Medical data management on blockchain with privacy H Tian, J He, Y Ding Journal of medical systems 43, 1-6, 2019 | 112 | 2019 |
Blockchain-based searchable symmetric encryption scheme H Li, H Tian, F Zhang, J He Computers & Electrical Engineering 73, 32-45, 2019 | 99 | 2019 |
Identity-based chameleon hashing and signatures without key exposure X Chen, F Zhang, W Susilo, H Tian, J Li, K Kim Information Sciences 265, 198-210, 2014 | 72 | 2014 |
Efficient generic on-line/off-line (threshold) signatures without key exposure X Chen, F Zhang, H Tian, B Wei, W Susilo, Y Mu, H Lee, K Kim Information Sciences 178 (21), 4192-4203, 2008 | 65 | 2008 |
A searchable symmetric encryption scheme using blockchain H Li, F Zhang, J He, H Tian arXiv preprint arXiv:1711.01030, 2017 | 62 | 2017 |
Toward quantum-resistant strong designated verifier signature from isogenies X Sun, H Tian, Y Wang 2012 Fourth International Conference on Intelligent Networking and …, 2012 | 52 | 2012 |
Dynamic asymmetric group key agreement for ad hoc networks X Zhao, F Zhang, H Tian Ad Hoc Networks 9 (5), 928-939, 2011 | 50 | 2011 |
Secure bilinear pairing outsourcing made more efficient and flexible H Tian, F Zhang, K Ren Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 48 | 2015 |
Identity-based chameleon hash scheme without key exposure X Chen, F Zhang, W Susilo, H Tian, J Li, K Kim Information Security and Privacy: 15th Australasian Conference, ACISP 2010 …, 2010 | 46 | 2010 |
Incentive compatible and anti-compounding of wealth in proof-of-stake Y Wang, G Yang, A Bracciali, H Leung, H Tian, L Ke, X Yu Information Sciences 530, 85-94, 2020 | 42 | 2020 |
New receipt-free voting scheme using double-trapdoor commitment X Chen, Q Wu, F Zhang, H Tian, B Wei, B Lee, H Lee, K Kim Information Sciences 181 (8), 1493-1502, 2011 | 40 | 2011 |
Discrete logarithm based chameleon hashing and signatures without key exposure X Chen, F Zhang, H Tian, B Wei, K Kim Computers & Electrical Engineering 37 (4), 614-623, 2011 | 33 | 2011 |
Anonymous post-quantum cryptocash H Zhang, F Zhang, H Tian, MH Au International Conference on Financial Cryptography and Data Security, 461-479, 2018 | 31 | 2018 |
Method for managing network key and updating session key L Pang, J Cao, H Tian, Z Huang, B Zhang US Patent 8,306,229, 2012 | 29 | 2012 |
A privacy preserving fair contract signing protocol based on block chains H Tian, J He, L Fu Journal of Cryptologic Research 4 (2), 187-198, 2017 | 28 | 2017 |
A new strong multiple designated verifiers signature H Tian International Journal of Grid and Utility Computing 3 (1), 1-11, 2012 | 25 | 2012 |
Systems, methods and computer-accessible media for acquiring and authenticating public key certificate status H Tian, J Cao, L Pang, M Tie, Z Huang, B Zhang US Patent 8,195,935, 2012 | 24 | 2012 |
A lattice‐based partially blind signature H Tian, F Zhang, B Wei Security and Communication Networks 9 (12), 1820-1828, 2016 | 23 | 2016 |
Key management protocol of the IEEE 802.16 e H Tian, L Pang, Y Wang Wuhan University Journal of Natural Sciences 12 (1), 59-62, 2007 | 23 | 2007 |
Contract coin: Toward practical contract signing on blockchain H Tian, J He, L Fu Information Security Practice and Experience: 13th International Conference …, 2017 | 21 | 2017 |