Secure and efficient two-party signing protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography D He, Y Zhang, D Wang, KKR Choo IEEE transactions on dependable and secure computing 17 (5), 1124-1132, 2018 | 66 | 2018 |
Privacy-preserving federated learning in medical diagnosis with homomorphic re-encryption H Ku, W Susilo, Y Zhang, W Liu, M Zhang Computer Standards & Interfaces 80, 103583, 2022 | 59 | 2022 |
Obfuscating EVES algorithm and its application in fair electronic transactions in public clouds M Zhang, Y Zhang, Y Jiang, J Shen IEEE Systems Journal 13 (2), 1478-1486, 2019 | 42 | 2019 |
Efficient identity-based distributed decryption scheme for electronic personal health record sharing system Y Zhang, D He, MS Obaidat, P Vijayakumar, KF Hsiao IEEE Journal on Selected Areas in Communications 39 (2), 384-395, 2020 | 36 | 2020 |
A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm Y Zhang, D He, M Zhang, KKR Choo Frontiers of Computer Science 14, 1-14, 2020 | 30 | 2020 |
White-box implementation of the identity-based signature scheme in the IEEE P1363 standard for public key cryptography Y Zhang, D He, X Huang, D Wang, KKR Choo, J Wang IEICE TRANSACTIONS on Information and Systems 103 (2), 188-195, 2020 | 28 | 2020 |
Attribute-based hash proof system under learning-with-errors assumption in obfuscator-free and leakage-resilient environments M Zhang, Y Zhang, Y Su, Q Huang, Y Mu IEEE Systems Journal 11 (2), 1018-1026, 2015 | 22 | 2015 |
Efficient and provably secure distributed signing protocol for mobile devices in wireless networks Y Zhang, D He, S Zeadally, D Wang, KKR Choo IEEE Internet of Things Journal 5 (6), 5271-5280, 2018 | 14 | 2018 |
An efficient identity-based homomorphic signature scheme for network coding Y Zhang, Y Jiang, B Li, M Zhang Advances in Internetworking, Data & Web Technologies: The 5th International …, 2018 | 14 | 2018 |
Balancing privacy and flexibility of cloud-based personal health records sharing system Y Zhang, F Guo, W Susilo, G Yang IEEE Transactions on Cloud Computing 11 (3), 2420-2430, 2022 | 10 | 2022 |
Efficient obfuscation for encrypted identity-based signatures in wireless body area networks Y Zhang, D He, Y Li, M Zhang, KKR Choo IEEE Systems Journal 14 (4), 5320-5328, 2020 | 10 | 2020 |
Privacy-preserving outsourcing schemes of modular exponentiations using single untrusted cloud server L Zhao, M Zhang, H Shen, Y Zhang, J Shen KSII Transactions on Internet and Information Systems (TIIS) 11 (2), 826-845, 2017 | 9 | 2017 |
An efficient blind signature scheme based on SM2 signature algorithm Y Zhang, D He, F Zhang, X Huang, D Li Information Security and Cryptology: 16th International Conference, Inscrypt …, 2021 | 8 | 2021 |
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing S Chen, W Susilo, Y Zhang, B Yang, M Zhang Computer Standards & Interfaces 85, 103707, 2023 | 7 | 2023 |
Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security. M Zhang, Y Zhang, H Shen, C Tang, L Harn Journal of Information Science & Engineering 33 (4), 2017 | | 2017 |