default search action
Fuqun Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Guang Yang, Lidong Han, Jingguo Bi, Fuqun Wang:
A collusion-resistant certificateless provable data possession scheme for shared data with user revocation. Clust. Comput. 27(2): 2165-2179 (2024) - [j17]Jifa Hu, Fuqun Wang, Kefei Chen:
Faster matrix approximate homomorphic encryption. Comput. Stand. Interfaces 87: 103775 (2024) - [j16]Bin Lian, Jialin Cui, Hongyuan Chen, Xianghong Zhao, Fuqun Wang, Kefei Chen, Maode Ma:
Trusted Location Sharing on Enhanced Privacy-Protection IoT Without Trusted Center. IEEE Internet Things J. 11(7): 12331-12345 (2024) - [j15]Xu Yan, Bin Lian, Yunhao Yang, Xiaotie Wang, Jialin Cui, Xianghong Zhao, Fuqun Wang, Kefei Chen:
A Ciphertext Reduction Scheme for Garbling an S-Box in an AES Circuit with Minimal Online Time. Symmetry 16(6): 664 (2024) - 2023
- [j14]Xiaodan Jin, Fuqun Wang, Renjun Zhang, Bin Lian, Kefei Chen:
Leveled Fully Homomorphic Signcryption From Lattices. IEEE Access 11: 35232-35242 (2023) - [j13]Fucai Luo, Saif M. Al-Kuwari, Haiyan Wang, Fuqun Wang, Kefei Chen:
Revocable attribute-based encryption from standard lattices. Comput. Stand. Interfaces 84: 103698 (2023) - [j12]Junling Guo, Lidong Han, Guang Yang, Xiao Tan, Fuqun Wang:
Cryptanalysis of Two Public Key Encryption Schemes with Multi-keyword Search. Wirel. Pers. Commun. 130(3): 2231-2240 (2023) - 2022
- [j11]Fucai Luo, Saif M. Al-Kuwari, Changlu Lin, Fuqun Wang, Kefei Chen:
Provable Data Possession Schemes from Standard Lattices for Cloud Computing. Comput. J. 65(12): 3223-3239 (2022) - [j10]Shuang Hu, Renjun Zhang, Fuqun Wang, Kefei Chen, Bin Lian, Gongliang Chen:
A sanitizable signcryption scheme with public verifiability via chameleon hash function. J. Inf. Secur. Appl. 71: 103371 (2022) - 2021
- [j9]Tongchen Shen, Fuqun Wang, Kefei Chen, Zhonghua Shen, Renjun Zhang:
Compressible Multikey and Multi-Identity Fully Homomorphic Encryption. Secur. Commun. Networks 2021: 6619476:1-6619476:14 (2021) - [j8]Fucai Luo, Saif M. Al-Kuwari, Fuqun Wang, Kefei Chen:
Attribute-based proxy re-encryption from standard lattices. Theor. Comput. Sci. 865: 52-62 (2021) - [j7]Qian Meng, Jian Weng, Yinbin Miao, Kefei Chen, Zhonghua Shen, Fuqun Wang, Zhijun Li:
Verifiable Spatial Range Query Over Encrypted Cloud Data in VANET. IEEE Trans. Veh. Technol. 70(12): 12342-12357 (2021) - [i2]Li Yu, Xue-Tong Zhang, Fuqun Wang, Chui-Ping Yang:
Check-based generation of one-time tables using qutrits. CoRR abs/2109.08107 (2021) - 2020
- [j6]Fei Tang, Jiali Bao, Yonghong Huang, Dong Huang, Fuqun Wang:
Identity-Based Identification Scheme without Trusted Party against Concurrent Attacks. Secur. Commun. Networks 2020: 8820271:1-8820271:9 (2020) - [j5]Zhe Liu, Fuqun Wang, Kefei Chen, Fei Tang:
A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update. Secur. Commun. Networks 2020: 8856592:1-8856592:11 (2020)
2010 – 2019
- 2019
- [j4]Tongchen Shen, Fuqun Wang, Kefei Chen, Kunpeng Wang, Bao Li:
Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes. IEEE Access 7: 79299-79310 (2019) - [j3]Fucai Luo, Fuqun Wang, Kunpeng Wang, Kefei Chen:
Fully homomorphic encryption based on the ring learning with rounding problem. IET Inf. Secur. 13(6): 639-648 (2019) - [j2]Fucai Luo, Fuqun Wang, Kunpeng Wang, Kefei Chen:
A more efficient leveled strongly-unforgeable fully homomorphic signature scheme. Inf. Sci. 480: 70-89 (2019) - [i1]Yu Zhang, Li Yu, Qi-Ping Su, Zhe Sun, Fuqun Wang, Xiao-Qiang Xu, Qingjun Xu, Jin-Shuang Jin, Kefei Chen, Chui-Ping Yang:
A framework for quantum homomorphic encryption with experimental demonstration. CoRR abs/1910.03500 (2019) - 2018
- [j1]Fucai Luo, Fuqun Wang, Kunpeng Wang, Jie Li, Kefei Chen:
LWR-Based Fully Homomorphic Encryption, Revisited. Secur. Commun. Networks 2018: 5967635:1-5967635:12 (2018) - 2015
- [c4]Fuqun Wang, Kunpeng Wang, Bao Li, Yuanyuan Gao:
Leveled Strongly-Unforgeable Identity-Based Fully Homomorphic Signatures. ISC 2015: 42-60 - [c3]Fuqun Wang, Kunpeng Wang, Bao Li:
LWE-Based FHE with Better Parameters. IWSEC 2015: 175-192 - [c2]Fuqun Wang, Kunpeng Wang, Bao Li:
An Efficient Leveled Identity-Based FHE. NSS 2015: 303-315 - 2014
- [c1]Fuqun Wang, Kunpeng Wang:
Fully Homomorphic Encryption with Auxiliary Inputs. Inscrypt 2014: 220-238
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-21 21:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint