Mingwu Zhang

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Provably secure group authentication in the asynchronous communication model
 
2024-04-19Paper
Leakage-resilient identity-based cryptography from minimal assumptions
Designs, Codes and Cryptography
2023-11-07Paper
Structure-preserving linearly homomorphic signature with designated combiner for subspace
Information Security and Privacy
2023-07-26Paper
An Efficient and Provably Secure Private Polynomial Evaluation Scheme
Information Security Practice and Experience
2023-06-30Paper
Key exposure resistant group key agreement protocol
 
2023-04-13Paper
Measurement-device-independent quantum secure multiparty summation
Quantum Information Processing
2022-11-29Paper
Secure two-party integer comparison protocol without any third party
Quantum Information Processing
2022-11-24Paper
Verifiable quantum key exchange with authentication
International Journal of Theoretical Physics
2021-11-05Paper
Novel generic construction of leakage-resilient PKE scheme with CCA security
Designs, Codes and Cryptography
2021-06-24Paper
Improvement of attribute-based encryption using Blakley secret sharing
 
2021-06-08Paper
Quantum secure multi-party private set intersection cardinality
International Journal of Theoretical Physics
2020-09-04Paper
Cryptanalysis and improvement of quantum sealed-bid auction
International Journal of Theoretical Physics
2020-06-19Paper
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
Theoretical Computer Science
2020-01-29Paper
Provably secure proactive secret sharing without the adjacent assumption
 
2020-01-10Paper
Realizing secret sharing with general access structure
Information Sciences
2020-01-06Paper
Strong privacy-preserving two-party scalar product quantum protocol
International Journal of Theoretical Physics
2019-12-19Paper
Cloud-based data-sharing scheme using verifiable and CCA-secure re-encryption from indistinguishability obfuscation
 
2019-10-31Paper
Verifiable secret sharing based on hyperplane geometry with its applications to optimal resilient proactive cryptosystems
 
2018-09-26Paper
Secure publicly verifiable computation with polynomial commitment in cloud computing
 
2018-09-26Paper
ADR-lrABE: new mechanism of direct-revocable attribute-based encryption with continual-leakage tolerances
Fundamenta Informaticae
2018-05-03Paper
Cryptographic reverse firewall via malleable smooth projective hash functions
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Anonymous spatial encryption under affine space delegation functionality with full security
Information Sciences
2017-01-31Paper
Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage
Provable Security
2017-01-06Paper
One-round strong oblivious signature-based envelope
Information Security and Privacy
2016-09-02Paper
Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks
Frontiers of Computer Science
2015-11-20Paper
Identity-based partially blind signature in the standard model for electronic cash
Mathematical and Computer Modelling
2014-10-21Paper
New Model and Construction of ABE: Achieving Key Resilient-Leakage and Attribute Direct-Revocation
Information Security and Privacy
2014-07-24Paper
A robust fuzzy extractor without ECCs
Information Security and Cryptology
2013-05-28Paper
LR-UESDE: a continual-leakage resilient encryption with unbounded extensible set delegation
Provable Security
2012-11-06Paper
An ID-based cryptographic mechanisms based on GDLP and IFP
Information Processing Letters
2012-10-23Paper
Group-oriented setting's multisigncryption scheme with threshold designcryption
Information Sciences
2012-07-13Paper
Efficient identity-based signcryption in the standard model
Provable Security
2011-09-16Paper
Anonymous encryption with partial-order subset delegation functionality
Provable Security
2011-09-16Paper
GeoENC: geometric area based keys and policies in functional encryption systems
Information Security and Privacy
2011-07-07Paper


Research outcomes over time


This page was built for person: Mingwu Zhang