


default search action
Haibo Tian
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Haibo Tian, Yanchuan Wen, Fangguo Zhang
, Yunfeng Shao, Bingshuai Li:
Lattice based distributed threshold additive homomorphic encryption with application in federated learning. Comput. Stand. Interfaces 87: 103765 (2024) - [j33]Yang Yang, Peidong Guan, Haibo Tian, Fangguo Zhang:
Elliptic code-based oblivious polynomial evaluation. Comput. Stand. Interfaces 90: 103846 (2024) - [j32]Yu Gao, Mengyuan Xue, Haibo Tian, Fei Guo, Yaoyang Jin, Baomiao Wang:
Investigating the impact of humidity on potential-induced degradation (PID) in photovoltaic modules with ash accumulation. IEICE Electron. Express 21(16): 20240357 (2024) - [j31]Nan Wang, Yuqin Luo, Hao Liu, Haibo Tian:
A user transaction privacy protection protocol supporting regulations on account-based blockchain. Int. J. Inf. Comput. Secur. 25(3/4): 234-264 (2024) - [c43]Jiayi An, Haibo Tian:
Embedding Data in Bitcoin Transaction Values with Restricted Boltzmann Machine. DSPP (1) 2024: 21-38 - [c42]Haoyao Xu, Yitong Li, Haibo Tian:
Enhanced PIR Scheme Combining SimplePIR and Spiral: Achieving Higher Throughput Without Client Hints. ML4CS 2024: 299-315 - [c41]Haibo Tian, Jiajun Chen:
Asynchronous Byzantine Fault Tolerance Reliable Broadcast Based on Directed Acyclic Graph. ProvSec (2) 2024: 109-123 - 2023
- [c40]Ruozhou Zuo, Haibo Tian, Fangguo Zhang:
Post-quantum Dropout-Resilient Aggregation for Federated Learning via Lattice-Based PRF. AIS&P (1) 2023: 382-399 - [c39]Chen Li, Haibo Tian, Fangguo Zhang:
TVES: Threshold Verifiably Encrypted Signature and Its Applications. Inscrypt (1) 2023: 3-22 - [c38]Zhiyuan An
, Haibo Tian, Chao Chen
, Fangguo Zhang:
Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience. ESORICS (1) 2023: 24-44 - [c37]Haibo Tian, Yini Lin:
An Efficient Private Information Retrieval Protocol Based on TFHE. SecureComm (1) 2023: 476-495 - [i8]Zhiyuan An, Haibo Tian, Chao Chen, Fangguo Zhang:
Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience. IACR Cryptol. ePrint Arch. 2023: 705 (2023) - 2022
- [j30]Yan Huang, Fangguo Zhang
, Zhijie Liu, Haibo Tian:
Pseudorandom number generator based on supersingular elliptic curve isogenies. Sci. China Inf. Sci. 65(5): 1-3 (2022) - [c36]Haibo Tian, Yanchuan Wen, Fangguo Zhang
, Yunfeng Shao, Bingshuai Li:
A Distributed Threshold Additive Homomorphic Encryption for Federated Learning with Dropout Resiliency Based on Lattice. CSS 2022: 277-292 - [c35]Ruozhou Zuo
, Haibo Tian, Zhiyuan An
, Fangguo Zhang
:
Post-quantum Privacy-Preserving Aggregation in Federated Learning Based on Lattice. CSS 2022: 314-326 - [c34]Jianzhang Chen, Haibo Tian, Fangguo Zhang
:
Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization. ISC 2022: 194-213 - [c33]Zhuoran Zhang, Haibo Tian, Fangguo Zhang
:
Improved WAVE Signature and Apply to Post-quantum Blockchain. SocialSec 2022: 309-323 - 2021
- [j29]Jieyu Xu, Wen Bai, Miao Hu, Haibo Tian, Di Wu
:
Bitcoin miners: Exploring a covert community in the Bitcoin ecosystem. Peer-to-Peer Netw. Appl. 14(2): 644-654 (2021) - [i7]Haibo Tian, Fangguo Zhang, Yunfeng Shao, Bingshuai Li:
Secure Linear Aggregation Using Decentralized Threshold Additive Homomorphic Encryption For Federated Learning. CoRR abs/2111.10753 (2021) - 2020
- [j28]Yilei Wang
, Guoyu Yang, Andrea Bracciali, Ho-fung Leung, Haibo Tian, Lishan Ke, Xiaomei Yu:
Incentive compatible and anti-compounding of wealth in proof-of-stake. Inf. Sci. 530: 85-94 (2020) - [c32]Zhuoran Zhang, Fangguo Zhang
, Haibo Tian:
CSH: A Post-quantum Secret Handshake Scheme from Coding Theory. ESORICS (2) 2020: 317-335 - [c31]Haibo Tian, Huizhi Lin, Fangguo Zhang
:
Design a Proof of Stake Based Directed Acyclic Graph Chain. FCS 2020: 150-165 - [c30]Zixuan Xie
, Run Wu, Miao Hu, Haibo Tian:
Blockchain-Enabled Computing Resource Trading: A Deep Reinforcement Learning Approach. WCNC 2020: 1-8
2010 – 2019
- 2019
- [j27]Huige Li, Haibo Tian, Fangguo Zhang
, Jiejie He:
Blockchain-based searchable symmetric encryption scheme. Comput. Electr. Eng. 73: 32-45 (2019) - [j26]Huige Li, Fangguo Zhang
, Peiran Luo
, Haibo Tian, Jiejie He:
How to retrieve the encrypted data on the blockchain. KSII Trans. Internet Inf. Syst. 13(11): 5560-5579 (2019) - [j25]Haibo Tian, Jiejie He, Yong Ding
:
Medical Data Management on Blockchain with Privacy. J. Medical Syst. 43(2): 26:1-26:6 (2019) - [j24]Huang Zhang
, Fangguo Zhang
, Rong Cheng, Haibo Tian:
Efficient obfuscation for CNF circuits and applications in cloud computing. Soft Comput. 23(6): 2061-2072 (2019) - [c29]Haibo Tian, Peiran Luo
, Yinxue Su:
A Group Signature Based Digital Currency System. BlockSys 2019: 3-14 - [c28]Fangguo Zhang
, Zhijie Liu, Ping Wang, Haibo Tian:
Improving ECDLP Computation in Characteristic 2. Inscrypt 2019: 535-550 - [c27]Haibo Tian, Yinxue Su, Zhenquan Liang:
A Provable Secure Server Friendly Two-Party SM2 Singing Protocol for Blockchain IoT. GLOBECOM Workshops 2019: 1-5 - [c26]Haibo Tian, Peiran Luo, Yinxue Su:
An Efficient Group Signature Based Digital Currency System. PAAP 2019: 380-392 - [c25]Haibo Tian, Peiran Luo
, Yinxue Su:
A Centralized Digital Currency System with Rich Functions. ProvSec 2019: 288-302 - 2018
- [c24]Haibo Tian, Xiaofeng Chen, Yong Ding, Xiaoyan Zhu, Fangguo Zhang
:
AFCoin: A Framework for Digital Fiat Currency of Central Banks Based on Account Model. Inscrypt 2018: 70-85 - [c23]Huang Zhang
, Fangguo Zhang
, Haibo Tian, Man Ho Au:
Anonymous Post-Quantum Cryptocash. Financial Cryptography 2018: 461-479 - 2017
- [j23]Haibo Tian, Yu-Feng Ma, Baodian Wei:
Proxy re-designated verifier signature and its applications. Int. J. Embed. Syst. 9(6): 535-547 (2017) - [c22]Haibo Tian, Liqing Fu, Jiejie He:
A Simpler Bitcoin Voting Protocol. Inscrypt 2017: 81-98 - [c21]Xijuan Wu, Baodian Wei, Haibo Tian, Yusong Du, Xiao Ma:
Fair Electronic Voting via Bitcoin Deposits. GSKI (2) 2017: 650-661 - [c20]Haibo Tian, Jiejie He, Liqing Fu:
Contract Coin: Toward Practical Contract Signing on Blockchain. ISPEC 2017: 43-61 - [i6]Huige Li, Fangguo Zhang, Jiejie He, Haibo Tian:
A Searchable Symmetric Encryption Scheme using BlockChain. CoRR abs/1711.01030 (2017) - [i5]Huige Li, Haibo Tian, Fangguo Zhang:
Block Chain based Searchable Symmetric Encryption. IACR Cryptol. ePrint Arch. 2017: 447 (2017) - [i4]Huang Zhang, Fangguo Zhang, Haibo Tian, Man Ho Au:
Anonymous Post-Quantum Cryptocash. IACR Cryptol. ePrint Arch. 2017: 716 (2017) - 2016
- [j22]Yu-Feng Ma, Haibo Tian, Baodian Wei:
Secure Modular Exponentiation Outsource With Two Untrusted Programs and Improved Checkability. J. Inf. Sci. Eng. 32(5): 1205-1218 (2016) - [j21]Haibo Tian, Fangguo Zhang
, Baodian Wei:
A lattice-based partially blind signature. Secur. Commun. Networks 9(12): 1820-1828 (2016) - 2015
- [j20]Yongqiang Zhang, Qiang Liu, Chengpei Tang, Haibo Tian:
A lattice-based designated verifier signature for cloud computing. Int. J. High Perform. Comput. Netw. 8(2): 135-143 (2015) - [c19]Haibo Tian, Fangguo Zhang
, Kui Ren
:
Secure Bilinear Pairing Outsourcing Made More Efficient and Flexible. AsiaCCS 2015: 417-426 - 2014
- [j19]Haibo Tian, Jin Li:
A short non-delegatable strong designated verifier signature. Frontiers Comput. Sci. 8(3): 490-502 (2014) - [j18]Xi Sun, Haibo Tian, Yumin Wang:
Toward quantum-resistant strong designated verifier signature. Int. J. Grid Util. Comput. 5(2): 80-86 (2014) - [j17]Xiaofeng Chen, Fangguo Zhang
, Willy Susilo
, Haibo Tian, Jin Li, Kwangjo Kim:
Identity-based chameleon hashing and signatures without key exposure. Inf. Sci. 265: 198-210 (2014) - [j16]Haibo Tian, Xiaofeng Chen, Willy Susilo
:
Deniability and forward secrecy of one-round authenticated key exchange. J. Supercomput. 67(3): 671-690 (2014) - [c18]Baodian Wei, Yusong Du, Huang Zhang
, Fangguo Zhang
, Haibo Tian, Chong-zhi Gao:
Identity Based Threshold Ring Signature from Lattices. NSS 2014: 233-245 - 2013
- [j15]Haibo Tian, Fangguo Zhang
, Xiaofeng Chen, Baodian Wei:
Selectively unforgeable but existentially forgeable signature schemes and applications. Sci. China Inf. Sci. 56(1): 1-14 (2013) - [j14]Haibo Tian, Zhengtao Jiang, Yi Liu, Baodian Wei:
A systematic method to design strong designated verifier signature without random oracles. Clust. Comput. 16(4): 817-827 (2013) - [j13]Haibo Tian, Xiaofeng Chen, Baodian Wei, Yi Liu:
Security Analysis of a Suite of Deniable Authentication Protocols. Int. J. Netw. Secur. 15(5): 384-389 (2013) - [j12]Haibo Tian, Xiaofeng Chen, Fangguo Zhang
, Baodian Wei, Zhengtao Jiang, Yi Liu:
A non-delegatable strong designated verifier signature in ID-based setting for mobile environment. Math. Comput. Model. 58(5-6): 1289-1300 (2013) - [c17]Haibo Tian:
On Security Model of One-Round Authenticated Key Exchange. INCoS 2013: 319-322 - [c16]Haibo Tian:
General Certificateless Strong Designated Verifier Signature Schemes. INCoS 2013: 392-397 - [c15]Yongqiang Zhang, Qiang Liu, Haibo Tian:
A Hybrid System for Authentication Service. INCoS 2013: 821-826 - 2012
- [j11]Haibo Tian:
Deniable message transmission authenticator based on weak signature schemes. IET Inf. Secur. 6(4): 258-263 (2012) - [j10]Haibo Tian:
A new strong multiple designated verifiers signature. Int. J. Grid Util. Comput. 3(1): 1-11 (2012) - [c14]Haibo Tian, Xiaofeng Chen, Jin Li:
A Short Non-delegatable Strong Designated Verifier Signature. ACISP 2012: 261-279 - [c13]Haibo Tian, Xiaofeng Chen, Fangguo Zhang
, Baodian Wei, Zhengtao Jiang, Yi Liu:
An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability. IMIS 2012: 81-88 - [c12]Haibo Tian, Zhengtao Jiang, Yi Liu, Baodian Wei:
A Non-delegatable Strong Designated Verifier Signature without Random Oracles. INCoS 2012: 237-244 - [c11]Xi Sun, Haibo Tian, Yumin Wang:
Toward Quantum-Resistant Strong Designated Verifier Signature from Isogenies. INCoS 2012: 292-296 - [c10]Chong-zhi Gao, Dongqing Xie, Jin Li, Baodian Wei, Haibo Tian:
Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack. INCoS 2012: 377-384 - 2011
- [j9]Xingwen Zhao, Fangguo Zhang
, Haibo Tian:
Dynamic asymmetric group key agreement for ad hoc networks. Ad Hoc Networks 9(5): 928-939 (2011) - [j8]Xiaofeng Chen, Fangguo Zhang
, Haibo Tian, Baodian Wei, Kwangjo Kim:
Discrete logarithm based chameleon hashing and signatures without key exposure. Comput. Electr. Eng. 37(4): 614-623 (2011) - [j7]Xiaofeng Chen, Qianhong Wu, Fangguo Zhang
, Haibo Tian, Baodian Wei, Byoungcheon Lee
, Hyunrok Lee, Kwangjo Kim:
New receipt-free voting scheme using double-trapdoor commitment. Inf. Sci. 181(8): 1493-1502 (2011) - [j6]Xiaofeng Chen, Willy Susilo
, Fangguo Zhang
, Haibo Tian, Jin Li:
Identity-based trapdoor mercurial commitments and applications. Theor. Comput. Sci. 412(39): 5498-5512 (2011) - [c9]Haibo Tian, Xiaofeng Chen, Zhengtao Jiang:
Non-interactive Deniable Authentication Protocols. Inscrypt 2011: 142-159 - [c8]Haibo Tian, Xiaofeng Chen, Zhengtao Jiang, Yusong Du:
Non-delegatable Strong Designated Verifier Signature on Elliptic Curves. ICISC 2011: 219-234 - [c7]Haibo Tian:
A New Strong Multiple Designated Verifiers Signature for Broadcast Propagation. INCoS 2011: 268-274 - 2010
- [c6]Xiaofeng Chen, Fangguo Zhang
, Willy Susilo
, Haibo Tian, Jin Li, Kwangjo Kim:
Identity-Based Chameleon Hash Scheme without Key Exposure. ACISP 2010: 200-215 - [c5]Xiaofeng Chen, Haibo Tian, Fangguo Zhang
, Yong Ding:
Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring. Inscrypt 2010: 415-426 - [c4]Xiaofeng Chen, Fangguo Zhang
, Haibo Tian, Qianhong Wu, Yi Mu, Jangseong Kim, Kwangjo Kim:
Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy. Financial Cryptography 2010: 304-311
2000 – 2009
- 2009
- [j5]Haibo Tian, Xiaofeng Chen, Yong Ding:
Analysis of Two Types Deniable Authentication Protocols. Int. J. Netw. Secur. 9(3): 242-246 (2009) - [c3]Yang Zhan, Haibo Tian, Qingqi Pei, Yueyu Zhang, Yumin Wang, Weidong Zhang:
A Deep Copy Protection Framework for Electronic Devices within Home. IAS 2009: 23-26 - [i3]Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Kwangjo Kim:
Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems. IACR Cryptol. ePrint Arch. 2009: 35 (2009) - [i2]Xiaofeng Chen, Haibo Tian, Fangguo Zhang:
Comments and Improvements on Chameleon Hashing Without Key Exposure Based on Factoring. IACR Cryptol. ePrint Arch. 2009: 319 (2009) - [i1]Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Kwangjo Kim:
Identity-Based Chameleon Hash Scheme Without Key Exposure. IACR Cryptol. ePrint Arch. 2009: 400 (2009) - 2008
- [j4]Xiaofeng Chen, Fangguo Zhang
, Haibo Tian, Baodian Wei, Willy Susilo
, Yi Mu, Hyunrok Lee, Kwangjo Kim:
Efficient generic on-line/off-line (threshold) signatures without key exposure. Inf. Sci. 178(21): 4192-4203 (2008) - [j3]Haibo Tian, Willy Susilo
, Yang Ming, Yumin Wang:
A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles. J. Comput. Sci. Technol. 23(5): 832-842 (2008) - 2007
- [j2]Haibo Tian, Xi Sun, Yumin Wang:
A New Public-Key Encryption Scheme. J. Comput. Sci. Technol. 22(1): 95-102 (2007) - 2006
- [c2]Haibo Tian, Yumin Wang:
Security Analysis of the Digital Transmission Copy Protection Specification. Security and Management 2006: 134-137 - 2005
- [j1]Haibo Tian, Yang Zhan, Yumin Wang:
Analysis of host authentication mechanism in current POD copy protection system. IEEE Trans. Consumer Electron. 51(3): 922-924 (2005) - [c1]Haibo Tian, Xi Sun, Yumin Wang:
A Virtual Bridge Certificate Authority Model. CIS (2) 2005: 500-507
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-16 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint