huang lin
huang lin
Shanghai Jiao Tong University/University of florida
Verified email at ufl.edu - Homepage
Title
Cited by
Cited by
Year
Attribute based proxy re-encryption with delegating capabilities
X Liang, Z Cao, H Lin, J Shao
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
2342009
Provably secure and efficient bounded ciphertext policy attribute based encryption
X Liang, Z Cao, H Lin, D Xing
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
1592009
Secure threshold multi authority attribute based encryption without a central authority
H Lin, Z Cao, X Liang, J Shao
International Conference on Cryptology in India, 426-436, 2008
1552008
Proxy re-encryption with keyword search
J Shao, Z Cao, X Liang, H Lin
Information Sciences 180 (13), 2576-2587, 2010
1372010
CAM: cloud-assisted privacy preserving mobile health monitoring
H Lin, J Shao, C Zhang, Y Fang
IEEE Transactions on Information Forensics and Security 8 (6), 985-997, 2013
1282013
Secure threshold multi authority attribute based encryption without a central authority
H Lin, Z Cao, X Liang, J Shao
Information Sciences 180 (13), 2618-2632, 2010
1272010
Short group signature without random oracles
X Liang, Z Cao, J Shao, H Lin
International Conference on Information and Communications Security, 69-82, 2007
612007
FairTest: Discovering unwarranted associations in data-driven applications
F Tramer, V Atlidakis, R Geambasu, D Hsu, JP Hubaux, M Humbert, ...
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 401-416, 2017
592017
Sealed-glass proofs: Using transparent enclaves to prove and sell knowledge
F Tramer, F Zhang, H Lin, JP Hubaux, A Juels, E Shi
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 19-34, 2017
562017
Towards practical lattice-based one-time linkable ring signatures
C Baum, H Lin, S Oechsner
International Conference on Information and Communications Security, 303-322, 2018
242018
A privacy-preserving solution for compressed storage and selective retrieval of genomic data
Z Huang, E Ayday, H Lin, RS Aiyar, A Molyneaux, Z Xu, J Fellay, ...
Genome Research 26 (12), 1687-1696, 2016
182016
Discovering unwarranted associations in data-driven applications with the fairtest testing toolkit
F Tramèr, V Atlidakis, R Geambasu, DJ Hsu, JP Hubaux, M Humbert, ...
CoRR, abs/1510.02377, 2015
162015
Privacy preserving friend search over online social networks
H Lin, SSM Chow, D Xing, Y Fang, Z Cao
Cryptology ePrint Archive, Report 2011/445, 2011
132011
Efficient trust based information sharing schemes over distributed collaborative networks
H Lin, X Zhu, Y Fang, D Xing, C Zhang, Z Cao
IEEE Journal on Selected Areas in Communications 31 (9), 279-290, 2013
112013
How to design space efficient revocable IBE from non-monotonic ABE
H Lin, Z Cao, Y Fang, M Zhou, H Zhu
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
112011
Privacy-aware profiling and statistical data extraction for smart sustainable energy systems
H Lin, Y Fang
IEEE Transactions on Smart Grid 4 (1), 332-340, 2013
102013
How to construct interval encryption from binary tree encryption
H Lin, Z Cao, X Liang, M Zhou, H Zhu, D Xing
International Conference on Applied Cryptography and Network Security, 19-34, 2010
72010
SQC: secure quality control for meta-analysis of genome-wide association studies
Z Huang, H Lin, J Fellay, Z Kutalik, JP Hubaux
Bioinformatics 33 (15), 2273-2280, 2017
52017
Methods and apparatuses for key generation, encryption and decryption in broadcast encryption
Z Cao, H Lin, X Dong, X Liang, D Xing
US Patent 8,290,154, 2012
22012
Methods and apparatuses for key generation, encryption and decryption in broadcast encryption
Z Cao, H Lin, X Dong, X Liang, D Xing
US Patent App. 12/761,852, 2010
22010
The system can't perform the operation now. Try again later.
Articles 1–20