近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
发表期刊和会议论文40余篇,其中13篇被SCI检索(他引次数110余次),30余篇被EI检索。
ZhenhuaLiu,BinLi,QiHan,Secureandverifiableoutsourcingprotocolfornon-negativematrixfactorisation,InternationalJournalofHighPerformanceComputingandNetworking,2018,11(1):14-23.
ZhenhuaLiu,ShuhongDuan,PeilinZhou,BaocangWang,Traceable-then-revocableciphertext-policyattribute-basedencryptionscheme,FutureGenerationComputerSystems,2017,https://doi.org/10.1016/j.future.2017.09.045
ZhenhuaLiu,YaqianKang,ChenLi,YaqingFan,Hybridcloudapproachforblock-leveldeduplicationandsearchableencryptioninlargeuniverse,JournalofChinaUniversitiesofPostsandTelecommunications,2017,24(5):23-34.
ZhenhuaLiu,XiangsongZhang,YupuHu,TsuyoshiTakagi,Revocableandstronglyunforgeableidentity-basedsignatureschemeinthestandardmodel,SecurityandCommunicationNetworks,2016,9(14):2422-2433.
ZhenhuaLiu,YupuHu,XiangsongZhang,FagenLi,Efficientandstronglyunforgeableidentity-basedsignatureschemefromlatticesinthestandardmodel,SecurityandCommunicationNetworks,2013,6(1):69-77.
LiuZhenhua,ZhangXiangsong,TakagiT.,Post-quantumstronglyunforgeableidentity-basedsignatureschemefromlatticeswithoutrandomoracles,5thInternationalConferenceonIntelligentNetworkingandCollaborativeSystems,INCoS2013,Xi’an,P.R.China,2013,9.9-9.11
ZhenhuaLiu,YupuHu,XiangsongZhang,HuaMa,Provablysecuremulti-proxysignatureschemewithrevocationinthestandardmodel,ComputerCommunications,2011,34(3):494-501.
ZhenhuaLiu,YupuHu,XiangsongZhang,HuaMa,Certificatelesssigncryptionschemeinthestandardmodel,InformationSciences,2010,180(3):452-464.
ZhenhuaLiu,YupuHu,XiangsongZhang,HuaMa,Secureproxysignatureschemewithfastrevocationinthestandardmodel,TheJournalofChinaUniversitiesofPostsandTelecommunications,2009,16(4):116-124.
ZhangXiangsong,LiuZhenhua,Lattice-basedstrongly-unforgeableforward-secureidentity-basedsignatureschemewithflexiblekeyupdate,KSIITransactionsonInternetandInformationSystems,2017,11(5):2792-2810.
MaHua,PengTing,LiuZhenhua*,Directlyrevocableandverifiablekey-policyattribute-basedencryptionforlargeuniverse,InternationalJournalofNetworkSecurity,2017,19(2):272-284.
FanYaqing,LiuZhenhua,etal.,Verifiableattribute-basedmulti-keywordsearchoverencryptedclouddatainmulti-ownersetting,2ndIEEEInternationalConferenceonDataScienceinCyberspace,DSC2017,Shenzhen,China,2017.6.26-6.29,IEEE,pp:441-449.
KangYaqian,LiuZhenhua,Afullysecureverifiableandoutsourceddecryptionrankedsearchableencryptionschemesupportingsynonymquery,2ndIEEEInternationalConferenceonDataScienceinCyberspace,DSC2017,Shenzhen,P.R.China,2017.6.26-6.29,IEEE,pp:223-231.
ZhenhuaLiu*,ZhangXiangsong,HuYupu,Revocableandstronglyunforgeableidentity-basedsignatureschemeinthestandardmodel,SecurityandCommunicationNetworks,2016,9(14):2422-2433.
WangFenghe,LiuZhenhua,WangChunxiao,Fullsecureidentity-basedencryptionschemewithshortpublickeysizeoverlatticesinthestandardmodel,InternationalJournalofComputerMathematics,2016,93(6):854-863.
WangFenghe,LiuZhenhua,Shortandprovablesecurelattice-basedsignatureschemeinthestandardmodel,SecurityandCommunicationNetworks,2016,9(16):3627-3632.
XiangsongZhang,ZhenhuaLiu*,YupuHu,TsuyoshiTakagi,RevocableIdentity-basedsigncryptionschemewithoutrandomoracles,InternationalJournalofNetworkSecurity,2015,17(2):110-122.
XiangXinyin,LiHui,WangMingyu,LiuZhenhua,Hiddenattribute-basedsigncryptionschemeforlattice,SecurityandCommunicationNetworks,2014,7(11):1780-1787.
XiangsongZhang,ZhenhuaLiu,SanyangLiu,AtrustregionSQP-filtermethodfornonlinearsecond-orderconeprogramming,Computers&MathematicswithApplications,2012,63(12):1569-1576.
XiangsongZhang,SanyangLiu,ZhenhuaLiu,Aregularizationsmoothingmethodforsecond-orderconecomplementarityproblem,NonlinearAnalysis:RealWorldApplications,2011,12(1):731-740.
XiangsongZhang,SanyangLiu,ZhenhuaLiu,Apredictor-correctorsmoothingmethodforsecond-orderconeprogramming,JournalofAppliedMathematicsandComputing,2010,32(2):369-381.
XiangsongZhang,SanyangLiu,ZhenhuaLiu,Anon-interior-pointsmoothingmethodforvariationalinequalityproblem,JournalofComputationalandAppliedMathematics,2010,234(3):713-721.
XiangsongZhang,SanyangLiu,ZhenhuaLiu,Asmoothingmethodforsecondorderconecomplementarityproblem,JournalofComputationalandAppliedMathematics,2009,228(1):83-91.
LiuZhenhua*,LiBin,Secureandverifiableoutsourcingprotocolfornon-negativematrixfactorization,theFirstInternationalWorkshoponCyberSecurity,CS-2015,Xi'an,P.R.China,2015,10.16-10.18.
ZhouPeilin,LiuZhenhua*,DuanShuhong,Flexibleattribute-basedkeywordsearchviatwoaccesspolicies,11thInternationalConferenceonBroadbandWirelessComputing,CommunicationandApplications,BWCCA2016,Asan,Korea,2016,11.5-11.7.
DuanShuhong,LiuZhenhua*,ZhouPeilin,Aprivacy-preservingpersonalhealthrecordwithsearchabilityandrevocabilityusingattribute-basedencryption,11thInternationalConferenceonBroadbandWirelessComputing,CommunicationandApplications,2016,11.5-11.7.
YanXuewei,MaHua,LiuZhenhua,PengTing,Largeuniverserevocablefine-grainedencryptionwithpublicauditing,11thInternationalConferenceonBroadbandWirelessComputing,CommunicationandApplications,2016,11.5-11.7.
ZhangLinchao,MaHua,LiuZhenhua,DongEnting,Securityanalysisandimprovementofacollusion-resistantidentity-basedproxyre-encryptionscheme,11thInternationalConferenceonBroadbandWirelessComputing,CommunicationandApplications,2016,11.5-11.7.
ZuLonghui,LiuZhenhua*,LiJuanjuan,Newciphertext-policyattribute-basedencryptionwithefficientrevocation,2014IEEEInternationalConferenceonComputerandInformationTechnology,CIT2014,Xi’an,P.R.China,2014,9.11-9.13.
LiJuanjuan,LiuZhenhua*,ZuLonghui,Chosen-ciphertextsecuremulti-useunidirectionalattribute-basedproxyre-encryptions,9thAsiaJointConferenceonInformationSecurity,AsiaJCIS2014,Wuhan,P.R.China,2014,9.3-9.5.