Login / Signup
Xixi Yan
ORCID
Publication Activity (10 Years)
Years Active: 2014-2023
Publications (10 Years): 20
Top Topics
Keyword Search
Diffie Hellman
Access Structure
Ciphertext
Top Venues
IEEE Access
Connect. Sci.
J. Inf. Secur. Appl.
ICCCS (3)
</>
Publications
</>
Xixi Yan
,
Chengfu Zheng
,
Yongli Tang
,
Yachao Huo
,
Minglu Jin
Dynamic forward secure searchable encryption scheme with phrase search for smart healthcare.
J. Syst. Archit.
144 (2023)
Xixi Yan
,
Pei Yin
,
Yongli Tang
,
Suwei Feng
A remote sensing encrypted data search method based on a novel double-chain.
Connect. Sci.
35 (1) (2023)
Yongjun Wang
,
Kun Xiong
,
Yongli Tang
,
Li Yang
,
Jing Zhang
,
Xixi Yan
More efficient constant-round secure multi-party computation based on optimized Tiny-OT and half-gate.
J. Inf. Secur. Appl.
79 (2023)
Yongli Tang
,
Yanpeng Ba
,
Lixiang Li
,
Xiaojun Wang
,
Xixi Yan
Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT.
Clust. Comput.
25 (4) (2022)
Xixi Yan
,
Suwei Feng
,
Yongli Tang
,
Pei Yin
,
Dazhi Deng
Blockchain-based verifiable and dynamic multi-keyword ranked searchable encryption scheme in cloud computing.
J. Inf. Secur. Appl.
71 (2022)
Xixi Yan
,
Pei Yin
,
Yongli Tang
,
Suwei Feng
Multi-keywords fuzzy search encryption supporting dynamic update in an intelligent edge network.
Connect. Sci.
34 (1) (2022)
Yongli Tang
,
Jingran Li
,
Xixi Yan
,
Qiang Zhao
Edge-Cloud-Assisted Multiuser Forward Secure Searchable Encryption (EMFSSE) Scheme in the P2P Networking Environment.
Mob. Inf. Syst.
2021 (2021)
Xixi Yan
,
Guanghui He
,
Jinxia Yu
,
Yongli Tang
,
Mingjie Zhao
Offline/Online Outsourced Attribute-Based Encryption with Partial Policy Hidden for the Internet of Things.
J. Sensors
2020 (2020)
Jinxia Yu
,
Guanghui He
,
Xixi Yan
,
Yongli Tang
,
Rongxia Qin
Outsourced ciphertext-policy attribute-based encryption with partial policy hidden.
Int. J. Distributed Sens. Networks
16 (5) (2020)
Xixi Yan
,
Xiaohan Yuan
,
Qing Ye
,
Yongli Tang
Blockchain-Based Searchable Encryption Scheme With Fair Payment.
IEEE Access
8 (2020)
Xixi Yan
,
Xiaohan Yuan
,
Qichao Zhang
,
Yongli Tang
Traceable and Weighted Attribute-Based Encryption Scheme in the Cloud Environment.
IEEE Access
8 (2020)
Xixi Yan
,
Chaochao Yang
,
Qichao Zhang
,
Jinxia Yu
Revocable ciphertext-policy attribute-based encryption in data outsourcing systems from lattices.
Int. J. Embed. Syst.
13 (4) (2020)
Qing Ye
,
Wenbo Wang
,
Yongli Tang
,
Xixi Yan
,
Jing Zhang
,
Zongqu Zhao
,
Panke Qin
RLWE Commitment-Based Linkable Ring Signature Scheme and Its Application in Blockchain.
BlockSys
(2019)
Xixi Yan
,
Xu He
,
Jinxia Yu
,
Yongli Tang
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption in Multi-Domain Environment.
IEEE Access
7 (2019)
Yuan Liu
,
Licheng Wang
,
Lixiang Li
,
Xixi Yan
Secure and Efficient Multi-Authority Attribute-Based Encryption Scheme From Lattices.
IEEE Access
7 (2019)
Xixi Yan
,
Hao Ni
,
Yuan Liu
,
Dezhi Han
Privacy-preserving multi-authority attribute-based encryption with dynamic policy updating in PHR.
Comput. Sci. Inf. Syst.
16 (3) (2019)
Cheng Song
,
Yadong Zhang
,
Xixi Yan
,
Zhizhong Liu
A Trajectory Privacy Protection Scheme based on DTW Switch Query in Location-based Services.
J. Inf. Hiding Multim. Signal Process.
10 (2) (2019)
Yongli Tang
,
Huanhuan Lian
,
Lixiang Li
,
Xiaojun Wang
,
Xixi Yan
A Randomness Detection Method of ZigBee Protocol in a Wireless Sensor Network.
Sensors
18 (11) (2018)
Jinxia Yu
,
Chaochao Yang
,
Yongli Tang
,
Xixi Yan
Attribute-Based Encryption Scheme Supporting Tree-Access Structure on Ideal Lattices.
ICCCS (3)
(2018)
Qing Ye
,
Xiaomeng Yang
,
Xixi Yan
,
Zongqu Zhao
Efficient Group Signature Scheme Over NTRU Lattice.
ICCCS (3)
(2018)
Xixi Yan
,
Tao Geng
,
Haiyang Ding
Efficient Cryptographic Access Control Protocol for Sensitive Data Management.
J. Comput.
9 (1) (2014)