default search action
Qiuliang Xu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j50]Han Jiang, Qiuliang Xu, Changyuan Liu, Zhihua Zheng, Yi Tang, Mingqiang Wang:
Cut-and-choose bilateral oblivious transfer protocol based on DDH assumption. J. Ambient Intell. Humaniz. Comput. 15(2): 1327-1337 (2024) - 2023
- [j49]Pingyuan Zhang, Haining Yang, Liang Zhu, Yanhua Zhang, Hao Wang, Qiuliang Xu:
A new lattice-based online/offline signatures framework for low-power devices. Theor. Comput. Sci. 962: 113942 (2023) - 2022
- [j48]Pingyuan Zhang, Han Jiang, Zhihua Zheng, Hao Wang, Qiuliang Xu:
A New and Efficient Lattice-Based Online/Offline Signature From Perspective of Abort. Comput. J. 65(9): 2400-2410 (2022) - [j47]Shengnan Zhao, Qi Zhao, Chuan Zhao, Han Jiang, Qiuliang Xu:
Privacy-enhancing machine learning framework with private aggregation of teacher ensembles. Int. J. Intell. Syst. 37(11): 9904-9920 (2022) - [j46]Yiran Liu, Ye Dong, Hao Wang, Han Jiang, Qiuliang Xu:
Distributed Fog Computing and Federated-Learning-Enabled Secure Aggregation for IoT Devices. IEEE Internet Things J. 9(21): 21025-21037 (2022) - 2021
- [j45]Yongli Wang, Peichu Hu, Qiuliang Xu:
Quantum secure multi-party summation based on entanglement swapping. Quantum Inf. Process. 20(10): 319 (2021) - [j44]Hang-chao Ding, Han Jiang, Qiuliang Xu:
Postquantum Cut-and-Choose Oblivious Transfer Protocol Based on LWE. Secur. Commun. Networks 2021: 9974604:1-9974604:15 (2021) - [c73]Yunting Tao, Fanyu Kong, Jia Yu, Qiuliang Xu:
Modification and Performance Improvement of Paillier Homomorphic Cryptosystem. EUC 2021: 131-136 - [c72]Shengnan Zhao, Ming Ma, Xiangfu Song, Han Jiang, Yunxue Yan, Qiuliang Xu:
Lightweight Threshold Private Set Intersection via Oblivious Transfer. WASA (3) 2021: 108-116 - 2020
- [j43]Hang-chao Ding, Han Jiang, Qiuliang Xu:
Post-Quantum Universal Composable OT Based on Key Exchange. IEEE Access 8: 148445-148459 (2020) - [j42]Shengnan Zhao, Xiangfu Song, Han Jiang, Ming Ma, Zhihua Zheng, Qiuliang Xu:
An Efficient Outsourced Oblivious Transfer Extension Protocol and Its Applications. Secur. Commun. Networks 2020: 8847487:1-8847487:12 (2020) - [j41]Jie Cai, Han Jiang, Hao Wang, Qiuliang Xu:
Lattice-Based Linearly Homomorphic Signature Scheme over F 2. Secur. Commun. Networks 2020: 8857815:1-8857815:7 (2020) - [j40]Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, Minghao Zhao:
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency. IEEE Trans. Dependable Secur. Comput. 17(5): 912-927 (2020) - [c71]Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo:
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-challenge Setting. ASIACRYPT (1) 2020: 191-220 - [c70]Rupeng Yang, Man Ho Au, Zuoxia Yu, Qiuliang Xu:
Collusion Resistant Watermarkable PRFs from Standard Assumptions. CRYPTO (1) 2020: 590-620 - [c69]Xiangfu Song, Dong Yin, Han Jiang, Qiuliang Xu:
Searchable Symmetric Encryption with Tunable Leakage Using Multiple Servers. DASFAA (1) 2020: 157-177 - [c68]Junming Ke, Pawel Szalachowski, Jianying Zhou, Qiuliang Xu:
Formalizing Bitcoin Crashes with Universally Composable Security. ISC 2020: 334-351 - [c67]Guoqiang Yang, Fanyu Kong, Qiuliang Xu:
Optimized FPGA Implementation of Elliptic Curve Cryptosystem over Prime Fields. TrustCom 2020: 243-249 - [i13]Rupeng Yang, Man Ho Au, Zuoxia Yu, Qiuliang Xu:
Collusion Resistant Watermarkable PRFs from Standard Assumptions. IACR Cryptol. ePrint Arch. 2020: 695 (2020) - [i12]Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo:
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting. IACR Cryptol. ePrint Arch. 2020: 1080 (2020) - [i11]Junming Ke, Pawel Szalachowski, Jianying Zhou, Qiuliang Xu:
Formalizing Bitcoin Crashes with Universally Composable Security. IACR Cryptol. ePrint Arch. 2020: 1098 (2020)
2010 – 2019
- 2019
- [j39]Jie Cai, Han Jiang, Pingyuan Zhang, Zhihua Zheng, Guangshi Lyu, Qiuliang Xu:
An Efficient Strong Designated Verifier Signature Based on ℛ-SIS Assumption. IEEE Access 7: 3938-3947 (2019) - [j38]Yiran Liu, Junming Ke, Qiuliang Xu, Han Jiang, Hao Wang:
Decentralization is Vulnerable Under the Gap Game. IEEE Access 7: 90999-91008 (2019) - [j37]Han Jiang, Hao Wang, Zhihua Zheng, Qiuliang Xu:
Privacy preserved wireless sensor location protocols based on mobile edge computing. Comput. Secur. 84: 393-401 (2019) - [j36]Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu:
Decentralized blacklistable anonymous credentials with reputation. Comput. Secur. 85: 353-371 (2019) - [j35]Zhen Li, Minghao Zhao, Han Jiang, Qiuliang Xu:
Keyword guessing on multi-user searchable encryption. Int. J. High Perform. Comput. Netw. 14(1): 60-68 (2019) - [j34]Jie Cai, Han Jiang, Pingyuan Zhang, Zhihua Zheng, Hao Wang, Guangshi Lü, Qiuliang Xu:
ID-Based Strong Designated Verifier Signature over ℛ-SIS Assumption. Secur. Commun. Networks 2019: 9678095:1-9678095:8 (2019) - [c66]Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Collusion Resistant Watermarking Schemes for Cryptographic Functionalities. ASIACRYPT (1) 2019: 371-398 - [c65]Hang-chao Ding, Han Jiang, Jie Cai, Chen-guang Wang, Jing Zou, Qiuliang Xu:
Research on Key Exchange Protocol Based on LWE. CIS 2019: 236-240 - [c64]Rupeng Yang, Man Ho Au, Zhenfei Zhang, Qiuliang Xu, Zuoxia Yu, William Whyte:
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications. CRYPTO (1) 2019: 147-175 - [c63]Zuoxia Yu, Man Ho Au, Jiangshan Yu, Rupeng Yang, Qiuliang Xu, Wang Fat Lau:
New Empirical Traceability Analysis of CryptoNote-Style Blockchains. Financial Cryptography 2019: 133-149 - [c62]Junming Ke, Pawel Szalachowski, Jianying Zhou, Qiuliang Xu, Zheng Yang:
IBWH: An Intermittent Block Withholding Attack with Optimal Mining Reward Rate. ISC 2019: 3-24 - [i10]Rupeng Yang, Man Ho Au, Zhenfei Zhang, Qiuliang Xu, Zuoxia Yu, William Whyte:
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications. IACR Cryptol. ePrint Arch. 2019: 747 (2019) - 2018
- [j33]Pingyuan Zhang, Han Jiang, Zhihua Zheng, Peichu Hu, Qiuliang Xu:
A New Post-Quantum Blind Signature From Lattice Assumptions. IEEE Access 6: 27251-27258 (2018) - [j32]Zuoxia Yu, Man Ho Au, Qiuliang Xu, Rupeng Yang, Jinguang Han:
Towards leakage-resilient fine-grained access control in fog computing. Future Gener. Comput. Syst. 78: 763-777 (2018) - [j31]Rupeng Yang, Qiuliang Xu, Man Ho Au, Zuoxia Yu, Hao Wang, Lu Zhou:
Position based cryptography with location privacy: A step for Fog Computing. Future Gener. Comput. Syst. 78: 799-806 (2018) - [j30]Minghao Zhao, Han Jiang, Zhen Li, Qiuliang Xu, Hao Wang, Shaojing Li:
An efficient symmetric searchable encryption scheme for dynamic dataset in cloud computing paradigms. Int. J. High Perform. Comput. Netw. 12(2): 179-190 (2018) - [j29]Dandan Yuan, Xiangfu Song, Qiuliang Xu, Minghao Zhao, Xiaochao Wei, Hao Wang, Han Jiang:
An ORAM-based privacy preserving data sharing scheme for cloud storage. J. Inf. Secur. Appl. 39: 1-9 (2018) - [j28]Xiaochao Wei, Minghao Zhao, Qiuliang Xu:
Efficient and secure outsourced approximate pattern matching protocol. Soft Comput. 22(4): 1175-1187 (2018) - [c61]Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai, Qiuliang Xu:
Lattice-Based Universal Accumulator with Nonmembership Arguments. ACISP 2018: 502-519 - [c60]Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu:
Decentralized Blacklistable Anonymous Credentials with Reputation. ACISP 2018: 720-738 - [c59]Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai, Qiuliang Xu:
Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption. AsiaCCS 2018: 659-672 - [c58]Junming Ke, Han Jiang, Xiangfu Song, Shengnan Zhao, Hao Wang, Qiuliang Xu:
Analysis on the Block Reward of Fork After Withholding (FAW). NSS 2018: 16-31 - [c57]Xiaoyan Yang, Han Jiang, Mengbo Hou, Zhihua Zheng, Qiuliang Xu, Kim-Kwang Raymond Choo:
A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity. NSS 2018: 111-124 - [c56]Jie Cai, Han Jiang, Qiuliang Xu, Guangshi Lv, Minghao Zhao, Hao Wang:
Towards Security Authentication for IoT Devices with Lattice-Based ZK. NSS 2018: 141-150 - [c55]Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Unforgeable Watermarking Schemes with Public Extraction. SCN 2018: 63-80 - [i9]Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, Minghao Zhao:
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency. IACR Cryptol. ePrint Arch. 2018: 497 (2018) - 2017
- [j27]Zhen Li, Minghao Zhao, Han Jiang, Qiuliang Xu:
Multi-user searchable encryption with a designated server. Ann. des Télécommunications 72(9-10): 617-629 (2017) - [j26]Xiaochao Wei, Qiuliang Xu, Yi Tang:
k-out-of-n oblivious transfer protocol with security against malicious adversaries. Comput. Syst. Sci. Eng. 32(2) (2017) - [j25]Chengyu Hu, Pengtao Liu, Shanqing Guo, Qiuliang Xu:
Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application. Int. J. High Perform. Comput. Netw. 10(3): 226-239 (2017) - [c54]Han Jiang, Qiuliang Xu, Changyuan Liu, Zhe Liu:
An Efficient CPA-Secure Encryption Scheme with Equality Test. CSE/EUC (2) 2017: 38-45 - [c53]Kang Li, Rupeng Yang, Man Ho Au, Qiuliang Xu:
Practical Range Proof for Cryptocurrency Monero with Provable Security. ICICS 2017: 255-262 - [i8]Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, Minghao Zhao:
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency. CoRR abs/1710.00183 (2017) - [i7]Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu:
Decentralized Blacklistable Anonymous Credentials with Reputation. IACR Cryptol. ePrint Arch. 2017: 389 (2017) - [i6]Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak PRF with Efficient Protocols from LWR. IACR Cryptol. ePrint Arch. 2017: 781 (2017) - [i5]Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Collusion Resistant Watermarking Schemes for Cryptographic Functionalities. IACR Cryptol. ePrint Arch. 2017: 1201 (2017) - 2016
- [j24]Yilei Wang, Zhe Liu, Hao Wang, Qiuliang Xu:
Social rational secure multi-party computation. Concurr. Comput. Pract. Exp. 28(9): 2748 (2016) - [j23]Han Jiang, Xue Li, Qiuliang Xu:
An Improvement to a Multi-Client Searchable Encryption Scheme for Boolean Queries. J. Medical Syst. 40(12): 255:1-255:11 (2016) - [j22]Yilei Wang, Zhe Liu, Qiuliang Xu:
Corrigendum to "New Rational Parties Relying on Reputation". Secur. Commun. Networks 9(7): 697 (2016) - [j21]Chengyu Hu, Rupeng Yang, Pengtao Liu, Zuoxia Yu, Yongbin Zhou, Qiuliang Xu:
Public-key encryption with keyword search secure against continual memory attacks. Secur. Commun. Networks 9(11): 1613-1629 (2016) - [j20]Yilei Wang, Tao Li, Lufeng Chen, Ping Li, Ho-fung Leung, Zhe Liu, Qiuliang Xu:
Rational computing protocol based on fuzzy theory. Soft Comput. 20(2): 429-438 (2016) - [j19]Chengyu Hu, Pengtao Liu, Yongbin Zhou, Shanqing Guo, Yilei Wang, Qiuliang Xu:
Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks. Soft Comput. 20(12): 4919-4932 (2016) - [c52]Zhe Liu, Johann Großschädl, Lin Li, Qiuliang Xu:
Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes. ACISP (1) 2016: 94-112 - [c51]Zuoxia Yu, Man Ho Au, Qiuliang Xu, Rupeng Yang, Jinguang Han:
Leakage-Resilient Functional Encryption via Pair Encodings. ACISP (1) 2016: 443-460 - [c50]Zhen Li, Minghao Zhao, Han Jiang, Qiuliang Xu:
Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System. CloudComp 2016: 123-132 - [c49]Xiaochao Wei, Chuan Zhao, Han Jiang, Qiuliang Xu, Hao Wang:
Practical Server-Aided k-out-of-n Oblivious Transfer Protocol. GPC 2016: 261-277 - [c48]Xueyang Han, Qiuliang Xu, Fengbo Lin, Minghao Zhao:
Improved Power Analysis Attack Based on the Preprocessed Power Traces. GPC 2016: 278-289 - [c47]Minghao Zhao, Zhen Li, Yilei Wang, Qiuliang Xu:
Longest Common Sub-sequence Computation and Retrieve for Encrypted Character Strings. NBiS 2016: 496-499 - [c46]Xiaochao Wei, Han Jiang, Chuan Zhao, Minghao Zhao, Qiuliang Xu:
Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries. Trustcom/BigDataSE/ISPA 2016: 418-425 - [c45]Xiaoyan Yang, Han Jiang, Qiuliang Xu, Mengbo Hou, Xiaochao Wei, Minghao Zhao, Kim-Kwang Raymond Choo:
A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol. Trustcom/BigDataSE/ISPA 2016: 670-677 - 2015
- [j18]Chengyu Hu, Zuoxia Yu, Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Qixia Yuan:
Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption. Int. J. Embed. Syst. 7(3/4): 216-229 (2015) - [j17]Yilei Wang, Willy Susilo, Tao Li, Qiuliang Xu:
File sharing in cloud computing using win stay lose shift strategy. Int. J. High Perform. Comput. Netw. 8(2): 154-166 (2015) - [j16]Chuan Zhao, Han Jiang, Qiuliang Xu, Xiaochao Wei, Hao Wang:
Several Oblivious Transfer Variants in Cut-and-Choose Scenario. Int. J. Inf. Secur. Priv. 9(2): 1-12 (2015) - [j15]Yilei Wang, Tao Li, Hairong Qin, Jin Li, Wei Gao, Zhe Liu, Qiuliang Xu:
A brief survey on secure multi-party computing in the presence of rational parties. J. Ambient Intell. Humaniz. Comput. 6(6): 807-824 (2015) - [j14]Yilei Wang, Chuan Zhao, Qiuliang Xu, Zhihua Zheng, Zhenhua Chen, Zhe Liu:
Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks. Mob. Inf. Syst. 2015: 637458:1-637458:8 (2015) - [j13]Yilei Wang, Duncan S. Wong, Chuan Zhao, Qiuliang Xu:
Fair two-party computation with rational parties holding private types. Secur. Commun. Networks 8(2): 284-297 (2015) - [j12]Zhe Liu, Hwajeong Seo, Qiuliang Xu:
Performance evaluation of twisted Edwards-form elliptic curve cryptography for wireless sensor nodes. Secur. Commun. Networks 8(18): 3301-3310 (2015) - [j11]Yilei Wang, Duncan S. Wong, Willy Susilo, Xiaofeng Chen, Qiuliang Xu:
Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information. Secur. Commun. Networks 8(18): 3690-3700 (2015) - [c44]Tao Li, Hao Yang, Yilei Wang, Qiuliang Xu:
The Electronic Voting in the Presence of Rational Voters. AINA Workshops 2015: 293-296 - [c43]Junwei Wang, Praveen Kumar Vadnala, Johann Großschädl, Qiuliang Xu:
Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON. CT-RSA 2015: 181-198 - [c42]Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Rui Zhang, Chengyu Hu, Zuoxia Yu:
Updatable Hash Proof System and Its Applications. ESORICS (1) 2015: 266-285 - [c41]Shufeng Li, Minghao Zhao, Han Jiang, Qiuliang Xu, Xiaochao Wei:
Efficient ORAM Based on Binary Tree without Data Overflow and Evictions. ISICA 2015: 596-607 - [c40]Chuan Zhao, Han Jiang, Xiaochao Wei, Qiuliang Xu, Minghao Zhao:
Cut-and-Choose Bilateral Oblivious Transfer and Its Application. TrustCom/BigDataSE/ISPA (1) 2015: 384-391 - 2014
- [j10]Yilei Wang, Zhe Liu, Hao Wang, Qiuliang Xu:
Social rational secure multi-party computation. Concurr. Comput. Pract. Exp. 26(5): 1067-1083 (2014) - [j9]Yilei Wang, Zhe Liu, Qiuliang Xu:
New rational parties relying on reputation. Secur. Commun. Networks 7(7): 1128-1137 (2014) - [c39]Shujie Cui, Johann Großschädl, Zhe Liu, Qiuliang Xu:
High-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing Unit. ISPEC 2014: 202-216 - [c38]Yilei Wang, Zhe Liu, Tao Li, Qiuliang Xu:
Rational Secure Two-party Computation in Social Cloud. NSS 2014: 476-483 - [i4]Zuoxia Yu, Qiuliang Xu, Yongbin Zhou, Chengyu Hu, Rupeng Yang, Guangjun Fan:
Weak-Key Leakage Resilient Cryptography. IACR Cryptol. ePrint Arch. 2014: 159 (2014) - [i3]Han Jiang, Xiaochao Wei, Chuan Zhao, Qiuliang Xu:
Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation. IACR Cryptol. ePrint Arch. 2014: 768 (2014) - 2013
- [c37]Kerui Wang, Qiuliang Xu, Guoyan Zhang:
A Secure Threshold Signature Scheme from Lattices. CIS 2013: 469-473 - [c36]Yuanhui Lin, Mengbo Hou, Qiuliang Xu:
Strongly Password-Based Three-Party Authenticated Key Exchange Protocol. CIS 2013: 555-558 - [c35]Guiying Li, Mengbo Hou, Chuan Zhao, Qiuliang Xu:
A Two-Party Certificateless Authenticated Key Agreement Protocol with Provable Security. CIS 2013: 559-563 - [c34]Hao Wang, Chuan Zhao, Qiuliang Xu, Yilei Wang:
Identity-Based Authenticate Key Exchange Protocol from Lattice. CIS 2013: 564-568 - [c33]Xianglong Kong, Wei Wang, Qiuliang Xu:
Improved Rectangle Attack on SMS4 Reduced to 18 Rounds. CIS 2013: 575-578 - [c32]Yilei Wang, Qiuliang Xu, Zhe Liu:
Fair Computation with Tit-for-Tat Strategy. INCoS 2013: 309-314 - 2012
- [j8]Yilei Wang, Hao Wang, Qiuliang Xu:
Repeated rational secret sharing, revisited. Int. J. Grid Util. Comput. 3(1): 12-24 (2012) - [j7]Yilei Wang, Hao Wang, Qiuliang Xu:
Rational secret sharing with semi-rational players. Int. J. Grid Util. Comput. 3(1): 59-67 (2012) - [j6]Mengbo Hou, Qiuliang Xu, Fengbo Lin:
An Efficient Certificate Revocation and Verification Scheme from Multi-Hashing. J. Comput. 7(6): 1437-1444 (2012) - [c31]Heyu Yin, Qiuliang Xu:
A Permanent Secure QKD Protocol Realized with Asymmetric Key Authentication. CIS 2012: 457-460 - [c30]Tao Shi, Wei Wang, Qiuliang Xu:
Improved Impossible Differential Cryptanalysis of SMS4. CIS 2012: 492-496 - [c29]Minda Yu, Qiuliang Xu:
A Simple and Effective Scheme of Ciphertext-Policy ABE. CIS 2012: 516-519 - [c28]Yang Cai, Qiuliang Xu, Zhihua Zheng:
A Provably Secure Identity-Based Key Agreement Protocol from Key Encapsulation Scheme. CIS 2012: 636-640 - [c27]Yilei Wang, Qiuliang Xu, Zhe Liu:
Multi-party Computation with Social Rational Parties. INCoS 2012: 251-258 - 2011
- [j5]Xiufeng Zhao, Qiuliang Xu, Hao Wang, Peng He:
A Scalable ID-based Constant-round AGKE Protocol with Logarithmic Computation Complexity. J. Networks 6(10): 1422-1429 (2011) - [c26]Chao Ning, Qiuliang Xu:
Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security. ASIACRYPT 2011: 572-589 - [c25]Yilei Wang, Qiuliang Xu:
2-out-of-2 Rational Secret Sharing in Extensive Form. CIS 2011: 847-851 - [c24]Qing Dai, Xiufeng Zhao, Qiuliang Xu, Han Jiang:
A New Cross-realm Group Password-based Authenticated Key Exchange Protocol. CIS 2011: 856-860 - [c23]Hao Wang, Qiuliang Xu, Han Jiang, Rui Li:
Attribute-Based Authenticated Key Exchange Protocol with General Relations. CIS 2011: 900-904 - [c22]Rui Li, Qiuliang Xu, Hao Wang:
Concurrent Non-malleable Statistically Hiding Commitment. CIS 2011: 920-924 - [c21]Yilei Wang, Qiuliang Xu:
Fairness with Semi-rational Players in Standard Communication Networks. INCoS 2011: 293-298 - [c20]Guoyan Zhang, Qiuliang Xu:
Secret Key Awareness Security Public Key Encryption Scheme. ISA 2011: 53-61 - [i2]Chao Ning, Qiuliang Xu:
Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security. IACR Cryptol. ePrint Arch. 2011: 69 (2011) - 2010
- [j4]Hao Wang, Qiuliang Xu, Xiufeng Zhao:
Generalized Hierarchical Identity-Based Signcryption. J. Comput. 5(7): 1078-1085 (2010) - [j3]Mengbo Hou, Qiuliang Xu, Shanqing Guo, Han Jiang:
Cryptanalysis on Identity-based Authenticated Key Agreement Protocols from Pairings. J. Networks 5(7): 855-862 (2010) - [c19]Chao Ning, Qiuliang Xu:
Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition. ASIACRYPT 2010: 483-500 - [c18]Han Jiang, Qiuliang Xu, Chenghui Zhang:
Convertible Perfect Concurrent Signature Protocol. CIS 2010: 352-356 - [c17]Hao Wang, Qiuliang Xu, Han Jiang, Xiufeng Zhao:
A Fully Anonymous Identity-Based Signcryption Scheme in the Standard Model. CIS 2010: 372-376 - [c16]Yongquan Shi, Tao Ban, Shanqing Guo, Qiuliang Xu, Youki Kadobayashi:
Fast Implementation of String-Kernel-Based Support Vector Classifiers by GPU Computing. ICONIP (2) 2010: 143-151 - [c15]Bo Zhang, Qiuliang Xu:
An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model. AST/UCMA/ISA/ACN 2010: 15-27 - [i1]Chao Ning, Qiuliang Xu:
Multiparty Computation for Modulo Reduction without Bit-Decomposition and A Generalization to Bit-Decomposition. IACR Cryptol. ePrint Arch. 2010: 266 (2010)
2000 – 2009
- 2009
- [j2]Xiu Fu, Qiuliang Xu, Hao Wang:
A Provably-Secure Password-Authenticated Group Key Agreement in the Standard Model. J. Networks 4(8): 763-770 (2009) - [j1]Hao Wang, Qiuliang Xu, Xiu Fu:
Revocable Attribute-based Key Agreement Protocol without Random Oracles. J. Networks 4(8): 787-794 (2009) - [c14]Mengbo Hou, Qiuliang Xu:
A Secure ID-Based Explicit Authenticated Key Agreement Protocol without Key Escrow. IAS 2009: 487-490 - [c13]Mengbo Hou, Qiuliang Xu:
On the Security of Certificateless Authenticated Key Agreement Protocol (CL-AK) for Grid Computing. ChinaGrid 2009: 128-133 - [c12]Tao Ban, Shanqing Guo, Qiuliang Xu, Youki Kadobayashi:
AdaIndex: An Adaptive Index Structure for Fast Similarity Search in Metric Spaces. ICONIP (2) 2009: 729-737 - [c11]Mengbo Hou, Qiuliang Xu, Tao Ban:
Perfect Forward Secure Two-Party Key Agreement Protocol with Key Escrow. IIH-MSP 2009: 644-647 - [c10]Xiangfei Sun, Qiuliang Xu, Tao Ban:
Identity Based Authenticated Key Agreement for Tree-Based Group. IIH-MSP 2009: 941-944 - [c9]Hao Wang, Qiuliang Xu, Tao Ban:
A Provably Secure Two-Party Attribute-Based Key Agreement Protocol. IIH-MSP 2009: 1042-1045 - [c8]Mengbo Hou, Qiuliang Xu:
Secure and Efficient Two-Party Authenticated Key Agreement Protocol from Certificateless Public Key Encryption Scheme. NCM 2009: 894-897 - [c7]Bo Zhang, Qiuliang Xu:
A Strong Designated-verifier Proxy Signature Scheme. WKDD 2009: 569-572 - [c6]Bo Zhang, Qiuliang Xu:
Certificateless Proxy Blind Signature Scheme from Bilinear Pairings. WKDD 2009: 573-576 - 2008
- [c5]Jiang Han, Qiuliang Xu, Bo Zhang:
Perfect Concurrent Signature Protocol for Symmetric Participant. CIS (2) 2008: 273-277 - [c4]Jiang Han, Qiuliang Xu, Guohua Chen:
Efficient ID-based Threshold Ring Signature scheme. EUC (2) 2008: 437-442 - [c3]Qian Sun, Shanqing Guo, Qiuliang Xu:
Research on the Encrypted Data Access Control of Multi-purpose Asynchronous WSN. EUC (2) 2008: 651-654 - [c2]Bo Zhang, Qiuliang Xu:
Identity-Based Broadcast Group-Oriented Encryption from Pairings. FGCN (1) 2008: 407-410 - [c1]Zhonghua Zhao, Shanqing Guo, Qiuliang Xu, Tao Ban:
G-Means: A Clustering Algorithm for Intrusion Detection. ICONIP (1) 2008: 563-570
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint