Xinyi Huang(黄欣沂)
Fujian Normal University
H-index: 62
Asia-China
Top articles of Xinyi Huang(黄欣沂)
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Fault-tolerant identity-based encryption from SM9 | Science China Information Sciences | Xiaohong Liu Xinyi Huang Zhaohui Cheng Wei Wu | 2024/2 |
A Secure and Effective Hierarchical Identity-based Signature Scheme for ADS-B Systems | IEEE Transactions on Aerospace and Electronic Systems | Xin Chen Debiao He Cong Peng Min Luo Xinyi Huang | 2024/4/8 |
A Privacy-Preserving and Redactable Healthcare Blockchain System | IEEE Transactions on Services Computing | Shengmin Xu Jianting Ning Xiaoguo Li Jiaming Yuan Xinyi Huang | 2024/1/22 |
Provably secure multi-signature scheme based on the standard SM2 signature scheme | Computer Standards & Interfaces | Yuchen Xiao Lei Zhang Yafang Yang Wei Wu Jianting Ning | 2024/4/1 |
Subverting Cryptographic Protocols from A Fine-Grained Perspective-A Case Study on 2-Party ECDSA | Cryptology ePrint Archive | Jialiu Cheng Yi Wang Rongmao Chen Xinyi Huang | 2024 |
Lattice-based dynamic universal accumulator: Design and application | Computer Standards & Interfaces | Yong Zhao Shaojun Yang Xinyi Huang | 2024/4/1 |
Privacy Enhanced Authentication for Online Learning Healthcare Systems | IEEE Transactions on Services Computing | Jianghua Liu Jian Yang Xinyi Huang Lei Xu Yang Xiang | 2024/1/1 |
New tag-based signatures and their applications on linearly homomorphic signatures | Computer Standards & Interfaces | Chengjun Lin Rui Xue Xinyi Huang Shaojun Yang | 2024/3/1 |
Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud | Computer Standards & Interfaces | Zesen Hou Jianting Ning Xinyi Huang Shengmin Xu Leo Yu Zhang | 2024/8/1 |
Analysis and Construction of Zero-Knowledge Proofs for the MinRank Problem | The Computer Journal | Yongcheng Song Jiang Zhang Xinyi Huang Wei Wu Haixia Chen | 2024/3 |
Parameter-Hiding Order-Revealing Encryption Without Pairings | Cong Peng Rongmao Chen Yi Wang Debiao He Xinyi Huang | 2024/4/14 | |
Public Proofs of Data Replication and Retrievability with User-friendly Replication | IEEE Transactions on Dependable and Secure Computing | Jun Shen Xiaofeng Chen Xinyi Huang Yang Xiang | 2023/7/28 |
Robust and Secure Federated Learning Against Hybrid Attacks: A Generic Architecture | IEEE Transactions on Information Forensics and Security | Xiaohan Hao Chao Lin Wenhan Dong Xinyi Huang Hui Xiong | 2023/11/23 |
High-Performance Implementation of the Identity-Based Signature Scheme in IEEE P1363 on GPU | ACM Transactions on Embedded Computing Systems | Xinyi Hu Debiao He Min Luo Cong Peng Qi Feng | 2023/1/24 |
Ledgermaze: An efficient privacy-preserving non-interactive zero-knowledge scheme over account-model blockchain | IEEE Transactions on Computers | Zijian Bao Debiao He Wei Wei Cong Peng Xinyi Huang | 2023/8/18 |
Instant and Secure Channel Key Extraction Scheme Among Wireless Devices | Hong Zhao Enting Guo Chunhua Su Xinyi Huang | 2023/12/4 | |
Efficient blockchain-based electronic medical record sharing with anti-malicious propagation | IEEE Transactions on Services Computing | Chao Lin Xinyi Huang Debiao He | 2023/6/28 |
基于 SM9 的匿名广播加密方案 | Journal of Cyber Security 信息安全学报 | 崔岩, 黄欣沂, 赖建昌, 何德彪, 程朝辉 | 2023/11 |
Secure Cloud-Assisted Data Pub/Sub Service with Fine-grained Bilateral Access Control | IEEE Transactions on Information Forensics and Security | Kai Zhang Xiwen Wang Jianting Ning Junqing Gong Xinyi Huang | 2023/8/17 |
Sapfs: An efficient symmetric-key authentication key agreement scheme with perfect forward secrecy for industrial internet of things | IEEE Internet of Things Journal | Yunru Zhang Debiao He Pandi Vijayakumar Min Luo Xinyi Huang | 2023/1/4 |