6. On the Security of A Certificateless Signcryption with Known Session-specific Temporary Information Security in the Standard Model,The Computer Journal,2019,,
7. Cryptanalysis of A Compact Anonymous HIBE with Constant Size Private Key,The Computer Journal,2019,,
8. On the Security of Secure Server-Designation Public Key Encryption with Keyword Search,The Computer Journal,2018,,
9. Certificateless public key encryption with equality test,Information Sciences,2018,,
10. Generic construction of public key encryption, identity-based encryption and signcryption with equality test,Information Sciences,2018,,
11. Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme,The Computer Journal,2018,,
12. An Efficient RSA-based Certificateless Public Key Encryption Scheme,Discrete Applied Mathematics,2017,,
13. Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme,The Computer Journal,2016,,
14. Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications,Computers & Security,2015,,
15. Comment on “Identity-based non-interactive key distribution with forward security”,Designs, Codes and Cryptography,2015,,
16. Many-to-one Encryption and Authentication Scheme and Its Application,Journal of Commun.and Networks,2008,,
17. Analysis of An Authenticated Identity-Based Multicast Scheme,IET Communication,2008,,
课程
1. 现代密码学(本科),限选/基础,2.5,48
2. 操作系统(本科),基础,3,64
3. 现代密码学(研究生),,,48
教材或专著
专利
成果转化与社会服务
Research Fields
Achievement
1. ,国家重点研发计划,2020.09 ~ 2023.05,负责人
Social Appointments
Teaching Experience
1. Cryptanalysis of An Anonymous and Traceable Group Data Sharing in Cloud Computing,IEEE Transactions on Information Forensics & Security,2021,,
2. dentity-Based Encryption with Equality Test and Datestamp-Based Authorization Mechanism,Theoretical Computer Science,2021,,
3. Public key encryption supporting equality test and flexible authorization without bilinear pairings,Computer Communications,2021,,
4. Security Analysis of the First Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks,The Computer Journal,2020,,
6. On the Security of A Certificateless Signcryption with Known Session-specific Temporary Information Security in the Standard Model,The Computer Journal,2019,,
7. Cryptanalysis of A Compact Anonymous HIBE with Constant Size Private Key,The Computer Journal,2019,,
8. On the Security of Secure Server-Designation Public Key Encryption with Keyword Search,The Computer Journal,2018,,
9. Certificateless public key encryption with equality test,Information Sciences,2018,,
10. Generic construction of public key encryption, identity-based encryption and signcryption with equality test,Information Sciences,2018,,
11. Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme,The Computer Journal,2018,,
12. An Efficient RSA-based Certificateless Public Key Encryption Scheme,Discrete Applied Mathematics,2017,,
13. Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme,The Computer Journal,2016,,
14. Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications,Computers & Security,2015,,
15. Comment on “Identity-based non-interactive key distribution with forward security”,Designs, Codes and Cryptography,2015,,
16. Many-to-one Encryption and Authentication Scheme and Its Application,Journal of Commun.and Networks,2008,,
17. Analysis of An Authenticated Identity-Based Multicast Scheme,IET Communication,2008,,