Paper Publications
-
[61] 姚克 , 杨海宁 and 秦静. 云存储中可验证完整性的可搜索加密协议. 山东大学学报(理学版), 54, 71-82, 2018.
-
[62] 杨海宁 , 秦静 , 孙加萌 and 朱斌瑞. 一个基于混淆电路的选择性公开可验证外包计算方案. 密码学报, 5, 599-611, 2018.
-
[63] Binrui Zhu , Jiameng Sun , Jing Qin and Jixin Ma. The Public Verifiability of Public Key Encryption with Keyword Search. MOBILE NETWORKS AND MANAGEMENT (MONAMI 2017), 235, 299-312, 2018.
-
[64] Jiameng Sun , Jiankun Hu , Binrui Zhu , Jing Qin and Jixin Ma. Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and .... Security and Communication Networks, 2018.
-
[65] 焦鸿儒 and 秦静. 可实现全部超星量子存取结构的量子秘密共享方案. 山东大学学报(理学版), 53, 62-68, 2018.
-
[66] 刘文 and Jing Qin. 区块链技术及其在数字加密货币中的应用. 通信技术, 51, 682-687, 2018.
-
[67] Jiameng Sun , Qianhong Wu , Jiankun Hu , Binrui Zhu and Jing Qin. Confidentiality-Preserving Publicly Verifiable Computation. International Journal of Foundations of Computer Science, 28, 799-818, 2017.
-
[68] 韩盼盼 and Jing Qin. 云计算中可验证的外包数据库加密搜索方案. 山东大学学报(理学版), 52, 41-53, 2017.
-
[69] 姚克 , 朱斌瑞 and Jing Qin. 基于生物信息的可验证公钥可搜索加密协议. 山东大学学报(理学版), 52, 11-22, 2017.
-
[70] Jiameng Sun , Binrui Zhu , Jing Qin and Jixin Ma. A Confidentiality Preserving Publicly Verifiable Computation for Multivariate Polynomials. 2017 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA), 5-12, 2017.
-
[71] Jiameng Sun , Jing Qin and Jixin Ma. Securely outsourcing decentralized multi-authority attribute based signature. Cyberspace Safety and Security - 9th International Symposium, {CSS} 2017, 10581, 86-102, 2017.
-
[72] Haibin Zheng , Jing Qin , Jixin Ma and Qianhong Wu. Threshold attribute-based signcryption and its application to authenticated key agreement. Security and Communication Networks, 9, 4914-4923, 2016.
-
[73] 朱斌瑞 , 秦静 and 韩斐. 基于生物特征的可搜索加密. 山东大学学报(理学版), 51, 81-89, 2016.
-
[74] Yue Zhang , Jing Qin and Lihua Du. A Secure Biometric Authentication Based on PEKS. Concurrency and Computation: Practice and Experience, 28, 1111--1123, 2016.
-
[75] Fei Han , Jiankun Hu and Jing Qin. Secure searches in the cloud: A survey. Future Generation Computer Systems, 62, 66-75, 2016.
-
[76] Guoyan Zhang and Jing Qin. Lattice-based threshold cryptography and its applications in distributed cloud computing. International Journal of High Performance Computing and Networking, 8, 176-185, 2015.
-
[77] Guoyan Zhang , Jing Qin and Shams Qazi. Multi-Authority Attribute-Based Encryption Scheme from Lattices. Journal of Universal Computer Science, 21, 483-501, 2015.
-
[78] Jing Qin , Honghui Duan , Jiankun Hu and Huawei Zhao. A new Lagrange solution to the privacy-preserving general geometric intersection problem. Journal of Network and Computer Applications, 2014, 94-99, 2014.
-
[79] Fei Han and Jing Qin. A Function Private Attribute-Based Encryption. International Journal of Distributed Sensor Networks, 10, 2014.
-
[80] Fei Han , Jing Qin , Huawei Zhao and Jiankun Hu. A General Transformation from KP-ABE to Searchable Encryption. Future Generation Computation Systems, 30, 107-115, 2014.