Seuraa
Fucai Luo
Fucai Luo
Tuntematon yhteys
Ei vahvistettua sähköpostiosoitetta
Nimike
Viittaukset
Viittaukset
Vuosi
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing
H Wang, Y Li, W Susilo, DH Duong, F Luo
Computer Standards & Interfaces 82, 103635, 2022
232022
Chosen-ciphertext secure homomorphic proxy re-encryption
F Luo, S Al-Kuwari, W Susilo, DH Duong
IEEE Transactions on Cloud Computing 10 (4), 2398-2408, 2020
172020
A more efficient leveled strongly-unforgeable fully homomorphic signature scheme
F Luo, F Wang, K Wang, K Chen
Information Sciences 480, 70-89, 2019
162019
Attribute-based proxy re-encryption from standard lattices
F Luo, S Al-Kuwari, F Wang, K Chen
Theoretical Computer Science 865, 52-62, 2021
152021
LWR-based fully homomorphic encryption, revisited
F Luo, F Wang, K Wang, J Li, K Chen
Security and Communication Networks 2018, 2018
152018
P2SIM: Privacy-Preserving and Source-Reliable Incentive Mechanism for Mobile Crowdsensing
X Yan, WWY Ng, B Zeng, B Zhao, F Luo, Y Gao
IEEE Internet of Things Journal 9 (24), 25424-25437, 2022
142022
SVFL: Efficient secure aggregation and verification for cross-silo federated learning
F Luo, S Al-Kuwari, Y Ding
IEEE Transactions on Mobile Computing, 2022
132022
Attribute-based proxy re-signature from standard lattices and its applications
F Luo, S Al-Kuwari, W Susilo, DH Duong
Computer Standards & Interfaces 75, 103499, 2021
122021
Verifiable decryption for fully homomorphic encryption
F Luo, K Wang
International Conference on Information Security, 347-365, 2018
102018
Revocable attribute-based encryption from standard lattices
F Luo, S Al-Kuwari, H Wang, F Wang, K Chen
Computer Standards & Interfaces 84, 103698, 2023
72023
Revocable attribute-based proxy re-encryption
F Luo, S Al-Kuwari
Journal of Mathematical Cryptology 15 (1), 465-482, 2021
62021
Leveled hierarchical identity-based fully homomorphic encryption from learning with rounding
F Luo, K Wang, C Lin
International Conference on Information Security Practice and Experience …, 2018
62018
Generic construction of black-box traceable attribute-based encryption
F Luo, S Al-Kuwari
IEEE Transactions on Cloud Computing 11 (1), 942-955, 2021
52021
Fully homomorphic encryption based on the ring learning with rounding problem
F Luo, F Wang, K Wang, K Chen
IET Information Security 13 (6), 639-648, 2019
52019
A provable data possession scheme with data hierarchy in cloud
C Lin, F Luo, H Wang, Y Zhu
Information Security and Cryptology: 11th International Conference, Inscrypt …, 2016
52016
Multi-key Fully Homomorphic Encryption without CRS from RLWE
F Luo, H Wang, AK Saif, W Han
Computer Standards & Interfaces 86, 103742, 2023
32023
Generic construction of trace-and-revoke inner product functional encryption
F Luo, S Al-Kuwari, H Wang, W Han
European Symposium on Research in Computer Security, 259-282, 2022
32022
Attribute-based signatures from lattices: Unbounded attributes and semi-adaptive security
F Luo, S Al-Kuwari
Designs, Codes and Cryptography 90 (5), 1157-1177, 2022
22022
Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities
F Luo, S Al-Kuwari, H Wang, X Yan
Theoretical Computer Science 987, 114368, 2024
12024
Public Trace-and-Revoke Proxy Re-encryption for Secure Data Sharing in Clouds
F Luo, H Wang, W Susilo, X Yan, X Zheng
IEEE Transactions on Information Forensics and Security, 2024
12024
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20