Efficient public key encryption with equality test supporting flexible authorization S Ma, Q Huang, M Zhang, B Yang IEEE Transactions on Information Forensics and Security 10 (3), 458-470, 2014 | 199 | 2014 |
Identity-based encryption with outsourced equality test in cloud computing S Ma Information Sciences 328, 389-402, 2016 | 186 | 2016 |
Public key encryption with delegated equality test in a multi-user setting S Ma, M Zhang, Q Huang, B Yang The Computer Journal 58 (4), 986-1002, 2015 | 118 | 2015 |
ID-based encryption with equality test against insider attack T Wu, S Ma, Y Mu, S Zeng Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017 | 53 | 2017 |
Authorized equality test on identity-based ciphertexts for secret data sharing via cloud storage H Li, Q Huang, S Ma, J Shen, W Susilo IEEE Access 7, 25409-25421, 2019 | 38 | 2019 |
Group public key encryption with equality test against offline message recovery attack Y Ling, S Ma, Q Huang, X Li, Y Ling Information Sciences 510, 16-32, 2020 | 32 | 2020 |
A generic scheme of plaintext-checkable database encryption S Ma, Y Mu, W Susilo Information Sciences 429, 88-101, 2018 | 24 | 2018 |
Group id-based encryption with equality test Y Ling, S Ma, Q Huang, R Xiang, X Li Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019 | 20 | 2019 |
Private set intersection with authorization over outsourced encrypted datasets Y Wang, Q Huang, H Li, M Xiao, S Ma, W Susilo IEEE Transactions on Information Forensics and Security 16, 4050-4062, 2021 | 19 | 2021 |
Efficient group ID-based encryption with equality test against insider attack Y Ling, S Ma, Q Huang, X Li, Y Zhong, Y Ling The Computer Journal 64 (4), 661-674, 2021 | 16 | 2021 |
Identity-based broadcast encryption for inner products J Lai, Y Mu, F Guo, P Jiang, S Ma The Computer Journal 61 (8), 1240-1251, 2018 | 16 | 2018 |
Witness-based searchable encryption S Ma, Y Mu, W Susilo, B Yang Information Sciences 453, 364-378, 2018 | 15 | 2018 |
A general two-server framework for ciphertext-checkable encryption against offline message recovery attack Y Ling, S Ma, Q Huang, X Li International Conference on Cloud Computing and Security, 370-382, 2018 | 14 | 2018 |
A general two-server cryptosystem supporting complex queries S Ma, Y Ling Information Security Applications: 18th International Conference, WISA 2017 …, 2018 | 14 | 2018 |
Lattice-based proxy signature scheme 夏峰, 杨波, 马莎, 孙微微, 张明武 Journal of Hunan University 38 (6), 84-88, 2011 | 14 | 2011 |
Efficient public key encryption with outsourced equality test for cloud-based IoT environments S Ma, Y Zhong, Q Huang IEEE Transactions on Information Forensics and Security 17, 3758-3772, 2022 | 12 | 2022 |
Authorized equality test of encrypted data for secure cloud databases S Ma 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 12 | 2018 |
Efficient k-out-of-n oblivious transfer scheme with the ideal communication cost J Lai, Y Mu, F Guo, R Chen, S Ma Theoretical Computer Science 714, 15-26, 2018 | 11 | 2018 |
An efficient identity-based signature from lattice in the random oracle model F Xia, B Yang, W Sun Journal of Computational Information Systems 7 (11), 3963-3971, 2011 | 9 | 2011 |
A privacy-preserving join on outsourced database S Ma, B Yang, K Li, F Xia Information Security: 14th International Conference, ISC 2011, Xi’an, China …, 2011 | 9 | 2011 |