Paper Publications
-
[41] 杨海宁. Verifiable inner product computation on outsourced database for authenticated multi-user data sha.... Information Sciences, 539, 295, 2020.
-
[42] Haining Yang , Ye Su , Jing Qin and Huaxiong Wang. Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database. IEEE Transactions on Dependable and Secure Computing, 网络发表, 2020.
-
[43] Ye Su , Jiameng Sun , Jing Qin and Jiankun Hu. Publicly Verifiable Shared Dynamic Electronic Health Record Databases with Functional Commitment .... IEEE Transactions on Cloud Computing, 网络发表, 2020.
-
[44] Haining Yang , Ye Su , Jing Qin , Huaxiong Wang and Yongcheng Song. Verifiable Inner Product Computation on Outsourced Database for Authenticated Multi-user Data Sha.... Information Sciences, 539, 295-311, 2020.
-
[45] Xi Zhang , Ye Su and Jing Qin. A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security. Security and Communication Networks, 2020, 1-13, 2020.
-
[46] Haining Yang , Ye Su , Jing Qin , Jinhua Ma and Huaxiong Wang. An Efficient Public Batch Auditing Scheme for Data Integrity in Standard Model. 3rd International Conference on Machine Learning for Cyber Security, LNCS 12486, 578-592, 2020.
-
[47] Ke Huang , Xiaosong Zhang , Yi Mu , Fatemeh Rezaeibagha , Xiaofen Wang , Jingwei Li , Qi Xia and Jing Qin. EVA: Efficient Versatile Auditing Scheme for IoT-Based Datamarket in Jointcloud. IEEE Internet Things Journal, 7, 882-892, 2020.
-
[48] 张茜 , 苏烨 and 秦静. 集合成员关系判定的安全多方计算协议. 山东大学学报(理学版), 55, 118-126, 2020.
-
[49] Haining Yang , Jiameng Sun , Jing Qin and Jixin Ma. An improved scheme for outsourced computation with attribute-based encryption. Concurrency and Computation: Practice and Experience, 31, 2019.
-
[50] Binrui Zhu , Jiameng Sun , Jing Qin and Jixin Ma. A Secure Data Sharing Scheme with Designated Server. Security and Communication Networks, 2019, 4268731:1-4268731:16, 2019.
-
[51] Wenting Shen , Jing Qin , Jia Yu , Rong Hao , Jiankun Hu and Jixin Ma. Data Integrity Auditing without Private Key Storage for Secure Cloud Storage. IEEE Transactions on Cloud Computing, 网络发表, 2019.
-
[52] Jiameng Sun , Ye Su , Jing Qin , Jiankun Hu and Jixin Ma. Outsourced Decentralized Multi-authority Attribute Based Signature and Its Application in IoT. IEEE Transactions on Cloud Computing, 网络发表, 2019.
-
[53] Wenting Shen , Jing Qin , Jia Yu , Rong Hao and Jiankun Hu. Enabling identity-based integrity auditing and data sharing with sensitive information hiding for.... IEEE Transactions on Information Forensics and Security, 14, 331-346, 2019.
-
[54] Wenting Shen , Jing Qin and Jixin Ma. A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Pa.... Security and Communication Networks, 2019, 8275074:1--8275074:15, 2019.
-
[55] Wenting Shen , Jing Qin , Jia Yu , Rong Hao , Jiankun Hu and Jixin Ma. Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for.... IEEE Transactions on Information Forensics and Security, 14, 331, 2019.
-
[56] Binrui Zhu , Jiameng Sun , Jing Qin and Jixin Ma. Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23, 527-536, 2019.
-
[57] Dawei Xie , Haining Yang , Jing Qin and Jixin Ma. Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a M.... IJDCF, 11, 14-27, 2019.
-
[58] 郑京竺 , 杨海宁 , 苏烨 and 秦静. 一个盲公开可验证的矩阵乘积外包计算方案. 山东大学学报(理学版), 11, 1-11, 2019.
-
[59] 高嘉昕 , 孙加萌 and 秦静. 支持属性撤销的可追踪外包属性加密方案. 计算机研究与发展, 56, 56(10): 2160-2169, 2019.
-
[60] Jiameng Sun , Binrui Zhu , Jing Qin , Jiankun Hu and Jixin Ma. Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and .... Security and Communication Networks, 2018, 5275132:1--5275132:15, 2018.