An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks Q Huang, H Li Information Sciences 403, 1-14, 2017 | 330 | 2017 |
Designated-server identity-based authenticated encryption with keyword search for encrypted emails H Li, Q Huang, J Shen, G Yang, W Susilo Information Sciences 481, 330-343, 2019 | 119 | 2019 |
Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search H Li, Q Huang, J Huang, W Susilo IEEE Transactions on Information Forensics and Security 18, 396-410, 2023 | 54 | 2023 |
Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage H Li, Q Huang, S Ma, J Shen, W Susilo IEEE Access, 2019 | 39 | 2019 |
Decentralized and privacy-preserving public auditing for cloud storage based on blockchain Y Miao, Q Huang, M Xiao, H Li IEEE Access 8, 139813-139826, 2020 | 33 | 2020 |
Ciphertext-policy attribute-based encrypted data equality test and classification Y Cui, Q Huang, J Huang, H Li, G Yang The Computer Journal 62 (8), 1166-1177, 2019 | 29 | 2019 |
Outsourced ciphertext-policy attribute-based encryption with equality test Y Cui, Q Huang, J Huang, H Li, G Yang International Conference on Information Security and Cryptology, 448-467, 2018 | 25 | 2018 |
Attribute-based hierarchical access control with extendable policy M Xiao, H Li, Q Huang, S Yu, W Susilo IEEE Transactions on Information Forensics and Security 17, 1868-1883, 2022 | 24 | 2022 |
Private set intersection with authorization over outsourced encrypted datasets Y Wang, Q Huang, H Li, M Xiao, S Ma, W Susilo IEEE Transactions on Information Forensics and Security 16, 4050-4062, 2021 | 23 | 2021 |
Towards enhanced security for certificateless public-key authenticated encryption with keyword search X Liu, H Li, G Yang, W Susilo, J Tonien, Q Huang Provable Security: 13th International Conference, ProvSec 2019, Cairns, QLD …, 2019 | 22 | 2019 |
A secure cloud data sharing protocol for enterprise supporting hierarchical keyword search H Li, Q Huang, W Susilo IEEE Transactions on Dependable and Secure Computing 19 (3), 1532-1543, 2022 | 21 | 2022 |
Attribute-based equality test over encrypted data without random oracles Y Wang, Y Cui, Q Huang, H Li, J Huang, G Yang IEEE Access 8, 32891-32903, 2020 | 20 | 2020 |
Public key authenticated encryption with designated equality test and its applications in diagnostic related groups Y Wang, Q Huang, H Li, J Huang, G Yang, W Susilo IEEE Access 7, 135999-136011, 2019 | 14 | 2019 |
A more efficient public-key authenticated encryption scheme with keyword search Q Huang, P Huang, H Li, J Huang, H Lin Journal of Systems Architecture 137, 102839, 2023 | 12 | 2023 |
FS-IBEKS: Forward secure identity-based encryption with keyword search from lattice X Yang, X Chen, J Huang, H Li, Q Huang Computer Standards & Interfaces 86, 103732, 2023 | 11 | 2023 |
Efficient functional encryption for inner product with simulation-based security W Liu, Q Huang, X Chen, H Li Cybersecurity 4, 1-13, 2021 | 6 | 2021 |
Public key encryption with fuzzy matching Y Wang, Q Huang, H Li, M Xiao, J Huang, G Yang International Conference on Provable Security, 39-62, 2021 | 5 | 2021 |
Secure channel free public key authenticated encryption with multi-keyword search on healthcare systems P Yang, H Li, J Huang, H Zhang, MHA Au, Q Huang Future Generation Computer Systems 145, 511-520, 2023 | 4 | 2023 |
An Identity-Based Encryption with Equality Test scheme for healthcare social apps J Lu, H Li, J Huang, S Ma, MHA Au, Q Huang Computer Standards & Interfaces 87, 103759, 2024 | 3 | 2024 |
A novel identity-based multi-signature scheme over NTRU lattices X Chen, Q Huang, H Li, Z Liao, W Susilo Theoretical Computer Science 933, 163-176, 2022 | 3 | 2022 |