HOME > Publications

Journal Papers

  1. Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura, and Licheng Wang, "Certificate-Based Proxy Decryption Systems with Revocability in the Standard Model," Information Science, 247:188-201 (2013)
    Abstract   Paper   
     Issue2
  2. Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan and Yixian Yang, "Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie-Hellman Assumption," The computer Journal, 56(10):1249-1257 (2013)
    Abstract   Paper    
     Issue2
  3. Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan, and Yixian Yang, “Efficient Threshold PKE with Full Security Based on Dual Pairing Vector Spaces”, International Journal of Communication Systems (2013)
    Abstract   Paper   
     Issue2
  4. Tanaka Hidema,Lihua Wang,Ryuichi Ichikawa, Tukasa Iwama, and Yasuhiro Koyama,"Position Authentication Using Homomorphic Encryption," IEICE, J96-D(8): 1913-1924 (2013)
    Abstract   Paper   
     Issue2
  5. Ping Pan, Licheng Wang, Yuanju Gan, and Yixian Yang, Lihua Wang, "Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups," Fundamental Informaticae, 126: 103-119 (2013)
    Abstract   Paper   
     Issue1
  6. Jianhua Yan, Licheng Wang, Lihua Wang, Yixian Yang, Wenbin Yao. “Efficient Lattice-Based Signcryption in Standard Model”,Mathematical Problems in Engineering (2013)
    Abstract   Paper   
     Issue1
  7. Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan and Yixian Yang, "Publicly Verifiable Secret Sharing Scheme with Provable SecurityAgainst Chosen Secret Attacks," International Journal of Distributed Sensor Networks (2013).
    Abstract   Paper   
     Issue2
  8. Lihua Wang, Lichen Wang, Masahiro Mambo, and Eiji Okamoto, "Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities," IEICE Transaction on Fundamentals, E95-A(1):70-88 (2012)
    Abstract   Paper   
     Issue2
  9. Ping Pan, Lihua Wang, Licheng Wang, Lixiang Li, and Yixian Yang, "CSP-DHIES: A New Public-Key Encryption Scheme From Matrix Conjugation," Security and Communication Networks, 5(7): 809–822 (2012)
    Abstract   Paper   
     Issue1

International Conference

  1. Yoshinori Aono, Xavior Boyen, L.T. Phong, Lihua Wang, "Key-Private Proxy Re-encryption under LWE," INDOCRYPT 2013, Springer-Verlag, Berlin, LNCS 8250: 1-18 (2013)
    Abstract   Paper   Slide   
     Issue1
       
     Issue2

Symposium Presented Papers


  1. Lihua Wang, Atsushi Waseda, Ryo Nojima, and Shiho Moriai, "PRINCESS: Proxy Re-encryption with INd-Cca security in Encrypted file Storage System," SCIS2014.
    Abstract   Paper   
     Issue2
  2. Lihua Wang, "Study on CSP-based Cryptography," Algebraic Systems and Theoretical Computer Science, Feb. 2012.
    Abstract   
     Issue1
  3. Yuanju Gan, Lihua Wang, Ping Pan, Licheng Wang, and Yixian Yang, "A CCA Secure Threshold KEM Scheme," SCIS2012.
    Abstract   Paper   
     Issue2
  4. Lihua Wang, Hidema Tanaka, Ryuichi Ichikawa, Tukasa Iwama, and Yasuhiro Koyama, "Position Information Authentication Using Electric Waves," SITA2011.
    Abstract   Paper   
     Issue2
TOP                
Paper