A threshold anonymous authentication protocol for VANETs J Shao, X Lin, R Lu, C Zuo IEEE Transactions on vehicular technology 65 (3), 1711-1720, 2015 | 366 | 2015 |
Result pattern hiding searchable encryption for conjunctive queries S Lai, S Patranabis, A Sakzad, JK Liu, D Mukhopadhyay, R Steinfeld, ... Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 199 | 2018 |
CCA-secure ABE with outsourced decryption for fog computing C Zuo, J Shao, G Wei, M Xie, M Ji Future Generation Computer Systems 78, 730-738, 2018 | 172 | 2018 |
Dynamic searchable symmetric encryption with forward and stronger backward privacy C Zuo, SF Sun, JK Liu, J Shao, J Pieprzyk European symposium on research in computer security, 283-303, 2019 | 96 | 2019 |
Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security C Zuo, SF Sun, JK Liu, J Shao, J Pieprzyk Computer Security: 23rd European Symposium on Research in Computer Security …, 2018 | 84 | 2018 |
Privacy-preserving COVID-19 contact tracing app: a zero-knowledge proof approach JK Liu, MH Au, TH Yuen, C Zuo, J Wang, A Sakzad, X Luo, L Li, ... Cryptology ePrint Archive, 2020 | 76 | 2020 |
Fine-grained two-factor protection mechanism for data sharing in cloud storage C Zuo, J Shao, JK Liu, G Wei, Y Ling IEEE Transactions on Information Forensics and Security 13 (1), 186-196, 2017 | 70 | 2017 |
Multi-client cloud-based symmetric searchable encryption SK Kermanshahi, JK Liu, R Steinfeld, S Nepal, S Lai, R Loh, C Zuo IEEE Transactions on Dependable and Secure Computing 18 (5), 2419-2437, 2019 | 55 | 2019 |
Forward and backward private DSSE for range queries C Zuo, SF Sun, JK Liu, J Shao, J Pieprzyk, L Xu IEEE Transactions on Dependable and Secure Computing 19 (1), 328-338, 2020 | 41 | 2020 |
Non-interactive multi-client searchable encryption: Realization and implementation SF Sun, C Zuo, JK Liu, A Sakzad, R Steinfeld, TH Yuen, X Yuan, D Gu IEEE Transactions on Dependable and Secure Computing 19 (1), 452-467, 2020 | 40 | 2020 |
Building a dynamic searchable encrypted medical database for multi-client L Xu, C Xu, JK Liu, C Zuo, P Zhang Information Sciences 527, 394-405, 2020 | 36 | 2020 |
Enabling authorized encrypted search for multi-authority medical databases L Xu, S Sun, X Yuan, JK Liu, C Zuo, C Xu IEEE Transactions on Emerging Topics in Computing 9 (1), 534-546, 2019 | 30 | 2019 |
Trusted boolean search on cloud using searchable symmetric encryption C Zuo, J Macindoe, S Yang, R Steinfeld, JK Liu 2016 IEEE Trustcom/BigDataSE/ISPA, 113-120, 2016 | 29 | 2016 |
Forward and backward private dynamic searchable symmetric encryption for conjunctive queries C Zuo, SF Sun, JK Liu, J Shao, J Pieprzyk, G Wei Cryptology ePrint Archive, 2020 | 20 | 2020 |
New threshold anonymous authentication for VANETs J Shao, R Lu, X Lin, C Zuo 2015 IEEE/CIC International Conference on Communications in China (ICCC), 1-6, 2015 | 15 | 2015 |
Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage Q Gan, JK Liu, X Wang, X Yuan, SF Sun, D Huang, C Zuo, J Wang Frontiers of Computer Science 16 (6), 166820, 2022 | 12 | 2022 |
Verifiable identity-based encryption with keyword search for IoT from lattice L Mei, C Xu, L Xu, X Yu, C Zuo Comput. Mater. Contin 68, 2299-2314, 2021 | 12 | 2021 |
Efficient certificate-based signature and its aggregation X Ma, J Shao, C Zuo, R Meng Information Security Practice and Experience: 13th International Conference …, 2017 | 12 | 2017 |
Searchable encryption with access control on keywords in multi-user setting L Li, C Xu, X Yu, B Dou, C Zuo Journal of Cybersecurity 2 (1), 9, 2020 | 10 | 2020 |
Result-pattern-hiding conjunctive searchable symmetric encryption with forward and backward privacy D Yuan, C Zuo, S Cui, G Russello Proceedings on Privacy Enhancing Technologies, 2023 | 9 | 2023 |