default search action
Zhenhua Liu 0001
Person information
- affiliation: Xidian University, School of Mathematics and Statistics, Xi'an, China
Other persons with the same name
- Zhenhua Liu — disambiguation page
- Zhenhua Liu 0002 — Stony Brook University, Department of Applied Mathematics and Statistics, NY, USA (and 1 more)
- Zhenhua Liu 0003 — Peking University, Beijing, China
- Zhenhua Liu 0004 — South China Agricultural University, Guangzhou, China
- Zhenhua Liu 0005 — Stevens Institute of Technology, Hoboken, NJ, USA (and 1 more)
- Zhenhua Liu 0006 — NLP Group, Gridsum, Beijing, China
- Zhenhua Liu 0007 — Dongbei University of Finance and Economics, Dalian, China (and 1 more)
- Zhenhua Liu 0008 — Huawei Technologies Co., Ltd, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j29]Zhenhua Liu, Jingwan Gong, Yuanju Ma, Yaxin Niu, Baocang Wang:
Forward and backward secure updatable ElGamal encryption scheme for cloud storage. J. Syst. Archit. 141: 102926 (2023) - [j28]Zhenhua Liu, Yingying Ding, Ming Yuan, Baocang Wang:
Black-Box Accountable Authority CP-ABE Scheme for Cloud-Assisted E-Health System. IEEE Syst. J. 17(1): 756-767 (2023) - [j27]Zhenhua Liu, Yaxin Niu, Jingwan Gong, Yuanju Ma, Baocang Wang:
Perfect Data Protection, Storage, and Reputation Management Scheme for Ride-Sharing Services. IEEE Syst. J. 17(3): 3834-3845 (2023) - 2022
- [c16]Zhenhua Liu, Yuanju Ma, Yaxin Niu, Jingwan Gong, Baocang Wang:
Updatable Hybrid Encryption Scheme with No-Directional Key Update for Cloud Storage. CSS 2022: 71-85 - [c15]Xiangsong Zhang, Ming Yuan, Zhenhua Liu:
Efficient and Automatic Pseudonym Management Scheme for VANET with Blockchain. FCS 2022: 211-225 - [c14]Zhenhua Liu, Jingwan Gong, Yuanju Ma, Yaxin Niu, Baocang Wang:
Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage. FCS 2022: 324-345 - 2021
- [j26]Zhenhua Liu, Jiaqi Ji, Fangfang Yin, Baocang Wang:
Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption. KSII Trans. Internet Inf. Syst. 15(1): 323-342 (2021) - [j25]Zhenhua Liu, Ming Yuan, Yingying Ding, Baocang Wang:
Efficient Small-Batch Verification and Identification Scheme With Invalid Signatures in VANETs. IEEE Trans. Veh. Technol. 70(12): 12836-12846 (2021) - 2020
- [j24]Zhenhua Liu, Changbo Guo, Baocang Wang:
A Physically Secure, Lightweight Three-Factor and Anonymous User Authentication Protocol for IoT. IEEE Access 8: 195914-195928 (2020) - [j23]Xiangsong Zhang, Zhenhua Liu, Xu An Wang, Fenghe Wang:
Constant-size ring signature scheme using multilinear maps. Int. J. Embed. Syst. 12(2): 206-215 (2020) - [j22]Qianlong Dang, Hua Ma, Zhenhua Liu, Ying Xie:
Secure and Efficient Client-Side Data Deduplication with Public Auditing in Cloud Storage. Int. J. Netw. Secur. 22(3): 460-473 (2020) - [j21]Zhenhua Liu, Yan Liu, Jing Xu, Baocang Wang:
Verifiable Attribute-based Keyword Search Encryption with Attribute Revocation for Electronic Health Record System. Int. J. Netw. Secur. 22(5): 845-856 (2020) - [j20]Guohua Tian, Hua Ma, Ying Xie, Zhenhua Liu:
Randomized deduplication with ownership management and data sharing in cloud storage. J. Inf. Secur. Appl. 51: 102432 (2020)
2010 – 2019
- 2019
- [j19]Zhenhua Liu, Jing Xu, Yan Liu, Baocang Wang:
Updatable Ciphertext-Policy Attribute-Based Encryption Scheme With Traceability and Revocability. IEEE Access 7: 66832-66844 (2019) - [j18]Hua Ma, Ying Xie, Jianfeng Wang, Guohua Tian, Zhenhua Liu:
Revocable Attribute-Based Encryption Scheme With Efficient Deduplication for Ehealth Systems. IEEE Access 7: 89205-89217 (2019) - [j17]Zhenhua Liu, Shuhong Duan, Peilin Zhou, Baocang Wang:
Traceable-then-revocable ciphertext-policy attribute-based encryption scheme. Future Gener. Comput. Syst. 93: 903-913 (2019) - [j16]Enting Dong, Jianfeng Wang, Zhenhua Liu, Hua Ma:
Large universe multi-authority attribute-based PHR sharing with user revocation. Int. J. Comput. Sci. Eng. 19(3): 376-386 (2019) - [j15]Hua Ma, Linchao Zhang, Zhenhua Liu, Enting Dong:
Secure deduplication of encrypted data in online and offline environments. Int. J. High Perform. Comput. Netw. 14(3): 294-303 (2019) - [j14]Zhenhua Liu, Yaqing Fan:
Provably Secure Searchable Attribute-Based Authenticated Encryption Scheme. Int. J. Netw. Secur. 21(2): 177-190 (2019) - [j13]Zhenhua Liu, Yuanyuan Li, Dong Yuan, Yaohui Liu:
Effective Privacy Preservation and Fast Signature Verification in Bitcoin Transaction. Int. J. Netw. Secur. 21(5): 741-750 (2019) - [c13]Zhenhua Liu, Yan Liu, Jing Xu, Baocang Wang:
Privacy-Preserving Attribute-Based Multi-keyword Search Encryption Scheme with User Tracing. CSS (2) 2019: 382-397 - 2018
- [j12]Zhenhua Liu, Yaohui Liu, Yaqing Fan:
Searchable Attribute-Based Signcryption Scheme for Electronic Personal Health Record. IEEE Access 6: 76381-76394 (2018) - [c12]Zhenhua Liu, Yaohui Liu:
Verifiable and Authenticated Searchable Encryption Scheme with Aggregate Key in Cloud Storage. CIS 2018: 421-425 - [c11]Hua Ma, Guohua Tian, Zhenhua Liu, Linchao Zhang:
Secure Data Deduplication with Ownership Management and Sharing in Cloud Storage. FCS 2018: 168-176 - [c10]Zhenhua Liu, Yuanyuan Li, Yaohui Liu, Dong Yuan:
Sharing Economy Protocol with Privacy Preservation and Fairness Based on Blockchain. ICCCS (6) 2018: 59-69 - 2017
- [j11]Cuicui Bai, Yinghui Zhang, Hua Ma, Zhenhua Liu:
Expressive ciphertext-policy attribute-based encryption with direct user revocation. Int. J. Embed. Syst. 9(6): 495-504 (2017) - [j10]Hua Ma, Ting Peng, Zhenhua Liu:
Directly Revocable and Verifiable Key-Policy Attribute-based Encryption for Large Universe. Int. J. Netw. Secur. 19(2): 272-284 (2017) - [j9]Xiangsong Zhang, Zhenhua Liu:
Lattice-based strongly-unforgeable forward-secure identity-based signature scheme with flexible key update. KSII Trans. Internet Inf. Syst. 11(5): 2792-2810 (2017) - [c9]Hua Ma, Enting Dong, Zhenhua Liu, Linchao Zhang:
Privacy-Preserving Multi-authority Ciphertext-Policy Attribute-Based Encryption with Revocation. BWCCA 2017: 811-820 - [c8]Yaqing Fan, Zhenhua Liu:
Verifiable Attribute-Based Multi-keyword Search over Encrypted Cloud Data in Multi-owner Setting. DSC 2017: 441-449 - 2016
- [j8]Zhenhua Liu, Xiangsong Zhang, Yupu Hu, Tsuyoshi Takagi:
Revocable and strongly unforgeable identity-based signature scheme in the standard model. Secur. Commun. Networks 9(14): 2422-2433 (2016) - [j7]Fenghe Wang, Zhenhua Liu:
Short and provable secure lattice-based signature scheme in the standard model. Secur. Commun. Networks 9(16): 3627-3632 (2016) - [c7]Peilin Zhou, Zhenhua Liu, Shuhong Duan:
Flexible Attribute-Based Keyword Search via Two Access Policies. BWCCA 2016: 815-822 - [c6]Xuewei Yan, Hua Ma, Zhenhua Liu, Ting Peng:
Large Universe Revocable Fine-Grained Encryption with Public Auditing. BWCCA 2016: 823-830 - [c5]Shuhong Duan, Zhenhua Liu, Peilin Zhou:
A privacy-preserving personal health record with searchability and revocability using attribute-based encryption. BWCCA 2016: 831-838 - [c4]Linchao Zhang, Hua Ma, Zhenhua Liu, Enting Dong:
Security Analysis and Improvement of A Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme. BWCCA 2016: 839-846 - 2015
- [j6]Xiangsong Zhang, Zhenhua Liu, Yupu Hu, Tsuyoshi Takagi:
Revocable Identity-based Signcryption Scheme Without Random Oracles. Int. J. Netw. Secur. 17(2): 110-122 (2015) - [c3]Xiangsong Zhang, Zhenhua Liu, Xu An Wang:
Ring Signature Scheme from Multilinear Maps in the Standard Model. 3PGCIC 2015: 859-864 - 2013
- [j5]Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Fagen Li:
Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model. Secur. Commun. Networks 6(1): 69-77 (2013) - [c2]Zhenhua Liu, Xiangsong Zhang, Tsuyoshi Takagi:
Post-quantum Strongly Unforgeable Identity-Based Signature Scheme from Lattices without Random Oracles. INCoS 2013: 578-585 - 2012
- [j4]Xiangsong Zhang, Zhenhua Liu, Sanyang Liu:
A trust region SQP-filter method for nonlinear second-order cone programming. Comput. Math. Appl. 63(12): 1569-1576 (2012) - 2011
- [j3]Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Hua Ma:
Provably secure multi-proxy signature scheme with revocation in the standard model. Comput. Commun. 34(3): 494-501 (2011) - 2010
- [j2]Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Hua Ma:
Certificateless signcryption scheme in the standard model. Inf. Sci. 180(3): 452-464 (2010) - [j1]Xiangsong Zhang, Sanyang Liu, Zhenhua Liu:
A non-interior-point smoothing method for variational inequality problem. J. Comput. Appl. Math. 234(3): 713-721 (2010)
2000 – 2009
- 2008
- [c1]Zhenhua Liu, Yupu Hu, Hua Ma:
Secure Proxy Multi-signature Scheme in the Standard Model. ProvSec 2008: 127-140
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint