default search action
Yinxia Sun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j23]Qiu Zhang, Yinxia Sun, Yang Lu, Wensheng Huang:
Revocable identity-based designated verifier proxy re-signature with signature evolution. Comput. Stand. Interfaces 92: 103894 (2025) - 2024
- [j22]Qiu Zhang, Yinxia Sun, Yang Lu, Nian Xia, Ge Wu:
Efficient Certificateless Aggregate Designated Verifier Signature With Conditional Privacy Preserving in VANETs. IEEE Internet Things J. 11(15): 26191-26202 (2024) - [j21]Qiu Zhang, Yinxia Sun, Yang Lu, Guoqiang Zhang:
Revocable certificateless proxy re-signature with signature evolution for EHR sharing systems. J. Inf. Secur. Appl. 87: 103892 (2024) - [c7]Chen Zhu, Jiale Ding, Xingrui Wei, Yang Lu, Yinxia Sun:
Efficient Revocable Attribute-Based Keyword Search Against Keyword Guessing Attack. CyberC 2024: 155-162 - 2022
- [j20]Yinxia Sun, Pushpita Chatterjee, Yi Chen, Yudong Zhang:
Efficient Identity-Based Encryption With Revocation for Data Privacy in Internet of Things. IEEE Internet Things J. 9(4): 2734-2743 (2022) - [j19]Anmin Fu, Zhenzhu Chen, Yi Mu, Willy Susilo, Yinxia Sun, Jie Wu:
Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization. IEEE Trans. Serv. Comput. 15(1): 266-278 (2022) - 2021
- [j18]Yumei Li, Futai Zhang, Yinxia Sun:
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system. IET Inf. Secur. 15(1): 131-146 (2021) - [j17]Lei Zhou, Anmin Fu, Yi Mu, Huaqun Wang, Shui Yu, Yinxia Sun:
Multicopy provable data possession scheme supporting data dynamics for cloud-based Electronic Medical Record system. Inf. Sci. 545: 254-276 (2021) - 2020
- [j16]Yinxia Sun, Futai Zhang, Anmin Fu, Zhe Xia:
CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution. Int. J. Found. Comput. Sci. 31(2): 175-191 (2020) - [j15]Yinxia Sun, Yi Mu, Willy Susilo, Futai Zhang, Anmin Fu:
Revocable identity-based encryption with server-aided ciphertext evolution. Theor. Comput. Sci. 815: 11-24 (2020)
2010 – 2019
- 2019
- [j14]Yinxia Sun, Limin Shen:
Pairing-free certificateless signature with revocation. Int. J. Comput. Sci. Eng. 19(1): 46-52 (2019) - [j13]Burong Kang, Xinyu Meng, Lei Zhang, Yinxia Sun:
Nonce-Based Key Agreement Protocol Against Bad Randomness. Int. J. Found. Comput. Sci. 30(4): 619-633 (2019) - 2018
- [j12]Yinxia Sun, Willy Susilo, Futai Zhang, Anmin Fu:
CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud. IEEE Access 6: 56977-56983 (2018) - [j11]Qianwen Pei, Burong Kang, Lei Zhang, Kim-Kwang Raymond Choo, Yuanfei Zhang, Yinxia Sun:
Secure and privacy-preserving 3D vehicle positioning schemes for vehicular ad hoc network. EURASIP J. Wirel. Commun. Netw. 2018: 271 (2018) - [j10]Yinxia Sun, Zhuoran Zhang, Limin Shen:
A revocable certificateless encryption scheme with high performance. Int. J. High Perform. Comput. Netw. 11(1): 83-91 (2018) - [j9]Anmin Fu, Shuai Li, Shui Yu, Yuqing Zhang, Yinxia Sun:
Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server. J. Netw. Comput. Appl. 118: 102-112 (2018) - [c6]Yinxia Sun, Futai Zhang, Anmin Fu:
Revocable Certificateless Encryption with Ciphertext Evolution. ACISP 2018: 741-749 - 2017
- [j8]Limin Shen, Futai Zhang, Yinxia Sun, Jianfeng Ma:
An efficient revocable ID-based encryption scheme in the standard model. Int. J. Embed. Syst. 9(2): 168-176 (2017) - 2016
- [c5]Yinxia Sun, Zhuoran Zhang, Limin Shen:
A Revocable Certificateless Signature Scheme Without Pairing. ICCCS (1) 2016: 355-364 - 2015
- [j7]Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng:
Efficient revocable certificateless encryption against decryption key exposure. IET Inf. Secur. 9(3): 158-166 (2015) - 2014
- [j6]Limin Shen, Futai Zhang, Yinxia Sun:
Efficient Revocable Certificateless Encryption Secure in the Standard Model. Comput. J. 57(4): 592-601 (2014) - [j5]Limin Shen, Futai Zhang, Yinxia Sun, Sujuan Li:
Cryptanalysis and improvement on a certificateless encryption scheme in the standard model. Int. J. Inf. Comput. Secur. 6(4): 354-371 (2014) - [j4]Yinxia Sun, Futai Zhang, Limin Shen:
A Revocable Certificateless Signature Scheme. J. Comput. 9(8): 1843-1850 (2014) - 2013
- [j3]Sujuan Li, Futai Zhang, Yinxia Sun, Limin Shen:
Efficient leakage-resilient public key encryption from DDH assumption. Clust. Comput. 16(4): 797-806 (2013) - [c4]Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng:
Revocable Identity-Based Signature without Pairing. INCoS 2013: 363-365 - [i3]Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng:
A revocable certificateless signature scheme. IACR Cryptol. ePrint Arch. 2013: 53 (2013) - 2012
- [c3]Limin Shen, Futai Zhang, Yinxia Sun, Sujuan Li:
Cryptanalysis of a Certificateless Encryption Scheme in the Standard Model. INCoS 2012: 329-333 - [c2]Sujuan Li, Futai Zhang, Yinxia Sun, Limin Shen:
A New Variant of the Cramer-Shoup Leakage-Resilient Public Key Encryption. INCoS 2012: 342-346 - [i2]Limin Shen, Yinxia Sun:
On security of a Certificateless Aggregate Signature Scheme. IACR Cryptol. ePrint Arch. 2012: 152 (2012) - 2010
- [j2]Yinxia Sun, Hui Li:
Efficient signcryption between TPKC and IDPKC and its multi-receiver construction. Sci. China Inf. Sci. 53(3): 557-566 (2010) - [j1]Yinxia Sun, Hui Li:
Short-ciphertext and BDH-based CCA2 secure certificateless encryption. Sci. China Inf. Sci. 53(10): 2005-2015 (2010)
2000 – 2009
- 2008
- [i1]Yinxia Sun, Futai Zhang:
Secure Certificateless Public Key Encryption without Redundancy. IACR Cryptol. ePrint Arch. 2008: 487 (2008) - 2007
- [c1]Yinxia Sun, Futai Zhang, Joonsang Baek:
Strongly Secure Certificateless Public Key Encryption Without Pairing. CANS 2007: 194-208
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-15 01:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint