What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Xiaofeng Chen
Google Scholar
62
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Lightweight 0-RTT Session Resumption Protocol for Constrained Devices.
Jianghong Wei
Guohua Tian
Xiaofeng Chen
Willy Susilo
2025
conf/acisp
Zeroth-Order Federated Private Tuning for Pretrained Large Language Models.
Xiaoyu Zhang
Yong Lin
Meixia Miao
Jian Lou
Jin Li
Xiaofeng Chen
2025
journals/tifs
CSAP-IoD: A Chaotic Map-Based Secure Authentication Protocol for Internet of Drones.
Jintian Zhang
Qingfeng Cheng
Xiaofeng Chen
Xiangyang Luo
2024
journals/tifs
Distributed Differential Privacy via Shuffling Versus Aggregation: A Curious Study.
Yu Wei
Jingyu Jia
Yuduo Wu
Changhui Hu
Changyu Dong
Zheli Liu
Xiaofeng Chen
Yun Peng
Shaowei Wang
2024
conf/ccs
Practical Non-interactive Encrypted Conjunctive Search with Leakage Suppression.
Yunling Wang
Shi-Feng Sun
Jianfeng Wang
Xiaofeng Chen
Joseph K. Liu
Dawu Gu
2024
conf/uss
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus.
Jianghong Wei
Guohua Tian
Ding Wang
Fuchun Guo
Willy Susilo
Xiaofeng Chen
2023
journals/tifs
Verifiable and Redactable Blockchains With Fully Editing Operations.
Jun Shen
Xiaofeng Chen
Zheli Liu
Willy Susilo
2023
conf/uss
Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords.
Ding Wang
Yunkai Zou
Yuan-an Xiao
Siqi Ma
Xiaofeng Chen
2023
conf/asiaccs
Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup.
Mengdie Huang
Yi Xie
Xiaofeng Chen
Jin Li
Changyu Dong
Zheli Liu
Willy Susilo
2023
conf/asiacrypt
Robust Decentralized Multi-client Functional Encryption: Motivation, Definition, and Inner-Product Constructions.
Yamin Li
Jianghong Wei
Fuchun Guo
Willy Susilo
Xiaofeng Chen
2022
conf/ccs
Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond.
Jianfeng Wang
Shifeng Sun
Tianci Li
Saiyu Qi
Xiaofeng Chen
2022
conf/esorics
GAME: Generative-Based Adaptive Model Extraction Attack.
Yi Xie
Mengdie Huang
Xiaoyu Zhang
Changyu Dong
Willy Susilo
Xiaofeng Chen
2022
conf/esorics
New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead.
Jiaojiao Wu
Jianfeng Wang
Xinwei Yong
Xinyi Huang
Xiaofeng Chen
2022
conf/wisa
Chameleon DNN Watermarking: Dynamically Public Model Ownership Verification.
Wei Li
Xiaoyu Zhang
Shen Lin
Xinbo Ban
Xiaofeng Chen
2021
conf/acisp
Forward-Secure Group Encryptions from Lattices.
Jing Pan
Xiaofeng Chen
Fangguo Zhang
Willy Susilo
2021
conf/esorics
Optimal Verifiable Data Streaming Protocol with Data Auditing.
Jianghong Wei
Guohua Tian
Jun Shen
Xiaofeng Chen
Willy Susilo
2021
conf/esorics
Efficient Multi-client Order-Revealing Encryption and Its Applications.
Chunyang Lv
Jianfeng Wang
Shifeng Sun
Yunling Wang
Saiyu Qi
Xiaofeng Chen
2021
conf/asiacrypt
Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy.
Jing Pan
Xiaofeng Chen
Fangguo Zhang
Willy Susilo
2020
conf/esorics
Secure Cloud Auditing with Efficient Ownership Transfer.
Jun Shen
Fuchun Guo
Xiaofeng Chen
Willy Susilo
2020
conf/icics
New Practical Public-Key Deniable Encryption.
Yanmei Cao
Fangguo Zhang
Chongzhi Gao
Xiaofeng Chen
2019
journals/istr
Secure distributed data geolocation scheme against location forgery attack.
Yinyuan Zhao
Haoran Yuan
Tao Jiang
Xiaofeng Chen
2019
conf/esorics
Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption.
Zhongjun Zhang
Jianfeng Wang
Yunling Wang
Yaping Su
Xiaofeng Chen
2019
conf/esorics
Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails.
Jianghong Wei
Xiaofeng Chen
Jianfeng Wang
Xuexian Hu
Jianfeng Ma
2018
journals/compsec
Secure attribute-based data sharing for resource-limited users in cloud computing.
Jin Li
Yinghui Zhang
Xiaofeng Chen
Yang Xiang
2018
journals/tifs
Anonymous and Traceable Group Data Sharing in Cloud Computing.
Jian Shen
Tianqi Zhou
Xiaofeng Chen
Jin Li
Willy Susilo
2018
conf/ccs
PatternListener: Cracking Android Pattern Lock Using Acoustic Signals.
Man Zhou
Qian Wang
Jingxiao Yang
Qi Li
Feng Xiao
Zhibo Wang
Xiaofeng Chen
2018
conf/acisp
Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing.
Jian Shen
Dengzhi Liu
Xiaofeng Chen
Xinyi Huang
Jiageng Chen
Mingwu Zhang
2018
conf/esorics
Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database.
Jianfeng Wang
Xiaofeng Chen
Shifeng Sun
Joseph K. Liu
Man Ho Au
Zhi-Hui Zhan
2018
conf/icics
Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage.
Changsong Yang
Jianfeng Wang
Xiaoling Tao
Xiaofeng Chen
2017
journals/tifs
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data.
Jian Shen
Jun Shen
Xiaofeng Chen
Xinyi Huang
Willy Susilo
2017
journals/tifs
Secure and Efficient Cloud Data Deduplication With Randomized Tag.
Tao Jiang
Xiaofeng Chen
Qianhong Wu
Jianfeng Ma
Willy Susilo
Wenjing Lou
2017
conf/provsec
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
Yunling Wang
Jianfeng Wang
Shifeng Sun
Joseph K. Liu
Willy Susilo
Xiaofeng Chen
2016
conf/acisp
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures.
Yinghui Zhang
Jin Li
Dong Zheng
Xiaofeng Chen
Hui Li
2016
conf/acisp
Towards Efficient Fully Randomized Message-Locked Encryption.
Tao Jiang
Xiaofeng Chen
Qianhong Wu
Jianfeng Ma
Willy Susilo
Wenjing Lou
2015
journals/tifs
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations.
Xiaofeng Chen
Xinyi Huang
Jin Li
Jianfeng Ma
Wenjing Lou
Duncan S. Wong
2015
conf/ccs
Group-oriented Proofs of Storage.
Yujue Wang
Qianhong Wu
Bo Qin
Xiaofeng Chen
Xinyi Huang
Yunya Zhou
2015
conf/provsec
Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach.
Xu Yang
Wei Wu
Joseph K. Liu
Xiaofeng Chen
2015
conf/esorics
Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key.
Tran Viet Xuan Phuong
Guomin Yang
Willy Susilo
Xiaofeng Chen
2014
conf/acisp
A Secure Three-Party Computational Protocol for Triangle Area.
Liang Liu
Xiaofeng Chen
Wenjing Lou
2014
conf/acisp
TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage.
Zheli Liu
Jin Li
Xiaofeng Chen
Jun Yang
Chunfu Jia
2014
conf/provsec
Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts.
Yinghui Zhang
Dong Zheng
Xiaofeng Chen
Jin Li
Hui Li
2014
conf/esorics
Verifiable Computation over Large Database with Incremental Updates.
Xiaofeng Chen
Jin Li
Jian Weng
Jianfeng Ma
Wenjing Lou
2013
conf/ccs
Anonymous attribute-based encryption supporting efficient decryption test.
Yinghui Zhang
Xiaofeng Chen
Jin Li
Duncan S. Wong
Hui Li
2013
conf/ccs
Towards asymmetric searchable encryption with message recovery and flexible search authorization.
Qiang Tang
Xiaofeng Chen
2013
conf/esorics
Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption.
Jin Li
Xiaofeng Chen
Jingwei Li
Chunfu Jia
Jianfeng Ma
Wenjing Lou
2012
journals/tifs
Efficient Fair Conditional Payments for Outsourcing Computations.
Xiaofeng Chen
Jin Li
Willy Susilo
2012
conf/acisp
A Short Non-delegatable Strong Designated Verifier Signature.
Haibo Tian
Xiaofeng Chen
Jin Li
2012
conf/esorics
New Algorithms for Secure Outsourcing of Modular Exponentiations.
Xiaofeng Chen
Jin Li
Jianfeng Ma
Qiang Tang
Wenjing Lou
2012
conf/icics
Outsourcing Encryption of Attribute-Based Encryption with MapReduce.
Jingwei Li
Chunfu Jia
Jin Li
Xiaofeng Chen
2011
conf/ccs
Multi-authority ciphertext-policy attribute-based encryption with accountability.
Jin Li
Qiong Huang
Xiaofeng Chen
Sherman S. M. Chow
Duncan S. Wong
Dongqing Xie
2011
conf/icisc
Non-delegatable Strong Designated Verifier Signature on Elliptic Curves.
Haibo Tian
Xiaofeng Chen
Zhengtao Jiang
Yusong Du
2010
conf/acisp
Identity-Based Chameleon Hash Scheme without Key Exposure.
Xiaofeng Chen
Fangguo Zhang
Willy Susilo
Haibo Tian
Jin Li
Kwangjo Kim
2010
conf/fc
Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy.
Xiaofeng Chen
Fangguo Zhang
Haibo Tian
Qianhong Wu
Yi Mu
Jangseong Kim
Kwangjo Kim
2009
conf/wisa
ID-Based Adaptive Oblivious Transfer.
Fangguo Zhang
Xingwen Zhao
Xiaofeng Chen
2008
conf/ccs
Efficient designated confirmer signature from bilinear pairings.
Fangguo Zhang
Xiaofeng Chen
Baodian Wei
2008
conf/provsec
A Tamper-Evident Voting Machine Resistant to Covert Channels.
Wei Han
Tao Hao
Dong Zheng
Kefei Chen
Xiaofeng Chen
2007
conf/acns
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure.
Xiaofeng Chen
Fangguo Zhang
Willy Susilo
Yi Mu
2007
conf/provsec
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature.
Jin Li
Kwangjo Kim
Fangguo Zhang
Xiaofeng Chen
2006
conf/fc
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings.
Xiaofeng Chen
Fangguo Zhang
Yi Mu
Willy Susilo
2004
conf/acns
Limited Verifier Signature from Bilinear Pairings.
Xiaofeng Chen
Fangguo Zhang
Kwangjo Kim
2003
conf/icisc
Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption.
Xiaofeng Chen
Byoungcheon Lee
Kwangjo Kim
2003
conf/icics
ID-Based Distributed "Magic Ink" Signature from Pairings.
Yan Xie
Fangguo Zhang
Xiaofeng Chen
Kwangjo Kim
Coauthors
Baodian Wei
(1)
Bo Qin
(1)
Byoungcheon Lee
(1)
Changhui Hu
(1)
Changsong Yang
(1)
Changyu Dong
(3)
Chongzhi Gao
(1)
Chunfu Jia
(3)
Chunyang Lv
(1)
Dawu Gu
(1)
Dengzhi Liu
(1)
Ding Wang
(2)
Dong Zheng
(3)
Dongqing Xie
(1)
Duncan S. Wong
(3)
Fangguo Zhang
(12)
Feng Xiao
(1)
Fuchun Guo
(3)
Guohua Tian
(3)
Guomin Yang
(1)
Haibo Tian
(4)
Haoran Yuan
(1)
Hui Li
(3)
Jangseong Kim
(1)
Jiageng Chen
(1)
Jian Lou
(1)
Jian Shen
(3)
Jian Weng
(1)
Jianfeng Ma
(7)
Jianfeng Wang
(9)
Jianghong Wei
(5)
Jiaojiao Wu
(1)
Jin Li
(18)
Jing Pan
(2)
Jingwei Li
(2)
Jingxiao Yang
(1)
Jingyu Jia
(1)
Jintian Zhang
(1)
Joseph K. Liu
(4)
Jun Shen
(4)
Jun Yang
(1)
Kefei Chen
(1)
Kwangjo Kim
(6)
Liang Liu
(1)
Man Ho Au
(1)
Man Zhou
(1)
Meixia Miao
(1)
Mengdie Huang
(2)
Mingwu Zhang
(1)
Qi Li
(1)
Qian Wang
(1)
Qiang Tang
(2)
Qianhong Wu
(4)
Qingfeng Cheng
(1)
Qiong Huang
(1)
Saiyu Qi
(2)
Shaowei Wang
(1)
Shen Lin
(1)
Sherman S. M. Chow
(1)
Shi-Feng Sun
(1)
Shifeng Sun
(4)
Siqi Ma
(1)
Tao Hao
(1)
Tao Jiang
(3)
Tianci Li
(1)
Tianqi Zhou
(1)
Tran Viet Xuan Phuong
(1)
Wei Han
(1)
Wei Li
(1)
Wei Wu
(1)
Wenjing Lou
(7)
Willy Susilo
(20)
Xiangyang Luo
(1)
Xiaofeng Chen
(62)
Xiaoling Tao
(1)
Xiaoyu Zhang
(3)
Xinbo Ban
(1)
Xingwen Zhao
(1)
Xinwei Yong
(1)
Xinyi Huang
(5)
Xu Yang
(1)
Xuexian Hu
(1)
Yamin Li
(1)
Yan Xie
(1)
Yang Xiang
(1)
Yanmei Cao
(1)
Yaping Su
(1)
Yi Mu
(3)
Yi Xie
(2)
Yinghui Zhang
(4)
Yinyuan Zhao
(1)
Yong Lin
(1)
Yu Wei
(1)
Yuan-an Xiao
(1)
Yuduo Wu
(1)
Yujue Wang
(1)
Yun Peng
(1)
Yunkai Zou
(1)
Yunling Wang
(4)
Yunya Zhou
(1)
Yusong Du
(1)
Zheli Liu
(4)
Zhengtao Jiang
(1)
Zhi-Hui Zhan
(1)
Zhibo Wang
(1)
Zhongjun Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to