Attribute based proxy re-encryption with delegating capabilities X Liang, Z Cao, H Lin, J Shao Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 363 | 2009 |
Proxy re-encryption with keyword search J Shao, Z Cao, X Liang, H Lin Information Sciences 180 (13), 2576-2587, 2010 | 227 | 2010 |
FairTest: Discovering unwarranted associations in data-driven applications F Tramer, V Atlidakis, R Geambasu, D Hsu, JP Hubaux, M Humbert, ... 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 401-416, 2017 | 206 | 2017 |
Secure threshold multi authority attribute based encryption without a central authority H Lin, Z Cao, X Liang, J Shao International Conference on Cryptology in India, 426-436, 2008 | 206 | 2008 |
Provably secure and efficient bounded ciphertext policy attribute based encryption X Liang, Z Cao, H Lin, D Xing Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 191 | 2009 |
Secure threshold multi authority attribute based encryption without a central authority H Lin, Z Cao, X Liang, J Shao Information Sciences 180 (13), 2618-2632, 2010 | 172 | 2010 |
CAM: cloud-assisted privacy preserving mobile health monitoring H Lin, J Shao, C Zhang, Y Fang IEEE Transactions on Information Forensics and Security 8 (6), 985-997, 2013 | 156 | 2013 |
Sealed-glass proofs: Using transparent enclaves to prove and sell knowledge F Tramer, F Zhang, H Lin, JP Hubaux, A Juels, E Shi 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 19-34, 2017 | 128 | 2017 |
Towards practical lattice-based one-time linkable ring signatures C Baum, H Lin, S Oechsner International Conference on Information and Communications Security, 303-322, 2018 | 84 | 2018 |
Short group signature without random oracles X Liang, Z Cao, J Shao, H Lin International Conference on Information and Communications Security, 69-82, 2007 | 72 | 2007 |
Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments G Couteau, M Klooß, H Lin, M Reichle Annual International Conference on the Theory and Applications of …, 2021 | 45 | 2021 |
A privacy-preserving solution for compressed storage and selective retrieval of genomic data Z Huang, E Ayday, H Lin, RS Aiyar, A Molyneaux, Z Xu, J Fellay, ... Genome Research 26 (12), 1687-1696, 2016 | 41 | 2016 |
Discovering unwarranted associations in data-driven applications with the fairtest testing toolkit F Tramèr, V Atlidakis, R Geambasu, DJ Hsu, JP Hubaux, M Humbert, ... CoRR, abs/1510.02377, 2015 | 33 | 2015 |
Privacy preserving friend search over online social networks H Lin, SSM Chow, D Xing, Y Fang, Z Cao Cryptology ePrint Archive, Report 2011/445, 2011 | 15 | 2011 |
Efficient trust based information sharing schemes over distributed collaborative networks H Lin, X Zhu, Y Fang, D Xing, C Zhang, Z Cao IEEE Journal on Selected Areas in Communications 31 (9), 279-290, 2013 | 14 | 2013 |
How to design space efficient revocable IBE from non-monotonic ABE H Lin, Z Cao, Y Fang, M Zhou, H Zhu Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 14 | 2011 |
SQC: secure quality control for meta-analysis of genome-wide association studies Z Huang, H Lin, J Fellay, Z Kutalik, JP Hubaux Bioinformatics 33 (15), 2273-2280, 2017 | 13 | 2017 |
Privacy-aware profiling and statistical data extraction for smart sustainable energy systems H Lin, Y Fang IEEE Transactions on Smart Grid 4 (1), 332-340, 2012 | 13 | 2012 |
How to construct interval encryption from binary tree encryption H Lin, Z Cao, X Liang, M Zhou, H Zhu, D Xing International Conference on Applied Cryptography and Network Security, 19-34, 2010 | 8 | 2010 |
Methods and apparatuses for key generation, encryption and decryption in broadcast encryption Z Cao, H Lin, X Dong, X Liang, D Xing US Patent 8,290,154, 2012 | 3 | 2012 |