Current position: Home > Scientific Research > Paper Publications
Paper Publications
- 2022-10-24
[1]. Jun Huang , Debiao He , Yitao Chen , Muhammad Khurram Khan and Min Luo. A blockchain-based self-tallying voting protocol with maximum voter privacy. IEEE Transactions on Network Science and Engineering, DOI:10.1109/TNSE.2022.3190909, 2022.
- 2022-10-24
[2]. Xiaotong Zhou , Debiao He , Muhammad Khurram Khan , Wei Wu and Kim-Kwang Raymond Choo. An efficient blockchain-based conditional privacy-preserving authentication protocol for VANETs. IEEE Transactions on Vehicular Technology, DOI: 10.1109/TVT.2022.3204582, 2022.
- 2022-10-24
[3]. Zijian Bao , Debiao He , Muhammad Khurram Khan , Min Luo and Qi Xie. PBIDM: Privacy-preserving blockchain-based identity management system for Industrial Internet of Things. IEEE Transactions on Industrial Informatics, DOI: 10.1109/TII.2022.3206798, 2022.
- 2022-10-24
[4]. Xinyi Hu , Debiao He , Min Luo , Cong Peng , Qi Feng and Xinyi Huang. High-performance implementation of the identity-based signature scheme in the IEEE P1363 on GPU. ACM Transactions on Embedded Computing Systems, DOI: 10.1145/3564784, 2022.
- 2022-10-24
[5]. Chao Lin , Xinyi Huang and Debiao He. EBCPA: efficient blockchain-based conditional privacy-preserving authentication for VANETs. IEEE Transactions on Dependable and Secure Computing, DOI: 10.1109/TDSC.2022.3164740, 2022.
- 2022-10-24
[6]. Zhichao Yang , Debiao He , Longjiang Qu and Jianqiao Xu. On the security of a lattice-based multi-stage secret sharing scheme. IEEE Transactions on Dependable and Secure Computing, DOI: 10.1109/TDSC.2022.3209011, 2022..
- 2022-10-24
[7]. Yulin Liu , Debiao He , Zijian Bao , Huaqun Wang , Muhammad Khurram Khan and Kim-Kwang Raymond Choo. An efficient multilayered linkable ring signature scheme with logarithmic size for anonymous payment in vehicle-to-grid networks. IEEE Transactions on Intelligent Vehicles, DOI: 10.1109/TIV.2022.3216949, 2022.
- 2022-10-24
[8]. Jing Wang , Debiao He , Aniello Castiglione , Brij B. Gupta , Marimuthu Karuppiah and Libing Wu. PCNN_{CEC}: Efficient and privacy-preserving convolutional neural network inference based on cloud-edge-client collaboration. IEEE Transactions on Network Science and Engineering, DOI: 10.1109/TNSE.2022.3177755, 2022..
- 2022-10-24
[9]. Yi Yang , Debiao He , Pandi Vijayakumar , Brij B. Gupta and Qi Xie. An efficienct identity-based aggregate signcryption scheme with blockchain for IoT-enabled maritime transportation system. IEEE Transactions on Green Communications and Networking, vol. 6, no. 3, pp. 1520-1531, 2022..
- 2022-10-24
[10]. Jinglin Zou , Debiao He , Sherali Zeadally , Neeraj Kumar , Huaqun Wang and Kkwang Raymond Choo. Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges. ACM Computing Surveys, vol. 54, no. 8, pp. 160:1-160:36, 2022.
- 2022-10-24
[11]. Jun Huang , Debiao He , Mohammad S. Obaidat , Pandi Vijayakumar , Min Luo and Kim-Kwang Raymond Choo. The application of the blockchain technology in voting systems: a review. ACM Computing Surveys, vol. 54, no. 3, Article ID: 60, 28 pages, 2022.
- 2022-10-24
[12]. Quanrun Li , Debiao He , Zhichao Yang , Qi Xie and Kim-Kwang Raymond Choo. A lattice-based conditional privacy-preserving authentication protocol for the vehicular ad hoc network. IEEE Transactions on Vehicular Technology, vol. 71, no. 4, pp. 4336-4347, 2022.
- 2022-10-24
[13]. Huaqun Wang , Debiao He , Anmin Fu , Qi Li and Qihua Wang. Provable data possession with outsourced data transfer. IEEE Transactions on Services Computing, vol. 14, no. 6, pp. 2000-2010, 2021.
- 2022-10-24
[14]. Chao Lin , Debiao He , Xinyi Huang , Neeraj Kumar and Kim-Kwang Raymond Choo. BCPPA: A blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 2020.vol. 12, no. 2, pp. 7408-7420, 2021.
- 2022-10-24
[15]. Biwen Chen , Debiao He , Neeraj Kumar , Huaqun Wang and Kim-Kwang Raymond Choo. A blockchain-based proxy re-encryption with equality test for vehicular communication systems. IEEE Transactions on Network Science and Engineering, vol. 8, no. 3, pp. 2048-2059, 2021.
- 2022-10-24
[16]. Huaqun Wang , Qihua Wang and Debiao He. Blockchain-based private provable data possession. IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 5, pp. 2379-2389, 2021.
- 2022-10-24
[17]. Zhen Zhou , Debiao He , Zhe Liu , Min Luo and Kim-Kwang Raymond Choo. A software/hardware co-design of Crystals-Dilithium signature scheme. ACM Transactions on Reconfigurable Technology and Systems, vol. 14, no. 2, Article ID: 11, 21 pages, 2021.
- 2022-10-24
[18]. Chao Lin , Debiao He , Xinyi Huang and Kim-Kwang Raymond Choo. OBFP: Optimized blockchain-based fair payment for outsourcing computations in cloud computing. IEEE Transactions on Information Forensics and Security, vol. 16, pp. 3241-3253, 2021.
- 2022-10-24
[19]. Yudi Zhang , Debiao He , Mohammad S. Obaidat , Pandi Vijayakumar and Kuei-Fang Hsiao. Efficient identity-based distributed decryption scheme for electronic personal health record sharing system. IEEE Journal on Selected Areas in Communications, vol. 39, no. 2, pp. 384-395, 2021.
- 2022-10-24
[20]. Chao Lin , Debiao He , Zeadally Sherali , Xinyi Huang and Zhe Liu. Blockchain-based data sharing system for sensing-as-a-service in smart cities. ACM Transactions on Internet Technology, vol. 21, no. 2, 1-21, 2021.
- 2022-10-24
[21]. Shunli Ma , Yi Deng , Debiao He , Jiang Zhang and Xiang Xie. An efficient NIZK scheme for privacy-preserving transactions over account-model blockchain. IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 2, pp. 641 - 651, 2021.
- 2022-10-24
[22]. Chao Lin , Debiao He , Xinyi Huang , Muhammad Khurram Khan and Kim-Kwang Raymond Choo. DCAP: A secure and efficient decentralized conditional anonymous payment system based on blockchain. IEEE Transactions on Information Forensics and Security, vol. 15, no. 1, pp. 2440-2452, 2020.
- 2022-10-24
[23]. Qi Feng , Debiao He , Zhe Liu , Ding Wang and Kim-Kwang Raymond Choo. Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography. IET Information Security, vol. 14, no. 6, pp. 724-732, 2020.
- 2022-10-24
[24]. Qi Feng , Debiao He , Zhe Liu , Ding Wang and Kim-Kwang Raymond Choo. Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme. IET Information Security, vol.14, no .4, pp. 443-451, 2020.
- 2022-10-24
[25]. Huaqun Wang , Debiao He , Zhe Liu and Rui Guo. Blockchain-based anonymous reporting scheme with anonymous rewarding. IEEE Transactions on Engineering Management, vol. 67, no. 4, pp. 1514-1524, 2020.
- 2022-10-24
[26]. Debiao He , Yudi Zhang , Ding Wang and Kim-Kwang Raymond Choo. Secure and efficient two-party signing protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography. IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 5, pp. 1124-1132, 2020.
- 2022-10-24
[27]. Qi Feng , Debiao He , Zhe Liu , Huaqun Wang and Kim-Kwang Raymond Choo. SecureNLP: A system for multi-party privacy-preserving natural language processing. IEEE Transactions on Information Forensics and Security, vol. 15, pp. 3709-3721, 2020.
- 2022-10-24
[28]. Qi Feng , Debiao He , Zhe Liu , Ding Wang and Raymond Choo. Multi-party signing protocol for the identity-based signature scheme in IEEE P1363 standard. IET Information Security, vol. 14, no. 4, pp. 443-451, 2020.
- 2022-10-24
[29]. Qi Feng , Debiao He , Sherali Zeadally and Kaitai Liang. BPAS: Blockchain-assisted privacy-preserving authentication system for vehicular ad-hoc networks. IEEE Transactions on Industrial Informatics, vol. 16, no. 6, pp. 4146 - 4155, 2020.
- 2022-10-24
[30]. Chao Lin , Debiao He , Sherali Zeadally , Neeraj Kumar and Kim-Kwang Raymond Choo. SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system. SCIENCE CHINA-Information Sciences , vol. 63, no. 3, ArticleID: 130102, 14 pages, 2020.
- 2022-10-24
[31]. Huaqun Wang , Debiao He and Jinguang Han. VOD-ADAC: Anonymous distributed fine-grained access control protocol with verifiable outsourced decryption in public cloud. IEEE Transactions on Services Computing, vol. 13, no. 3, pp. 572-583, 2020.
- 2022-10-24
[32]. Huaqun Wang , Debiao He , Jia Yu and Zhiwei Wang. Incentive and unconditionally anonymous identity-based public provable data possession. IEEE Transactions on Services Computing, vol. 12, no. 5, pp. 824-835, 2019.
- 2022-10-24
[33]. Ding Wang , Ping Wang , Debiao He , Yuan Tian and Birthday. Name and Bifacial-security: Understanding Passwords of Chinese Web Users. The 28th USENIX Security Symposium (USENIX Security'19), pp.1537-1555, 2019.
- 2022-10-24
[34]. Debiao He , Neeraj Kumar , Huaqun Wang , Lina Wang , Kim-Kwang Raymond Choo and Alexey Vinel. A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network. IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 4. pp. 633-645, 2018.
- 2022-10-24
[35]. Debiao He , Neeraj Kumar , Sherali Zeadally and Huaqun Wang. Certificateless provable data possession scheme for cloud-based smart grid data management systems. IEEE Transactions on Industrial Informatics, vol. 14, no. 3, pp. 1232-1241, 2018.
- 2022-10-24
[36]. Debiao He , Mimi Ma , Sherali Zeadally , Neeraj Kumar and Kaitai Liang. Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things. IEEE Transaction on Industrial Informatics, vol. 14, no. 8, pp. 3618-3627, 2018.
- 2022-10-24
[37]. Mimi Ma , Debiao He , Neeraj Kumar , Kim-Kwang Raymond Choo and Jianhua Chen. Certificateless searchable public key encryption scheme for industrial internet of things. IEEE Transactions on Industrial Informatics, vol. 14, no. 2, pp. 759-767.
- 2022-10-24
[38]. Libing Wu , Yubo Zhang , Kim-Kwang Raymond Choo and Debiao He. Efficient identity-based encryption scheme with equality test for smart city. IEEE Transactions on Sustainable Computing, vol. 3, no. 1, pp. 44-55, 2018.
- 2022-10-24
[39]. Debiao He , Neeraj Kumar , Sherali Zeadally , Alexey Vinel and Laurence T Yang. Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries. IEEE Transactions on Smart Grid, vol. 8, no. 5, pp. 2411-2419, 2017.
- 2022-10-24
[40]. Debiao He , Neeraj Kumar , Kim-Kwang Raymond Choo and Wei Wu. Efficient hierarchical identity-based signature with batch verification for automatic dependent surveillance-broadcast system. IEEE Transactions on Information Forensics and Security, vol. 12, no. 2, pp. 454-464, 2017.
- 2022-10-24
[41]. Debiao He , Ding Wang , Qi Xie and Kefei Chen. Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation. Science China-Information Sciences, vol. 60, no. 5, pp. 1-17, 2017.
- 2022-10-24
[42]. Huaqun Wang , Debiao He and Shibin Zhang. Balanced anonymity and traceability for outsourcing small-scale data linear aggregation in the smart grid. IET Information Security, vol. 11, no. 3, pp. 131 - 138, 2017.
- 2022-10-24
[43]. Debiao He , Neeraj Kumar , Han Shen and Jong-Hyouk Lee. One-to-many authentication for access control in mobile pay-TV systems. Science China-Information Sciences, vol. 59, no. 5, pp. 1–14, 2016.
- 2022-10-24
[44]. Debiao He , Sherali Zeadally , Neeraj Kumar and Wei Wu. Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures. IEEE Transactions on Information Forensics and Security, vol. 11, no. 9, pp. 2052-2064, 2016.
- 2022-10-24
[45]. Ding Wang , Debiao He , Haibo Cheng and Ping Wang. fuzzyPSM: A new password strength meter using fuzzy probabilistic context-free grammars. The 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016), pp. 595-606, 2016.
- 2022-10-24
[46]. Huaqun Wang , Debiao He and Shaohua Tang. Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Transactions on Information Forensics and Security, vol. 11, no. 6, pp. 1165- 1176, 2016.
- 2022-10-24
[47]. Debiao He , Sherali Zeadally , Baowen Xu and Xinyi Huang. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad-hoc networks. IEEE Transactions on Information Forensics and Security , vol. 10, no. 12, pp. 1681-2691, 2015.
- 2022-10-24
[48]. Debiao He , Neeraj Kumar and Jong-Hyouk Lee. Enhanced three-factor security protocol for USB consumer storage devices. IEEE Transactions on Consumer Electronics, vol. 60, no. 1, pp. 30-37, 2014.
- 2022-10-24
[49]. Debiao He , Neeraj Kumar , Muhammad Khurram Khan and Jong-Hyouk Lee. Anonymous two-factor authentication for consumer roaming service in Global Mobility Networks. IEEE Transactions on Consumer Electronics, vol. 59, no. 4, pp. 811-817, 2013.
- 2022-10-24
[50]. Debiao He , Baojun Huang and Jianhua Chen. New certificateless short signature scheme. IET Information Security, vol. 7, no. 2. pp. 113-117, 2013.
- 2022-10-24
[51]. Debiao He , Yitao Chen , Jianhua Chen and Rui Zhang. A new two-round certificateless authenticated key agreement protocol without bilinear pairings. Mathematical and Computer Modelling, vol. 54, no. 11, pp. 3143–3152, 2011.
- 2022-10-24
[52]. Debiao He , Jianhua Chen and Yu Wang. On Diophantine equation 3a^2 x^4-By^2=1. Annali di Matematica Pura ed Applicata, vol. 189, no. 4, pp. 679-687, 2010.
|