default search action
Zhenhua Chen 0001
Person information
- affiliation: Xi'an University of Science and Technology, School of Computer Science and Technology, China
- affiliation: Guilin University of Electronic Technology, Guangxi Key Laboratory of Cryptography and Information Security, China
- affiliation (PhD 2014): Shaanxi Normal University, Xi'an, China
Other persons with the same name
- Zhenhua Chen — disambiguation page
- Zhenhua Chen 0002
— Nanjing University of Information Science and Technology, Institute of Radar Technology, China (and 1 more)
- Zhenhua Chen 0003 — Indiana University, School of Informatics, Computing, and Engineering, Bloomington, IN, USA
- Zhenhua Chen 0004
— China Wenchang Spacescraft Launch Site, Command and Control Center Xichang Satellite Launch Center, China
- Zhenhua Chen 0005 — Northeastern University, NEU, College of Information Science and Engineering, Shenyang, China
- Zhenhua Chen 0006
— Syracuse University, Department of Electrical Engineering and Computer Science, NY, USA
- Zhenhua Chen 0007 — Huazhong University of Science and Technology, School of Computer Science and Technology, Wuhan, China
- Zhenhua Chen 0008 (aka: Zhen-hua Chen 0008) — Shandong Normal University, School of Information Science and Engineering, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
- [j17]Zhenhua Chen
, Kaili Long
, Qiqi Lai
, Long Li
, Yining Liu
, Hao Wang
:
An Unbounded Multi-Input Quadratic Functional Encryption Scheme for Secure Cloud-Based Machine Learning. IEEE Trans. Dependable Secur. Comput. 23(1): 316-328 (2026) - [j16]Yilei Wang
, Zhaobo Lu, Zhiquan Liu
, Tao Li
, Zhenhua Chen
, Willy Susilo
:
Cer-FeaUn: Certified Feature Unlearning in Vertical Federated Learning. IEEE Trans. Mob. Comput. 25(1): 817-829 (2026) - 2025
- [j15]Zhenhua Chen
, Ni Li
, Luqi Huang
, Xingxing Jia
, Yilei Wang
, Hao Wang
, Jing Su:
Two Practical Attribute-Based Encryption Schemes for Privacy-Preserving Mobile Location-Sharing Applications. IEEE Internet Things J. 12(5): 5148-5159 (2025) - [j14]Zhenhua Chen
, Siying Fan
, Hao Jin
, Jing Zhang
, Zhen Li
, Jing Su
:
An Asymmetric Searchable Encryption Scheme Supporting Shortest Distance Query in Internet of Vehicles. IEEE Internet Things J. 12(13): 25867-25878 (2025) - [j13]Zhenhua Chen
, Kaili Long, Junrui Xie
, Qiqi Lai, Yilei Wang, Ni Li
, Luqi Huang
, Aijun Ge:
A New Functional Encryption Scheme Supporting Privacy-Preserving Maximum Similarity for Web Service Platforms. IEEE Trans. Inf. Forensics Secur. 20: 2621-2631 (2025) - 2024
- [j12]Zhenhua Chen
, Luqi Huang
, Guomin Yang
, Willy Susilo
, Xingbing Fu
, Xingxing Jia
:
Attribute-Hiding Fuzzy Encryption for Privacy-Preserving Data Evaluation. IEEE Trans. Serv. Comput. 17(3): 789-803 (2024) - 2023
- [j11]Zhenhua Chen, Jingjing Nie, Zhanli Li, Chunpeng Ge, Willy Susilo
:
Geometric Searchable Encryption Without False Positive And Its Applications. Comput. J. 66(9): 2155-2168 (2023) - [j10]Zhenhua Chen
, Jingjing Nie
, Li Zhan-Li, Willy Susilo
, Chunpeng Ge
:
Geometric Searchable Encryption for Privacy-Preserving Location-Based Services. IEEE Trans. Serv. Comput. 16(4): 2672-2684 (2023) - 2020
- [j9]Zhenhua Chen, Luqi Huang
, Xiaonan Shi, Qiong Huang
, Hao Wang
, Xueqiao Liu
:
Privacy-preserving polynomial interpolation and its applications on predictive analysis. Inf. Sci. 541: 259-270 (2020)
2010 – 2019
- 2016
- [j8]Zhenhua Chen, Shundong Li, Qiong Huang, Yilei Wang, Sufang Zhou:
A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage. Concurr. Comput. Pract. Exp. 28(10): 2858-2876 (2016) - [j7]Zhenhua Chen, Shundong Li, Qiong Huang, Jianhua Yan, Yong Ding:
A Joint Random Secret Sharing Scheme with Public Verifiability. Int. J. Netw. Secur. 18(5): 917-925 (2016) - 2015
- [j6]Xin Liu, Shundong Li, Zhenhua Chen:
基本初等函数的保密云计算服务协议 (Secure Cloud Computing Service Protocols of Elementary Functions). 计算机科学 42(10): 159 (2015) - [j5]Zhenhua Chen, Shundong Li, Qianhong Wu, Qiong Huang:
A distributed secret share update scheme with public verifiability for ad hoc network. Secur. Commun. Networks 8(8): 1485-1493 (2015) - [j4]Zhenhua Chen, Shundong Li, Youwen Zhu, Jianhua Yan, Xinli Xu:
A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem. Secur. Commun. Networks 8(18): 3592-3601 (2015) - 2014
- [j3]Zhenhua Chen, Shundong Li, Chunzhi Wang, Mingwu Zhang:
Comments on FHH Anonymous Multireceiver Encryption. Int. J. Netw. Secur. 16(5): 397-400 (2014) - [c3]Zhenhua Chen, Shundong Li, Yimin Guo, Yilei Wang, Yunjie Chu:
A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing. NSS 2014: 82-95 - 2013
- [j2]Mingwu Zhang, Bo Yang, Zhenhua Chen, Tsuyoshi Takagi:
Efficient and adaptively secure broadcast encryption systems. Secur. Commun. Networks 6(8): 1044-1052 (2013) - [c2]Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu:
Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions. ISPEC 2013: 75-90 - [i1]Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu:
Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction. IACR Cryptol. ePrint Arch. 2013: 247 (2013) - 2012
- [j1]Zhenhua Chen, Shundong Li, Chunzhi Wang, Yanping Shen:
Two Constructions of Multireceiver Encryption Supporting Constant Keys, Short Ciphertexts, and Identity Privacy. Int. J. Netw. Secur. 14(5): 270-279 (2012) - [c1]Zhenhua Chen, Chunying Wu, Daoshun Wang, Shundong Li:
Conjunctive Keywords Searchable Encryption with Efficient Pairing, Constant Ciphertext and Short Trapdoor. PAISI 2012: 176-189
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-05-07 01:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint