Privacy-preserving patient-centric clinical decision support system on naive Bayesian classification X Liu, R Lu, J Ma, L Chen, B Qin IEEE journal of biomedical and health informatics 20 (2), 655-668, 2015 | 264 | 2015 |
Attribute-based encryption with efficient verifiable outsourced decryption B Qin, RH Deng, S Liu, S Ma IEEE Transactions on Information Forensics and Security 10 (7), 1384-1393, 2015 | 226 | 2015 |
Server-aided revocable attribute-based encryption H Cui, RH Deng, Y Li, B Qin Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016 | 119 | 2016 |
Public-key authenticated encryption with keyword search revisited: Security model and constructions B Qin, Y Chen, Q Huang, X Liu, D Zheng Information Sciences 516, 515-528, 2020 | 112 | 2020 |
Leakage-resilient chosen-ciphertext secure public-key encryption from hash proof system and one-time lossy filter B Qin, S Liu Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013 | 69 | 2013 |
Privacy-preserving outsourced calculation on floating point numbers X Liu, RH Deng, W Ding, R Lu, B Qin IEEE Transactions on Information Forensics and Security 11 (11), 2513-2527, 2016 | 68 | 2016 |
Server-aided revocable identity-based encryption B Qin, RH Deng, Y Li, S Liu Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 65 | 2015 |
An efficient privacy-preserving outsourced computation over public data X Liu, B Qin, RH Deng, Y Li IEEE Transactions on Services Computing 10 (5), 756-770, 2015 | 55 | 2015 |
Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited Z Huang, S Liu, B Qin International Workshop on Public Key Cryptography, 369-385, 2013 | 37 | 2013 |
Leakage-flexible CCA-secure public-key encryption: simple construction and free of pairing B Qin, S Liu Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014 | 36 | 2014 |
(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance B Qin, Q Zhao, D Zheng, H Cui Information Sciences 490, 74-92, 2019 | 35 | 2019 |
Improved security model for public-key authenticated encryption with keyword search B Qin, H Cui, X Zheng, D Zheng Provable and Practical Security: 15th International Conference, ProvSec 2021 …, 2021 | 34 | 2021 |
Efficient chosen‐ciphertext secure public‐key encryption scheme with high leakage‐resilience B Qin, S Liu, K Chen IET Information Security 9 (1), 32-42, 2015 | 33 | 2015 |
Key regeneration-free ciphertext-policy attribute-based encryption and its application H Cui, RH Deng, B Qin, J Weng Information Sciences 517, 217-229, 2020 | 30 | 2020 |
A privacy-preserving outsourced functional computation framework across large-scale multiple encrypted domains X Liu, B Qin, RH Deng, R Lu, J Ma IEEE Transactions on Computers 65 (12), 3567-3579, 2016 | 30 | 2016 |
Cloud-assisted attribute-based data sharing with efficient user revocation in the internet of things D Zheng, B Qin, Y Li, A Tian IEEE Wireless Communications 27 (3), 18-23, 2020 | 28 | 2020 |
Server-aided revocable attribute-based encryption resilient to decryption key exposure B Qin, Q Zhao, D Zheng, H Cui Cryptology and Network Security: 16th International Conference, CANS 2017 …, 2018 | 28 | 2018 |
Continuous non-malleable key derivation and its application to related-key security B Qin, S Liu, TH Yuen, RH Deng, K Chen IACR International Workshop on Public Key Cryptography, 557-578, 2015 | 28 | 2015 |
An efficient searchable public-key authenticated encryption for cloud-assisted medical internet of things T Chi, B Qin, D Zheng Wireless Communications and Mobile Computing 2020, 1-11, 2020 | 25 | 2020 |
Escrow free attribute-based signature with self-revealability H Cui, G Wang, RH Deng, B Qin Information Sciences 367, 660-672, 2016 | 20 | 2016 |