) and identity based (IBE) while preserving their features. CBE provides an efficient implicit certificate mechanism to eliminate third-party queries for the status simply revocation problem. Therefore, can be used construct PKI requiring fewer infrastructures. In addition, it also solves key escrow problem distribution inherent in IBE. this paper, we scheme with paring prove CCAsecure...