An efficient authentication scheme for blockchain-based electronic health records F Tang, S Ma, Y Xiang, C Lin IEEE access 7, 41678-41689, 2019 | 168 | 2019 |
An unlinkable authentication scheme for distributed IoT application Y Zhou, T Liu, F Tang, M Tinashe IEEE Access 7, 14757-14766, 2019 | 36 | 2019 |
Attribute-based signatures for circuits from multilinear maps F Tang, H Li, B Liang International Conference on Information Security, 54-71, 2014 | 29 | 2014 |
Multiauthority traceable ring signature scheme for smart grid based on blockchain F Tang, J Pang, K Cheng, Q Gong Wireless Communications and Mobile Computing 2021 (1), 5566430, 2021 | 28 | 2021 |
Privacy-preserving authentication scheme based on zero trust architecture F Tang, C Ma, K Cheng Digital Communications and Networks 10 (5), 1211-1220, 2024 | 19 | 2024 |
A New User Revocable Ciphertext‐Policy Attribute‐Based Encryption with Ciphertext Update Z Liu, F Wang, K Chen, F Tang Security and Communication Networks 2020 (1), 8856592, 2020 | 17 | 2020 |
Efficient leakage-resilient signature schemes in the generic bilinear group model F Tang, H Li, Q Niu, B Liang International Conference on Information Security Practice and Experience …, 2014 | 15 | 2014 |
TP-PBFT: A Scalable PBFT Based On Threshold Proxy Signature for IoT-Blockchain Applications F Tang, T Xu, J Peng, N Gan IEEE Internet of Things Journal, 2023 | 13 | 2023 |
Solving small exponential ECDLP in EC-based additively homomorphic encryption and applications F Tang, G Ling, C Cai, J Shan, X Liu, P Tang, W Qiu IEEE Transactions on Information Forensics and Security 18, 3517-3530, 2023 | 13 | 2023 |
A privacy-preserving authentication and key agreement scheme with deniability for IoT Y Zhou, T Liu, F Tang, F Wang, M Tinashe Electronics 8 (4), 450, 2019 | 13 | 2019 |
Multi-hop unidirectional proxy re-encryption from multilinear maps F Tang, H Li, J Chang IEICE Transactions on Fundamentals of Electronics, Communications and …, 2015 | 13 | 2015 |
IHVFL: a privacy-enhanced intention-hiding vertical federated learning framework for medical data F Tang, S Liang, G Ling, J Shan Cybersecurity 6 (1), 37, 2023 | 11 | 2023 |
Multi‐Party Verifiable Privacy‐Preserving Federated k‐Means Clustering in Outsourced Environment R Hou, F Tang, S Liang, G Ling Security and Communication Networks 2021 (1), 3630312, 2021 | 10 | 2021 |
Privacy-preserving aggregate signcryption for vehicular ad hoc networks Z Hong, F Tang, W Luo Proceedings of the 2nd International Conference on Cryptography, Security …, 2018 | 10 | 2018 |
Privacy‐Preserving Scheme in the Blockchain Based on Group Signature with Multiple Managers F Tang, Z Feng, Q Gong, Y Huang, D Huang Security and Communication Networks 2021 (1), 7094910, 2021 | 9 | 2021 |
Universal designated verifier signcryption F Tang, C Lin, P Ke Network and System Security: 6th International Conference, NSS 2012 …, 2012 | 7 | 2012 |
Identity-based strong designated verifier signature scheme with full non-delegatability F Tang, C Lin, Y Li, S Zhang 2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011 | 6 | 2011 |
基于国密 SM2 和 SM9 的加法同态加密方案 唐飞, 凌国玮, 单进勇 密码学报 9 (3), 535-549, 2022 | 4 | 2022 |
基于区块链与国密 SM9 的抗恶意 KGC 无证书签名方案 唐飞, 甘宁, 阳祥贵, 王金洋 网络与信息安全学报 8 (6), 9-19, 2022 | 4 | 2022 |
Cellular automata based secure distributed storage scheme with integrity proof Y Zhou, F Wang, F Tang, X Wang Computers & Electrical Engineering 59, 291-304, 2017 | 4 | 2017 |