Paper Publications
-
[61] Jiameng Sun , Jing Qin and Jixin Ma. Securely outsourcing decentralized multi-authority attribute based signature. Cyberspace Safety and Security - 9th International Symposium, {CSS} 2017, 10581, 86-102, 2017.
-
[62] Haibin Zheng , Jing Qin , Jixin Ma and Qianhong Wu. Threshold attribute-based signcryption and its application to authenticated key agreement. Security and Communication Networks, 9, 4914-4923, 2016.
-
[63] 朱斌瑞 , 秦静 and 韩斐. 基于生物特征的可搜索加密. 山东大学学报(理学版), 51, 81-89, 2016.
-
[64] Yue Zhang , Jing Qin and Lihua Du. A Secure Biometric Authentication Based on PEKS. Concurrency and Computation: Practice and Experience, 28, 1111--1123, 2016.
-
[65] Fei Han , Jiankun Hu and Jing Qin. Secure searches in the cloud: A survey. Future Generation Computer Systems, 62, 66-75, 2016.
-
[66] Guoyan Zhang and Jing Qin. Lattice-based threshold cryptography and its applications in distributed cloud computing. International Journal of High Performance Computing and Networking, 8, 176-185, 2015.
-
[67] Guoyan Zhang , Jing Qin and Shams Qazi. Multi-Authority Attribute-Based Encryption Scheme from Lattices. Journal of Universal Computer Science, 21, 483-501, 2015.
-
[68] Jing Qin , Honghui Duan , Jiankun Hu and Huawei Zhao. A new Lagrange solution to the privacy-preserving general geometric intersection problem. Journal of Network and Computer Applications, 2014, 94-99, 2014.
-
[69] Fei Han and Jing Qin. A Function Private Attribute-Based Encryption. International Journal of Distributed Sensor Networks, 10, 2014.
-
[70] Fei Han , Jing Qin , Huawei Zhao and Jiankun Hu. A General Transformation from KP-ABE to Searchable Encryption. Future Generation Computation Systems, 30, 107-115, 2014.
-
[71] Mingqiang Wang and Jing Qin. A note on a provable secure encryption scheme. Journal of Shanghai Jiaotong University, 13, 655-658, 2008.