A social-network-based cryptocurrency wallet-management scheme S He, Q Wu, X Luo, Z Liang, D Li, H Feng, H Zheng, Y Li IEEE Access 6, 7654-7663, 2018 | 50 | 2018 |
Making MA-ABE fully accountable: A blockchain-based approach for secure digital right management Y Hei, J Liu, H Feng, D Li, Y Liu, Q Wu Computer Networks 191, 108029, 2021 | 33 | 2021 |
A decentralized and secure blockchain platform for open fair data trading YN Li, X Feng, J Xie, H Feng, Z Guan, Q Wu Concurrency and Computation: Practice and Experience 32 (7), e5578, 2020 | 30 | 2020 |
A medical information service platform based on distributed cloud and blockchain Y Du, J Liu, Z Guan, H Feng 2018 IEEE International Conference on Smart Cloud (SmartCloud), 34-39, 2018 | 30 | 2018 |
OpBoost: A vertical federated tree boosting framework based on order-preserving desensitization X Li, Y Hu, W Liu, H Feng, L Peng, Y Hong, K Ren, Z Qin arXiv preprint arXiv:2210.01318, 2022 | 20 | 2022 |
Traceable ring signatures with post-quantum security H Feng, J Liu, Q Wu, YN Li Topics in Cryptology–CT-RSA 2020: The Cryptographers’ Track at the RSA …, 2020 | 19 | 2020 |
Traceable ring signatures: general framework and post-quantum security H Feng, J Liu, D Li, YN Li, Q Wu Designs, Codes and Cryptography 89, 1111-1145, 2021 | 18 | 2021 |
Scape: Scalable collaborative analytics system on private database with malicious security F Han, L Zhang, H Feng, W Liu, X Li 2022 IEEE 38th International Conference on Data Engineering (ICDE), 1740-1753, 2022 | 15 | 2022 |
Privacy enhancement via dummy points in the shuffle model X Li, W Liu, H Feng, K Huang, Y Hu, J Liu, K Ren, Z Qin IEEE Transactions on Dependable and Secure Computing, 2023 | 6 | 2023 |
Secure stern signatures in quantum random oracle model H Feng, J Liu, Q Wu International Conference on Information Security, 425-444, 2019 | 6 | 2019 |
Computational robust (Fuzzy) extractors for CRS-dependent sources with minimal min-entropy H Feng, Q Tang Theory of Cryptography Conference, 689-717, 2021 | 4 | 2021 |
Witness authenticating NIZKs and applications H Feng, Q Tang Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021 | 3 | 2021 |
Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable Ciphertext H Feng, J Liu, Q Wu, W Liu International Conference on Information Security and Cryptology, 278-298, 2017 | 2 | 2017 |
Breaking the Cubic Barrier: Distributed Key and Randomness Generation through Deterministic Sharding. H Feng, Z Lu, Q Tang IACR Cryptol. ePrint Arch. 2024, 168, 2024 | 1 | 2024 |
Scalable and Adaptively Secure Any-Trust Distributed Key Generation and All-hands Checkpointing H Feng, T Mai, Q Tang arXiv preprint arXiv:2311.09592, 2023 | 1 | 2023 |
Two-layer Group Signature and Application to E-cash H Feng, J Liu, Q Wu, T Xu 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2019 | 1 | 2019 |
Traceable decentralized anonymous e-cash system against active attackers H Feng, J Liu, Q Wu, T Xu 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2019 | 1 | 2019 |
基于 LWE 的全同态身份基广播加密方案 冯翰文, 刘建伟, 伍前红 密码学报 5 (1), 21-34, 2018 | 1 | 2018 |
Dragon: Decentralization at the cost of Representation after Arbitrary Grouping and Its Applications to Sub-cubic DKG and Interactive Consistency H Feng, Z Lu, Q Tang Cryptology ePrint Archive, 2024 | | 2024 |
Making Hash-based MVBA Great Again H Feng, Z Lu, T Mai, Q Tang Cryptology ePrint Archive, 2024 | | 2024 |