Constructions of 2-Rotation Symmetric Semi-Bent Functions with Degree Bigger than 2

Baodong QIN , Rui GUO , Qinglan ZHAO , Dong ZHENG
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 102 ( 11) 1497 -1503

2019
Fast and secure elliptic curve scalar multiplication algorithm based on side channel atomicity

Bao-dong QIN Fan-yu KONG
Journal of Computer Applications 29 ( 11) 2983 -2983

2009
Public-key Encryption with Bidirectional Keyword Search and Its Application to Encrypted Emails

Baodong Qin , Wenzheng Zhang , Xinfeng Dong , Aikui Tian
Computer Standards & Interfaces 78 103542

2021
Leakage-resilient lossy trapdoor functions and public-key encryption

Baodong Qin , Shengli Liu , Kefei Chen , Manuel Charlemagne
public key cryptography 3 -12

10
2013
A QR Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things

Qinglan Zhao , Shuntong Yang , Dong Zheng , Baodong Qin
Security and Communication Networks 2019 1 -8

2019
Cloud-Assisted Attribute-Based Data Sharing with Efficient User Revocation in the Internet of Things

Dong Zheng , Baodong Qin , Yannan Li , Aikui Tian
IEEE Wireless Communications 27 ( 3) 18 -23

2
2020
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness

Shuai Han , Shengli Liu , Baodong Qin , Dawu Gu
Designs, Codes and Cryptography 86 ( 3) 517 -554

2
2018
How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks

Baodong Qin , Shuai Han , Yu Chen , Shengli Liu
Information Security and Cryptology 150 -165

2017
Tightly Secure Lossy Trapdoor Functions: Constructions and Applications

Baodong Qin
Security and Communication Networks 2019 1 -13

2019
RKA-Secure Public Key Encryptions Against Efficiently Invertible Functions

Shi-Feng Sun , Joseph K. Liu , Yu Yu , Baodong Qin
The Computer Journal 59 ( 11) 1637 -1658

1
2016
Bounded Revocable and Outsourceable ABE for Secure Data Sharing

Baodong Qin , Qinglan Zhao , Dong Zheng
The Computer Journal 61 ( 8) 1259 -1268

2018
Security Analysis and Improvement of a (t, n) Threshold Proxy Signature Scheme

Fanyu Kong , Jia Yu , Baodong Qin , Ming Li
Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007) 1 309 -314

7
2007
Privacy-Preserving Outsourced Calculation on Floating Point Numbers

Ximeng Liu , Robert H. Deng , Wenxiu Ding , Rongxing Lu
IEEE Transactions on Information Forensics and Security 11 ( 11) 2513 -2527

35
2016
New efficient chosen ciphertext secure Elgamal encryption schemes for secure cloud storage service

Xu An Wang , Jianfeng Ma , Fatos Xhafa , Baodong Qin
International Journal of Web and Grid Services 13 ( 3) 246 -269

2
2017
An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted Medical Internet of Things

Tianyu Chi , Baodong Qin , Dong Zheng
Wireless Communications and Mobile Computing 2020 1 -11

15
2020
Regularly Lossy Functions and Applications.

Yu Chen , Baodong Qin , Haiyang Xue
the cryptographers’ track at the rsa conference 491 -511

2
2018
Public key encryption resilient to leakage and tampering attacks

Shi-Feng Sun , Dawu Gu , Udaya Parampalli , Yu Yu
Journal of Computer and System Sciences 89 142 -156

1
2017
A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains

Ximeng Liu , Baodong Qin , Robert H. Deng , Rongxing Lu
IEEE Transactions on Computers 65 ( 12) 1 -1

12
2016
Escrow free attribute-based signature with self-revealability

Hui Cui , Guilin Wang , Robert H Deng , Baodong Qin
Information Sciences 367-368 660 -672

8
2016
Related-key secure key encapsulation from extended computational bilinear Diffie–Hellman

Baodong Qin , Shengli Liu , Shifeng Sun , Robert H Deng
Information Sciences 406 1 -11

2017