default search action
Baocang Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j134]Jiacheng Zhou, Zhenhua Liu, Baocang Wang:
Updatable Signature Scheme With Weakened Token and No-Directional Key Update. Int. J. Netw. Manag. 35(1) (2025) - [j133]Yuejun Wang, Baocang Wang, Qiqi Lai, Yu Zhan:
Identity-based matchmaking encryption with stronger security and instantiation on lattices. Theor. Comput. Sci. 1029: 115048 (2025) - 2024
- [j132]Liu Zhang, Zilong Wang, Baocang Wang:
Improving Differential-Neural Cryptanalysis. IACR Commun. Cryptol. 1(3): 13 (2024) - [j131]Yange Chen, Baocang Wang, Hang Jiang, Pu Duan, Yuan Ping, Zhiyong Hong:
PEPFL: A framework for a practical and efficient privacy-preserving federated learning. Digit. Commun. Networks 10(2): 355-368 (2024) - [j130]Fengrong Zhang, Enes Pasalic, Amar Bapic, Baocang Wang:
Constructions of several special classes of cubic bent functions outside the completed Maiorana-McFarland class. Inf. Comput. 297: 105149 (2024) - [j129]Linqing Xiao, Juntao Gao, Baocang Wang, Xuelian Li:
Optimized byzantine fault tolerant algorithm for improving performance and security with trust values. IET Blockchain 4(1): 1-17 (2024) - [j128]Momeng Liu, Yupu Hu, Qiqi Lai, Shanshan Zhang, Huiwen Jia, Wen Gao, Baocang Wang:
Dual-Mode Encryption for UC-Secure String OT from Learning with Errors. IET Inf. Secur. 2024: 1-16 (2024) - [j127]Xiaoying Shen, Xue Luo, Feng Yuan, Baocang Wang, Yange Chen, Dianhua Tang, Le Gao:
Verifiable Privacy-Preserving Federated Learning Under Multiple Encrypted Keys. IEEE Internet Things J. 11(2): 3430-3445 (2024) - [j126]Yunzhen Zhang, Baocang Wang, Zhen Zhao:
Secure k-NN Query With Multiple Keys Based on Random Projection Forests. IEEE Internet Things J. 11(9): 15205-15218 (2024) - [j125]Sensen Guo, Xiaoyu Li, Peican Zhu, Baocang Wang, Zhiying Mu, Jinxiong Zhao:
MixCam-attack: Boosting the transferability of adversarial examples with targeted data augmentation. Inf. Sci. 657: 119918 (2024) - [j124]Runze Wu, Baocang Wang, Zhen Zhao:
Privacy-preserving medical diagnosis system with Gaussian kernel-based support vector machine. Peer Peer Netw. Appl. 17(5): 3094-3109 (2024) - [j123]Wenju Xu, Xin Li, Yunxuan Su, Baocang Wang, Wei Zhao:
Verifiable privacy-preserving cox regression from multi-key fully homomorphic encryption. Peer Peer Netw. Appl. 17(5): 3182-3199 (2024) - [j122]Yuan Ping, Huina Li, Bin Hao, Chun Guo, Baocang Wang:
Beyond k-Means++: Towards better cluster exploration with geometrical information. Pattern Recognit. 146: 110036 (2024) - [j121]Wenjuan Jia, Jiang Zhang, Binwu Xiang, Baocang Wang:
Hardness of (M)LWE with semi-uniform seeds. Theor. Comput. Sci. 994: 114481 (2024) - [j120]Baocang Wang, Yange Chen, Furong Li, Jian Song, Rongxing Lu, Pu Duan, Zhihong Tian:
Privacy-Preserving Convolutional Neural Network Classification Scheme With Multiple Keys. IEEE Trans. Serv. Comput. 17(1): 322-335 (2024) - [c15]Yingfei Yan, Yongjun Zhao, Wen Gao, Baocang Wang:
Lattice-Based Threshold, Accountable, and Private Signature. CT-RSA 2024: 249-274 - [c14]Wenwen Xia, Leizhang Wang, Geng Wang, Dawu Gu, Baocang Wang:
A Refined Hardness Estimation of LWE in Two-Step Mode. Public Key Cryptography (3) 2024: 3-35 - [i16]Wenwen Xia, Leizhang Wang, Geng Wang, Dawu Gu, Baocang Wang:
A Refined Hardness Estimation of LWE in Two-step Mode. IACR Cryptol. ePrint Arch. 2024: 67 (2024) - 2023
- [j119]Wenju Xu, Baocang Wang, Yupu Hu, Pu Duan, Benyu Zhang, Momeng Liu:
Multi-key Fully Homomorphic Encryption from Additive Homomorphism. Comput. J. 66(1): 197-207 (2023) - [j118]Wenju Xu, Baocang Wang, Quanbo Qu, Tanping Zhou, Pu Duan:
Modified Multi-Key Fully Homomorphic Encryption Scheme in the Plain Model. Comput. J. 66(10): 2355-2364 (2023) - [j117]Momeng Liu, Zeyu Zhang, Wenqiang Chai, Baocang Wang:
Privacy-preserving COVID-19 contact tracing solution based on blockchain. Comput. Stand. Interfaces 83: 103643 (2023) - [j116]Quanbo Qu, Baocang Wang, Leizhang Wang, Yuejun Wang, Yingfei Yan:
More efficient tightly-secure lattice-based IBE with equality test. Comput. Stand. Interfaces 86: 103736 (2023) - [j115]Zhen Zhao, Willy Susilo, Fuchun Guo, Jianchang Lai, Baocang Wang:
Full black-box retrievable and accountable identity-based encryption. Comput. Stand. Interfaces 86: 103741 (2023) - [j114]Yu Zhan, Ziqian Zhang, Qian Liu, Baocang Wang:
Hiding the input-size in multi-party private set intersection. Des. Codes Cryptogr. 91(9): 2893-2915 (2023) - [j113]Xiaoying Shen, Hang Jiang, Yange Chen, Baocang Wang, Le Gao:
PLDP-FL: Federated Learning with Personalized Local Differential Privacy. Entropy 25(3): 485 (2023) - [j112]Kaixin Peng, Xiaoying Shen, Le Gao, Baocang Wang, Yichao Lu:
Communication-Efficient and Privacy-Preserving Verifiable Aggregation for Federated Learning. Entropy 25(8): 1125 (2023) - [j111]Jun Liu, Dachao Wang, Yupu Hu, Jie Chen, Baocang Wang:
Improved integral cryptanalysis of SPNbox in digital rights management systems. IET Inf. Secur. 17(1): 147-158 (2023) - [j110]Wenjuan Jia, Baocang Wang:
Hardness of (Semiuniform) MLWE with Short Distributions Using the Rényi Divergence. IET Inf. Secur. 2023: 1-15 (2023) - [j109]Wenjuan Jia, Jiang Zhang, Baocang Wang:
Hardness of Module-LWE with Semiuniform Seeds from Module-NTRU. IET Inf. Secur. 2023: 1-16 (2023) - [j108]Baocang Wang, Yange Chen, Hang Jiang, Zhen Zhao:
PPeFL: Privacy-Preserving Edge Federated Learning With Local Differential Privacy. IEEE Internet Things J. 10(17): 15488-15500 (2023) - [j107]Xiaoliang Che, Longfei Liu, Baocang Wang, Yiliang Han, Xu An Wang, Xiaoyuan Yang, Tanping Zhou:
Multi-key homomorphic encryption with tightened RGSW ciphertexts without relinearization for ciphertexts product. J. King Saud Univ. Comput. Inf. Sci. 35(10): 101794 (2023) - [j106]Zhenhua Liu, Jingwan Gong, Yuanju Ma, Yaxin Niu, Baocang Wang:
Forward and backward secure updatable ElGamal encryption scheme for cloud storage. J. Syst. Archit. 141: 102926 (2023) - [j105]Xiaoying Shen, Xue Luo, Feng Yuan, Baocang Wang, Yange Chen, Dianhua Tang, Le Gao:
Privacy-preserving multi-party deep learning based on homomorphic proxy re-encryption. J. Syst. Archit. 144: 102983 (2023) - [j104]Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang:
Quantum rotational cryptanalysis for preimage recovery of round-reduced Keccak. Quantum Inf. Comput. 23(3&4): 223-234 (2023) - [j103]Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang:
Allocating rotational cryptanalysis-based preimage attack on 4-round Keccak-224 for quantum setting. Quantum Inf. Process. 22(6): 228 (2023) - [j102]Yangru Zheng, Juntao Gao, Xuelian Li, Baocang Wang:
A polynomial system for bit-based division property solving by quantum algorithm. Quantum Inf. Process. 22(12): 448 (2023) - [j101]Zhenhua Liu, Yingying Ding, Ming Yuan, Baocang Wang:
Black-Box Accountable Authority CP-ABE Scheme for Cloud-Assisted E-Health System. IEEE Syst. J. 17(1): 756-767 (2023) - [j100]Zhenhua Liu, Yaxin Niu, Jingwan Gong, Yuanju Ma, Baocang Wang:
Perfect Data Protection, Storage, and Reputation Management Scheme for Ride-Sharing Services. IEEE Syst. J. 17(3): 3834-3845 (2023) - [j99]Xiaoying Shen, Zhen Wang, Baocang Wang, Licheng Wang, Qingqi Pei:
A Privacy-Preserving Ride-Matching Scheme Without a Trusted Third-Party Server. IEEE Syst. J. 17(4): 6413-6424 (2023) - [j98]Zhen Zhao, Willy Susilo, Baocang Wang, Kai Zeng:
Public-Key Encryption With Tester Verifiable Equality Test for Cloud Computing. IEEE Trans. Cloud Comput. 11(4): 3396-3406 (2023) - [j97]Dachao Wang, Baocang Wang, Siwei Sun:
SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers. IACR Trans. Symmetric Cryptol. 2023(1): 152-191 (2023) - [c13]Leizhang Wang, Yuntao Wang, Baocang Wang:
A Trade-off SVP-solving Strategy based on a Sharper pnj-BKZ Simulator. AsiaCCS 2023: 664-677 - [i15]Dachao Wang, Baocang Wang, Siwei Sun:
SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers (Long Paper). IACR Cryptol. ePrint Arch. 2023: 202 (2023) - [i14]Yangru Zheng, Juntao Gao, Baocang Wang:
New Quantum Search Model on Symmetric Ciphers and Its Applications. IACR Cryptol. ePrint Arch. 2023: 327 (2023) - [i13]Yupu Hu, Siyue Dong, Baocang Wang, Xingting Dong:
On the Invalidity of LV16/Lin17 Obfuscation Schemes. IACR Cryptol. ePrint Arch. 2023: 692 (2023) - [i12]Yupu Hu, Siyue Dong, Baocang Wang, Xingting Dong:
On the Invalidity of LV16/Lin17 Obfuscation Schemes Revisited. IACR Cryptol. ePrint Arch. 2023: 1291 (2023) - 2022
- [j96]Jun Liu, Vincent Rijmen, Yupu Hu, Jie Chen, Baocang Wang:
WARX: efficient white-box block cipher based on ARX primitives and random MDS matrix. Sci. China Inf. Sci. 65(3) (2022) - [j95]Zhiyong Hong, Liguo Zhou, Yu Zhan, Chengdong Liu, Baocang Wang:
Cryptanalysis of an additively homomorphic public key encryption scheme. Comput. Stand. Interfaces 82: 103623 (2022) - [j94]Jun Liu, Dachao Wang, Yupu Hu, Jie Chen, Baocang Wang:
Improved key-recovery attacks on reduced-round WEM-8. Des. Codes Cryptogr. 90(10): 2419-2448 (2022) - [j93]Yange Chen, Qingqing Zhao, Pu Duan, Benyu Zhang, Zhiyong Hong, Baocang Wang:
Verifiable privacy-preserving association rule mining using distributed decryption mechanism on the cloud. Expert Syst. Appl. 201: 117086 (2022) - [j92]Furong Li, Yange Chen, Pu Duan, Benyu Zhang, Zhiyong Hong, Yupu Hu, Baocang Wang:
Privacy-preserving convolutional neural network prediction with low latency and lightweight users. Int. J. Intell. Syst. 37(1): 568-595 (2022) - [j91]Yange Chen, SuYu He, Baocang Wang, Pu Duan, Benyu Zhang, Zhiyong Hong, Yuan Ping:
Cryptanalysis and Improvement of DeepPAR: Privacy-Preserving and Asynchronous Deep Learning for Industrial IoT. IEEE Internet Things J. 9(21): 21958-21970 (2022) - [j90]Zhen Zhao, Fuchun Guo, Ge Wu, Willy Susilo, Baocang Wang:
Secure Infectious Diseases Detection System With IoT-Based e-Health Platforms. IEEE Internet Things J. 9(22): 22595-22607 (2022) - [j89]Yu Zhan, Danfeng Shen, Pu Duan, Benyu Zhang, Zhiyong Hong, Baocang Wang:
MDOPE: Efficient multi-dimensional data order preserving encryption scheme. Inf. Sci. 595: 334-343 (2022) - [j88]Wenju Xu, Baocang Wang, Jiasen Liu, Yange Chen, Pu Duan, Zhiyong Hong:
Toward practical privacy-preserving linear regression. Inf. Sci. 596: 119-136 (2022) - [j87]Xiaoying Shen, Baocang Wang, Licheng Wang, Pu Duan, Benyu Zhang:
Group public key encryption supporting equality test without bilinear pairings. Inf. Sci. 605: 202-224 (2022) - [j86]Songyang Wu, Wenju Xu, Zhiyong Hong, Pu Duan, Benyu Zhang, Yupu Hu, Baocang Wang:
Updatable privacy-preserving itK-nearest neighbor query in location-based s-ervice. Peer-to-Peer Netw. Appl. 15(2): 1076-1089 (2022) - [j85]Juntao Gao, Hao Li, Baocang Wang, Xuelian Li:
AES-128 under HHL algorithm. Quantum Inf. Comput. 22(3&4): 209-240 (2022) - [j84]Wenjuan Jia, Guanhao Xue, Baocang Wang, Yupu Hu:
Module-LWE-Based Key Exchange Protocol Using Error Reconciliation Mechanism. Secur. Commun. Networks 2022: 8299232:1-8299232:7 (2022) - [j83]Yange Chen, Baocang Wang, Zhili Zhang:
PDLHR: Privacy-Preserving Deep Learning Model With Homomorphic Re-Encryption in Robot System. IEEE Syst. J. 16(2): 2032-2043 (2022) - [j82]Juntao Gao, Xinxiang Liu, Xuelian Li, Baocang Wang:
Leakage-Suppressed Range Query Scheme for Structured Data in IoT. IEEE Syst. J. 16(3): 3531-3542 (2022) - [j81]Qinyu Mao, Yange Chen, Pu Duan, Benyu Zhang, Zhiyong Hong, Baocang Wang:
Privacy-Preserving Classification Scheme Based on Support Vector Machine. IEEE Syst. J. 16(4): 5906-5916 (2022) - [j80]Yange Chen, Qinyu Mao, Baocang Wang, Pu Duan, Benyu Zhang, Zhiyong Hong:
Privacy-Preserving Multi-Class Support Vector Machine Model on Medical Diagnosis. IEEE J. Biomed. Health Informatics 26(7): 3342-3353 (2022) - [j79]Yu Zhan, Liguo Zhou, Baocang Wang, Pu Duan, Benyu Zhang:
Efficient Function Queryable and Privacy Preserving Data Aggregation Scheme in Smart Grid. IEEE Trans. Parallel Distributed Syst. 33(12): 3430-3441 (2022) - [j78]Wenju Xu, Qingqing Zhao, Yu Zhan, Baocang Wang, Yupu Hu:
Privacy-preserving association rule mining based on electronic medical system. Wirel. Networks 28(1): 303-317 (2022) - [c12]Zhenhua Liu, Yuanju Ma, Yaxin Niu, Jingwan Gong, Baocang Wang:
Updatable Hybrid Encryption Scheme with No-Directional Key Update for Cloud Storage. CSS 2022: 71-85 - [c11]Zhenhua Liu, Jingwan Gong, Yuanju Ma, Yaxin Niu, Baocang Wang:
Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage. FCS 2022: 324-345 - [i11]Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang:
Quantum Rotational Cryptanalysis for Preimage Recovery of Round-Reduced Keccak. IACR Cryptol. ePrint Arch. 2022: 13 (2022) - [i10]Leizhang Wang, Wenwen Xia, Geng Wang, Baocang Wang, Dawu Gu:
Improved Pump and Jump BKZ by Sharp Simulator. IACR Cryptol. ePrint Arch. 2022: 468 (2022) - [i9]Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang:
Allocating Rotational Cryptanalysis based Preimage Attack on 4-round Keccak-224 for Quantum Setting. IACR Cryptol. ePrint Arch. 2022: 977 (2022) - [i8]Yupu Hu, Siyue Dong, Baocang Wang, Jun Liu:
Notes on Reusable Garbling. IACR Cryptol. ePrint Arch. 2022: 1208 (2022) - [i7]Wenwen Xia, Leizhang Wang, GengWang, Dawu Gu, Baocang Wang:
Improved Progressive BKZ with Lattice Sieving. IACR Cryptol. ePrint Arch. 2022: 1343 (2022) - [i6]Fengrong Zhang, Enes Pasalic, Amar Bapic, Baocang Wang:
Applications of the indirect sum in the design of several special classes of bent functions outside the completed MM class. IACR Cryptol. ePrint Arch. 2022: 1587 (2022) - [i5]Yuejun Wang, Baocang Wang, Qiqi Lai, Yu Zhan:
Identity-based Matchmaking Encryption with Stronger Security and Instantiation on Lattices. IACR Cryptol. ePrint Arch. 2022: 1718 (2022) - 2021
- [j77]Zhiyong Hong, Zhili Zhang, Pu Duan, Benyu Zhang, Baocang Wang, Wen Gao, Zhen Zhao:
Secure Privacy-Preserving Association Rule Mining With Single Cloud Server. IEEE Access 9: 165090-165102 (2021) - [j76]Guanhao Xue, Baocang Wang, Quanbo Qu, Weidong Zhang:
Efficient lattice-based authenticated key exchange based on key encapsulation mechanism and signature. IET Inf. Secur. 15(1): 107-116 (2021) - [j75]Dachao Wang, Baocang Wang, Yuan Ping:
Comment on 'Targeted Ciphers for Format-Preserving Encryption' from Selected Areas in Cryptography 2018. IET Inf. Secur. 15(5): 395-400 (2021) - [j74]Xingting Dong, Yupu Hu, Baocang Wang, Momeng Liu, Wen Gao:
Lattice-based revocable attribute-based encryption with decryption key exposure resistance. IET Inf. Secur. 15(6): 428-441 (2021) - [j73]Yu Zhan, Baocang Wang, Rongxing Lu:
Cryptanalysis and Improvement of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks. IEEE Internet Things J. 8(7): 5973-5984 (2021) - [j72]Yu Zhan, Baocang Wang, Rongxing Lu, Yong Yu:
DRBFT: Delegated randomization Byzantine fault tolerance consensus protocol for blockchains. Inf. Sci. 559: 8-21 (2021) - [j71]Zhenhua Liu, Jiaqi Ji, Fangfang Yin, Baocang Wang:
Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption. KSII Trans. Internet Inf. Syst. 15(1): 323-342 (2021) - [j70]Yange Chen, Hequn Liu, Baocang Wang, Baljinnyam Sonompil, Yuan Ping, Zhili Zhang:
A threshold hybrid encryption method for integrity audit without trusted center. J. Cloud Comput. 10(1): 3 (2021) - [j69]Yange Chen, Yuan Ping, Zhili Zhang, Baocang Wang, SuYu He:
Privacy-preserving image multi-classification deep learning model in robot system of industrial IoT. Neural Comput. Appl. 33(10): 4677-4694 (2021) - [j68]Wenju Xu, Baocang Wang, Rongxing Lu, Quanbo Qu, Yange Chen, Yupu Hu:
Efficient Private Information Retrieval Protocol with Homomorphically Computing Univariate Polynomials. Secur. Commun. Networks 2021: 5553256:1-5553256:14 (2021) - [j67]Hongping Pang, Baocang Wang:
Privacy-Preserving Association Rule Mining Using Homomorphic Encryption in a Multikey Environment. IEEE Syst. J. 15(2): 3131-3141 (2021) - [j66]Jindan Zhang, Rongxing Lu, Baocang Wang, Xu An Wang:
Comments on "Privacy-Preserving Public Auditing Protocol for Regenerating-Code-Based Cloud Storage". IEEE Trans. Inf. Forensics Secur. 16: 1288-1289 (2021) - [j65]Huilin Li, Yannan Li, Yong Yu, Baocang Wang, Kefei Chen:
A Blockchain-Based Traceable Self-Tallying E-Voting Protocol in AI Era. IEEE Trans. Netw. Sci. Eng. 8(2): 1019-1032 (2021) - [j64]Zhenhua Liu, Ming Yuan, Yingying Ding, Baocang Wang:
Efficient Small-Batch Verification and Identification Scheme With Invalid Signatures in VANETs. IEEE Trans. Veh. Technol. 70(12): 12836-12846 (2021) - [i4]Yupu Hu, Xingting Dong, Baocang Wang:
Size of IK00 Branching Program. IACR Cryptol. ePrint Arch. 2021: 400 (2021) - [i3]Yupu Hu, Jun Liu, Baocang Wang, Xingting Dong, Yanbin Pan:
P/poly Invalidity of the Agr17 Functional Encryption Scheme. IACR Cryptol. ePrint Arch. 2021: 1442 (2021) - [i2]Yupu Hu, Siyue Dong, Baocang Wang, Jun Liu:
A Note on P/poly Validity of GVW15 Predicate Encryption Scheme. IACR Cryptol. ePrint Arch. 2021: 1602 (2021) - 2020
- [j63]Leyou Zhang, Juan Ren, Yi Mu, Baocang Wang:
Privacy-Preserving Multi-Authority Attribute-Based Data Sharing Framework for Smart Grid. IEEE Access 8: 23294-23307 (2020) - [j62]Zhenhua Liu, Changbo Guo, Baocang Wang:
A Physically Secure, Lightweight Three-Factor and Anonymous User Authentication Protocol for IoT. IEEE Access 8: 195914-195928 (2020) - [j61]Zhen Zhao, Ge Wu, Fuchun Guo, Willy Susilo, Yi Mu, Baocang Wang, Yupu Hu:
Black-Box Accountable Authority Identity-Based Revocation System. Comput. J. 63(4): 525-535 (2020) - [j60]Jindan Zhang, Baocang Wang, Marek R. Ogiela, Xu An Wang, Arun Kumar Sangaiah:
New public auditing protocol based on homomorphic tags for secure cloud storage. Concurr. Comput. Pract. Exp. 32(18) (2020) - [j59]Jindan Zhang, Baocang Wang, Xu An Wang, Han Wang, Shuai Xiao:
New group user based privacy preserving cloud auditing protocol. Future Gener. Comput. Syst. 106: 585-594 (2020) - [j58]Zhenhua Liu, Yan Liu, Jing Xu, Baocang Wang:
Verifiable Attribute-based Keyword Search Encryption with Attribute Revocation for Electronic Health Record System. Int. J. Netw. Secur. 22(5): 845-856 (2020) - [j57]Yuan Ping, Xuyang Guo, Baocang Wang, Jingxian Zhou:
Secure outsourcing of modular inverses and scalar multiplications on elliptic curves. Int. J. Secur. Networks 15(2): 101-110 (2020) - [j56]Yuan Ping, Wei Song, Zhili Zhang, Weiping Wang, Baocang Wang:
A Multi-Keyword Searchable Encryption Scheme Based on Probability Trapdoor over Encryption Cloud Data. Inf. 11(8): 394 (2020) - [j55]Yuan Ping, Yu Zhan, Ke Lu, Baocang Wang:
Public Data Integrity Verification Scheme for Secure Cloud Storage. Inf. 11(9): 409 (2020) - [j54]Zhong Shen, Hai Jiang, Qingkuan Dong, Baocang Wang:
Energy-Efficient Neighbor Discovery for the Internet of Things. IEEE Internet Things J. 7(1): 684-698 (2020) - [j53]Jindan Zhang, Zhihu Li, Baocang Wang, Xu An Wang, Urszula Ogiela:
Enhanced Certificateless Auditing Protocols for Cloud Data Management and Transformative Computation. Inf. Process. Manag. 57(6): 102287 (2020) - [j52]Ying Zou, Zhen Zhao, Sha Shi, Lei Wang, Yunfeng Peng, Yuan Ping, Baocang Wang:
Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing. Secur. Commun. Networks 2020: 1238505:1-1238505:11 (2020) - [j51]Xingting Dong, Yanhua Zhang, Baocang Wang, Jiangshan Chen:
Server-Aided Revocable Attribute-Based Encryption from Lattices. Secur. Commun. Networks 2020: 1460531:1-1460531:13 (2020) - [j50]Ying Zou, Yanting Chai, Sha Shi, Lei Wang, Yunfeng Peng, Yuan Ping, Baocang Wang:
Improved Cloud-Assisted Privacy-Preserving Profile-Matching Scheme in Mobile Social Networks. Secur. Commun. Networks 2020: 4938736:1-4938736:12 (2020) - [j49]Yu Zhan, Baocang Wang, Zheng Wang, Tao Pei, Yuan Chen, Quanbo Qu, Zhili Zhang:
Improved Proxy Re-Encryption With Delegatable Verifiability. IEEE Syst. J. 14(1): 592-602 (2020) - [j48]Chenyang Ma, Baocang Wang, Kyle Jooste, Zhili Zhang, Yuan Ping:
Practical Privacy-Preserving Frequent Itemset Mining on Supermarket Transactions. IEEE Syst. J. 14(2): 1992-2002 (2020) - [j47]Zhen Zhao, Fuchun Guo, Jianchang Lai, Willy Susilo, Baocang Wang, Yupu Hu:
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts. Theor. Comput. Sci. 809: 73-87 (2020) - [j46]Mwitende Gervais, Ikram Ali, Nabeil Eltayieb, Baocang Wang, Fagen Li:
Authenticated key agreement for blockchain-based WBAN. Telecommun. Syst. 74(3): 347-365 (2020) - [j45]Yanting Chai, Yu Zhan, Baocang Wang, Yuan Ping, Zhili Zhang:
Improvement on a privacy-preserving outsourced classification protocol over encrypted data. Wirel. Networks 26(6): 4363-4374 (2020)
2010 – 2019
- 2019
- [j44]Zhen Zhao, Jianchang Lai, Willy Susilo, Baocang Wang, Yupu Hu, Fuchun Guo:
Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption. IEEE Access 7: 25936-25947 (2019) - [j43]Zhenhua Liu, Jing Xu, Yan Liu, Baocang Wang:
Updatable Ciphertext-Policy Attribute-Based Encryption Scheme With Traceability and Revocability. IEEE Access 7: 66832-66844 (2019) - [j42]Wenju Xu, Yu Zhan, Zheng Wang, Baocang Wang, Yuan Ping:
Attack and Improvement on a Symmetric Fully Homomorphic Encryption Scheme. IEEE Access 7: 68373-68379 (2019) - [j41]Yuan Ping, Bin Hao, Huina Li, Yuping Lai, Chun Guo, Hui Ma, Baocang Wang, Xiali Hei:
Efficient Training Support Vector Clustering With Appropriate Boundary Information. IEEE Access 7: 146964-146978 (2019) - [j40]Renpeng Zou, Xixiang Lv, Baocang Wang:
Blockchain-based photo forensics with permissible transformations. Comput. Secur. 87 (2019) - [j39]Zhenhua Liu, Shuhong Duan, Peilin Zhou, Baocang Wang:
Traceable-then-revocable ciphertext-policy attribute-based encryption scheme. Future Gener. Comput. Syst. 93: 903-913 (2019) - [j38]Lingyue Zhang, Huilin Li, Yannan Li, Yong Yu, Man Ho Au, Baocang Wang:
An efficient linkable group signature for payer tracing in anonymous cryptocurrencies. Future Gener. Comput. Syst. 101: 29-38 (2019) - [j37]Yupu Hu, Shanshan Zhang, Jiangshan Chen, Baocang Wang:
Revisiting BGG+14 ABE with weakness analysis. IET Inf. Secur. 13(6): 685-691 (2019) - [j36]Yupu Hu, Zhizhu Lian, Jiangshan Chen, Baocang Wang, Shanshan Zhang:
Algebraic Attacks Against Several Weak Variants of GVW'13 ABE. Int. J. Found. Comput. Sci. 30(4): 607-618 (2019) - [j35]Wen Gao, Liqun Chen, Yupu Hu, Christopher J. P. Newton, Baocang Wang, Jiangshan Chen:
Lattice-based deniable ring signatures. Int. J. Inf. Sec. 18(3): 355-370 (2019) - [j34]Jindan Zhang, Baocang Wang:
An improved public auditing protocol for cloud storage integrity checking. Int. J. Web Grid Serv. 15(3): 282-303 (2019) - [j33]Yuan Ping, Baocang Wang, Shengli Tian, Jingxian Zhou, Hui Ma:
PKCHD: Towards a Probabilistic Knapsack Public-Key Cryptosystem with High Density. Inf. 10(2): 75 (2019) - [j32]Liang Wang, Baocang Wang, Wei Song, Zhili Zhang:
A key-sharing based secure deduplication scheme in cloud storage. Inf. Sci. 504: 48-60 (2019) - [j31]Zhen Zhao, Ge Wu, Willy Susilo, Fuchun Guo, Baocang Wang, Yupu Hu:
Accountable identity-based encryption with distributed private key generators. Inf. Sci. 505: 352-366 (2019) - [j30]Jindan Zhang, Baocang Wang, Fatos Xhafa, Xu An Wang, Cong Li:
Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation. J. Ambient Intell. Humaniz. Comput. 10(2): 429-438 (2019) - [j29]Yu Zhan, Baocang Wang:
Cryptanalysis of a Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Network. Secur. Commun. Networks 2019: 6059834:1-6059834:5 (2019) - [j28]Quanbo Qu, Baocang Wang, Yuan Ping, Zhili Zhang:
Improved Cryptanalysis of a Fully Homomorphic Symmetric Encryption Scheme. Secur. Commun. Networks 2019: 8319508:1-8319508:6 (2019) - [j27]Jindan Zhang, Baocang Wang, Debiao He, Xu An Wang:
Improved secure fuzzy auditing protocol for cloud data storage. Soft Comput. 23(10): 3411-3422 (2019) - [c10]Zhenhua Liu, Yan Liu, Jing Xu, Baocang Wang:
Privacy-Preserving Attribute-Based Multi-keyword Search Encryption Scheme with User Tracing. CSS (2) 2019: 382-397 - [e1]Bazhong Shen, Baocang Wang, Jinguang Han, Yong Yu:
Frontiers in Cyber Security - Second International Conference, FCS 2019, Xi'an, China, November 15-17, 2019, Proceedings. Communications in Computer and Information Science 1105, Springer 2019, ISBN 978-981-15-0817-2 [contents] - [i1]Zhizhu Lian, Yupu Hu, Hu Chen, Baocang Wang:
Faster Bootstrapping of FHE over the integers with large prime message space. IACR Cryptol. ePrint Arch. 2019: 561 (2019) - 2018
- [j26]Jindan Zhang, Baocang Wang:
An Improved Secure Cloud Storage Auditing Protocol Based on Distributed String Equality Checking. Fundam. Informaticae 157(1-2): 185-199 (2018) - [j25]Yuan Ping, Baocang Wang, Shengli Tian, Yuehua Yang, Genyuan Du:
Deterministic lattice reduction on knapsacks with collision-free properties. IET Inf. Secur. 12(4): 375-380 (2018) - [j24]Baocang Wang, Hao Lei, Yupu Hu:
D-NTRU: More efficient and average-case IND-CPA secure NTRU variant. Inf. Sci. 438: 15-31 (2018) - [j23]Zhizhu Lian, Yupu Hu, Hu Chen, Baocang Wang:
Bootstrapping of FHE over the Integers with Large Message Space. Secur. Commun. Networks 2018: 6520258:1-6520258:11 (2018) - [j22]Baocang Wang, Yu Zhan, Zhili Zhang:
Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme. IEEE Trans. Inf. Forensics Secur. 13(6): 1460-1467 (2018) - [c9]Junli Kong, Baocang Wang, Caiyun Liu, Gaofei Wu:
An Approach for Predicting the Popularity of Online Security News Articles. CNS 2018: 1-6 - 2017
- [j21]Wen Gao, Yupu Hu, Baocang Wang, Jia Xie:
Improved identification protocol in the quantum random oracle model.. Int. Arab J. Inf. Technol. 14(3): 339-345 (2017) - [j20]Yuan Ping, Yingjie Tian, Chun Guo, Baocang Wang, Yuehua Yang:
FRSVC: Towards making support vector clustering consume less. Pattern Recognit. 69: 286-298 (2017) - [j19]Yuan Ping, Baocang Wang, Yuehua Yang, Shengli Tian:
Building Secure Public Key Encryption Scheme from Hidden Field Equations. Secur. Commun. Networks 2017: 9289410:1-9289410:6 (2017) - [c8]Jindan Zhang, Baocang Wang, Xu An Wang:
Improved Online/Offline Attribute Based Encryption and More. EIDWT 2017: 603-610 - 2016
- [c7]Jindan Zhang, Baocang Wang:
On the Security of a Cloud-Based Revocable IBPRE Scheme for Data Sharing. 3PGCIC 2016: 405-413 - [c6]Wen Gao, Yupu Hu, Baocang Wang, Jia Xie:
Identity-Based Blind Signature from Lattices in Standard Model. Inscrypt 2016: 205-218 - 2015
- [j18]Qiqi Lai, Yupu Hu, Yuan Chen, Baocang Wang, Fenghe Wang:
New method of key-dependent message security for asymmetric encryption. Secur. Commun. Networks 8(13): 2157-2170 (2015) - [j17]Mingming Jiang, Yupu Hu, Baocang Wang, F. H. Wang, Qiqi Lai:
Lattice-based multi-use unidirectional proxy re-encryption. Secur. Commun. Networks 8(18): 3796-3803 (2015) - 2014
- [j16]Qiqi Lai, Yuan Chen, Yupu Hu, Baocang Wang, Mingming Jiang:
Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model. Frontiers Comput. Sci. 8(3): 469-477 (2014) - [j15]Mingming Jiang, Yupu Hu, Hao Lei, Baocang Wang, Qiqi Lai:
Lattice-based certificateless encryption scheme. Frontiers Comput. Sci. 8(5): 828-836 (2014) - [j14]Baocang Wang, Fagen Li, Yupu Hu:
Improvement on a Knapsack-Based Probabilistic Encryption Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 421-424 (2014) - [j13]Xixiang Lv, Hui Li, Baocang Wang:
Authenticated asymmetric group key agreement based on certificateless cryptosystem. Int. J. Comput. Math. 91(3): 447-460 (2014) - [j12]Baocang Wang, Yupu Hu:
Signature Scheme Using the Root Extraction Problem on Quaternions. J. Appl. Math. 2014: 819182:1-819182:7 (2014) - [j11]Baocang Wang, Yupu Hu, Xixiang Lv:
Indistinguishable against adaptive chosen ciphertext attack secure public key cryptosystem with double trapdoor decryption mechanism. Secur. Commun. Networks 7(11): 1805-1814 (2014) - 2013
- [j10]Fenghe Wang, Yupu Hu, Baocang Wang:
Lattice-based linearly homomorphic signature scheme over binary field. Sci. China Inf. Sci. 56(11): 1-9 (2013) - [j9]Baocang Wang, Yupu Hu:
Sieve Method for Polynomial Linear Equivalence. J. Appl. Math. 2013: 872962:1-872962:8 (2013) - [j8]Xixiang Lv, Hui Li, Baocang Wang:
Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks. Secur. Commun. Networks 6(1): 49-57 (2013) - [c5]Senshan Pan, Yupu Hu, Baocang Wang:
The termination of the F5 algorithm revisited. ISSAC 2013: 291-298 - 2012
- [j7]Xixiang Lv, Hui Li, Baocang Wang:
Group key agreement for secure group communication in dynamic peer systems. J. Parallel Distributed Comput. 72(10): 1195-1200 (2012) - [c4]Baocang Wang, Hao Lei:
Lattice Attack on the Knapsack Cipher 0/255. INCoS 2012: 577-580 - 2011
- [j6]Xixiang Lv, Hui Li, Baocang Wang:
Identity-based key distribution for mobile Ad Hoc networks. Frontiers Comput. Sci. China 5(4): 442-447 (2011) - 2010
- [j5]Baocang Wang, Yupu Hu:
Quadratic compact knapsack public-key cryptosystem. Comput. Math. Appl. 59(1): 194-206 (2010) - [j4]Baocang Wang, Yupu Hu:
A Novel Combinatorial Public Key Cryptosystem. Informatica 21(4): 611-626 (2010)
2000 – 2009
- 2009
- [j3]Baocang Wang, Yupu Hu:
Signature scheme based on the root extraction problem over braid groups. IET Inf. Secur. 3(2): 53-59 (2009) - [c3]Baocang Wang, Hui Liu, Yupu Hu:
Cryptanalysis of a Knapsack Public Key Cryptosystem. IAS 2009: 49-52 - [c2]Weidong Zhang, Baocang Wang, Yupu Hu:
A New Knapsack Public-Key Cryptosystem. IAS 2009: 53-56 - 2008
- [j2]Yupu Hu, Baocang Wang, Wencai He:
NTRUSign With a New Perturbation. IEEE Trans. Inf. Theory 54(7): 3216-3221 (2008) - 2007
- [j1]Baocang Wang, Qianhong Wu, Yupu Hu:
A knapsack-based probabilistic encryption scheme. Inf. Sci. 177(19): 3981-3994 (2007) - 2006
- [c1]Baocang Wang, Yupu Hu:
Diophantine Approximation Attack on a Fast Public Key Cryptosystem. ISPEC 2006: 25-32
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint