The following pages link to Zhenfeng Zhang (Q237120):
Displayed 50 items.
- Certificateless threshold ring signature (Q730948) (← links)
- IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited (Q775952) (← links)
- Cryptanalysis of AW digital signature scheme based on error-correcting codes (Q865996) (← links)
- Bootstrapping fully homomorphic encryption with ring plaintexts within polynomial noise (Q1616886) (← links)
- On the hardness of the computational ring-LWR problem and its applications (Q1633465) (← links)
- Batched multi-hop multi-key FHE from ring-LWE with compact ciphertext extension (Q1690286) (← links)
- Fast lottery-based micropayments for decentralized currencies (Q1784502) (← links)
- Security of the SM2 signature scheme against generalized key substitution attacks (Q1989512) (← links)
- PRE: stronger security notions and efficient construction with non-interactive opening (Q2015128) (← links)
- Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes (Q2055683) (← links)
- Generic traceable proxy re-encryption and accountable extension in consensus network (Q2167770) (← links)
- Key encapsulation mechanism with explicit rejection in the quantum random oracle model (Q2289448) (← links)
- Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model (Q2302136) (← links)
- Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol (Q2353781) (← links)
- Certificateless signature: a new security model and an improved generic construction (Q2383987) (← links)
- Cryptanalysis of some signature schemes with message recovery (Q2572002) (← links)
- An additive problem with primes in arithmetic progressions (Q2577871) (← links)
- Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model (Q2794493) (← links)
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes (Q2829951) (← links)
- Towards a Secure Certificateless Proxy Re-Encryption Scheme (Q2856175) (← links)
- Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts (Q2907383) (← links)
- Black-Box Separations for One-More (Static) CDH and Its Generalization (Q2936619) (← links)
- Authenticated Key Exchange from Ideal Lattices (Q2948401) (← links)
- One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model (Q2980868) (← links)
- Expanded Framework for Dual System Encryption and Its Application (Q2988343) (← links)
- Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost (Q3092350) (← links)
- Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security (Q3092373) (← links)
- (Q3116378) (← links)
- UC-secure and Contributory Password-Authenticated Group Key Exchange (Q3179480) (← links)
- Certificateless Proxy Re-Encryption Without Pairings (Q3193254) (← links)
- (Q3610971) (← links)
- (Q4434314) (← links)
- (Q4823630) (← links)
- (Q4823929) (← links)
- A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening (Q4899207) (← links)
- A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings (Q4899217) (← links)
- Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures (Q4910225) (← links)
- Lattice-Based Cryptosystems (Q5139268) (← links)
- Combined Public-Key Schemes: The Case of ABE and ABS (Q5200572) (← links)
- Fully Secure Doubly-Spatial Encryption under Simple Assumptions (Q5200587) (← links)
- Authenticated Key Exchange with Entities from Different Settings and Varied Groups (Q5200589) (← links)
- Information and Communications Security (Q5393986) (← links)
- (Q5491195) (← links)
- Proxy Re-encryption with Unforgeable Re-encryption Keys (Q5498714) (← links)
- A New Anonymous Password-Based Authenticated Key Exchange Protocol (Q5504623) (← links)
- Key Replacement Attack Against a Generic Construction of Certificateless Signature (Q5757722) (← links)
- Cryptology and Network Security (Q5898112) (← links)
- Cryptology and Network Security (Q5898119) (← links)
- Applied Cryptography and Network Security (Q5899223) (← links)
- The ternary Goldbach problem with primes in arithmetic progressions (Q5958938) (← links)