default search action
Runhua Shi
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j64]Zhen-wan Peng, Runhua Shi, Ran Ding, Fei-Fan Zhang:
A novel quantum protocol for secure hamming distance computation. Quantum Inf. Process. 23(5): 165 (2024) - [j63]Kun-Chang Li, Run-Hua Shi, Wan-Peng Guo, Pengbo Wang, Bo-Shen Shao:
Dynamic Range Query Privacy-Preserving Scheme for Blockchain-Enhanced Smart Grid Based on Lattice. IEEE Trans. Dependable Secur. Comput. 21(4): 1652-1664 (2024) - [j62]Runhua Shi, Xia-qin Fang:
Anonymous Classical Message Transmission Through Various Quantum Networks. IEEE Trans. Netw. Sci. Eng. 11(3): 2901-2913 (2024) - [i1]Yundi He, Runhua Shi:
WT-CFormer: High-Performance Web Traffic Anomaly Detection Using CNN and Transformer Networks. CoRR abs/2410.10327 (2024) - 2023
- [j61]XiaoXu Zhang, Runhua Shi, WanPeng Guo, Pengbo Wang, WeiYang Ke:
A dual auditing protocol for fine-grained access control in the edge-cloud-based smart home. Comput. Networks 228: 109735 (2023) - [j60]Kun-Chang Li, Run-Hua Shi:
A Flexible and Efficient Privacy-Preserving Range Query Scheme for Blockchain-Enhanced IoT. IEEE Internet Things J. 10(1): 720-733 (2023) - [j59]Pengbo Wang, Kun-Chang Li, Run-Hua Shi, Bo-Shen Shao:
VC-DCPS: Verifiable Cross-Domain Data Collection and Privacy-Persevering Sharing Scheme Based on Lattice in Blockchain-Enhanced Smart Grids. IEEE Internet Things J. 10(14): 12449-12461 (2023) - [j58]Chenlu Xie, Runhua Shi, XiaoXu Zhang, Pengbo Wang, Wanpeng Guo:
Verifiable outsourcing EMRs scheme with attribute-based encryption in cloud-edge environments. J. Inf. Secur. Appl. 76: 103526 (2023) - [j57]En Li, Run-Hua Shi, Kunchang Li, Yifei Li:
Measurement-device-independent quantum protocol for E-payment based on blockchain. Quantum Inf. Process. 22(1): 40 (2023) - [j56]Run-Hua Shi, Yi-Fei Li:
Quantum Secret Permutating Protocol. IEEE Trans. Computers 72(5): 1223-1235 (2023) - [j55]Wan-Peng Guo, Run-Hua Shi, Xiao-Xu Zhang:
Comment on "Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data". IEEE Trans. Cloud Comput. 11(4): 3797-3798 (2023) - [j54]Run-Hua Shi, Hui Yu:
Privacy-Preserving Range Query Quantum Scheme With Single Photons in Edge-Based Internet of Things. IEEE Trans. Netw. Serv. Manag. 20(4): 4923-4936 (2023) - 2022
- [j53]Zhiwei Wu, Runhua Shi, Kunchang Li, Yifan Yang:
Attribute-based data access control scheme with secure revocation in fog computing for smart grid. Clust. Comput. 25(6): 3899-3913 (2022) - [j52]Yifan Yang, Run-Hua Shi, Kunchang Li, Zhiwei Wu, Shuhao Wang:
Multiple access control scheme for EHRs combining edge computing with smart contracts. Future Gener. Comput. Syst. 129: 453-463 (2022) - [j51]Kunchang Li, Runhua Shi, Mingxia Wu, Yi-Fei Li, Xiaoxu Zhang:
A novel privacy-preserving multi-level aggregate signcryption and query scheme for Smart Grid via mobile fog computing. J. Inf. Secur. Appl. 67: 103214 (2022) - [j50]Wei Gao, Runhua Shi, Mingxia Wu:
A privacy-preserving quantum sealed-bid auction protocol with EPR pairs. Quantum Inf. Process. 21(1): 1 (2022) - [j49]Mingxia Wu, Runhua Shi, Wei Gao, Kunchang Li:
A secure quantum sealed-bid auction protocol based on quantum public key encryption. Quantum Inf. Process. 21(2): 77 (2022) - [j48]Run-Hua Shi, Bai Liu, Mingwu Zhang:
Measurement-device-independent quantum secure multiparty summation. Quantum Inf. Process. 21(4): 122 (2022) - [j47]Run-Hua Shi, Yi-Fei Li:
Quantum Private Set Intersection Cardinality Protocol With Application to Privacy-Preserving Condition Query. IEEE Trans. Circuits Syst. I Regul. Pap. 69(6): 2399-2411 (2022) - [j46]Run-Hua Shi, Yi-Fei Li:
Quantum Protocol for Secure Multiparty Logical AND With Application to Multiparty Private Set Intersection Cardinality. IEEE Trans. Circuits Syst. I Regul. Pap. 69(12): 5206-5218 (2022) - [j45]Run-Hua Shi:
Anonymous Quantum Sealed-Bid Auction. IEEE Trans. Circuits Syst. II Express Briefs 69(2): 414-418 (2022) - 2021
- [j44]Kunchang Li, Yifan Yang, Shuhao Wang, Runhua Shi, Jianbin Li:
A lightweight privacy-preserving and sharing scheme with dual-blockchain for intelligent pricing system of smart grid. Comput. Secur. 103: 102189 (2021) - [j43]Qingle Wang, Chaohang Yu, Yuancheng Li, Jiangshan Liu, Runhua Shi, Yuqian Zhou:
Authenticated Quantum Sortition and Application in "Picking at Random" Problems. IEEE Commun. Lett. 25(2): 518-522 (2021) - [j42]Qingle Wang, Yuancheng Li, Chaohang Yu, Runhua Shi, Zhichao Zhang:
Quantum-based anonymity and secure veto. Quantum Inf. Process. 20(3): 85 (2021) - [j41]Xiang-lin Gou, Runhua Shi, Wei Gao, Mingxia Wu:
A novel quantum E-payment protocol based on blockchain. Quantum Inf. Process. 20(5): 192 (2021) - [j40]Runhua Shi, Bai Liu, Mingwu Zhang:
Secure two-party integer comparison protocol without any third party. Quantum Inf. Process. 20(12): 402 (2021) - [j39]Run-Hua Shi:
Quantum Sealed-Bid Auction Without a Trusted Third Party. IEEE Trans. Circuits Syst. I Regul. Pap. 68(10): 4221-4231 (2021) - [j38]Run-Hua Shi:
Quantum Multiparty Privacy Set Intersection Cardinality. IEEE Trans. Circuits Syst. II Express Briefs 68(4): 1203-1207 (2021) - [c12]Kunchang Li, Xu Han, Yifan Yang, Shuhao Wang, Runhua Shi, Jianbin Li:
A Novel Edge Computing Offloading and Privacy-preserving Scheme for Energy Internet. CSP 2021: 79-83 - 2020
- [j37]Run-Hua Shi:
Useful Equations About Bell States and Their Applications to Quantum Secret Sharing. IEEE Commun. Lett. 24(2): 386-390 (2020) - [j36]Run-Hua Shi:
A generic quantum protocol for one-sided secure two-party classical computations. Quantum Inf. Process. 19(1): 22 (2020) - [j35]Qing Wang, Shun Zhang, Sheng-lan Wang, Run-Hua Shi:
Comment on "Controlled mutual quantum entity authentication with an untrusted third party". Quantum Inf. Process. 19(4): 125 (2020) - [c11]Kunchang Li, Runhua Shi, Jingchen Yan, Chenxi Cai, Mingyu Sun, Jianbin Li:
A RMF and AHP-Based Approach to Risk Assessment of Power Internet of Things. DASC/PiCom/CBDCom/CyberSciTech 2020: 684-689
2010 – 2019
- 2019
- [j34]Run-Hua Shi, Mingwu Zhang:
A Feasible Quantum Protocol for Private Set Intersection Cardinality. IEEE Access 7: 72105-72112 (2019) - [j33]Li Li, Zhengjuan Lv, Xiaohong Tong, Runhua Shi:
A Dynamic Location Privacy Protection Scheme Based on Cloud Storage. Int. J. Netw. Secur. 21(5): 828-834 (2019) - [j32]Zhen-wan Peng, Runhua Shi, Pan-hong Wang, Shun Zhang:
Two quantum protocols for secure hamming distance computation. Quantum Inf. Process. 18(1): 29 (2019) - [c10]Li Li, Zhengjuan Lv, Xiaohong Tong, Runhua Shi:
A Location Privacy Protection Scheme Based on Hybrid Encryption. CSAE 2019: 153:1-153:6 - 2018
- [j31]Run-Hua Shi:
Efficient Quantum Protocol for Private Set Intersection Cardinality. IEEE Access 6: 73102-73109 (2018) - [j30]Chin-Feng Lee, Chin-Chen Chang, Xiaozhu Xie, Ke Mao, Run-Hua Shi:
An adaptive high-fidelity steganographic scheme using edge detection and hybrid hamming codes. Displays 53: 30-39 (2018) - [j29]Yun-Xia Deng, Run-Hua Shi:
An efficient remote anonymous authentication scheme with user revocation. Int. J. Secur. Networks 13(2): 84-97 (2018) - [j28]Jie Cui, Jing Zhang, Hong Zhong, Runhua Shi, Yan Xu:
An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks. Inf. Sci. 451-452: 1-15 (2018) - [j27]Rui Zhang, Runhua Shi, Jia-qi Qin, Zhen-wan Peng:
An economic and feasible Quantum Sealed-bid Auction protocol. Quantum Inf. Process. 17(2): 35 (2018) - [j26]Zhen-wan Peng, Runhua Shi, Pan-hong Wang, Shun Zhang:
A novel quantum solution to secure two-party distance computation. Quantum Inf. Process. 17(6): 145 (2018) - 2017
- [j25]Dan Liu, Shun Zhang, Hong Zhong, Runhua Shi, Yimin Wang:
An Efficient ID-based Online/Offline Signature Scheme without Key Escrow. Int. J. Netw. Secur. 19(1): 127-137 (2017) - [j24]Runhua Shi, Yi Mu, Hong Zhong, Jie Cui, Shun Zhang:
Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query. Quantum Inf. Process. 16(1): 8 (2017) - [j23]Runhua Shi, Shun Zhang:
Quantum solution to a class of two-party private summation problems. Quantum Inf. Process. 16(9): 225 (2017) - [j22]Min Xu, Runhua Shi, Zhen-yu Luo, Zhen-wan Peng:
Nearest private query based on quantum oblivious key distribution. Quantum Inf. Process. 16(12): 286 (2017) - [j21]Zhen-wan Peng, Runhua Shi, Hong Zhong, Jie Cui, Shun Zhang:
A novel quantum scheme for secure two-party distance computation. Quantum Inf. Process. 16(12): 316 (2017) - 2016
- [j20]Xiaojuan Chen, Yi Mu, Xiaofen Wang, Runhua Shi:
Privacy-enhanced distance computation with applications. Int. J. Electron. Secur. Digit. Forensics 8(3): 234-249 (2016) - [j19]Feng Shao, Shun Zhang, Hong Zhong, Runhua Shi, Jie Cui:
Keyword search protocol with privacy preservation using ID-based proxy reencryption. Int. J. Secur. Networks 11(4): 188-195 (2016) - [j18]Runhua Shi, Yi Mu, Hong Zhong, Shun Zhang, Jie Cui:
Quantum private set intersection cardinality and its application to anonymous authentication. Inf. Sci. 370-371: 147-158 (2016) - [j17]Runhua Shi, Hong Zhong, Shun Zhang:
A Novel Authenticated Group Key Distribution Scheme. KSII Trans. Internet Inf. Syst. 10(2): 935-946 (2016) - [j16]Xuan Tang, Hong Zhong, Runhua Shi, Jie Cui:
基于编码和同态加密的高效SMP方案 (Efficient Solution to SMP Based on Coding and Homomorphic Encryption). 计算机科学 43(1): 181-185 (2016) - [j15]Runhua Shi, Yi Mu, Hong Zhong, Jie Cui, Shun Zhang:
An efficient quantum scheme for Private Set Intersection. Quantum Inf. Process. 15(1): 363-371 (2016) - [j14]Hong Zhong, Jie Cui, Runhua Shi, Chao Xia:
Many-to-one homomorphic encryption scheme. Secur. Commun. Networks 9(10): 1007-1015 (2016) - [c9]Runhua Shi, Shun Zhang:
Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks. CloudComp 2016: 204-215 - 2015
- [j13]Jie Cui, Hong Zhong, Runhua Shi, Jiankai Wang:
Related-key cryptanalysis on 7-round AES-128/192. Int. J. Electron. Secur. Digit. Forensics 7(2): 166-178 (2015) - [j12]Jie Cui, Hong Zhong, Runhua Shi, Liangmin Wang:
A New AES S-Box Equation System Based on BES. J. Inf. Hiding Multim. Signal Process. 6(6): 1177-1184 (2015) - [j11]Hong Zhong, Qunfeng Lin, Jie Cui, Runhua Shi, Lu Liu:
An Efficient SDN Load Balancing Scheme Based on Variance Analysis for Massive Mobile Users. Mob. Inf. Syst. 2015: 241732:1-241732:9 (2015) - [j10]Runhua Shi, Hong Zhong, Jie Cui, Shun Zhang:
A novel one-to-many and many-to-one asymmetric encryption model and its algorithms. Secur. Commun. Networks 8(18): 3906-3913 (2015) - [j9]Runhua Shi, Hong Zhong, Shun Zhang:
Comments on two schemes of identity-based user authentication and key agreement for mobile client-server networks. J. Supercomput. 71(11): 4015-4018 (2015) - 2014
- [j8]Runhua Shi, Hong Zhong, Liusheng Huang:
A novel anonymous authentication scheme without cryptography. Trans. Emerg. Telecommun. Technol. 25(9): 875-880 (2014) - 2013
- [j7]Runhua Shi, Hong Zhong:
Multi-party quantum key agreement with bell states and bell measurements. Quantum Inf. Process. 12(2): 921-932 (2013) - [j6]Runhua Shi, Hong Zhong:
Erratum to: Multi-party quantum key agreement with Bell states and Bell measurements. Quantum Inf. Process. 12(2): 933 (2013) - [j5]Wei Yang, Liusheng Huang, Runhua Shi, Libao He:
Secret sharing based on quantum Fourier transform. Quantum Inf. Process. 12(7): 2465-2474 (2013) - [j4]Runhua Shi, Hong Zhong, Liusheng Huang:
Quantum state sharing against the controller's cheating. Quantum Inf. Process. 12(8): 2889-2899 (2013) - 2012
- [j3]Runhua Shi, Hong Zhong:
Multiparty quantum secret sharing with the pure entangled two-photon states. Quantum Inf. Process. 11(1): 161-169 (2012) - [c8]Fen Wu, Hong Zhong, Runhua Shi, Hongsheng Huang:
Secure two-party computation of the quadratic function's extreme minimal value. FSKD 2012: 2975-2978 - [c7]Hong Zhong, Xiaodong Wei, Runhua Shi:
A novel anonymous secret sharing scheme based on BP Artificial Neural Network. ICNC 2012: 366-370 - 2011
- [j2]Runhua Shi, Liusheng Huang, Wei Yang, Hong Zhong:
Asymmetric multi-party quantum state sharing of an arbitrary m-qubit state. Quantum Inf. Process. 10(1): 53-61 (2011) - [j1]Runhua Shi, Liusheng Huang, Wei Yang, Hong Zhong:
Multi-party quantum state sharing of an arbitrary two-qubit state with Bell states. Quantum Inf. Process. 10(2): 231-239 (2011) - [c6]Runhua Shi, Hong Zhong:
An Efficient Multiparty Quantum Secret Sharing with Pure Entangled Two Photon States. CSEE (1) 2011: 489-495 - 2010
- [c5]Huanghong Sheng, Hong Zhong, Runhua Shi:
A Secure Scheme for Data Statistics. ICEE 2010: 1289-1291
2000 – 2009
- 2008
- [c4]Runhua Shi, Liusheng Huang, Yonglong Luo, Hong Zhong:
A Threshold Multi-secret Sharing Scheme. ICNSC 2008: 1705-1707 - [c3]Runhua Shi, Liusheng Huang, Hong Zhong:
An Efficient (t, n)-Threshold Multi-Secret Sharing Scheme. WKDD 2008: 580-583 - 2007
- [c2]Runhua Shi, Hong Zhong, Liusheng Huang:
A (t, n)-threshold verified multi-secret sharing scheme based on ECDLP. SNPD (2) 2007: 9-13 - 2005
- [c1]Runhua Shi, Jiaxing Cheng:
Two New Fast Methods for Simultaneous Scalar Multiplication in Elliptic Curve Cryptosystems. ICCNMC 2005: 462-470
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-26 20:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint