A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing H Wang, Y Li, W Susilo, DH Duong, F Luo Computer Standards & Interfaces 82, 103635, 2022 | 28 | 2022 |
Chosen-ciphertext secure homomorphic proxy re-encryption F Luo, S Al-Kuwari, W Susilo, DH Duong IEEE Transactions on Cloud Computing 10 (4), 2398-2408, 2020 | 23 | 2020 |
Attribute-based proxy re-encryption from standard lattices F Luo, S Al-Kuwari, F Wang, K Chen Theoretical Computer Science 865, 52-62, 2021 | 22 | 2021 |
SVFL: Efficient secure aggregation and verification for cross-silo federated learning F Luo, S Al-Kuwari, Y Ding IEEE Transactions on Mobile Computing 23 (1), 850-864, 2022 | 21 | 2022 |
P2SIM: Privacy-Preserving and Source-Reliable Incentive Mechanism for Mobile Crowdsensing X Yan, WWY Ng, B Zeng, B Zhao, F Luo, Y Gao IEEE Internet of Things Journal 9 (24), 25424-25437, 2022 | 19 | 2022 |
Attribute-based proxy re-signature from standard lattices and its applications F Luo, S Al-Kuwari, W Susilo, DH Duong Computer Standards & Interfaces 75, 103499, 2021 | 17 | 2021 |
A more efficient leveled strongly-unforgeable fully homomorphic signature scheme F Luo, F Wang, K Wang, K Chen Information Sciences 480, 70-89, 2019 | 17 | 2019 |
LWR‐based fully homomorphic encryption, revisited F Luo, F Wang, K Wang, J Li, K Chen Security and Communication Networks 2018 (1), 5967635, 2018 | 17 | 2018 |
Revocable attribute-based encryption from standard lattices F Luo, S Al-Kuwari, H Wang, F Wang, K Chen Computer Standards & Interfaces 84, 103698, 2023 | 16 | 2023 |
Verifiable decryption for fully homomorphic encryption F Luo, K Wang International Conference on Information Security, 347-365, 2018 | 13 | 2018 |
Fully homomorphic encryption based on the ring learning with rounding problem F Luo, F Wang, K Wang, K Chen IET Information Security 13 (6), 639-648, 2019 | 8 | 2019 |
Abaeks: Attribute-based authenticated encryption with keyword search over outsourced encrypted data F Luo, H Wang, C Lin, X Yan IEEE Transactions on Information Forensics and Security, 2023 | 7 | 2023 |
Revocable attribute-based proxy re-encryption F Luo, S Al-Kuwari Journal of Mathematical Cryptology 15 (1), 465-482, 2021 | 7 | 2021 |
Public trace-and-revoke proxy re-encryption for secure data sharing in clouds F Luo, H Wang, W Susilo, X Yan, X Zheng IEEE Transactions on Information Forensics and Security, 2024 | 6 | 2024 |
ESAFL: Efficient Secure Additively Homomorphic Encryption for Cross-Silo Federated Learning J Wu, W Zhang, F Luo arXiv preprint arXiv:2305.08599, 2023 | 6 | 2023 |
Generic construction of black-box traceable attribute-based encryption F Luo, S Al-Kuwari IEEE Transactions on Cloud Computing 11 (1), 942-955, 2021 | 6 | 2021 |
Leveled hierarchical identity-based fully homomorphic encryption from learning with rounding F Luo, K Wang, C Lin International Conference on Information Security Practice and Experience …, 2018 | 6 | 2018 |
A provable data possession scheme with data hierarchy in cloud C Lin, F Luo, H Wang, Y Zhu Information Security and Cryptology: 11th International Conference, Inscrypt …, 2016 | 5 | 2016 |
Multi-key fully homomorphic encryption without CRS from RLWE F Luo, H Wang, AK Saif, W Han Computer Standards & Interfaces 86, 103742, 2023 | 4 | 2023 |
Comments on “VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning” F Luo, H Wang, X Yan IEEE Transactions on Dependable and Secure Computing 21 (1), 499-500, 2023 | 4 | 2023 |