


default search action
Leixiao Cheng
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j15]Fei Meng, Leixiao Cheng:
Cloud-aided attribute-based encryption with efficient tracing and accountability auditing. J. Syst. Archit. 163: 103407 (2025) - [j14]Fei Meng
, Leixiao Cheng
:
TSR-ABE: Traceable and Server-Aided Revocable Ciphertext-Policy Attribute-Based Encryption Under Static Assumptions. IEEE Trans. Inf. Forensics Secur. 20: 955-967 (2025) - 2024
- [j13]Leixiao Cheng
, Jing Qin
, Fei Meng
:
Privacy leakage of certificateless public key authenticated searchable encryption via frequency analysis: Attacks and revises. Comput. Stand. Interfaces 87: 103762 (2024) - [j12]Fei Meng
, Leixiao Cheng
:
STR-ABKS: Server-Aided Traceable and Revocable Attribute-Based Encryption With Keyword Search. IEEE Internet Things J. 11(7): 12649-12659 (2024) - [j11]Leixiao Cheng
, Fei Meng
:
Server-Aided Public Key Authenticated Searchable Encryption With Constant Ciphertext and Constant Trapdoor. IEEE Trans. Inf. Forensics Secur. 19: 1388-1400 (2024) - 2023
- [j10]Leixiao Cheng
, Fei Meng
:
Certificateless Public Key Authenticated Searchable Encryption With Enhanced Security Model in IIoT Applications. IEEE Internet Things J. 10(2): 1391-1400 (2023) - [j9]Leixiao Cheng
, Fei Meng
:
Public key authenticated searchable encryption against frequency analysis attacks. Inf. Sci. 640: 119060 (2023) - [j8]Leixiao Cheng
, Jing Qin
, Feng Feng, Fei Meng
:
Security-enhanced public-key authenticated searchable encryption. Inf. Sci. 647: 119454 (2023) - [j7]Leixiao Cheng
, Fei Meng
:
An Improvement on "CryptCloud$^{+}$+: Secure and Expressive Data Access Control for Cloud Storage". IEEE Trans. Serv. Comput. 16(3): 1662-1663 (2023) - 2022
- [c4]Leixiao Cheng, Fei Meng:
Public Key Authenticated Encryption with Keyword Search from LWE. ESORICS (1) 2022: 303-324 - [i2]Leixiao Cheng, Fei Meng:
Public Key Authenticated Encryption with Keyword Search from LWE. IACR Cryptol. ePrint Arch. 2022: 1016 (2022) - 2021
- [j6]Fei Meng, Leixiao Cheng, Mingqiang Wang:
Ciphertext-policy attribute-based encryption with hidden sensitive policy from keyword search techniques in smart city. EURASIP J. Wirel. Commun. Netw. 2021(1): 20 (2021) - [j5]Ying Guo, Fei Meng, Leixiao Cheng, Xiaolei Dong, Zhenfu Cao
:
Designated server-aided revocable identity-based keyword search on lattice. EURASIP J. Wirel. Commun. Netw. 2021(1): 174 (2021) - [j4]Fei Meng, Leixiao Cheng, Mingqiang Wang:
ABDKS: attribute-based encryption with dynamic keyword search in fog computing. Frontiers Comput. Sci. 15(5): 155810 (2021) - [j3]Leixiao Cheng, Fei Meng
:
Security analysis of Pan et al.'s "Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability". J. Syst. Archit. 119: 102248 (2021) - [c3]Leixiao Cheng, Fei Meng:
Server-Aided Revocable Attribute-Based Encryption Revised: Multi-User Setting and Fully Secure. ESORICS (2) 2021: 192-212 - 2020
- [j2]Leixiao Cheng
, Fei Meng
, Xianmeng Meng
, Qixin Zhang
:
AKC-Based Revocable ABE Schemes from LWE Assumption. Secur. Commun. Networks 2020: 8834872:1-8834872:16 (2020) - [c2]Boru Gong, Leixiao Cheng, Yunlei Zhao:
SKCN: Practical and Flexible Digital Signature from Module Lattice. ACISP 2020: 62-81
2010 – 2019
- 2018
- [i1]Leixiao Cheng, Boru Gong, Yunlei Zhao:
Lattice-Based Signature from Key Consensus. IACR Cryptol. ePrint Arch. 2018: 1180 (2018) - 2017
- [j1]Leixiao Cheng, Quanshui Wu, Yunlei Zhao:
Compact lossy and all-but-one trapdoor functions from lattice. EAI Endorsed Trans. Security Safety 4(12): e4 (2017) - [c1]Leixiao Cheng, Quanshui Wu, Yunlei Zhao:
Compact Lossy and All-but-One Trapdoor Functions from Lattice. ISPEC 2017: 279-296
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-13 21:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint