Search filters

List of works by Debiao He

A Blockchain-Based Proxy Re-Encryption With Equality Test for Vehicular Communication Systems

scientific article published in 2021

A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks

scientific article published in 2020

A Blockchain-Based Self-Tallying Voting Protocol With Maximum Voter Privacy

scientific article published in 2022

A Lightweight Authenticated Searchable Encryption without Bilinear Pairing for Cloud Computing

scientific article published in 2022

A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing

scientific article published in 2022

A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems

A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing

scientific article published in 2020

A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network

article

A Survey on Redactable Blockchain: Challenges and Opportunities

scientific article published in 2023

A new handover authentication protocol based on bilinear pairing functions for wireless networks

A new two-round certificateless authenticated key agreement protocol without bilinear pairings

A novel covert channel detection method in cloud based on XSRM and improved event association algorithm

article published in 2016

A pairing-free certificateless authenticated key agreement protocol

A privacy preserving three-factor authentication protocol for e-Health clouds

article

A secure and efficient identity-based mutual authentication scheme with smart card using elliptic curve cryptography

scholarly article by Min Luo et al published 23 May 2017 in International Journal of Communication Systems

A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography

article

A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks

A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem

article by Han Shen et al published 21 January 2016 in The Journal of Supercomputing

Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing

scientific article published in 2020

An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography

article

An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

An Efficient Identity-Based Encryption with Equality Test in Cloud Computing

scientific article published in 2023

An Efficient Privacy-Preserving Aggregation Scheme for Multidimensional Data in IoT

scientific article published in 2022

An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography

scholarly article by Baojun Huang et al published 24 May 2015 in Wireless Personal Communications

An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System

An Id-Based Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments

scholarly article by Debiao He et al published 16 February 2013 in Arabian Journal for Science and Engineering

An efficient and provably-secure certificateless signature scheme without bilinear pairings

An efficient and secure 3-factor user-authentication protocol for multiserver environment

An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage

An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud

scientific article published in 2021

An efficient certificateless proxy signature scheme without pairing

article published in 2013

An efficient chaos-based 2-party key agreement protocol with provable security

article by Min Luo et al published 6 February 2017 in International Journal of Communication Systems

An efficient identity-based blind signature scheme without bilinear pairings

An efficient remote user authentication and key agreement protocol for mobile client–server environment from pairings

Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment

article published in 2015

Authenticated key agreement scheme for fog-driven IoT healthcare system

article

BCGS: Blockchain-assisted privacy-preserving cross-domain authentication for VANETs

scientific article published in 2023

BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records

scientific article published in 2023

Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing

scientific article published in 2019

Blockchain-Based Privacy-Preserving and Rewarding Private Data Sharing for IoT

scientific article published in 2022

CL-ME: Efficient Certificateless Matchmaking Encryption for Internet of Things

scientific article published in 2021

Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems

Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things

Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things

Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things

scientific article published in 2019

Compact Hardware Implementation of a SHA-3 Core for Wireless Body Sensor Networks

Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards

Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks

article published in 2013

Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol

Cryptanalysis of a certificateless aggregate signature scheme with efficient verification

Cryptanalysis of an Authenticated Key Agreement Protocol for Wireless Mobile Communications

article published in 2012

Dual-Server Public-Key Authenticated Encryption with Keyword Search

scientific article published in 2022

ESDR: an efficient and secure data repairing paradigm in cloud storage

Efficient Distributed Decryption Scheme for IoT Gateway-based Applications

scientific article published on 05 January 2021

Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System

Efficient Identity-Based Encryption Scheme with Equality Test in Smart City

Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems

scientific article published on 18 March 2020

Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services

scholarly article by Debiao He et al published June 2018 in IEEE Systems Journal

Efficient Revocable ID-Based Signature With Cloud Revocation Server

Efficient and Anonymous Cross-Domain Authentication for IIoT Based on Blockchain

scientific article published in 2023

Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures

scholarly article by Debiao He et al published September 2016 in IEEE Transactions on Information Forensics and Security

Efficient and Secure Ciphertext-Policy Attribute-Based Encryption Without Pairing for Cloud-Assisted Smart Grid

scientific article published in 2020

Efficient provably secure password-based explicit authenticated key agreement

article

Efficient revocable ID-based encryption with cloud revocation server

Faster Implementation of Ideal Lattice-Based Cryptography Using AVX512

scientific article published on 14 July 2023

High-Performance Implementation of the Identity-Based Signature Scheme in IEEE P1363 on GPU

scientific article published on 27 September 2022

High-throughput block cipher implementations with SIMD

scientific article published in 2022

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession

Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model

article

Insecurity of an efficient certificateless aggregate signature with constant pairing computations

Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage

IsoqurPEKS: An Isogeny-Based Quantum-Resistant Public-Key Encryption Scheme with Keyword Search

scientific article published in 2022

Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography

scholarly article by Debiao He et al published 2017 in Wireless Communications and Mobile Computing

Lightweight Encryption and Authentication for Controller Area Network of Autonomous Vehicles

scientific article published in 2023

Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data

scientific article published in 2021

Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography

scholarly article by Debiao He et al published 20 September 2016 in IET Communications

Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks

article

New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment

article

New biometrics-based authentication scheme for multi-server environment in critical systems

New certificateless short signature scheme

New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems

Note on ‘Design of improved password authentication and update scheme based on elliptic curve cryptography’

scholarly article by Debiao He et al published February 2012 in Mathematical and Computer Modelling

On Diophantine equation 3a 2 x 4 − By 2 = 1

On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices

One-to-many authentication for access control in mobile pay-TV systems

PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds

Privacy-preserving auditing scheme for shared data in public clouds

Privacy-preserving data aggregation scheme against internal attackers in smart grids

Provable Data Possession with Outsourced Data Transfer

scientific article published in 2021

Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography

scholarly article by Yuanyuan Zhang et al published 2015 in Mathematical Problems in Engineering

Proxy Provable Data Possession with General Access Structure in Public Clouds

Reattack of a certificateless aggregate signature scheme with constant pairing computations.

scientific article published on 13 March 2014

Robust Biometrics-Based Authentication Scheme for Multiserver Environment

Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks

article

Secure Key Agreement and Key Protection for Mobile Device User Authentication

Security Analysis of Two Password-Authenticated Multi-Key Exchange Protocols

Security Flaws in a Smart Card Based Authentication Scheme for Multi-server Environment

Security analysis of a user registration approach

Signature-based three-factor authenticated key exchange for internet of things applications

Synchronized Provable Data Possession Based on Blockchain for Digital Twin

scientific article published on 19 January 2022

Two-step single slope/SAR ADC with error correction for CMOS image sensor.

scientific article published on 22 January 2014

User-Friendly Public-Key Authenticated Encryption With Keyword Search for Industrial Internet of Things

scientific article published in 2023

VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud