Signature: TVES: Threshold Verifiably Encrypted Signature and Its Applications.- Compact Accountable Ring Signatures in the Plain Model.- Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.- Compact Ring Signatures with Post-Quantum Security in Standard Model.- Secure Multi-Party SM2 Signature based on SPDZ Protocol.- Blockchain: Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryption.- A General Federated Learning Scheme with Blockchain on non-IID Data.- A Blockchain-Based Personal Health Record Sharing Scheme with Security and Privacy Preservation.
- Cryptography primitive: General Constructions of Fuzzy Extractors for Continuous Sources.- Geometry-based Garbled Circuits Relying Solely on One Evaluation Algorithm under Standard Assumption.- Full Domain Functional Bootstrapping with Least Significant Bit Encoding.- Public key cryptography: PFE: Linear Active Security, Double-Shuffle Proofs, and LowComplexity Communication.- CCA-secure Identity-Based Matchmaking Encryption from Standard Assumptions.-Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications.- Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction.- Identity-Based Proxy Re-encryption Based on SM9.
- Security and Privacy: SecCDS: Secure Crowdsensing Data Sharing Scheme Supporting Aggressive Query.- An Improved Method for Evaluating Secret Variables and Its Application to WAGE.- Exploring Emotion Trends in Product Reviews: A Multi-modal Analysis with Malicious Comment Filtering and User Privacy Protection.- XPORAM: A Practical Multi-Client ORAM against Malicious Adversaries.- A Multi-scene Webpage Fingerprinting Method Based on Multi-head Attention and Data Enhancement.- A Lightweight Access Control Scheme Supporting Policy Hidden based on Path Bloom Filter.- MFL-RAT: Multi-class Few-shot Learning Method For Encrypted RAT Traffic Detection.