Author of the publication

A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage.

, , , , and . Concurr. Comput. Pract. Exp., 28 (10): 2858-2876 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Joint Random Secret Sharing Scheme with Public Verifiability., , , , and . Int. J. Netw. Secur., 18 (5): 917-925 (2016)(2, n) secret sharing scheme for gray and color images based on Boolean operation., , , and . Sci. China Inf. Sci., 55 (5): 1151-1161 (2012)Multiple ant colony optimization using both novel LSTM network and adaptive Tanimoto communication strategy., , and . Appl. Intell., 51 (8): 5644-5664 (2021)An Anti-cheating Block Secret Sharing Scheme Based on Cyclic Codes., , , and . IIH-MSP, page 369-372. IEEE, (2013)Symmetric cryptographic protocols for extended millionaires' problem., , and . Sci. China Ser. F Inf. Sci., 52 (6): 974-982 (2009)基本初等函数的保密云计算服务协议 (Secure Cloud Computing Service Protocols of Elementary Functions)., , and . 计算机科学, 42 (10): 159 (2015)Efficient Secure Multiparty Subset Computation., , , , and . Secur. Commun. Networks, (2017)Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes., , , , and . IEEE Access, (2019)A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle., , , , and . Theor. Comput. Sci., (2016)Privacy-Preserving Proximity Detection Framework for Location-Based Services., , and . NaNA, page 99-106. IEEE, (2021)