Zhenfu Cao

From MaRDI portal
(Redirected from Person:1763260)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Security proofs for key-alternating ciphers with non-independent round permutations2024-08-01Paper
LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search
Information Sciences
2023-09-22Paper
Lighter is better: a lighter multi-client verifiable outsourced computation with hybrid homomorphic encryption
Computer Security – ESORICS 2022
2023-07-28Paper
Anonymous IBE from Quadratic Residuosity with Fast Encryption2023-03-21Paper
Tight security analysis of 3-round key-alternating cipher with a single permutation2023-03-21Paper
Conjugate adjoining problem in braid groups and new design of braid-based signatures
Science China Information Sciences
2022-10-28Paper
scientific article; zbMATH DE number 7478099 (Why is no real title available?)2022-02-22Paper
New assumptions and efficient cryptosystems from the \(e\)-th power residue symbol2021-06-08Paper
Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity
Designs, Codes and Cryptography
2021-02-10Paper
Efficient multi-keyword searchable encryption based on multi-input inner-product functional encryption2021-01-18Paper
Server-aided directly revocable ciphertext-policy attribute-based encryption with verifiable delegation
Information and Communications Security
2020-07-20Paper
Efficient collision attack frameworks for RIPEMD-1602020-03-09Paper
DMU-ABSE: dynamic multi-user attribute-based searchable encryption with file deletion and user revocation
Communications in Computer and Information Science
2020-02-20Paper
Proof of Multicopy via Proof of File Position in Cloud
Fundamenta Informaticae
2018-05-03Paper
Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud
International Journal of Foundations of Computer Science
2018-02-23Paper
Another generalization of Menon’s identity
International Journal of Number Theory
2017-11-28Paper
Efficient IBE with tight reduction to standard assumption in the multi-challenge setting
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Accountable ciphertext-policy attribute-based encryption scheme supporting public verifiability and nonrepudiation
Provable Security
2017-01-06Paper
Efficient Asymmetric Index Encapsulation Scheme for Named Data
Provable Security
2017-01-06Paper
Extended dual system group and shorter unbounded hierarchical identity based encryption
Designs, Codes and Cryptography
2016-07-21Paper
Extended Nested Dual System Groups, Revisited
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Black-box separations of hash-and-sign signatures in the non-programmable random oracle model
Provable Security
2016-01-27Paper
Constant-round adaptive zero-knowledge proofs for NP
Information Sciences
2016-01-14Paper
Fully collusion-resistant traceable key-policy attribute-based encryption with sub-linear size ciphertexts
Information Security and Cryptology
2015-11-25Paper
Certificate-based proxy decryption systems with revocability in the standard model
Information Sciences
2015-09-24Paper
Large universe ciphertext-policy attribute-based encryption with white-box traceability
Computer Security - ESORICS 2014
2015-07-27Paper
Post-challenge leakage in public-key encryption
Theoretical Computer Science
2015-02-24Paper
A comment on ``An efficient common-multiplicand-multiplication method to the Montgomery algorithm for speeding up exponentiation
Information Sciences
2014-08-01Paper
All-but-one dual projective hashing and its applications
Applied Cryptography and Network Security
2014-07-07Paper
Blake-Wilson, Johnson \& Menezes protocol revisited
Science China Information Sciences
2013-07-03Paper
Identity based signature scheme based on cubic residues
Science China Information Sciences
2013-07-03Paper
Fuzzy identity based signature with applications to biometric authentication
Computers and Electrical Engineering
2013-05-31Paper
On constant-round concurrent non-malleable proof systems
Information Processing Letters
2013-04-04Paper
Threshold proxy re-signature
Journal of Systems Science and Complexity
2013-01-31Paper
A short and stateless signature2013-01-24Paper
Anonymous Identity-Based Hash Proof System and Its Applications
Provable Security
2012-11-06Paper
Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
Information Sciences
2012-10-29Paper
Identity-based extractable hash proofs and their applications
Applied Cryptography and Network Security
2012-09-10Paper
Concurrent non-malleable statistically hiding commitment
Information Processing Letters
2012-07-25Paper
New directions of modern cryptography2011-11-30Paper
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles
Computer Security – ESORICS 2011
2011-11-22Paper
New constructions of public-key encryption schemes from conjugacy search problems
Information Security and Cryptology
2011-07-29Paper
Identity-based proxy re-encryption with threshold multi-proxy2011-07-19Paper
Efficient certificateless threshold signatures without random oracles
Journal of Systems Science and Complexity
2011-06-22Paper
Efficient ID-based multi-receiver threshold decryption
International Journal of Foundations of Computer Science
2011-01-06Paper
Multi-use and unidirectional identity-based proxy re-encryption schemes
Information Sciences
2010-09-15Paper
Proxy re-encryption with keyword search
Information Sciences
2010-07-20Paper
Secure threshold multi authority attribute based encryption without a central authority
Information Sciences
2010-07-20Paper
How to Construct Interval Encryption from Binary Tree Encryption
Applied Cryptography and Network Security
2010-07-06Paper
Constant-round concurrent non-malleable statistically binding commitments and decommitments
Public Key Cryptography – PKC 2010
2010-05-28Paper
An efficient anonymous authentication mechanism for delay tolerant networks
Computers and Electrical Engineering
2010-05-27Paper
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System
Security and Privacy in Mobile Information and Communication Systems
2010-04-24Paper
A model of bilinear-pairings based designated-verifier proxy signatue scheme
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
2010-03-04Paper
Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
Science in China. Series F
2010-03-03Paper
Non-malleable statistically hiding commitment from any one-way function
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Spatial encryption under simpler assumption
Provable Security
2009-12-11Paper
An Observation on Non-Malleable Witness-Indistinguishability and Non-Malleable Zero-Knowledge
Lecture Notes in Computer Science
2009-06-03Paper
Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model
Information Security and Cryptology
2009-04-29Paper
A secure identity-based multi-proxy signature scheme
Computers and Electrical Engineering
2009-04-17Paper
A secure identity-based proxy multi-signature scheme
Information Sciences
2009-03-24Paper
CCA-Secure Proxy Re-encryption without Pairings
Public Key Cryptography – PKC 2009
2009-03-24Paper
An improved identity-based key agreement protocol and its security proof
Information Sciences
2009-03-24Paper
Non-interactive and non-malleable commitment scheme based on \(q\)-one way group homomorphisms
Journal of Shanghai Jiaotong University (Science)
2009-02-03Paper
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
The exponential Diophantine equation \(AX^2+BY^2=\lambda k^Z\) and its applications
Taiwanese Journal of Mathematics
2009-01-15Paper
Security Model of Proxy-Multi Signature Schemes
Cryptology and Network Security
2009-01-09Paper
Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque
Cryptology and Network Security
2009-01-09Paper
New designing of cryptosystems based on quadratic fields
Science in China. Series F
2008-11-10Paper
A simple deniable authentication protocol based on the Diffie–Hellman algorithm
International Journal of Computer Mathematics
2008-09-24Paper
Designing efficient proxy signature schemes for mobile communication
Science in China. Series F
2008-04-15Paper
Transitive Signatures from Braid Groups
Lecture Notes in Computer Science
2008-04-11Paper
Proxy Re-signature Schemes Without Random Oracles
Lecture Notes in Computer Science
2008-04-11Paper
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power
Lecture Notes in Computer Science
2008-04-11Paper
Short Group Signature Without Random Oracles
Information and Communications Security
2008-03-25Paper
New \((t, n)\) threshold directed signature scheme with provable security
Information Sciences
2008-01-11Paper
scientific article; zbMATH DE number 5222384 (Why is no real title available?)2008-01-02Paper
Identity-based signature scheme based on quadratic residues
Science in China. Series F
2007-10-12Paper
Survey of information security
Science in China. Series F
2007-10-12Paper
How to construct secure proxy cryptosystem
Information Sciences
2007-10-10Paper
Efficient and Provably Secure Multi-receiver Identity-Based Signcryption
Information Security and Privacy
2007-09-07Paper
A new ID-based deniable authentication protocol2007-08-07Paper
Developing semantic business model for VO construction on semantic grid
Wuhan University Journal of Natural Sciences
2007-06-08Paper
A secure anonymous internet electronic voting scheme based on the polynomial
Wuhan University Journal of Natural Sciences
2007-06-01Paper
Password-based group key agreement protocol for client-server application
Wuhan University Journal of Natural Sciences
2007-06-01Paper
An identity-based strong designated verifier proxy signature scheme
Wuhan University Journal of Natural Sciences
2007-06-01Paper
An efficient provable secure ID-based proxy signature scheme based on CDH assumption
Journal of Shanghai Jiaotong University (Science)
2007-05-09Paper
Theory and Applications of Models of Computation
Lecture Notes in Computer Science
2007-04-30Paper
Simulatability and security of certificateless threshold signatures
Information Sciences
2007-02-20Paper
A new threshold proxy signature scheme from bilinear pairings
Science in China. Series F
2007-02-20Paper
The simultaneous Pell equations y2-Dz2=1 and x2-2Dz2=1
Acta Arithmetica
2007-02-06Paper
Cryptanalysis of two signature schemes based on two hard problems2007-02-02Paper
An improved deniable authentication protocol
Networks
2007-02-02Paper
The identity-based authenticated blind signature protocol2007-02-02Paper
Combinatorial characterizations of one-coincidence frequency-hopping sequences
Designs, Codes and Cryptography
2006-11-22Paper
Proofs of security for improved Rabin signature scheme
Journal of Shanghai Jiaotong University (Science)
2006-11-15Paper
The braid-based bit commitment protocol
Journal of Shanghai Jiaotong University (Science)
2006-11-15Paper
An ID-based authenticated key agreement protocol for peer-to-peer computing
Journal of Shanghai Jiaotong University (Science)
2006-11-15Paper
A self-encryption remote user anonymous authentication scheme using smart cards
Journal of Shanghai Jiaotong University (Science)
2006-11-15Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper
Information Security and Cryptology
Lecture Notes in Computer Science
2006-11-14Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper
Factoring-Based Proxy Signature Schemes with Forward-Security
Computational and Information Science
2006-10-10Paper
Existence of \(V(9,t)\) vectors2006-09-14Paper
A kind of signature scheme based on class groups of quadratic fields2006-08-28Paper
Embeddings of resolvable 4-cycle systems2006-08-23Paper
Factoring based proxy signature schemes
Journal of Computational and Applied Mathematics
2006-08-04Paper
How to compute modular exponentiation with large operators based on the right-to-left binary algorithm
Applied Mathematics and Computation
2006-06-16Paper
Robust ID-based threshold signcryption scheme from pairings2006-05-26Paper
A dynamic threshold commercial key escrow scheme based on conic
Applied Mathematics and Computation
2006-05-18Paper
Minimal enclosing of an \(\mathrm{MPT}(v,\lambda)\) in a \(\mathrm{TS}(u,\lambda+1)\)2006-03-13Paper
scientific article; zbMATH DE number 2229691 (Why is no real title available?)2005-11-16Paper
scientific article; zbMATH DE number 2229781 (Why is no real title available?)2005-11-16Paper
scientific article; zbMATH DE number 2229782 (Why is no real title available?)2005-11-16Paper
scientific article; zbMATH DE number 2229817 (Why is no real title available?)2005-11-16Paper
scientific article; zbMATH DE number 2229743 (Why is no real title available?)2005-11-16Paper
scientific article; zbMATH DE number 2229674 (Why is no real title available?)2005-11-16Paper
Designated verifier proxy signature scheme with message recovery
Applied Mathematics and Computation
2005-11-14Paper
Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
Applied Mathematics and Computation
2005-11-14Paper
Proxy signature scheme using self-certified public keys
Applied Mathematics and Computation
2005-11-14Paper
Security of Pon-Lu-Jeng's Meta-He digital signature schemes
Applied Mathematics and Computation
2005-11-14Paper
A new efficient \((t,n)\) verifiable multi-secret sharing (VMSS) based on YCH scheme
Applied Mathematics and Computation
2005-11-04Paper
A new deniable authentication protocol from bilinear pairings
Applied Mathematics and Computation
2005-11-04Paper
Improved public key authentication scheme for non-repudiation
Applied Mathematics and Computation
2005-11-04Paper
Remarks on a new key authentication scheme based on discrete logarithms
Applied Mathematics and Computation
2005-10-28Paper
Efficient remote user authentication scheme using smart card
Computer Networks
2005-10-10Paper
scientific article; zbMATH DE number 2202168 (Why is no real title available?)2005-09-05Paper
A robust \((k,n)+1\) threshold proxy signature scheme based on factoring
Applied Mathematics and Computation
2005-08-05Paper
Cryptanalysis of Li-Tzeng-Hwang's improved signature schemes based on factoring and discrete logarithms
Applied Mathematics and Computation
2005-08-05Paper
Super-simple balanced incomplete block designs with block size 4 and index 6
Journal of Statistical Planning and Inference
2005-06-27Paper
Comment: cryptanalysis of Lee-Hwang-Li's key authentication scheme
Applied Mathematics and Computation
2005-06-13Paper
Proxy blind multi-signature scheme without a secure channel
Applied Mathematics and Computation
2005-05-04Paper
Provably secure proxy-protected signature schemes based on factoring
Applied Mathematics and Computation
2005-05-04Paper
scientific article; zbMATH DE number 2154971 (Why is no real title available?)2005-04-11Paper
Threshold undeniable signature scheme based on conic
Applied Mathematics and Computation
2005-02-22Paper
scientific article; zbMATH DE number 2112368 (Why is no real title available?)2004-10-28Paper
scientific article; zbMATH DE number 2109525 (Why is no real title available?)2004-10-25Paper
Existence of APAV\((q,k)\) with \(q\) a prime power \(\equiv 5 \pmod 8\) and \(k\equiv 1 \pmod 4\).
Discrete Mathematics
2004-03-29Paper
scientific article; zbMATH DE number 2042810 (Why is no real title available?)2004-02-15Paper
Nonrepudiable proxy multi-signature scheme
Journal of Computer Science and Technology
2003-12-09Paper
A new conjecture concerning the Diophantine equation \(x^2+b^y=c^z\).
Proceedings of the Japan Academy. Series A
2003-10-14Paper
An application of a lower bound for linear forms in two logarithms to the Terai–Jeśmanowicz conjecture
Acta Arithmetica
2003-09-28Paper
scientific article; zbMATH DE number 1895055 (Why is no real title available?)2003-09-20Paper
scientific article; zbMATH DE number 1912084 (Why is no real title available?)2003-05-18Paper
On a kind of superelliptic Diophantine equations
Journal of Harbin Institute of Technology
2002-12-08Paper
scientific article; zbMATH DE number 1471766 (Why is no real title available?)2002-10-10Paper
scientific article; zbMATH DE number 1789813 (Why is no real title available?)2002-08-27Paper
The Terai-Jeśmanowicz conjecture on the equation \(a^x+b^y=c^z\)
Chinese Annals of Mathematics. Series A
2002-06-27Paper
On simple \(K_4\)-groups
Journal of Algebra
2002-04-22Paper
On Whiteman's and Storer's difference sets
Journal of Statistical Planning and Inference
2002-02-21Paper
Integral trees of diameter \(R\) \((3\leq R\leq 6)\)
Journal of Natural Science of Heilongjiang University
2002-02-19Paper
Diophantine equations and class numbers of imaginary quadratic fields
Discussiones Mathematicae. General Algebra and Applications
2002-02-19Paper
Some classes of Diophantine equations connected with McFarland's and Ma's conjectures
Discussiones Mathematicae. General Algebra and Applications
2002-02-19Paper
Solutions of a class of Diophantine equations
Journal of Natural Science of Heilongjiang University
2002-02-19Paper
The class numbers of some imaginary quadratic fields and a class of Diophantine equations
Journal of Harbin Institute of Technology
2001-09-20Paper
An Erdős conjecture, Pell sequences and Diophantine equations
Journal of Harbin Institute of Technology
2001-09-20Paper
A generalization of the Schinzel-Sierpiński system of equations
Journal of Harbin Institute of Technology
2001-09-20Paper
Two new systems of decentralized management of cryptographic keys
Journal of Harbin Institute of Technology
2001-09-20Paper
Exponential Diophantine equations of the form \(a^x+b^y=c^z\)
Journal of Harbin Institute of Technology
2001-09-20Paper
A study of some Diophantine equations
Journal of Harbin Institute of Technology
2001-09-20Paper
A discussion on knapsack cryptosystems concealed by a matrix cover
Journal of Harbin Institute of Technology
2001-09-20Paper
On the Diophantine equation \((ax^m-4c)/(abx-4c)=by^2\)
Journal of Harbin Institute of Technology
2001-09-20Paper
On the Diophantine equation \(ax^2+by^2=p^z\)
Journal of Harbin Institute of Technology
2001-09-20Paper
On the Diophantine equation \(ax^m-by^n=4\)
Journal of Harbin Institute of Technology
2001-09-20Paper
Fermat's Last Theorem: A proof of Abel's conjecture
Journal of Harbin Institute of Technology
2001-09-20Paper
The Diophantine equation \(x^{2p}-Dy^2=1\) and the Fermat quotient \(Q_p(m)\)
Journal of Harbin Institute of Technology
2001-09-20Paper
Very high speed deconvolution based on recursively computing discrete Fourier transforms
Journal of Harbin Institute of Technology
2001-09-20Paper
On the number of solutions of Znám's problem
Journal of Harbin Institute of Technology
2001-09-20Paper
\(MD\) error-correcting block cipher systems
Journal of Harbin Institute of Technology
2001-09-20Paper
On the Diophantine equation \(x^3+z^3=Dy^2\)
Journal of Harbin Institute of Technology
2001-09-20Paper
The Diophantine equation \(x^2+b^y=c^z\)
Proceedings of the Japan Academy. Series A
2001-07-22Paper
Diophantine equations and class numbers of real quadratic fields
Acta Arithmetica
2001-06-17Paper
Some remarks on Fermat's equation in the set of matrices
Acta Academiae Paedagogicae Agriensis. Nova Series. Sectio Matematicae
2001-06-12Paper
A new proof of a conjecture of Antoniadis
Journal of Number Theory
2001-04-17Paper
The multi-dimension RSA and its low exponent security
Science in China. Series E
2000-12-12Paper
On the Diophantine equation $x^{p}+2^{2m}=py^{2}$
Proceedings of the American Mathematical Society
2000-05-22Paper
A note on the Diophantine equation $a^x + b^y = c^z$
Acta Arithmetica
2000-01-05Paper
On Terai's conjecture
Proceedings of the Japan Academy. Series A
1999-11-15Paper
scientific article; zbMATH DE number 1295226 (Why is no real title available?)1999-11-10Paper
Fermat's type equations in the set of \(2\times 2\) integral matrices
Tsukuba Journal of Mathematics
1999-10-17Paper
scientific article; zbMATH DE number 1262612 (Why is no real title available?)1999-06-01Paper
scientific article; zbMATH DE number 842861 (Why is no real title available?)1997-03-11Paper
Finite set theory and its application to cryptology
Journal of Statistical Planning and Inference
1996-07-18Paper
scientific article; zbMATH DE number 786244 (Why is no real title available?)1996-02-05Paper
scientific article; zbMATH DE number 810459 (Why is no real title available?)1995-11-26Paper
scientific article; zbMATH DE number 713438 (Why is no real title available?)1995-11-06Paper
scientific article; zbMATH DE number 613269 (Why is no real title available?)1994-09-27Paper
scientific article; zbMATH DE number 558921 (Why is no real title available?)1994-07-21Paper
scientific article; zbMATH DE number 496021 (Why is no real title available?)1994-02-07Paper
scientific article; zbMATH DE number 238384 (Why is no real title available?)1994-01-26Paper
scientific article; zbMATH DE number 169347 (Why is no real title available?)1993-05-16Paper
scientific article; zbMATH DE number 147689 (Why is no real title available?)1993-04-01Paper
scientific article; zbMATH DE number 123416 (Why is no real title available?)1993-02-18Paper
scientific article; zbMATH DE number 47263 (Why is no real title available?)1992-09-17Paper
scientific article; zbMATH DE number 24329 (Why is no real title available?)1992-06-26Paper
On the diophantine equation \({(ax^ m-1) \over{} (abx-1)} = by^ 2\)
Chinese Science Bulletin
1992-06-26Paper
scientific article; zbMATH DE number 24317 (Why is no real title available?)1992-06-26Paper
On the equation \(ax^ m - by^ n = 2\)
Chinese Science Bulletin
1992-06-25Paper
scientific article; zbMATH DE number 4208087 (Why is no real title available?)1991-01-01Paper
scientific article; zbMATH DE number 4173081 (Why is no real title available?)1989-01-01Paper
scientific article; zbMATH DE number 4122057 (Why is no real title available?)1988-01-01Paper
scientific article; zbMATH DE number 4091591 (Why is no real title available?)1988-01-01Paper
scientific article; zbMATH DE number 4043930 (Why is no real title available?)1987-01-01Paper
On the equation \(\sum ^{s}_{j=1}(1/x_ j)+(1/(x_ 1\,\dots \,x_ s))=1\) and Znám's problem
Journal of Number Theory
1987-01-01Paper
scientific article; zbMATH DE number 4031785 (Why is no real title available?)1987-01-01Paper
scientific article; zbMATH DE number 4095567 (Why is no real title available?)1987-01-01Paper
scientific article; zbMATH DE number 4095575 (Why is no real title available?)1987-01-01Paper
scientific article; zbMATH DE number 4095571 (Why is no real title available?)1986-01-01Paper
scientific article; zbMATH DE number 4025506 (Why is no real title available?)1986-01-01Paper
On the Diophantine Equation x 2n - y 2 = 1
Proceedings of the American Mathematical Society
1986-01-01Paper
scientific article; zbMATH DE number 3859219 (Why is no real title available?)1983-01-01Paper


Research outcomes over time


This page was built for person: Zhenfu Cao