default search action
Jinyong Chang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Jing Song, Jinyong Chang:
General construction of compressive integrity auditing protocol from strong homomorphic encryption scheme. Clust. Comput. 27(5): 5663-5675 (2024) - [j39]Songrun Yang, Jinyong Chang:
Identity-based remote data integrity auditing from lattices for secure cloud storage. Clust. Comput. 27(5): 5833-5844 (2024) - [j38]Zhong Wang, Funing Zhang, Anling Zhang, Jinyong Chang:
LFTDA: A lightweight and fault-tolerant data aggregation scheme with privacy-enhanced property in fog-assisted smart grid. Comput. Commun. 220: 35-42 (2024) - [j37]Xuening Guan, Jinyong Chang, Wei Zhang:
Secure data sharing scheme with privacy-preserving and certificateless integrity auditing in cloud storage. Comput. Commun. 224: 285-301 (2024) - [j36]Jinyong Chang, Xinyu Hao:
Certificateless Dynamic Data Sharing Scheme With File Recommendation and Integrity Auditing Functions in Cloud-Fog Environment. IEEE Internet Things J. 11(6): 9630-9644 (2024) - [j35]Tongda Liu, Zekun Li, Yanyan Ji, Jinyong Chang:
Efficient Key-Escrow-Free and Vehicle-Revocable Data Sharing Protocol for Vehicular Ad Hoc Network. IEEE Internet Things J. 11(7): 11540-11553 (2024) - [j34]Yufeng Yao, Jinyong Chang, Anling Zhang:
Efficient Data Sharing Scheme With Fine-Grained Access Control and Integrity Auditing in Terminal-Edge-Cloud Network. IEEE Internet Things J. 11(16): 26944-26954 (2024) - 2023
- [j33]Yuan Tian, Genqing Bian, Jinyong Chang, Ying Tang, Jian Li, Chong-Qiang Ye:
A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity. Entropy 25(5): 742 (2023) - 2022
- [j32]Yanyan Ji, Bilin Shao, Jinyong Chang, Genqing Bian:
Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property. Clust. Comput. 25(1): 337-349 (2022) - [j31]Yixin Chen, Jinyong Chang:
Identity-based proof of retrievability meets with identity-based network coding. Clust. Comput. 25(5): 3067-3083 (2022) - [j30]Jinyong Chang, Qiaochuan Ren, Yanyan Ji, Maozhi Xu, Rui Xue:
Secure medical data management with privacy-preservation and authentication properties in smart healthcare system. Comput. Networks 212: 109013 (2022) - [j29]Yubo Zhao, Jinyong Chang:
Certificateless public auditing scheme with designated verifier and privacy-preserving property in cloud storage. Comput. Networks 216: 109270 (2022) - [j28]Haiyan Xiao, Lifang Wang, Jinyong Chang:
The differential fault analysis on block cipher FeW. Cybersecur. 5(1): 28 (2022) - [j27]Yanyan Ji, Bilin Shao, Jinyong Chang, Maozhi Xu, Rui Xue:
Identity-based remote data checking with a designated verifier. J. Cloud Comput. 11: 7 (2022) - [j26]Jinyong Chang, Maozhi Xu, Rui Xue:
Public auditing protocol with dynamic update and privacy-preserving properties in fog-to-cloud-based IoT applications. Peer-to-Peer Netw. Appl. 15(4): 2021-2036 (2022) - [j25]Jinyong Chang, Bilin Shao, Yanyan Ji, Genqing Bian:
Comment on "A Lightweight Auditing Service for Shared Data With Secure User Revocation in Cloud Storage". IEEE Trans. Serv. Comput. 15(5): 2633-2634 (2022) - 2021
- [j24]Jinyong Chang, Bilin Shao, Yanyan Ji, Maozhi Xu, Rui Xue:
Secure network coding from secure proof of retrievability. Sci. China Inf. Sci. 64(12) (2021) - 2020
- [j23]Jinyong Chang, Huiqun Wang, Fei Wang, Anling Zhang, Yanyan Ji:
RKA Security for Identity-Based Signature Scheme. IEEE Access 8: 17833-17841 (2020) - [j22]Genqing Bian, Jinyong Chang:
Certificateless Provable Data Possession Protocol for the Multiple Copies and Clouds Case. IEEE Access 8: 102958-102970 (2020) - [j21]Yanyan Ji, Bilin Shao, Jinyong Chang, Genqing Bian:
Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited. Appl. Math. Comput. 386: 125478 (2020) - [j20]Jinyong Chang, Bilin Shao, Yanyan Ji, Genqing Bian:
Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage, Revisited. IEEE Commun. Lett. 24(12): 2723-2727 (2020) - [j19]Jinyong Chang, Yanyan Ji, Bilin Shao, Maozhi Xu, Rui Xue:
Certificateless Homomorphic Signature Scheme for Network Coding. IEEE/ACM Trans. Netw. 28(6): 2615-2628 (2020) - [j18]Jinyong Chang, Bilin Shao, Yanyan Ji, Genqing Bian:
Comment on "A Tag Encoding Scheme Against Pollution Attack to Linear Network Coding". IEEE Trans. Parallel Distributed Syst. 31(11): 2618-2619 (2020)
2010 – 2019
- 2019
- [j17]Jinyong Chang, Hui Ma, Anling Zhang, Maozhi Xu, Rui Xue:
RKA Security of Identity-Based Homomorphic Signature Scheme. IEEE Access 7: 50858-50868 (2019) - [j16]Jinyong Chang, Bilin Shao, Anling Zhang, Genqing Bian, Yanyan Ji, Maozhi Xu:
Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC. IEEE Access 7: 88393-88398 (2019) - [j15]Jinyong Chang, Genqing Bian, Yanyan Ji, Maozhi Xu:
On the KDM-CCA Security from Partial Trapdoor One-Way Family in the Random Oracle Model. Comput. J. 62(8): 1232-1245 (2019) - [j14]Jinyong Chang, Yanyan Ji, Maozhi Xu, Rui Xue:
General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding. Future Gener. Comput. Syst. 91: 416-425 (2019) - [j13]Yu Chen, Jiang Zhang, Yi Deng, Jinyong Chang:
KDM security for identity-based encryption: Constructions and separations. Inf. Sci. 486: 450-473 (2019) - 2018
- [j12]Yanyan Ji, Jinyong Chang, Honglong Dai, Maozhi Xu:
On the RKA Security of the Standard-Model-Based BFKW Network Coding Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(12): 2477-2480 (2018) - [j11]Honglong Dai, Ding Wang, Jinyong Chang, Maozhi Xu:
On the RCCA Security of Hybrid Signcryption for Internet of Things. Wirel. Commun. Mob. Comput. 2018: 8646973:1-8646973:11 (2018) - 2017
- [j10]Ying Wu, Jinyong Chang, Rui Xue, Rui Zhang:
Homomorphic MAC from Algebraic One-Way Functions for Network Coding with Small Key Size. Comput. J. 60(12): 1785-1800 (2017) - [c9]Honglong Dai, Luxuan Zhang, Janyan Ji, Jinyong Chang, Maozhi Xu:
On the key dependent message security of DHIES. ICAIT 2017: 322-328 - [c8]Jinyong Chang, Honglong Dai, Maozhi Xu:
The KDM-CCA Security of REACT. ISPEC 2017: 85-101 - [c7]Honglong Dai, Jinyong Chang, Zhenduo Hou, Maozhi Xu:
The ECCA Security of Hybrid Encryptions. ISPEC 2017: 847-859 - 2016
- [j9]Jinyong Chang, Honglong Dai, Maozhi Xu, Rui Xue:
Security analysis of a TESLA-based homomorphic MAC scheme for authentication in P2P live streaming system. Secur. Commun. Networks 9(16): 3309-3313 (2016) - [j8]Jinyong Chang, Honglong Dai, Maozhi Xu, Rui Xue:
Separations in circular security for arbitrary length key cycles, revisited. Secur. Commun. Networks 9(18): 5392-5400 (2016) - [c6]Jinyong Chang, Honglong Dai, Maozhi Xu, Rui Xue:
Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model. ICISC 2016: 239-253 - [i1]Yu Chen, Jiang Zhang, Yi Deng, Jinyong Chang:
KDM Security for Identity-Based Encryption: Constructions and Separations. IACR Cryptol. ePrint Arch. 2016: 1020 (2016) - 2015
- [j7]Fei Tang, Hongda Li, Jinyong Chang:
Multi-Hop Unidirectional Proxy Re-Encryption from Multilinear Maps. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(2): 762-766 (2015) - [j6]Fei Tang, Hongda Li, Jinyong Chang:
Multi-Use Unidirectional Proxy Re-Signatures of Constant Size without Random Oracles. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(3): 898-905 (2015) - [j5]Jinyong Chang, Rui Xue, Anling Zhang:
The KDM-CCA Security of the Kurosawa-Desmedt Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(4): 1032-1037 (2015) - [j4]Jinyong Chang, Rui Xue:
A Generic Construction of Homomorphic MAC for Multi-File Transmission in Network Coding. J. Commun. 10(1): 43-47 (2015) - [j3]Jinyong Chang, Rui Xue:
Practical key-dependent message chosen-ciphertext security based on decisional composite residuosity and quadratic residuosity assumptions. Secur. Commun. Networks 8(8): 1525-1536 (2015) - [c5]Bei Liang, Hongda Li, Jinyong Chang:
Verifiable Random Functions from (Leveled) Multilinear Maps. CANS 2015: 129-143 - [c4]Muhua Liu, Ying Wu, Jinyong Chang, Rui Xue, Wei Guo:
Verifiable Proxy Re-encryption from Indistinguishability Obfuscation. ICICS 2015: 363-378 - [c3]Bei Liang, Hongda Li, Jinyong Chang:
The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures. ISC 2015: 21-41 - [c2]Bei Liang, Hongda Li, Jinyong Chang:
Constrained Verifiable Random Functions from Indistinguishability Obfuscation. ProvSec 2015: 43-60 - 2014
- [j2]Jinyong Chang, Rui Xue:
On the Security against Nonadaptive Chosen Ciphertext Attack and Key-Dependent Message Attack. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(11): 2267-2271 (2014) - [j1]Jinyong Chang, Rui Xue:
General Construction of Chameleon All-But-One Trapdoor Functions and Their Applications. J. Softw. 9(10): 2557-2563 (2014) - [c1]Jinyong Chang, Rui Xue:
KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited. SECRYPT 2014: 299-306
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint