Person:411042: Difference between revisions

From MaRDI portal
Person:411042
Created automatically from import230924090903
 
m AuthorDisambiguator moved page Fangguo Zhang to Fangguo Zhang: Duplicate
 
(No difference)

Latest revision as of 19:19, 11 December 2023

Available identifiers

zbMath Open zhang.fangguoMaRDI QIDQ411042

List of research outcomes





PublicationDate of PublicationType
TVES: threshold verifiably encrypted signature and its applications2024-07-17Paper
Deniable cryptosystems: simpler constructions and achieving leakage resilience2024-06-05Paper
Fast hashing to \(\mathbb{G}_2\) on pairing-friendly curves with the lack of twists2023-08-31Paper
Quantum circuits for hyperelliptic curve discrete logarithms over the mersenne prime fields2023-08-11Paper
Forward-secure revocable secret handshakes from lattices2023-07-07Paper
Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy2023-05-26Paper
Secret handshakes: full dynamicity, deniability and lattice-based design2023-04-20Paper
Inner-product functional encryption from random linear codes: trial and challenges2023-04-13Paper
Forward-Secure Group Encryptions from Lattices2023-04-13Paper
Quantum algorithm for solving hyperelliptic curve discrete logarithm problem2023-01-05Paper
CSH: A Post-quantum Secret Handshake Scheme from Coding Theory2022-12-22Paper
New Practical Public-Key Deniable Encryption2022-12-21Paper
Twisted Ate pairing on hyperelliptic curves and applications2022-10-28Paper
Memory leakage-resilient secret sharing schemes2022-10-28Paper
Improving ECDLP Computation in Characteristic 22022-10-14Paper
Optimizing the evaluation of \(\ell\)-isogenous curve for isogeny-based cryptography2022-09-02Paper
Symmetric-Key Based Proofs of Retrievability Supporting Public Verification2022-08-19Paper
Identity based linkable ring signature with logarithmic size2022-07-01Paper
Lattice-based secret handshakes with reusable credentials2022-06-08Paper
Guruswami-Sudan Decoding of Elliptic Codes Through Module Basis Reduction2022-02-17Paper
An efficient blind signature scheme based on SM2 signature algorithm2021-12-08Paper
Functional encryption for cubic polynomials and implementation2021-09-06Paper
https://portal.mardi4nfdi.de/entity/Q49962412021-07-01Paper
Optimized arithmetic operations for isogeny-based cryptography on Huff curves2021-06-08Paper
ECC\(^2\): error correcting code and elliptic curve based cryptosystem2021-04-19Paper
Anonymous post-quantum cryptocash2021-03-17Paper
Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE2020-12-14Paper
Privacy preserving multi-party computation delegation for deep learning in cloud computing2020-09-09Paper
Deniable searchable symmetric encryption2020-02-07Paper
Solving ECDLP via list decoding2020-01-10Paper
Secure linear system computation in the presence of malicious adversaries2019-11-18Paper
Efficient obfuscation for CNF circuits and applications in cloud computing2019-07-02Paper
Bit security of the hyperelliptic curves Diffie-Hellman problem2018-11-07Paper
Implementing indistinguishability obfuscation using GGH152018-04-20Paper
Computing elliptic curve discrete logarithms with improved baby-step giant-step algorithm2017-10-12Paper
Faster Computation of Self-Pairings2017-07-12Paper
Efficient computation outsourcing for inverting a class of homomorphic functions2017-02-07Paper
Identity-based chameleon hashing and signatures without key exposure2016-01-14Paper
Solutions to the anti-piracy problem in oblivious transfer2015-12-30Paper
Security Model and Analysis of FHMQV, Revisited2015-12-02Paper
A New Signature Scheme Without Random Oracles from Bilinear Pairings2014-08-21Paper
https://portal.mardi4nfdi.de/entity/Q53990042014-02-28Paper
Discrete logarithm based chameleon hashing and signatures without key exposure2013-05-31Paper
Speeding up elliptic curve discrete logarithm computations with point halving2013-04-03Paper
https://portal.mardi4nfdi.de/entity/Q49121022013-04-03Paper
On the Resistance of Boolean Functions against Fast Algebraic Attacks2012-11-01Paper
Secret handshakes from ID-based message recovery signatures: a new generic approach2012-10-19Paper
Generic security-amplifying methods of ordinary digital signatures2012-10-17Paper
Computing elliptic curve discrete logarithms with the negation map2012-10-10Paper
Improved Pollard rho method for computing discrete logarithms over finite extension fields2012-08-03Paper
Efficient precomputation schemes of \(kP+lQ\)2012-07-25Paper
An efficient collision detection method for computing discrete logarithms with Pollard's rho2012-04-04Paper
Oblivious Transfer with Complex Attribute-Based Access Control2011-10-27Paper
Identity-based trapdoor mercurial commitments and applications2011-10-10Paper
Secure Obfuscation of Encrypted Verifiable Encrypted Signatures2011-09-16Paper
Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring2011-07-29Paper
Finding More Boolean Functions with Maximum Algebraic Immunity Based on Univariate Polynomial Representation2011-07-07Paper
New receipt-free voting scheme using double-trapdoor commitment2011-06-17Paper
On Relationship of Computational Diffie-Hellman Problem and Computational Square-Root Exponent Problem2011-06-08Paper
Traitor Tracing against Public Collaboration2011-05-19Paper
Computing bilinear pairings on elliptic curves with automorphisms2011-03-10Paper
Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 052010-08-20Paper
Attack on an ID-based authenticated group key agreement scheme from PKC 20042009-07-21Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure2009-03-10Paper
Efficient Partially Blind Signatures with Provable Security2009-02-10Paper
Efficient generic on-line/off-line (threshold) signatures without key exposure2008-11-20Paper
Efficient Tate pairing computation using double-base chains2008-11-10Paper
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings2008-09-09Paper
Generic Security-Amplifying Methods of Ordinary Digital Signatures2008-06-13Paper
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature2008-06-10Paper
Progress in Cryptology - INDOCRYPT 20032007-11-29Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Information Security2006-10-16Paper
Information Security and Privacy2006-06-22Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Financial Cryptography and Data Security2005-12-22Paper
Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'032005-11-22Paper
https://portal.mardi4nfdi.de/entity/Q57009802005-11-02Paper
Information Security and Privacy2005-09-07Paper
Information and Communications Security2005-08-19Paper
Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making2005-08-17Paper
Applied Cryptography and Network Security2005-06-13Paper
New identity-based society oriented signature schemes from pairings on elliptic curves2005-02-23Paper
Cryptanalysis of Lee-Hwang-Li's key authentication scheme2005-02-22Paper
https://portal.mardi4nfdi.de/entity/Q44735742004-08-04Paper
Selection of secure hyperelliptic curves of \textit{g=2} based on a subfield2004-07-01Paper
https://portal.mardi4nfdi.de/entity/Q44507582004-02-16Paper
Secure Web transaction with anonymous mobile agent over Internet2003-08-13Paper
https://portal.mardi4nfdi.de/entity/Q44129772003-07-17Paper
ID-Based Blind Signature and Ring Signature from Pairings2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q44093622002-01-01Paper

Research outcomes over time

This page was built for person: Fangguo Zhang