


default search action
Lidong Han
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j26]Zhihao Xu
, Chengliang Tian
, Guoyan Zhang, Weizhong Tian
, Lidong Han:
Forward-Secure multi-user and verifiable dynamic searchable encryption scheme within a zero-trust environment. Future Gener. Comput. Syst. 166: 107701 (2025) - 2024
- [j25]Ke Wang
, Zhenfeng Zhang, Haodong Jiang, Huiqin Xie, Yanjun Li, Ying Sun, Lidong Han:
Key Reuse Attacks on Post-quantum Cryptosystems, Revisited. Comput. J. 67(1): 323-337 (2024) - [j24]Guang Yang, Lidong Han, Jingguo Bi, Fuqun Wang:
A collusion-resistant certificateless provable data possession scheme for shared data with user revocation. Clust. Comput. 27(2): 2165-2179 (2024) - [j23]Qifan Mao
, Liangliang Wang, Yu Long, Lidong Han, Zihan Wang
, Kefei Chen
:
A blockchain-based framework for federated learning with privacy preservation in power load forecasting. Knowl. Based Syst. 284: 111338 (2024) - 2023
- [j22]Jiahao Jiang, Xiao Tan
, Lidong Han
, Qi Xie
, Shengbao Wang
:
CACPA: Credible Alliance-Chain-Based Public Auditing Scheme for Cloud Storage. IEEE Access 11: 86243-86251 (2023) - [j21]Xiao Tan
, Qi Xie
, Lidong Han, Shengbao Wang, Wenhao Liu:
Proof of retrievability with flexible designated verification for cloud storage. Comput. Secur. 135: 103486 (2023) - [j20]Limin Tao, Xikun Liang, Zhijing Wu, Lidong Han, Jiangping Zhu:
Plaintext Related Optical Image Hybrid Encryption Based on Fractional Fourier Transform and Generalized Chaos of Multiple Controlling Parameters. J. Grid Comput. 21(1): 17 (2023) - [j19]Zhaoxuan Bian
, Fuqun Wang
, Renjun Zhang
, Bin Lian, Lidong Han, Kefei Chen:
A Publicly Verifiable Leveled Fully Homomorphic Signcryption Scheme. IET Inf. Secur. 2023: 1-8 (2023) - [j18]Yuqin Sun, Lidong Han, Jingguo Bi, Xiao Tan, Qi Xie:
Verifiable attribute-based keyword search scheme over encrypted data for personal health records in cloud. J. Cloud Comput. 12(1): 77 (2023) - [j17]Lidong Han
, Guangwu Xu
, Qi Xie
:
Comments on "An Efficient Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage". IEEE Trans. Inf. Forensics Secur. 18: 3934-3935 (2023) - [j16]Junling Guo, Lidong Han
, Guang Yang, Xiao Tan, Fuqun Wang:
Cryptanalysis of Two Public Key Encryption Schemes with Multi-keyword Search. Wirel. Pers. Commun. 130(3): 2231-2240 (2023) - [c5]Lili Yan
, Jingyi Cui
, Jian Liu
, Guangquan Xu
, Lidong Han
, Alireza Jolfaei
, Xi Zheng
:
IGA : An Improved Genetic Algorithm to Construct Weightwise (Almost) Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity. AsiaCCS 2023: 638-648 - 2022
- [j15]Yuhang Shao, Chengliang Tian
, Lidong Han
, Hequn Xian, Jia Yu
:
Privacy-Preserving and Verifiable Cloud-Aided Disease Diagnosis and Prediction With Hyperplane Decision-Based Classifier. IEEE Internet Things J. 9(21): 21648-21661 (2022) - [j14]Junling Guo, Lidong Han
, Guang Yang, Xuejiao Liu, Chengliang Tian:
An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability. J. Cloud Comput. 11: 14 (2022) - [j13]Guang Yang, Junling Guo, Lidong Han
, Xuejiao Liu, Chengliang Tian:
An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy. Peer-to-Peer Netw. Appl. 15(1): 503-515 (2022) - [c4]Jianhong Zhang, Chenghe Dong, Ziang Li, Sentian Yin, Lidong Han:
On the Security of Verifiable Privacy-preserving Multi-type Data Aggregation Scheme in Smart Grid. CyberC 2022: 9-11 - [i4]Lidong Han, Guangwu Xu, Qi Xie, Xiao Tan, Chengliang Tian:
Cryptanalysis of an Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage. IACR Cryptol. ePrint Arch. 2022: 581 (2022) - 2021
- [j12]Jingguo Bi
, Lidong Han:
Lattice Attacks on NTRU Revisited. IEEE Access 9: 66218-66222 (2021) - [j11]Lidong Han
, Junling Guo, Guang Yang, Qi Xie
, Chengliang Tian
:
An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time. IEEE Access 9: 151245-151253 (2021) - [j10]Qi Xie
, Keheng Li, Xiao Tan, Lidong Han, Wen Tang, Bin Hu:
A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city. EURASIP J. Wirel. Commun. Netw. 2021(1): 119 (2021)
2010 – 2019
- 2018
- [j9]Lidong Han, Xiao Tan, Shengbao Wang, Xikun Liang:
An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems. Peer-to-Peer Netw. Appl. 11(1): 63-73 (2018) - 2017
- [j8]Lidong Han, Qi Xie, Wenhao Liu:
An Improved Biometric Based Authentication Scheme with User Anonymity Using Elliptic Curve Cryptosystem. Int. J. Netw. Secur. 19(3): 469-478 (2017) - [j7]Lidong Han, Qi Xie, Wenhao Liu, Shengbao Wang:
A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme. Wirel. Pers. Commun. 95(3): 3391-3406 (2017) - 2016
- [j6]Changhui Hu, Lidong Han:
Efficient wildcard search over encrypted data. Int. J. Inf. Sec. 15(5): 539-547 (2016) - [j5]Changhui Hu, Lidong Han, Siu-Ming Yiu:
Efficient and secure multi-functional searchable symmetric encryption schemes. Secur. Commun. Networks 9(1): 34-42 (2016) - 2014
- [j4]Chengliang Tian, Lidong Han, Guangwu Xu:
A polynomial time algorithm for GapCVPP in l 1 norm. Sci. China Inf. Sci. 57(3): 1-7 (2014) - [j3]Wenhao Liu, Qi Xie, Shengbao Wang, Lidong Han, Bin Hu:
Pairing-Free Certificateless Signature with Security Proof. J. Comput. Networks Commun. 2014: 792063:1-792063:6 (2014) - [j2]Qi Xie, Wenhao Liu, Shengbao Wang, Lidong Han, Bin Hu, Ting Wu:
Improvement of a Uniqueness-and-Anonymity-Preserving User Authentication Scheme for Connected Health Care. J. Medical Syst. 38(9): 91 (2014) - [c3]Lidong Han, Changhui Hu:
Efficient Approximate Search Using VGRAM Over Encrypted Cloud Data. CBD 2014: 228-234 - 2012
- [c2]Lidong Han, Wei Wei, Mingjie Liu:
On the Multiple Fault Attacks on RSA Signatures with LSBs of Messages Unknown. Inscrypt 2012: 1-9 - [i3]Lidong Han, Wei Wei, Mingjie Liu:
On the Multiple Fault Attack on RSA Signatures with LSBs of Messages Unknown. IACR Cryptol. ePrint Arch. 2012: 491 (2012) - 2010
- [j1]Lidong Han, Xiaoyun Wang, Guangwu Xu:
On an attack on RSA with small CRT-exponents. Sci. China Inf. Sci. 53(8): 1511-1518 (2010) - [c1]Keting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang:
Pseudo-Cryptanalysis of Luffa. Inscrypt 2010: 187-198
2000 – 2009
- 2009
- [i2]Keting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang:
Pseudo-Cryptanalysis of Luffa. IACR Cryptol. ePrint Arch. 2009: 224 (2009) - [i1]Jingguo Bi, Lidong Han, Xianmeng Meng:
Cryptanalysis of two knapsack public-key cryptosystems. IACR Cryptol. ePrint Arch. 2009: 537 (2009)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint