Follow
Baodong Qin (秦宝东)
Baodong Qin (秦宝东)
Xi'an University of Posts and Telecommunications
No verified email - Homepage
Title
Cited by
Cited by
Year
Privacy-preserving patient-centric clinical decision support system on naive Bayesian classification
X Liu, R Lu, J Ma, L Chen, B Qin
IEEE journal of biomedical and health informatics 20 (2), 655-668, 2015
2622015
Attribute-based encryption with efficient verifiable outsourced decryption
B Qin, RH Deng, S Liu, S Ma
IEEE Transactions on Information Forensics and Security 10 (7), 1384-1393, 2015
2242015
Server-aided revocable attribute-based encryption
H Cui, RH Deng, Y Li, B Qin
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
1172016
Public-key authenticated encryption with keyword search revisited: Security model and constructions
B Qin, Y Chen, Q Huang, X Liu, D Zheng
Information Sciences 516, 515-528, 2020
1082020
Leakage-resilient chosen-ciphertext secure public-key encryption from hash proof system and one-time lossy filter
B Qin, S Liu
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
692013
Privacy-preserving outsourced calculation on floating point numbers
X Liu, RH Deng, W Ding, R Lu, B Qin
IEEE Transactions on Information Forensics and Security 11 (11), 2513-2527, 2016
682016
Server-aided revocable identity-based encryption
B Qin, RH Deng, Y Li, S Liu
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
622015
An efficient privacy-preserving outsourced computation over public data
X Liu, B Qin, RH Deng, Y Li
IEEE Transactions on Services Computing 10 (5), 756-770, 2015
552015
Leakage-flexible CCA-secure public-key encryption: simple construction and free of pairing
B Qin, S Liu
Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014
362014
Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited
Z Huang, S Liu, B Qin
International Workshop on Public Key Cryptography, 369-385, 2013
362013
(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance
B Qin, Q Zhao, D Zheng, H Cui
Information Sciences 490, 74-92, 2019
352019
Efficient chosen‐ciphertext secure public‐key encryption scheme with high leakage‐resilience
B Qin, S Liu, K Chen
IET Information Security 9 (1), 32-42, 2015
332015
Improved security model for public-key authenticated encryption with keyword search
B Qin, H Cui, X Zheng, D Zheng
Provable and Practical Security: 15th International Conference, ProvSec 2021 …, 2021
322021
Key regeneration-free ciphertext-policy attribute-based encryption and its application
H Cui, RH Deng, B Qin, J Weng
Information Sciences 517, 217-229, 2020
302020
A privacy-preserving outsourced functional computation framework across large-scale multiple encrypted domains
X Liu, B Qin, RH Deng, R Lu, J Ma
IEEE Transactions on Computers 65 (12), 3567-3579, 2016
302016
Server-aided revocable attribute-based encryption resilient to decryption key exposure
B Qin, Q Zhao, D Zheng, H Cui
Cryptology and Network Security: 16th International Conference, CANS 2017 …, 2018
282018
Continuous non-malleable key derivation and its application to related-key security
B Qin, S Liu, TH Yuen, RH Deng, K Chen
IACR International Workshop on Public Key Cryptography, 557-578, 2015
282015
Cloud-assisted attribute-based data sharing with efficient user revocation in the internet of things
D Zheng, B Qin, Y Li, A Tian
IEEE Wireless Communications 27 (3), 18-23, 2020
262020
An efficient searchable public-key authenticated encryption for cloud-assisted medical internet of things
T Chi, B Qin, D Zheng
Wireless Communications and Mobile Computing 2020, 1-11, 2020
252020
Escrow free attribute-based signature with self-revealability
H Cui, G Wang, RH Deng, B Qin
Information Sciences 367, 660-672, 2016
202016
The system can't perform the operation now. Try again later.
Articles 1–20