职称: 副教授
主要研究方向:密码学
项目情况:
国家重点研发计划, 2020.09 ~ 2023.05, 负责人
论文情况:
-
1. Cryptanalysis of An Anonymous and Traceable Group Data Sharing in Cloud Computing, IEEE Transactions on Information Forensics & Security, 2021,
-
2. dentity-Based Encryption with Equality Test and Datestamp-Based Authorization Mechanism, Theoretical Computer Science, 2021,
-
3. Public key encryption supporting equality test and flexible authorization without bilinear pairings, Computer Communications, 2021,
-
4. Security Analysis of the First Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks, The Computer Journal, 2020,
-
5. Leakage-free ID-based Signature, Revisited, The Computer Journal, 2019,
-
6. On the Security of A Certificateless Signcryption with Known Session-specific Temporary Information Security in the Standard Model, The Computer Journal, 2019,
-
7. Cryptanalysis of A Compact Anonymous HIBE with Constant Size Private Key, The Computer Journal, 2019,
-
8. On the Security of Secure Server-Designation Public Key Encryption with Keyword Search, The Computer Journal, 2018,
-
9. Certificateless public key encryption with equality test, Information Sciences, 2018,
-
10. Generic construction of public key encryption, identity-based encryption and signcryption with equality test, Information Sciences, 2018,
-
11. Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme, The Computer Journal, 2018,
-
12. An Efficient RSA-based Certificateless Public Key Encryption Scheme, Discrete Applied Mathematics, 2017,
-
13. Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme, The Computer Journal, 2016,
-
14. Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications, Computers & Security, 2015,
-
15. Comment on “Identity-based non-interactive key distribution with forward security”, Designs, Codes and Cryptography, 2015,
-
16. Many-to-one Encryption and Authentication Scheme and Its Application, Journal of Commun.and Networks, 2008,
-
17. Analysis of An Authenticated Identity-Based Multicast Scheme, IET Communication, 2008,