default search action
Xiaolei Dong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j82]Miao Wang, Liwang Sun, Zhenfu Cao, Xiaolei Dong:
IPO-PEKS: Effective Inner Product Outsourcing Public Key Searchable Encryption From Lattice in the IoT. IEEE Access 12: 28926-28937 (2024) - [j81]Xiaomei Sun, Wencai Hui, Xiaolei Dong, Xiaofang Li, Sanaz Saeedi Nahani:
Evaluating the reliability of microgrids consisting of renewable energy sources using stochastic scheduling based on the data-driven uncertainty set. Eng. Appl. Artif. Intell. 133: 108250 (2024) - [j80]Yunbo Yang, Xiaolei Dong, Zhenfu Cao, Jiachen Shen, Ruofan Li, Yihao Yang, Shangmin Dou:
EMPSI: Efficient multiparty private set intersection (with cardinality). Frontiers Comput. Sci. 18(1): 181804 (2024) - [j79]Yunbo Yang, Yiwei Hu, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, Guomin Yang, Robert H. Deng:
OpenSE: Efficient Verifiable Searchable Encryption With Access and Search Pattern Hidden for Cloud-IoT. IEEE Internet Things J. 11(8): 13793-13809 (2024) - [j78]Ruochen Wang, Jun Zhou, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo:
Updatable Private Set Intersection With Forward Privacy. IEEE Trans. Inf. Forensics Secur. 19: 8573-8586 (2024) - [j77]Yunbo Yang, Xiang Chen, Yuhao Pan, Jiachen Shen, Zhenfu Cao, Xiaolei Dong, Xiaoguo Li, Jianfei Sun, Guomin Yang, Robert H. Deng:
OpenVFL: A Vertical Federated Learning Framework With Stronger Privacy-Preserving. IEEE Trans. Inf. Forensics Secur. 19: 9670-9681 (2024) - [j76]Yihao Yang, Yunbo Yang, Xiang Chen, Xiaolei Dong, Zhenfu Cao, Jiachen Shen:
DMPSI: Efficient Scalable Delegated Multiparty PSI and PSI-CA With Oblivious PRF. IEEE Trans. Serv. Comput. 17(2): 497-508 (2024) - [j75]Yunbo Yang, Yiwei Hu, Ruofan Li, Xiaolei Dong, Zhenfu Cao, Jiachen Shen, Shangmin Dou:
LSE: Efficient Symmetric Searchable Encryption Based on Labeled PSI. IEEE Trans. Serv. Comput. 17(2): 563-574 (2024) - [c49]Huilin He, Jiachen Shen, Zhenfu Cao, Xiaolei Dong, Haiqin Wu:
Proof of Privacy-Preserving Machine Learning: A Blockchain Consensus Mechanism with Secure Deep Learning Process. Blockchain 2024: 193-200 - 2023
- [j74]Yuanjian Zhou, Zhenfu Cao, Xiaolei Dong:
Dynamic identity-based broadcast proxy re-encryption for data sharing in autonomous vehicles. Trans. Emerg. Telecommun. Technol. 34(11) (2023) - [j73]Yunbo Yang, Xiaolei Dong, Zhenfu Cao, Jiachen Shen, Shangmin Dou:
IXT: Improved searchable encryption for multi-word queries based on PSI. Frontiers Comput. Sci. 17(5): 175811 (2023) - [j72]Yuanjian Zhou, Zhenfu Cao, Xiaolei Dong, Jun Zhou:
BLDSS: A Blockchain-Based Lightweight Searchable Data Sharing Scheme in Vehicular Social Networks. IEEE Internet Things J. 10(9, May 1): 7974-7992 (2023) - [j71]Liwang Sun, Zhenfu Cao, Xiaolei Dong, Jiachen Shen:
LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search. Inf. Sci. 648: 119554 (2023) - [j70]Liwang Sun, Zhenfu Cao, Xiaolei Dong, Jiachen Shen, Miao Wang, Jiasheng Chen:
dMCLAEKS: Pairing-free designated-tester multi-recipient certificateless authenticated encryption with keyword search for concealing search patterns. J. Syst. Archit. 144: 103007 (2023) - [j69]Miao Wang, Zhenfu Cao, Xiaolei Dong:
Criteria for entanglement and separability of discrete quantum states. Quantum Inf. Comput. 23(7&8): 541-561 (2023) - [j68]Jun Zhou, Nan Wu, Yisong Wang, Shouzhen Gu, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo:
A Differentially Private Federated Learning Model Against Poisoning Attacks in Edge Computing. IEEE Trans. Dependable Secur. Comput. 20(3): 1941-1958 (2023) - [j67]Jun Zhou, Guobin Gao, Zhenfu Cao, Kim-Kwang Raymond Choo, Xiaolei Dong:
Lightweight Privacy-Preserving Distributed Recommender System Using Tag-Based Multikey Fully Homomorphic Data Encapsulation. IEEE Trans. Dependable Secur. Comput. 20(6): 5230-5246 (2023) - [j66]Zhongyun Lin, Jun Zhou, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo:
Generalized Autonomous Path Proxy Re-Encryption Scheme to Support Branch Functionality. IEEE Trans. Inf. Forensics Secur. 18: 5387-5400 (2023) - [j65]Jun Zhou, Shiying Chen, Kim-Kwang Raymond Choo, Zhenfu Cao, Xiaolei Dong:
EPNS: Efficient Privacy-Preserving Intelligent Traffic Navigation From Multiparty Delegated Computation in Cloud-Assisted VANETs. IEEE Trans. Mob. Comput. 22(3): 1491-1506 (2023) - [c48]Zhen Xia, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, Jun Zhou, Liming Fang, Zhe Liu, Chunpeng Ge, Chunhua Su:
Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning. ISPEC 2023: 579-594 - [c47]Panyu Wu, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, Yihao Yang, Jun Zhou, Liming Fang, Zhe Liu, Chunpeng Ge, Chunhua Su:
MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage. PST 2023: 1-11 - [c46]Yihao Yang, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, Yunbo Yang, Jun Zhou, Liming Fang, Zhe Liu, Chunpeng Ge, Chunhua Su, Zongyang Hou:
MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI Cardinality. PST 2023: 1-7 - [c45]Jinyang Li, Zhenfu Cao, Jiachen Shen, Xiaolei Dong:
MCVDSSE: Secure Multi-client Verifiable Dynamic Symmetric Searchable Encryption. SciSec 2023: 85-96 - [c44]Kaifeng Luo, Zhenfu Cao, Jiachen Shen, Xiaolei Dong:
SVFL: Secure Vertical Federated Learning on Linear Models. SciSec 2023: 332-344 - [c43]Liqing Yu, Yusai Wu, Yu Yu, Zhenfu Cao, Xiaolei Dong:
Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations. TCC (1) 2023: 238-267 - [i17]Liqing Yu, Yusai Wu, Yu Yu, Zhenfu Cao, Xiaolei Dong:
Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations. IACR Cryptol. ePrint Arch. 2023: 1355 (2023) - 2022
- [j64]Huidan Hu, Zhenfu Cao, Xiaolei Dong:
Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds. IEEE Access 10: 87322-87332 (2022) - [j63]Zhusen Liu, Zhenfu Cao, Xiaolei Dong, Xiaopeng Zhao, Haiyong Bao, Jiachen Shen:
A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid. Frontiers Comput. Sci. 16(3): 161810 (2022) - [j62]Zhusen Liu, Zhenfu Cao, Xiaolei Dong, Xiaopeng Zhao, Tian Liu, Haiyong Bao, Jiachen Shen:
EPMDA-FED: Efficient and Privacy-Preserving Multidimensional Data Aggregation Scheme With Fast Error Detection in Smart Grid. IEEE Internet Things J. 9(9): 6922-6933 (2022) - [j61]Ying Guo, Zhen-Fu Cao, Xiaolei Dong:
Generalized Goldwasser and Micali's Type Cryptosystem. J. Comput. Sci. Technol. 37(2): 459-467 (2022) - [j60]Jun Zhou, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo:
Efficient Privacy-Preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain. IEEE Trans. Cloud Comput. 10(1): 366-382 (2022) - [j59]Ying Chen, Tianhui Zhou, Jun Zhou, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo:
SAVE: Efficient Privacy-Preserving Location-Based Service Bundle Authentication in Self-Organizing Vehicular Social Networks. IEEE Trans. Intell. Transp. Syst. 23(8): 11752-11766 (2022) - [c42]Caiqi Sun, Penghao Lu, Lei Cheng, Zhenfu Cao, Xiaolei Dong, Yili Tang, Jun Zhou, Linjian Mo:
Multi-interest Sequence Modeling for Recommendation with Causal Embedding. SDM 2022: 406-414 - 2021
- [j58]Gaoli Wang, Zhenfu Cao, Xiaolei Dong:
Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory. Comput. J. 64(8): 1264-1276 (2021) - [j57]Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao:
Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity. Des. Codes Cryptogr. 89(2): 241-253 (2021) - [j56]Ying Guo, Fei Meng, Leixiao Cheng, Xiaolei Dong, Zhenfu Cao:
Designated server-aided revocable identity-based keyword search on lattice. EURASIP J. Wirel. Commun. Netw. 2021(1): 174 (2021) - [j55]Nanyuan Cao, Zhenfu Cao, Xiaolei Dong, Haijiang Wang:
Improved RSA lossy trapdoor function and applications. Int. J. Inf. Comput. Secur. 14(3/4): 229-241 (2021) - [j54]Linghui Chen, Jun Zhou, Ying Chen, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo:
PADP: Efficient Privacy-Preserving Data Aggregation and Dynamic Pricing for Vehicle-to-Grid Networks. IEEE Internet Things J. 8(10): 7863-7873 (2021) - [j53]Menghui Lou, Xiaolei Dong, Zhenfu Cao, Jiachen Shen:
SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts. Secur. Commun. Networks 2021: 8884478:1-8884478:18 (2021) - [j52]Jun Zhou, Kim-Kwang Raymond Choo, Zhenfu Cao, Xiaolei Dong:
PVOPM: Verifiable Privacy-Preserving Pattern Matching with Efficient Outsourcing in the Malicious Setting. IEEE Trans. Dependable Secur. Comput. 18(5): 2253-2270 (2021) - [j51]Jianting Ning, Zhenfu Cao, Xiaolei Dong, Kaitai Liang, Lifei Wei, Kim-Kwang Raymond Choo:
CryptCloud$^+$+: Secure and Expressive Data Access Control for Cloud Storage. IEEE Trans. Serv. Comput. 14(1): 111-124 (2021) - [j50]Jiawei Qian, Zhenfu Cao, Xiaolei Dong, Jiachen Shen, Zhusen Liu, Yunxiu Ye:
Two Secure and Efficient Lightweight Data Aggregation Schemes for Smart Grid. IEEE Trans. Smart Grid 12(3): 2625-2637 (2021) - [c41]Xiao Tang, Zhenfu Cao, Xiaolei Dong, Jiachen Shen:
PKMark: A Robust Zero-distortion Blind Reversible Scheme for Watermarking Relational Databases. BigDataSE 2021: 72-79 - [c40]Qi Tang, Jiachen Shen, Zhenfu Cao, Xiaolei Dong:
PSSBP: A Privacy-preserving Scope-query Searchable Encryption Scheme Based on Blockchain for Parking Lots Sharing in Vehicular Networks. EUC 2021: 1-8 - [c39]Weijia Feng, Zhenfu Cao, Jiachen Shen, Xiaolei Dong:
RTPoW: A Proof-of-Work Consensus Scheme with Real-Time Difficulty Adjustment Algorithm. ICPADS 2021: 233-240 - [c38]Xiangyu Li, Zhenfu Cao, Jiachen Shen, Xiaolei Dong:
DPFDT: Decentralized Privacy-preserving Fair Data Trading System. MSN 2021: 183-190 - 2020
- [j49]Jun Zhou, Meng Zheng, Zhenfu Cao, Xiaolei Dong:
PVIDM: Privacy-preserving verifiable shape context based image denoising and matching with efficient outsourcing in the malicious setting. Comput. Secur. 88 (2020) - [j48]Jialu Chen, Jun Zhou, Zhenfu Cao, Athanasios V. Vasilakos, Xiaolei Dong, Kim-Kwang Raymond Choo:
Lightweight Privacy-Preserving Training and Evaluation for Discretized Neural Networks. IEEE Internet Things J. 7(4): 2663-2678 (2020) - [j47]Huajie Shen, Jun Zhou, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo:
Blockchain-Based Lightweight Certificate Authority for Efficient Privacy-Preserving Location-Based Service in Vehicular Social Networks. IEEE Internet Things J. 7(7): 6610-6622 (2020) - [j46]Jun Zhou, Zhenfu Cao, Zhan Qin, Xiaolei Dong, Kui Ren:
LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs. IEEE Trans. Inf. Forensics Secur. 15: 420-434 (2020) - [j45]Haijiang Wang, Xiaolei Dong, Zhenfu Cao:
Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search. IEEE Trans. Serv. Comput. 13(6): 1142-1151 (2020) - [c37]Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao, Licheng Wang, Zhusen Liu:
New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol. ACISP 2020: 408-424 - [c36]Yusai Wu, Liqing Yu, Zhenfu Cao, Xiaolei Dong:
Tight Security Analysis of 3-Round Key-Alternating Cipher with a Single Permutation. ASIACRYPT (1) 2020: 662-693 - [c35]Wenqi Yan, Jiachen Shen, Zhenfu Cao, Xiaolei Dong:
Blockchain Based Digital Evidence Chain of Custody. ICBCT 2020: 19-23 - [c34]Xin Chen, Jiachen Shen, Zhenfu Cao, Xiaolei Dong:
A Blockchain-Based Privacy-Preserving Scheme for Smart Grids. ICBCT 2020: 120-124 - [c33]Jing Chen, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, Xingkai Wang:
Forward Secure Dynamic Searchable Symmetric Encryption with Lighter Storage. ICCSP 2020: 24-30 - [c32]Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jinwen Zheng:
Anonymous IBE from Quadratic Residuosity with Fast Encryption. ISC 2020: 3-19 - [c31]Chan Fan, Xiaolei Dong, Zhenfu Cao, Jiachen Shen:
VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage. TrustCom 2020: 285-292 - [i16]Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao, Licheng Wang, Zhusen Liu:
New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol. IACR Cryptol. ePrint Arch. 2020: 245 (2020) - [i15]Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jinwen Zheng:
Anonymous IBE From Quadratic Residue With Fast Encryption. IACR Cryptol. ePrint Arch. 2020: 712 (2020) - [i14]Ying Guo, Zhenfu Cao, Xiaolei Dong:
A Generalization of Paillier's Public-Key System With Fast Decryption. IACR Cryptol. ePrint Arch. 2020: 796 (2020) - [i13]Yusai Wu, Liqing Yu, Zhenfu Cao, Xiaolei Dong:
Tight Security Analysis of 3-Round Key-Alternating Cipher with A Single Permutation. IACR Cryptol. ePrint Arch. 2020: 1073 (2020) - [i12]Chan Fan, Xiaolei Dong, Zhenfu Cao, Jiachen Shen:
VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage. IACR Cryptol. ePrint Arch. 2020: 1372 (2020)
2010 – 2019
- 2019
- [j44]Haijiang Wang, Xiaolei Dong, Zhenfu Cao, Dongmei Li, Nanyuan Cao:
Secure key-aggregation authorized searchable encryption. Sci. China Inf. Sci. 62(3): 39111:1-39111:3 (2019) - [j43]Gaoli Wang, Zhenfu Cao, Xiaolei Dong:
Improved Fault-Tolerant Aggregate Signatures. Comput. J. 62(4): 481-489 (2019) - [j42]Nanyuan Cao, Zhenfu Cao, Zhen Liu, Xiaolei Dong, Xiaopeng Zhao:
All-But-Many Lossy Trapdoor Functions under Decisional RSA Subgroup Assumption and Application. Comput. J. 62(8): 1148-1157 (2019) - [j41]Jun Zhou, Zhenfu Cao, Xiaolei Dong, Thanos Vasilakos:
GTSIM-POP: Game theory based secure incentive mechanism and patient-optimized privacy-preserving packet forwarding scheme in m-healthcare social networks. Future Gener. Comput. Syst. 101: 70-82 (2019) - [j40]Dongmei Li, Xiaolei Dong, Zhenfu Cao, Haijiang Wang:
Privacy-preserving outsourced image feature extraction. J. Inf. Secur. Appl. 47: 59-64 (2019) - [j39]Haijiang Wang, Xiaolei Dong, Zhenfu Cao:
Secure and efficient encrypted keyword search for multi-user setting in cloud computing. Peer-to-Peer Netw. Appl. 12(1): 32-42 (2019) - [c30]Jun Zhou, Yifang Zhang, Zhenfu Cao, Xiaolei Dong:
PPSAS: Lightweight Privacy-preserving Spectrum Aggregation and Auction in Cognitive Radio Networks. ICDCS 2019: 1127-1137 - [c29]Kangle Wang, Xiaolei Dong, Jiachen Shen, Zhenfu Cao:
An Effective Verifiable Symmetric Searchable Encryption Scheme in Cloud Computing. ICIT 2019: 98-102 - [c28]Fanghan Ye, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, Wenhua Zhao:
A Verifiable Dynamic Multi-user Searchable Encryption Scheme without Trusted Third Parties. ICPADS 2019: 896-900 - [c27]Hongyuan Chen, Zhenfu Cao, Xiaolei Dong, Jiachen Shen:
SDKSE-KGA: A Secure Dynamic Keyword Searchable Encryption Scheme Against Keyword Guessing Attacks. IFIPTM 2019: 162-177 - [c26]Jiming Liu, Zhenfu Cao, Xiaolei Dong, Jiachen Shen:
DMU-ABSE: Dynamic Multi-user Attribute-Based Searchable Encryption with File Deletion and User Revocation. SocialSec 2019: 17-31 - [i11]Xiaopeng Zhao, Jinwen Zheng, Nanyuan Cao, Zhenfu Cao, Xiaolei Dong:
Identity-Based Encryption from e-th Power Residue Symbols. IACR Cryptol. ePrint Arch. 2019: 557 (2019) - 2018
- [j38]Dongmei Li, Xiaolei Dong, Zhenfu Cao, Haijiang Wang:
Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation. Sci. China Inf. Sci. 61(3): 032112:1-032112:9 (2018) - [j37]Siyuan Chen, Peng Zeng, Kim-Kwang Raymond Choo, Xiaolei Dong:
Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols. Comput. J. 61(4): 545-560 (2018) - [j36]Haijiang Wang, Xiaolei Dong, Zhenfu Cao, Dongmei Li:
Secure and Efficient Attribute-Based Encryption with Keyword Search. Comput. J. 61(8): 1133-1142 (2018) - [j35]Huajun Zhang, Zhenfu Cao, Xiaolei Dong, Jiachen Shen:
Proof of Multicopy via Proof of File Position in Cloud. Fundam. Informaticae 157(1-2): 141-151 (2018) - [j34]Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei:
White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively. IEEE Trans. Dependable Secur. Comput. 15(5): 883-897 (2018) - [j33]Jianting Ning, Zhenfu Cao, Xiaolei Dong, Kaitai Liang, Hui Ma, Lifei Wei:
Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 13(1): 94-105 (2018) - [c25]Meng Zheng, Jun Zhou, Zhenfu Cao, Xiaolei Dong:
PPOIM: Privacy-Preserving Shape Context Based Image Denoising and Matching with Efficient Outsourcing. ICICS 2018: 215-231 - [c24]Yunong Liang, Zhenfu Cao, Xiaolei Dong, Jiachen Shen:
Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product Functional Encryption. ICICS 2018: 377-392 - [c23]Hongyuan Chen, Zhenfu Cao, Xiaolei Dong, Jiachen Shen:
SDKSE: A Secure Dynamic Keyword Searchable Encryption Scheme for Email Systems. SSIC 2018: 1-6 - [c22]Liang Hui, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, Hongyuan Chen, Yunong Liang:
VEPP: A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix Multiplication. SSIC 2018: 1-8 - 2017
- [j32]Jun Zhou, Zhenfu Cao, Xiaolei Dong, Athanasios V. Vasilakos:
Security and Privacy for Cloud-Based IoT: Challenges. IEEE Commun. Mag. 55(1): 26-33 (2017) - [j31]Xiaomei Zhang, Xiaolei Dong, Jie Wu, Zhenfu Cao, Chen Lyu:
Fault Activity Aware Service Delivery in Wireless Sensor Networks for Smart Cities. Wirel. Commun. Mob. Comput. 2017 (2017) - [c21]Xiaomei Zhang, Chi-Hung Chi, Chen Lyu, Zhijun Fang, Xiaolei Dong, Qiang Chen:
Availability Based Multiservice Delivery for Wireless Sensor Networks in Adversarial Environments. SCC 2017: 180-187 - [i10]Wanfen Guo, Xiaolei Dong, Zhenfu Cao, Jiachen Shen:
Efficient Attribute-Based Secure Keyword Search on the Cloud Storage. IACR Cryptol. ePrint Arch. 2017: 782 (2017) - 2016
- [j30]Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei:
Traceable and revocable CP-ABE with shorter ciphertexts. Sci. China Inf. Sci. 59(11): 119102:1-119102:3 (2016) - [j29]Junqing Gong, Xiaolei Dong, Zhenfu Cao, Jie Chen:
Almost-Tight Identity Based Encryption Against Selective Opening Attack. Comput. J. 59(11): 1669-1688 (2016) - [j28]Xiaolei Dong, Jun Zhou, Zhenfu Cao:
Efficient privacy-preserving temporal and spacial data aggregation for smart grid communications. Concurr. Comput. Pract. Exp. 28(4): 1145-1160 (2016) - [j27]Jun Zhou, Zhenfu Cao, Xiaolei Dong:
Secure and efficient fine-grained multiple file sharing in cloud-assisted crowd sensing networks. Peer-to-Peer Netw. Appl. 9(4): 774-794 (2016) - [j26]Weiwei Jia, Haojin Zhu, Suguo Du, Xiaolei Dong, Zhenfu Cao:
Cloud-based privacy-preserving aggregation architecture in multi-domain wireless networks. Secur. Commun. Networks 9(13): 1905-1915 (2016) - [j25]Dongmei Li, Xiaolei Dong, Zhenfu Cao:
Secure and privacy-preserving pattern matching in outsourced computing. Secur. Commun. Networks 9(16): 3444-3451 (2016) - [c20]Junqing Gong, Xiaolei Dong, Jie Chen, Zhenfu Cao:
Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting. ASIACRYPT (2) 2016: 624-654 - [c19]Jun Zhou, Zhenfu Cao, Xiaolei Dong:
PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching. ESORICS (1) 2016: 135-153 - [c18]Jianting Ning, Zhenfu Cao, Xiaolei Dong, Junqing Gong, Jie Chen:
Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently. ESORICS (2) 2016: 551-569 - [c17]Junqing Gong, Jie Chen, Xiaolei Dong, Zhenfu Cao, Shaohua Tang:
Extended Nested Dual System Groups, Revisited. Public Key Cryptography (1) 2016: 133-163 - [i9]Junqing Gong, Xiaolei Dong, Jie Chen, Zhenfu Cao:
Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting. IACR Cryptol. ePrint Arch. 2016: 860 (2016) - 2015
- [j24]Jun Zhou, Zhenfu Cao, Xiaolei Dong, Naixue Xiong, Athanasios V. Vasilakos:
4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inf. Sci. 314: 255-276 (2015) - [j23]Jun Zhou, Zhenfu Cao, Xiaolei Dong, Xiaodong Lin:
PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems. IEEE J. Sel. Top. Signal Process. 9(7): 1332-1344 (2015) - [j22]Xiaomei Zhang, Xiaolei Dong, Naixue Xiong, Jie Wu, Xiuqi Li:
Fault-aware flow control and multi-path routing in VANETs. Peer-to-Peer Netw. Appl. 8(6): 1090-1107 (2015) - [j21]Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei, Xiaodong Lin:
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes. IEEE Trans. Inf. Forensics Secur. 10(6): 1274-1288 (2015) - [j20]Jun Zhou, Xiaolei Dong, Zhenfu Cao, Athanasios V. Vasilakos:
Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Trans. Inf. Forensics Secur. 10(6): 1299-1314 (2015) - [j19]Jun Zhou, Xiaodong Lin, Xiaolei Dong, Zhenfu Cao:
PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributedm-Healthcare Cloud Computing System. IEEE Trans. Parallel Distributed Syst. 26(6): 1693-1703 (2015) - [j18]Jun Zhou, Zhenfu Cao, Xiaolei Dong, Xiaodong Lin:
Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions. IEEE Wirel. Commun. 22(2): 136-144 (2015) - [c16]Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei:
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud. ESORICS (2) 2015: 270-289 - [c15]Jun Zhou, Zhenfu Cao, Xiaolei Dong, Xiaodong Lin:
EVOC: More efficient verifiable outsourced computation from any one-way trapdoor function. ICC 2015: 7444-7449 - [c14]Jun Zhou, Zhenfu Cao, Xiaolei Dong, Xiaodong Lin:
TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems. INFOCOM 2015: 2398-2406 - [i8]Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei:
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud. IACR Cryptol. ePrint Arch. 2015: 613 (2015) - [i7]Junqing Gong, Jie Chen, Xiaolei Dong, Zhenfu Cao, Shaohua Tang:
Extended Nested Dual System Groups, Revisited. IACR Cryptol. ePrint Arch. 2015: 820 (2015) - [i6]Junqing Gong, Xiaolei Dong, Zhenfu Cao, Jie Chen:
Almost-tight Identity Based Encryption against Selective Opening Attack. IACR Cryptol. ePrint Arch. 2015: 904 (2015) - 2014
- [j17]Lifei Wei, Haojin Zhu, Zhenfu Cao, Xiaolei Dong, Weiwei Jia, Yunlu Chen, Athanasios V. Vasilakos:
Security and privacy for storage and computation in cloud computing. Inf. Sci. 258: 371-386 (2014) - [j16]Weiwei Jia, Haojin Zhu, Zhenfu Cao, Xiaolei Dong, Chengxin Xiao:
Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid. IEEE Syst. J. 8(2): 598-607 (2014) - [c13]Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, Xiaodong Lin:
Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability. ESORICS (2) 2014: 55-72 - [c12]Xiaolei Dong, Jun Zhou, Khalid Nawaf Alharbi, Xiaodong Lin, Zhenfu Cao:
An ElGamal-based efficient and privacy-preserving data aggregation scheme for smart grid. GLOBECOM 2014: 4720-4725 - [c11]Danyang He, Zhenfu Cao, Xiaolei Dong, Jiachen Shen:
User self-controllable profile matching for privacy-preserving mobile social networks. ICCS 2014: 248-252 - [c10]Hong Zhang, Xiaolei Dong, Zhenfu Cao, Jiachen Shen:
4P_VES: A Collusion-Resistant Accountable Virtual Economy System. ICICS 2014: 61-73 - 2013
- [j15]Lifei Wei, Zhenfu Cao, Xiaolei Dong:
Secure identity-based multisignature schemes under quadratic residue assumptions. Secur. Commun. Networks 6(6): 689-701 (2013) - [j14]Jun Zhou, Zhenfu Cao, Xiaolei Dong, Xiaodong Lin, Athanasios V. Vasilakos:
Securing m-healthcare social networks: challenges, countermeasures and future directions. IEEE Wirel. Commun. 20(4) (2013) - [c9]Jun Zhou, Zhenfu Cao, Xiaolei Dong:
BDK: Secure and Efficient Biometric based Deterministic Key Agreement in Wireless Body Area Networks. BODYNETS 2013: 488-494 - [c8]Xiaomei Zhang, Xiaolei Dong, Jie Wu, Xiuqi Li, Naixue Xiong:
Fault-Aware Flow Control and Multi-Path Routing in Wireless Sensor Networks. ICDCS Workshops 2013: 27-32 - [i5]Zhenfu Cao, Xiaolei Dong, Licheng Wang, Jun Shao:
More Efficient Cryptosystems From k-th Power Residues. IACR Cryptol. ePrint Arch. 2013: 569 (2013) - [i4]Jun Shao, Licheng Wang, Xiaolei Dong, Zhenfu Cao:
New Efficient Identity-Based Encryption From Factorization. IACR Cryptol. ePrint Arch. 2013: 570 (2013) - 2011
- [j13]Piyi Yang, Zhenfu Cao, Xiaolei Dong:
Fuzzy identity based signature with applications to biometric authentication. Comput. Electr. Eng. 37(4): 532-540 (2011) - [j12]Dongsheng Xing, Zhenfu Cao, Xiaolei Dong:
Identity based signature scheme based on cubic residues. Sci. China Inf. Sci. 54(10): 2001-2012 (2011) - [j11]Piyi Yang, Zhenfu Cao, Xiaolei Dong, Tanveer A. Zia:
An Efficient Privacy Preserving Data Aggregation Scheme with Constant Communication Overheads for Wireless Sensor Networks. IEEE Commun. Lett. 15(11): 1205-1207 (2011) - [j10]Piyi Yang, Zhenfu Cao, Xiaolei Dong:
Threshold proxy re-signature. J. Syst. Sci. Complex. 24(4): 816-824 (2011) - [j9]Xiaolei Dong, Lifei Wei, Haojin Zhu, Zhenfu Cao, Licheng Wang:
: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 60(2): 580-591 (2011) - 2010
- [j8]Piyi Yang, Zhenfu Cao, Xiaolei Dong:
Efficient certificateless threshold signatures without random oracles. J. Syst. Sci. Complex. 23(6): 1167-1182 (2010)
2000 – 2009
- 2009
- [j7]Xiaolei Dong, Haifeng Qian, Zhenfu Cao:
Provably secure RSA-type signature based on conic curve. Wirel. Commun. Mob. Comput. 9(2): 217-225 (2009) - [c7]Piyi Yang, Zhenfu Cao, Xiaolei Dong:
Certificateless Threshold Signature for Data Report Authentication in Mobile Ad Hoc Network. NSS 2009: 143-150 - 2008
- [j6]Rongxing Lu, Xiaolei Dong, Zhenfu Cao:
Designing efficient proxy signature schemes for mobile communication. Sci. China Ser. F Inf. Sci. 51(2): 183-195 (2008) - [j5]Xiaolei Dong, Zhenfu Cao, Licheng Wang:
New designing of cryptosystems based on quadratic fields. Sci. China Ser. F Inf. Sci. 51(8): 1106-1116 (2008) - [c6]Piyi Yang, Zhenfu Cao, Xiaolei Dong:
Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model. Inscrypt 2008: 201-216 - [c5]Liuquan Qin, Zhenfu Cao, Xiaolei Dong:
Multi-Receiver Identity-Based Encryption in Multiple PKG Environment. GLOBECOM 2008: 1862-1866 - [c4]Piyi Yang, Zhenfu Cao, Xiaolei Dong:
Threshold Proxy Re-Signature. IPCCC 2008: 450-455 - [i3]Piyi Yang, Zhenfu Cao, Xiaolei Dong:
Fuzzy Identity Based Signature. IACR Cryptol. ePrint Arch. 2008: 2 (2008) - 2007
- [j4]Zhenchuan Chai, Zhenfu Cao, Xiaolei Dong:
Identity-based signature scheme based on quadratic residues. Sci. China Ser. F Inf. Sci. 50(3): 373-380 (2007) - [j3]Rongxing Lu, Zhenfu Cao, Xiaolei Dong:
A New Practical Limited Identity-Based Encryption Scheme. Fundam. Informaticae 80(4): 461-474 (2007) - [j2]Zhenchuan Chai, Zhenfu Cao, Xiaolei Dong:
Efficient ID-Based Multi-Receiver Threshold Decryption. Int. J. Found. Comput. Sci. 18(5): 987-1004 (2007) - [i2]Zhenfu Cao, Xiaolei Dong, Licheng Wang:
New Public Key Cryptosystems Using Polynomials over Non-commutative Rings. IACR Cryptol. ePrint Arch. 2007: 9 (2007) - 2006
- [j1]Rongxing Lu, Zhenfu Cao, Xiaolei Dong:
Authenticated encryption protocol with perfect forward secrecy for mobile communication. Wirel. Commun. Mob. Comput. 6: 273-280 (2006) - [c3]Rongxing Lu, Zhenfu Cao, Xiaolei Dong:
Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque. CANS 2006: 153-167 - [c2]Rongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su:
Designated Verifier Proxy Signature Scheme from Bilinear Pairings. IMSCCS (2) 2006: 40-47 - [c1]Rongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su:
Group Oriented Deniable Authentication Protocol. IMSCCS (2) 2006: 89-92 - [i1]Xiaolei Dong, Licheng Wang, Zhenfu Cao:
New Public Key Authentication Frameworks with Lite Certification Authority. IACR Cryptol. ePrint Arch. 2006: 154 (2006)
Coauthor Index
aka: Zhen-Fu Cao
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint