default search action
Qiong Huang 0001
Person information
- affiliation: South China Agricultural University, Guangzhou, China
Other persons with the same name
- Qiong Huang — disambiguation page
- Qiong Huang 0002 — Rice University, Houston, TX, USA
- Qiong Huang 0003 — Okinawa Institute of Science and Technology Graduate University, Okinawa, Japan
- Qiong Huang 0004 — Hunan Normal University, Changsha, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j106]Tian Yang, Sha Ma, Jiaojiao Du, Chengyu Jiang, Qiong Huang:
Revocable Public Key Encryption with Equality Test without Pairing in Cloud Storage. Comput. J. 67(2): 642-657 (2024) - [j105]Kaifeng Xiao, Xinjian Chen, Jianye Huang, Hongbo Li, Qiong Huang:
A lattice-based public key encryption scheme with delegated equality test. Comput. Stand. Interfaces 87: 103758 (2024) - [j104]Jingwei Lu, Hongbo Li, Jianye Huang, Sha Ma, Man Ho Allen Au, Qiong Huang:
An Identity-Based Encryption with Equality Test scheme for healthcare social apps. Comput. Stand. Interfaces 87: 103759 (2024) - [j103]Shuaining Gao, Xinjian Chen, Hongbo Li, Willy Susilo, Qiong Huang:
Post-quantum secure group signature with verifier local revocation and backward unlinkability. Comput. Stand. Interfaces 88: 103782 (2024) - [j102]Sha Ma, Zhiqing Ye, Qiong Huang, Chengyu Jiang:
FFEC: Fast and forward-secure equivalence-based ciphertext comparability for multiple users in cloud environment. Comput. Stand. Interfaces 89: 103821 (2024) - [j101]Ximing Li, Hao Wang, Sha Ma, Meiyan Xiao, Qiong Huang:
Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud. Cybersecur. 7(1): 18 (2024) - [j100]Qingwen Guo, Chuntao Wang, Deqin Xiao, Qiong Huang:
A lightweight open-world pest image classifier using ResNet8-based matching network and NT-Xent loss function. Expert Syst. Appl. 237(Part A): 121395 (2024) - [j99]Mouke Mo, Chuntao Wang, Qingwen Guo, Shan Bian, Qiong Huang, Xinpeng Zhang:
A novel robust black-box fingerprinting scheme for deep classification neural networks. Expert Syst. Appl. 252: 124201 (2024) - [j98]Jiaojiao Du, Sha Ma, Tian Yang, Qiong Huang:
Efficient revocable identity-based encryption with equality test. Int. J. Appl. Cryptogr. 4(3/4): 205-218 (2024) - [j97]Yichao Tang, Kangshun Li, Chuntao Wang, Shan Bian, Qiong Huang:
A two-stage robust reversible watermarking using polar harmonic transform for high robustness and capacity. Inf. Sci. 654: 119786 (2024) - [j96]Kaifeng Xiao, Xinjian Chen, Hongbo Li, Jianye Huang, Willy Susilo, Qiong Huang:
A fully secure lattice-based signcryption with designated equality test in standard model. Inf. Sci. 658: 120015 (2024) - [j95]Sha Ma, Zhiqing Ye, Qiong Huang, Chengyu Jiang:
Controllable forward secure identity-based encryption with equality test in privacy-preserving text similarity analysis. Inf. Sci. 660: 120099 (2024) - [j94]Jinrong Cui, Zhipeng He, Qiong Huang, Yulu Fu, Yuting Li, Jie Wen:
Structure-aware contrastive hashing for unsupervised cross-modal retrieval. Neural Networks 174: 106211 (2024) - [j93]Jinrong Cui, Yazi Xie, Chengliang Liu, Qiong Huang, Mu Li, Jie Wen:
Deep dual incomplete multi-view multi-label classification via label semantic-guided contrastive learning. Neural Networks 180: 106674 (2024) - [j92]Xiao-Kai Cao, Man-Sheng Chen, Chang-Dong Wang, Jian-Huang Lai, Qiong Huang, C. L. Philip Chen:
Dynamic Secure Multi Broad Network for Privacy Preserving of Streaming Data. IEEE Trans. Emerg. Top. Comput. Intell. 8(4): 3152-3165 (2024) - [j91]Lifeng Huang, Qiong Huang, Peichao Qiu, Shuxin Wei, Chengying Gao:
FASTEN: Fast Ensemble Learning for Improved Adversarial Robustness. IEEE Trans. Inf. Forensics Secur. 19: 2565-2580 (2024) - [j90]Meiyan Xiao, Qiong Huang, Wenya Chen, Chuan Lyu, Willy Susilo:
Domain-Specific Fine-Grained Access Control for Cloud-Edge Collaborative IoT. IEEE Trans. Inf. Forensics Secur. 19: 6499-6513 (2024) - [j89]Zesheng Lin, Hongbo Li, Xinjian Chen, Meiyan Xiao, Qiong Huang:
Identity-Based Encryption With Disjunctive, Conjunctive and Range Keyword Search From Lattices. IEEE Trans. Inf. Forensics Secur. 19: 8644-8657 (2024) - [j88]Chaoda Peng, Zexiong Wu, Xumin Huang, Yuan Wu, Jiawen Kang, Qiong Huang, Shengli Xie:
Joint Energy and Completion Time Difference Minimization for UAV-Enabled Intelligent Transportation Systems: A Constrained Multi-Objective Optimization Approach. IEEE Trans. Intell. Transp. Syst. 25(10): 14040-14053 (2024) - [j87]Yun Liang, Yijin Chen, Qiong Huang, Haoming Chen, Feiping Nie:
An Effective Optimization Method for Fuzzy $k$k-Means With Entropy Regularization. IEEE Trans. Knowl. Data Eng. 36(7): 2846-2861 (2024) - 2023
- [j86]Xinmin Yang, Xinjian Chen, Jianye Huang, Hongbo Li, Qiong Huang:
FS-IBEKS: Forward secure identity-based encryption with keyword search from lattice. Comput. Stand. Interfaces 86: 103732 (2023) - [j85]Qingwen Guo, Chuntao Wang, Deqin Xiao, Qiong Huang:
A novel multi-label pest image classifier using the modified Swin Transformer and soft binary cross entropy loss. Eng. Appl. Artif. Intell. 126: 107060 (2023) - [j84]Pan Yang, Hongbo Li, Jianye Huang, Hao Zhang, Man Ho Allen Au, Qiong Huang:
Secure channel free public key authenticated encryption with multi-keyword search on healthcare systems. Future Gener. Comput. Syst. 145: 511-520 (2023) - [j83]Jingwei Lu, Hongbo Li, Jianye Huang, Sha Ma, Man Ho Allen Au, Qiong Huang:
Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security. Inf. 14(3): 142 (2023) - [j82]Junbin Liang, Jianye Huang, Qiong Huang, Liantao Lan, Man Ho Allen Au:
A Lattice-Based Certificateless Traceable Ring Signature Scheme. Inf. 14(3): 160 (2023) - [j81]Qiong Huang, Peisen Huang, Hongbo Li, Jianye Huang, Hongyuan Lin:
A more efficient public-key authenticated encryption scheme with keyword search. J. Syst. Archit. 137: 102839 (2023) - [j80]Junbin Liang, Qiong Huang, Jianye Huang, Liantao Lan, Man Ho Allen Au:
An identity-based traceable ring signatures based on lattice. Peer Peer Netw. Appl. 16(2): 1270-1285 (2023) - [j79]Xiao-Kai Cao, Chang-Dong Wang, Jian-Huang Lai, Qiong Huang, C. L. Philip Chen:
Multiparty Secure Broad Learning System for Privacy Preserving. IEEE Trans. Cybern. 53(10): 6636-6648 (2023) - [j78]Hongbo Li, Qiong Huang, Jianye Huang, Willy Susilo:
Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search. IEEE Trans. Inf. Forensics Secur. 18: 396-410 (2023) - [j77]Sha Ma, Pan Zhou, Qiong Huang, Jiajun Wang:
MTER: An Efficient Multi-User Threshold Equality Retrieval for Double Auction in Smart Grid Market. IEEE Trans. Inf. Forensics Secur. 18: 4515-4529 (2023) - [j76]Chuntao Wang, Tianjian Zhang, Hao Chen, Qiong Huang, Jiangqun Ni, Xinpeng Zhang:
A Novel Encryption-Then-Lossy-Compression Scheme of Color Images Using Customized Residual Dense Spatial Network. IEEE Trans. Multim. 25: 4026-4040 (2023) - [c44]Guiquan Yang, Sha Ma, Hongbo Li, Husheng Yang, Qiong Huang:
Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction. Inscrypt (1) 2023: 299-319 - [c43]Husheng Yang, Sha Ma, Pan Zhou, Guiquan Yang, Qiong Huang:
Forward Secure Online/Offline Key Policy Attribute-Based Encryption with Keyword Search. Inscrypt (2) 2023: 356-367 - 2022
- [j75]Zhijian Liao, Qiong Huang, Xinjian Chen:
A fully dynamic forward-secure group signature from lattice. Cybersecur. 5(1) (2022) - [j74]Ningbin Yang, Quan Zhou, Qiong Huang, Chunming Tang:
Multi-Recipient encryption with keyword search without pairing for cloud storage. J. Cloud Comput. 11: 10 (2022) - [j73]Xinjian Chen, Qiong Huang, Hongbo Li, Zhijian Liao, Willy Susilo:
A novel identity-based multi-signature scheme over NTRU lattices. Theor. Comput. Sci. 933: 163-176 (2022) - [j72]Jianye Huang, Willy Susilo, Fuchun Guo, Ge Wu, Zhen Zhao, Qiong Huang:
An Anonymous Authentication System for Pay-As-You-Go Cloud Computing$^*$*. IEEE Trans. Dependable Secur. Comput. 19(2): 1280-1291 (2022) - [j71]Hongbo Li, Qiong Huang, Willy Susilo:
A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search. IEEE Trans. Dependable Secur. Comput. 19(3): 1532-1543 (2022) - [j70]Meiyan Xiao, Hongbo Li, Qiong Huang, Shui Yu, Willy Susilo:
Attribute-Based Hierarchical Access Control With Extendable Policy. IEEE Trans. Inf. Forensics Secur. 17: 1868-1883 (2022) - [j69]Ying Miao, Qiong Huang, Meiyan Xiao, Willy Susilo:
Blockchain Assisted Multi-Copy Provable Data Possession With Faults Localization in Multi-Cloud Storage. IEEE Trans. Inf. Forensics Secur. 17: 3663-3676 (2022) - [j68]Sha Ma, Yijian Zhong, Qiong Huang:
Efficient Public Key Encryption With Outsourced Equality Test for Cloud-Based IoT Environments. IEEE Trans. Inf. Forensics Secur. 17: 3758-3772 (2022) - [j67]Lei Zhang, Hu Xiong, Qiong Huang, Jiguo Li, Kim-Kwang Raymond Choo, Jiangtao Li:
Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities. IEEE Trans. Serv. Comput. 15(1): 567-587 (2022) - [j66]Meiyan Xiao, Qiong Huang, Ying Miao, Shunpeng Li, Willy Susilo:
Blockchain Based Multi-Authority Fine-Grained Access Control System With Flexible Revocation. IEEE Trans. Serv. Comput. 15(6): 3143-3155 (2022) - [c42]Xiaofei Wu, Hao Wang, Chunpeng Ge, Lu Zhou, Qiong Huang, Lanju Kong, Lizhen Cui, Zhe Liu:
CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts. ACISP 2022: 449-468 - [c41]Pan Yang, Hongbo Li, Jianye Huang, Hao Zhang, Man Ho Au, Qiong Huang:
Secure-Channel Free Certificateless Searchable Public Key Authenticated Encryption with Keyword Search. ProvSec 2022: 20-35 - [c40]Meiyan Xiao, Qiong Huang, Ying Miao, Shunpeng Li, Willy Susilo:
Blockchain Based Multi-Authority Fine-Grained Access Control System With Flexible Revocation. SERVICES 2022: 31 - [i20]Xiao-Kai Cao, Chang-Dong Wang, Jian-Huang Lai, Qiong Huang, C. L. Philip Chen:
Multi-party Secure Broad Learning System for Privacy Preserving. CoRR abs/2206.11133 (2022) - 2021
- [j65]Qingwen Guo, Qiong Huang, Sha Ma, Meiyan Xiao, Guomin Yang, Willy Susilo:
Functional signatures: new definition and constructions. Sci. China Inf. Sci. 64(12) (2021) - [j64]Zhen Liu, Qiong Huang, Duncan S. Wong:
On Enabling Attribute-Based Encryption to Be Traceable Against Traitors. Comput. J. 64(4): 575-598 (2021) - [j63]Yunhao Ling, Sha Ma, Qiong Huang, Ximing Li, Yijian Zhong, Yunzhi Ling:
Efficient Group ID-Based Encryption With Equality Test Against Insider Attack. Comput. J. 64(4): 661-674 (2021) - [j62]Sha Ma, Qiong Huang:
CCA-Almost-Full Anonymous Group Signature with Verifier Local Revocation in the Standard Model. Comput. J. 64(8): 1239-1252 (2021) - [j61]Wenbo Liu, Qiong Huang, Xinjian Chen, Hongbo Li:
Efficient functional encryption for inner product with simulation-based security. Cybersecur. 4(1): 2 (2021) - [j60]Ge Song, Yuqiao Deng, Qiong Huang, Changgen Peng, Chunming Tang, Xiaohua Wang:
Hierarchical identity-based inner product functional encryption. Inf. Sci. 573: 332-344 (2021) - [j59]Yuanhao Wang, Qiong Huang, Hongbo Li, Meiyan Xiao, Sha Ma, Willy Susilo:
Private Set Intersection With Authorization Over Outsourced Encrypted Datasets. IEEE Trans. Inf. Forensics Secur. 16: 4050-4062 (2021) - [c39]Xueqiao Liu, Kai He, Guomin Yang, Willy Susilo, Joseph Tonien, Qiong Huang:
Broadcast Authenticated Encryption with Keyword Search. ACISP 2021: 193-213 - [c38]Xinjian Chen, Qiong Huang, Jianye Huang:
A Novel Certificateless Multi-signature Scheme over NTRU Lattices. ISPEC 2021: 345-362 - [c37]Yuanhao Wang, Qiong Huang, Hongbo Li, Meiyan Xiao, Jianye Huang, Guomin Yang:
Public Key Encryption with Fuzzy Matching. ProvSec 2021: 39-62 - [c36]Ru Xiang, Sha Ma, Qiong Huang, Ximing Li:
A CCA-Full-Anonymous Group Signature with Verifiable Controllable Linkability in the Standard Model. ProvSec 2021: 279-295 - 2020
- [j58]Chuntao Wang, Tianzheng Li, Jiangqun Ni, Qiong Huang:
A New MRF-Based Lossy Compression for Encrypted Binary Images. IEEE Access 8: 11328-11341 (2020) - [j57]Yuanhao Wang, Yuzhao Cui, Qiong Huang, Hongbo Li, Jianye Huang, Guomin Yang:
Attribute-Based Equality Test Over Encrypted Data Without Random Oracles. IEEE Access 8: 32891-32903 (2020) - [j56]Yijian Zhong, Sha Ma, Qiong Huang:
Plaintext-Verifiably-Checkable Encryption and Its Extension in Dual-Server Setting. IEEE Access 8: 132825-132840 (2020) - [j55]Weili Wang, Chuntao Wang, Junxiang Wang, Shan Bian, Qiong Huang:
Improving Multi-Histogram-Based Reversible Watermarking Using Optimized Features and Adaptive Clustering Number. IEEE Access 8: 134334-134350 (2020) - [j54]Ying Miao, Qiong Huang, Meiyan Xiao, Hongbo Li:
Decentralized and Privacy-Preserving Public Auditing for Cloud Storage Based on Blockchain. IEEE Access 8: 139813-139826 (2020) - [j53]Sha Ma, Qiong Huang:
A New Framework of IND-CCA Secure Public Key Encryption with Keyword Search. Comput. J. 63(12): 1849-1858 (2020) - [j52]Jianye Huang, Qiong Huang, Willy Susilo:
Leakage-resilient group signature: Definitions and constructions. Inf. Sci. 509: 119-132 (2020) - [j51]Yunhao Ling, Sha Ma, Qiong Huang, Ximing Li, Yunzhi Ling:
Group public key encryption with equality test against offline message recovery attack. Inf. Sci. 510: 16-32 (2020) - [j50]Baodong Qin, Yu Chen, Qiong Huang, Ximeng Liu, Dong Zheng:
Public-key authenticated encryption with keyword search revisited: Security model and constructions. Inf. Sci. 516: 515-528 (2020) - [j49]Zhenhua Chen, Luqi Huang, Xiaonan Shi, Qiong Huang, Hao Wang, Xueqiao Liu:
Privacy-preserving polynomial interpolation and its applications on predictive analysis. Inf. Sci. 541: 259-270 (2020) - [c35]Jiaxian Wu, Shuangjuan Li, Qiong Huang:
Reducing Sensor Failure and Ensuring Scheduling Fairness for Online Charging in Heterogeneous Rechargeable Sensor Networks. ISCC 2020: 1-6
2010 – 2019
- 2019
- [j48]Hongbo Li, Qiong Huang, Sha Ma, Jian Shen, Willy Susilo:
Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage. IEEE Access 7: 25409-25421 (2019) - [j47]Yuanhao Wang, Qiong Huang, Hongbo Li, Jianye Huang, Guomin Yang, Willy Susilo:
Public Key Authenticated Encryption With Designated Equality Test and its Applications in Diagnostic Related Groups. IEEE Access 7: 135999-136011 (2019) - [j46]Shuangjuan Li, Hong Shen, Qiong Huang, Longkun Guo:
Optimizing the Sensor Movement for Barrier Coverage in a Sink-Based Deployed Mobile Sensor Network. IEEE Access 7: 156301-156314 (2019) - [j45]Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang:
Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification. Comput. J. 62(8): 1166-1177 (2019) - [j44]Hongbo Li, Qiong Huang, Jian Shen, Guomin Yang, Willy Susilo:
Designated-server identity-based authenticated encryption with keyword search for encrypted emails. Inf. Sci. 481: 330-343 (2019) - [j43]Yuanhao Wang, Meiyan Xiao, Ying Miao, Wenbo Liu, Qiong Huang:
Signature Scheme from Trapdoor Functions. J. Internet Serv. Inf. Secur. 9(2): 31-41 (2019) - [j42]Jianye Huang, Qiong Huang, Willy Susilo:
Leakage-resilient ring signature schemes. Theor. Comput. Sci. 759: 1-13 (2019) - [c34]Yunhao Ling, Sha Ma, Qiong Huang, Ru Xiang, Ximing Li:
Group ID-Based Encryption with Equality Test. ACISP 2019: 39-57 - [c33]Ximing Li, Weizhao Chen, Yubin Guo, Sha Ma, Qiong Huang:
Secure, Efficient and Searchable File System on Distributed Clouds. ICPCSEE (2) 2019: 246-266 - [c32]Sha Ma, Qiong Huang:
Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model. ISPEC 2019: 3-19 - [c31]Xueqiao Liu, Hongbo Li, Guomin Yang, Willy Susilo, Joseph Tonien, Qiong Huang:
Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search. ProvSec 2019: 113-129 - [c30]Sha Ma, Qiong Huang, Ximing Li, Meiyan Xiao:
Plaintext-Verifiably-Checkable Encryption. ProvSec 2019: 149-166 - [i19]Jianye Huang, Qiong Huang:
Leakage-Resilient Group Signature: Definitions and Constructions. IACR Cryptol. ePrint Arch. 2019: 2 (2019) - 2018
- [j41]Jianye Huang, Qiong Huang, Willy Susilo:
Leakage-Resilient Dual-Form Signatures. Comput. J. 61(8): 1216-1227 (2018) - [j40]Qingwen Guo, Qiong Huang, Guomin Yang:
Authorized Function Homomorphic Signature. Comput. J. 61(12): 1897-1908 (2018) - [j39]Jianye Huang, Qiong Huang:
Black-box constructions of signature schemes in the bounded leakage setting. Inf. Sci. 423: 313-325 (2018) - [j38]Willy Susilo, Guomin Yang, Fuchun Guo, Qiong Huang:
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes. Inf. Sci. 429: 349-360 (2018) - [j37]Jin Li, Xiaofeng Chen, Sherman S. M. Chow, Qiong Huang, Duncan S. Wong, Zheli Liu:
Multi-authority fine-grained access control with accountability and its application in cloud. J. Netw. Comput. Appl. 112: 89-96 (2018) - [j36]Chuntao Wang, Jiangqun Ni, Xinpeng Zhang, Qiong Huang:
Efficient Compression of Encrypted Binary Images Using the Markov Random Field. IEEE Trans. Inf. Forensics Secur. 13(5): 1271-1285 (2018) - [c29]Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang:
Outsourced Ciphertext-Policy Attribute-Based Encryption with Equality Test. Inscrypt 2018: 448-467 - [c28]Ximing Li, Weizhao Chen, Yubin Guo, Senyang Zhang, Qiong Huang:
Secure File Storage System Among Distributed Public Clouds. ICCCS (3) 2018: 277-289 - [c27]Yunhao Ling, Sha Ma, Qiong Huang, Ximing Li:
A General Two-Server Framework for Ciphertext-Checkable Encryption Against Offline Message Recovery Attack. ICCCS (3) 2018: 370-382 - [i18]Qiong Huang, Hongbo Li:
An Efficient Public-Key Searchable Encryption Scheme Secure against Inside Keyword Guessing Attacks. IACR Cryptol. ePrint Arch. 2018: 7 (2018) - [i17]Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang:
Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification. IACR Cryptol. ePrint Arch. 2018: 1058 (2018) - 2017
- [j35]Jianye Huang, Qiong Huang, Chunhua Pan:
A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting. Int. J. Found. Comput. Sci. 28(6): 761-780 (2017) - [j34]Qiong Huang, Hongbo Li:
An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf. Sci. 403: 1-14 (2017) - [j33]Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Fuchun Guo, Qiong Huang:
Sequence aware functional encryption and its application in searchable encryption. J. Inf. Secur. Appl. 35: 106-118 (2017) - [j32]Qingwen Guo, Yuzhao Cui, Xiaomeng Zou, Qiong Huang:
Generic Construction of Privacy-Preserving Optimistic Fair Exchange Protocols. J. Internet Serv. Inf. Secur. 7(2): 44-56 (2017) - [j31]Mingwu Zhang, Yudi Zhang, Yixin Su, Qiong Huang, Yi Mu:
Attribute-Based Hash Proof System Under Learning-With-Errors Assumption in Obfuscator-Free and Leakage-Resilient Environments. IEEE Syst. J. 11(2): 1018-1026 (2017) - [j30]Roman Schlegel, Chi-Yin Chow, Qiong Huang, Duncan S. Wong:
Privacy-Preserving Location Sharing Services for Social Networks. IEEE Trans. Serv. Comput. 10(5): 811-825 (2017) - [i16]Qiong Huang, Jianye Huang:
Black-Box Constructions of Signature Schemes in the Bounded Leakage Setting. IACR Cryptol. ePrint Arch. 2017: 619 (2017) - 2016
- [j29]Zhenhua Chen, Shundong Li, Qiong Huang, Yilei Wang, Sufang Zhou:
A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage. Concurr. Comput. Pract. Exp. 28(10): 2858-2876 (2016) - [j28]Yu Chen, Qiong Huang, Zongyang Zhang:
Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange revisited and more. Int. J. Inf. Sec. 15(1): 15-33 (2016) - [j27]Zhenhua Chen, Shundong Li, Qiong Huang, Jianhua Yan, Yong Ding:
A Joint Random Secret Sharing Scheme with Public Verifiability. Int. J. Netw. Secur. 18(5): 917-925 (2016) - [c26]Jianye Huang, Qiong Huang, Chunhua Pan:
A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model. ProvSec 2016: 320-339 - 2015
- [j26]Sha Ma, Mingwu Zhang, Qiong Huang, Bo Yang:
Public Key Encryption with Delegated Equality Test in a Multi-User Setting. Comput. J. 58(4): 986-1002 (2015) - [j25]Qiong Huang, Guomin Yang:
A Summary of the Special Issue "Cybersecurity and Cryptography". Inf. 6(4): 833-835 (2015) - [j24]Qiong Huang, Duncan S. Wong, Willy Susilo:
How to protect privacy in Optimistic Fair Exchange of digital signatures. Inf. Sci. 325: 300-315 (2015) - [j23]Zhenhua Chen, Shundong Li, Qianhong Wu, Qiong Huang:
A distributed secret share update scheme with public verifiability for ad hoc network. Secur. Commun. Networks 8(8): 1485-1493 (2015) - [j22]Chuntao Wang, Jiangqun Ni, Qiong Huang:
A new encryption-then-compression algorithm using the rate-distortion optimization. Signal Process. Image Commun. 39: 141-150 (2015) - [j21]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
Ambiguous optimistic fair exchange: Definition and constructions. Theor. Comput. Sci. 562: 177-193 (2015) - [j20]Xiao Tan, Qiong Huang, Duncan S. Wong:
Concurrent signature without random oracles. Theor. Comput. Sci. 562: 194-212 (2015) - [j19]Sha Ma, Qiong Huang, Mingwu Zhang, Bo Yang:
Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization. IEEE Trans. Inf. Forensics Secur. 10(3): 458-470 (2015) - [j18]Roman Schlegel, Chi-Yin Chow, Qiong Huang, Duncan S. Wong:
User-Defined Privacy Grid System for Continuous Location-Based Services. IEEE Trans. Mob. Comput. 14(10): 2158-2172 (2015) - 2014
- [j17]Jin Li, Xiaofeng Chen, Qiong Huang, Duncan S. Wong:
Digital provenance: Enabling secure data forensics in cloud computing. Future Gener. Comput. Syst. 37: 259-266 (2014) - [j16]Xiao Tan, Qiong Huang, Duncan S. Wong:
Extending concurrent signature to multiple parties. Theor. Comput. Sci. 548: 54-67 (2014) - [c25]Yu Chen, Qiong Huang, Zongyang Zhang:
Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited. ACISP 2014: 274-289 - [c24]Qiong Huang, Duncan S. Wong, Willy Susilo:
P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures. CT-RSA 2014: 367-384 - [i15]Yu Chen, Qiong Huang, Zongyang Zhang:
Sakai-Ohgishi-Kasahara Non-Interactive Identity-Based Key Exchange Scheme, Revisited. IACR Cryptol. ePrint Arch. 2014: 310 (2014) - 2013
- [j15]Qiong Huang, Duncan S. Wong, Willy Susilo:
The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles. Inf. Sci. 228: 222-238 (2013) - [j14]Jing Liu, Qiong Huang, Bo Yang, Yang Zhang:
Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures. IEEE Trans. Computers 62(8): 1656-1672 (2013) - [j13]Qiong Huang, Duncan S. Wong:
Short and efficient convertible undeniable signature schemes without random oracles. Theor. Comput. Sci. 476: 67-83 (2013) - [c23]Dennis Y. W. Liu, Duncan S. Wong, Qiong Huang:
Ambiguous One-Move Nominative Signature Without Random Oracles. ICISC 2013: 325-341 - [c22]Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang:
A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release. ISPEC 2013: 132-146 - [i14]Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang:
A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release. IACR Cryptol. ePrint Arch. 2013: 115 (2013) - [i13]Dennis Y. W. Liu, Duncan S. Wong, Qiong Huang:
Ambiguous One-Move Nominative Signature Without Random Oracles. IACR Cryptol. ePrint Arch. 2013: 711 (2013) - 2012
- [j12]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
A new efficient optimistic fair exchange protocol without random oracles. Int. J. Inf. Sec. 11(1): 53-63 (2012) - [c21]Xiaoqiong Pang, Bo Yang, Qiong Huang:
Privacy-Preserving Noisy Keyword Search in Cloud Computing. ICICS 2012: 154-166 - [c20]Weiwei Sun, Bo Yang, Qiong Huang, Sha Ma, Ximing Li:
Multi-Committer Threshold Commitment Scheme from Lattice. PAISI 2012: 162-175 - [c19]Qiong Huang, Duncan S. Wong, Willy Susilo:
The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles. Public Key Cryptography 2012: 120-137 - [i12]Xiao Tan, Qiong Huang, Duncan S. Wong:
Concurrent Signature without Random Oracles. IACR Cryptol. ePrint Arch. 2012: 576 (2012) - 2011
- [j11]Qiong Huang, Duncan S. Wong, Guomin Yang:
Heterogeneous Signcryption with Key Privacy. Comput. J. 54(4): 525-536 (2011) - [j10]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
Efficient strong designated verifier signature schemes without random oracle or with non-delegatability. Int. J. Inf. Sec. 10(6): 373-385 (2011) - [j9]Qiong Huang, Duncan S. Wong, Willy Susilo:
Group-oriented fair exchange of signatures. Inf. Sci. 181(16): 3267-3283 (2011) - [j8]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
Identity-based strong designated verifier signature revisited. J. Syst. Softw. 84(1): 120-129 (2011) - [j7]Qiong Huang, Duncan S. Wong, Willy Susilo:
Efficient Designated Confirmer Signature and DCS-Based Ambiguous Optimistic Fair Exchange. IEEE Trans. Inf. Forensics Secur. 6(4): 1233-1247 (2011) - [c18]Jin Li, Qiong Huang, Xiaofeng Chen, Sherman S. M. Chow, Duncan S. Wong, Dongqing Xie:
Multi-authority ciphertext-policy attribute-based encryption with accountability. AsiaCCS 2011: 386-390 - [c17]Zhen Liu, Zhenfu Cao, Qiong Huang, Duncan S. Wong, Tsz Hon Yuen:
Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles. ESORICS 2011: 278-297 - [c16]Qiong Huang, Duncan S. Wong:
Short Convertible Undeniable Signature in the Standard Model. ISPEC 2011: 257-272 - [c15]Qiong Huang, Duncan S. Wong, Willy Susilo, Bo Yang:
An Efficient Construction of Time-Selective Convertible Undeniable Signatures. ISC 2011: 355-371 - [c14]Tsz Hon Yuen, Duncan S. Wong, Willy Susilo, Qiong Huang:
Concurrent Signatures with Fully Negotiable Binding Control. ProvSec 2011: 170-187 - [i11]Jing Liu, Qiong Huang, Bo Yang:
Efficient Multicast Key Distribution Using HOWF-based Access Control Structures. IACR Cryptol. ePrint Arch. 2011: 576 (2011) - 2010
- [j6]Qiong Huang, Duncan S. Wong:
Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model. J. Comput. Sci. Technol. 25(4): 807-826 (2010) - [j5]Guomin Yang, Qiong Huang, Duncan S. Wong, Xiaotie Deng:
Universal authentication protocols for anonymous wireless communications. IEEE Trans. Wirel. Commun. 9(1): 168-174 (2010) - [c13]Guomin Yang, Chik How Tan, Qiong Huang, Duncan S. Wong:
Probabilistic Public Key Encryption with Equality Test. CT-RSA 2010: 119-131 - [c12]Qiong Huang, Duncan S. Wong, Willy Susilo:
A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange - (Extended Abstract). Pairing 2010: 41-61 - [c11]Ye Zhang, Man Ho Au, Duncan S. Wong, Qiong Huang, Nikos Mamoulis, David W. Cheung, Siu-Ming Yiu:
Oblivious Transfer with Access Control : Realizing Disjunction without Duplication. Pairing 2010: 96-115
2000 – 2009
- 2009
- [c10]Tsz Hon Yuen, Qiong Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Guomin Yang:
Efficient Non-interactive Range Proof. COCOON 2009: 138-147 - [c9]Pairat Thorncharoensri, Qiong Huang, Willy Susilo, Man Ho Au, Yi Mu, Duncan S. Wong:
Escrowed Deniable Identification Schemes. FGIT-SecTech 2009: 234-241 - [i10]Qiong Huang, Duncan S. Wong, Willy Susilo:
Group-Oriented Fair Exchange of Signatures. IACR Cryptol. ePrint Arch. 2009: 324 (2009) - [i9]Qiong Huang, Willy Susilo, Duncan S. Wong:
Non-delegatable Identity-based Designated Verifier Signature. IACR Cryptol. ePrint Arch. 2009: 367 (2009) - [i8]Qiong Huang, Duncan S. Wong:
New Constructions of Convertible Undeniable Signature Schemes without Random Oracles. IACR Cryptol. ePrint Arch. 2009: 517 (2009) - [i7]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability. IACR Cryptol. ePrint Arch. 2009: 518 (2009) - 2008
- [j4]Qiong Huang, Duncan S. Wong:
On the relation among various security models for certificateless cryptography. Int. J. Appl. Cryptogr. 1(2): 108-119 (2008) - [j3]Thomas Plantard, Willy Susilo, Khin Than Win, Qiong Huang:
Efficient lattice-based signature scheme. Int. J. Appl. Cryptogr. 1(2): 120-132 (2008) - [j2]Qiong Huang, Dennis Y. W. Liu, Duncan S. Wong:
An efficient one-move Nominative Signature scheme. Int. J. Appl. Cryptogr. 1(2): 133-143 (2008) - [j1]Qiong Huang, Duncan S. Wong, Jin Li, Yiming Zhao:
Generic Transformation from Weakly to Strongly Unforgeable Signatures. J. Comput. Sci. Technol. 23(2): 240-252 (2008) - [c8]Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang:
Traceable and Retrievable Identity-Based Encryption. ACNS 2008: 94-110 - [c7]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
Ambiguous Optimistic Fair Exchange. ASIACRYPT 2008: 74-89 - [c6]Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo:
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles. CT-RSA 2008: 106-120 - 2007
- [c5]Qiong Huang, Duncan S. Wong:
Generic Certificateless Key Encapsulation Mechanism. ACISP 2007: 215-229 - [c4]Qiong Huang, Duncan S. Wong, Yiming Zhao:
Generic Transformation to Strongly Unforgeable Signatures. ACNS 2007: 1-17 - [c3]Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin Yang, Xiaotie Deng:
Time Capsule Signature: Efficient and Provably Secure Constructions. EuroPKI 2007: 126-142 - [c2]Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo:
Formal Definition and Construction of Nominative Signature. ICICS 2007: 57-68 - [c1]Qiong Huang, Duncan S. Wong:
Generic Certificateless Encryption in the Standard Model. IWSEC 2007: 278-291 - [i6]Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo:
Nominative Signature: Application, Security Model and Construction. IACR Cryptol. ePrint Arch. 2007: 69 (2007) - [i5]Qiong Huang, Duncan S. Wong:
Generic Certificateless Encryption in the Standard Model. IACR Cryptol. ePrint Arch. 2007: 95 (2007) - [i4]Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin Yang, Xiaotie Deng:
Time Capsule Signature: Efficient and Provably Secure Constructions. IACR Cryptol. ePrint Arch. 2007: 146 (2007) - [i3]Dennis Y. W. Liu, Qiong Huang, Duncan S. Wong:
An Efficient One-move Nominative Signature Scheme. IACR Cryptol. ePrint Arch. 2007: 260 (2007) - [i2]Guomin Yang, Duncan S. Wong, Qiong Huang, Xiaotie Deng:
A New Security Definition for Public Key Encryption Schemes and Its Applications. IACR Cryptol. ePrint Arch. 2007: 319 (2007) - 2006
- [i1]Qiong Huang, Duncan S. Wong, Yiming Zhao:
Generic Transformation to Strongly Unforgeable Signatures. IACR Cryptol. ePrint Arch. 2006: 346 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint