Name
Affiliation
Papers
BAODONG QIN
Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
46
Collaborators
Citations 
PageRank 
61
190
19.40
Referers 
Referees 
References 
478
639
519
Search Limit
100639
Title
Citations
PageRank
Year
Blockchain-Based Auditable Privacy-Preserving Data Classification for Internet of Things00.342022
Improved Security Model for Public-Key Authenticated Encryption with Keyword Search00.342021
Forward-Secure Revocable Identity-Based Encryption00.342021
Key regeneration-free ciphertext-policy attribute-based encryption and its application.10.402020
Space efficient revocable IBE for mobile devices in cloud computing00.342020
Public-key authenticated encryption with keyword search revisited: Security model and constructions.30.382020
An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted Medical Internet of Things10.352020
Robust digital signature revisited00.342020
A QR Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things00.342019
Constructions Of 2-Rotation Symmetric Semi-Bent Functions With Degree Bigger Than 200.342019
Tightly Secure Lossy Trapdoor Functions: Constructions and Applications.00.342019
Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing.10.352019
(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance.20.362019
Regular lossy functions and their applications in leakage-resilient cryptography.20.372018
LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF.00.342018
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness.00.342018
Bounded Revocable and Outsourceable ABE for Secure Data Sharing.00.342018
Regularly Lossy Functions and Applications00.342018
Chameleon all-but-one extractable hash proof and its applications.00.342018
A new construction on randomized message-locked encryption in the standard model via UCEs.20.442017
An Efficient Privacy-Preserving Outsourced Computation over Public Data.80.442017
New Efficient Chosen Ciphertext Secure Elgamal Encryption Schemes For Secure Cloud Storage Service10.362017
Public key encryption resilient to leakage and tampering attacks.00.342017
Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman.00.342017
How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks.00.342016
RKA-Secure Public Key Encryptions Against Efficiently Invertible Functions.10.352016
Certificateless encryption secure against selective opening attack.00.342016
Privacy-Preserving Outsourced Calculation on Floating Point Numbers.160.572016
Privacy-Preserving Patient-Centric Clinical Decision Support System on Naive Bayesian Classification451.292016
Escrow free attribute-based signature with self-revealability.00.342016
A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains.40.412016
Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption300.872015
Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience70.742015
Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited.80.502015
Server-Aided Revocable Identity-Based Encryption.60.452015
Leakage-resilient lossy trapdoor functions and public-key encryption60.422013
Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter.250.712013
Fixing the Sender-Equivocable Encryption Scheme in Eurocrypt 201060.552013
Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem.30.392013
Efficient chosen ciphertext secure public-key encryption under factoring assumption.30.392013
Sender-Equivocable Encryption Schemes Secure Against Chosen-Ciphertext Attacks Revisited50.412012
New left-to-right minimal weight signed-digit radix-r representation20.412009
Cryptanalysis of a type of CRT-based RSA algorithms10.352008
Cryptanalysis of server-aided RSA key generation protocols at MADNES 200510.352007
Security Analysis of wrNAF and SPA Resistant Scalar Multiplication00.342007
Wide-w-NAF Method for Scalar Multiplication on Koblitz Curves00.342007