-
Zhenhua Liu, Bin Li, Qi Han, Secure and verifiable outsourcing protocol for non-negative matrix factorisation, International Journal of High Performance Computing and Networking, 2018,11(1): 14-23.
-
Zhenhua Liu, Shuhong Duan, Peilin Zhou, Baocang Wang, Traceable-then-revocable ciphertext-policy attribute-based encryption scheme, Future Generation Computer Systems, 2017, https://doi.org/10.1016/j.future.2017.09.045
-
Zhenhua Liu, Yaqian Kang, Chen Li, Yaqing Fan, Hybrid cloud approach for block-level deduplication and searchable encryption in large universe, Journal of China Universities of Posts and Telecommunications, 2017, 24(5): 23-34.
-
Zhenhua Liu, Xiangsong Zhang, Yupu Hu, Tsuyoshi Takagi, Revocable and strongly unforgeable identity-based signature scheme in the standard model, Security and Communication Networks, 2016, 9(14): 2422-2433.
-
Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Fagen Li, Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model, Security and Communication Networks, 2013, 6(1): 69-77.
-
Liu Zhenhua, Zhang Xiangsong, Takagi T., Post-quantum strongly unforgeable identity- based signature scheme from lattices without random oracles, 5th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2013, Xi’an, P.R. China, 2013, 9.9-9.11
-
Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Hua Ma, Provably secure multi-proxy signature scheme with revocation in the standard model, Computer Communications, 2011, 34(3): 494-501.
-
Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Hua Ma, Certificateless signcryption scheme in the standard model, Information Sciences, 2010, 180(3): 452-464.
-
Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Hua Ma, Secure proxy signature scheme with fast revocation in the standard model, The Journal of China Universities of Posts and Telecommunications, 2009, 16(4): 116-124.
-
Zhang Xiangsong, Liu Zhenhua, Lattice-based strongly-unforgeable forward-secure identity-based signature scheme with flexible key update, KSII Transactions on Internet and Information Systems, 2017,11(5): 2792-2810.
-
Ma Hua, Peng Ting, Liu Zhenhua*, Directly revocable and verifiable key- policy attribute-based encryption for large universe, International Journal of Network Security, 2017, 19(2): 272-284.
-
Fan Yaqing, Liu Zhenhua, et al., Verifiable attribute-based multi-keyword search over encrypted cloud data in multi-owner setting, 2nd IEEE International Conference on Data Science in Cyberspace, DSC2017, Shenzhen, China, 2017.6.26-6.29, IEEE, pp:441-449.
-
Kang Yaqian, Liu Zhenhua, A fully secure verifiable and outsourced decryption ranked searchable encryption scheme supporting synonym query, 2nd IEEE International Conference on Data Science in Cyberspace, DSC2017, Shenzhen, P.R. China, 2017.6.26-6.29, IEEE, pp:223-231.
-
Zhenhua Liu*, Zhang Xiangsong, Hu Yupu, Revocable and strongly unforgeable identity-based signature scheme in the standard model, Security and Communication Networks, 2016, 9(14): 2422-2433.
- Wang Fenghe, Liu Zhenhua, Wang Chunxiao, Full secure identity-based encryption scheme with short public key size over lattices in the standard model, International Journal of Computer Mathematics, 2016, 93(6): 854-863.
- Wang Fenghe, Liu Zhenhua, Short and provable secure lattice-based signature scheme in the standard model, Security and Communication Networks, 2016, 9(16): 3627-3632.
- Xiangsong Zhang, Zhenhua Liu*, Yupu Hu, Tsuyoshi Takagi, Revocable Identity-based signcryption scheme without random oracles, International Journal of Network Security, 2015,17(2):110-122.
- Xiang Xinyin, Li Hui, Wang Mingyu, Liu Zhenhua, Hidden attribute-based signcryption scheme for lattice, Security and Communication Networks, 2014, 7(11): 1780-1787.
- Xiangsong Zhang, Zhenhua Liu, Sanyang Liu, A trust region SQP-filter method for nonlinear second-order cone programming, Computers & Mathematics with Applications, 2012, 63(12):1569-1576.
- Xiangsong Zhang, Sanyang Liu, Zhenhua Liu, A regularization smoothing method for second-order cone complementarity problem, Nonlinear Analysis: Real World Applications,2011, 12(1): 731-740.
- Xiangsong Zhang, Sanyang Liu, Zhenhua Liu, A predictor-corrector smoothing method for second-order cone programming, Journal of Applied Mathematics and Computing, 2010, 32(2):369-381.
- Xiangsong Zhang, Sanyang Liu, Zhenhua Liu, A non-interior-point smoothing method for variational inequality problem, Journal of Computational and Applied Mathematics, 2010, 234(3):713-721.
- Xiangsong Zhang, Sanyang Liu, Zhenhua Liu, A smoothing method for second order cone complementarity problem, Journal of Computational and Applied Mathematics, 2009, 228(1):83-91.
- Liu Zhenhua*, Li Bin, Secure and verifiable outsourcing protocol for non-negative matrix factorization, the First International Workshop on Cyber Security, CS-2015, Xi'an, P.R. China, 2015, 10.16-10.18.
- Zhou Peilin, Liu Zhenhua*, Duan Shuhong, Flexible attribute-based keyword search via two access policies, 11th International Conference on Broadband Wireless Computing, Communication and Applications, BWCCA 2016, Asan, Korea,2016,11.5-11.7.
- Duan Shuhong, Liu Zhenhua*, Zhou Peilin, A privacy-preserving personal health record with searchability and revocability using attribute-based encryption, 11th International Conference on Broadband Wireless Computing, Communication and Applications, 2016,11.5-11.7.
- Yan Xuewei, Ma Hua, Liu Zhenhua, Peng Ting, Large universe revocable fine-grained encryption with public auditing, 11th International Conference on Broadband Wireless Computing, Communication and Applications, 2016, 11.5-11.7.
- Zhang Linchao, Ma Hua, Liu Zhenhua, Dong Enting, Security analysis and improvement of a collusion-resistant identity-based proxy re-encryption scheme, 11th International Conference on Broadband Wireless Computing, Communication and Applications, 2016, 11.5-11.7.
- Zu Longhui, Liu Zhenhua*, Li Juanjuan, New ciphertext-policy attribute-based encryption with efficient revocation, 2014 IEEE International Conference on Computer and Information Technology, CIT 2014, Xi’an, P.R. China, 2014, 9.11-9.13.
- Li Juanjuan, Liu Zhenhua*, Zu Longhui, Chosen-ciphertext secure multi-use unidirectional attribute-based proxy re-encryptions, 9th Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, P.R. China, 2014, 9.3-9.5.