Zhenfeng Zhang

From MaRDI portal
Person:237120

Available identifiers

zbMath Open zhang.zhenfengMaRDI QIDQ237120

List of research outcomes





PublicationDate of PublicationType
Bit security analysis of lattice-based KEMs under plaintext-checking attacks2024-10-16Paper
Post-quantum security of key encapsulation mechanism against CCA attacks with a single decapsulation query2024-09-13Paper
Existence and multiplicity of solutions for fractional \(p_1(x,\cdot)\& p_2(x,\cdot)\)-Laplacian Schrödinger-type equations with Robin boundary conditions2024-07-12Paper
On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model2023-05-12Paper
Generic traceable proxy re-encryption and accountable extension in consensus network2022-08-25Paper
Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes2021-12-01Paper
Lattice-Based Cryptosystems2020-12-07Paper
IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited2020-06-30Paper
Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model2020-02-25Paper
Key encapsulation mechanism with explicit rejection in the quantum random oracle model2020-01-28Paper
On the hardness of the computational ring-LWR problem and its applications2018-12-20Paper
Bootstrapping fully homomorphic encryption with ring plaintexts within polynomial noise2018-11-07Paper
Security of the SM2 signature scheme against generalized key substitution attacks2018-10-26Paper
Fast lottery-based micropayments for decentralized currencies2018-09-26Paper
Batched multi-hop multi-key FHE from ring-LWE with compact ciphertext extension2018-01-19Paper
Expanded Framework for Dual System Encryption and Its Application2017-05-19Paper
One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model2017-05-05Paper
UC-secure and Contributory Password-Authenticated Group Key Exchange2016-12-21Paper
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes2016-11-09Paper
Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model2016-03-10Paper
Generic constructions of integrated PKE and PEKS2016-02-19Paper
Certificateless Proxy Re-Encryption Without Pairings2015-10-16Paper
Authenticated Key Exchange from Ideal Lattices2015-09-30Paper
Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol2015-07-16Paper
Proxy Re-encryption with Unforgeable Re-encryption Keys2015-02-10Paper
Black-Box Separations for One-More (Static) CDH and Its Generalization2015-01-06Paper
PRE: stronger security notions and efficient construction with non-interactive opening2014-06-23Paper
Towards a Secure Certificateless Proxy Re-Encryption Scheme2013-10-23Paper
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures2013-03-18Paper
A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening2013-01-07Paper
A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings2013-01-07Paper
Combined Public-Key Schemes: The Case of ABE and ABS2012-11-06Paper
Fully Secure Doubly-Spatial Encryption under Simple Assumptions2012-11-06Paper
Authenticated Key Exchange with Entities from Different Settings and Varied Groups2012-11-06Paper
Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts2012-09-07Paper
https://portal.mardi4nfdi.de/entity/Q31163782012-02-22Paper
Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost2011-09-16Paper
Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security2011-09-16Paper
Certificateless threshold ring signature2009-10-01Paper
https://portal.mardi4nfdi.de/entity/Q36109712009-03-06Paper
A New Anonymous Password-Based Authenticated Key Exchange Protocol2009-01-22Paper
Certificateless signature: a new security model and an improved generic construction2007-09-20Paper
Key Replacement Attack Against a Generic Construction of Certificateless Signature2007-09-07Paper
Applied Cryptography and Network Security2007-05-02Paper
Cryptanalysis of AW digital signature scheme based on error-correcting codes2007-02-20Paper
Cryptology and Network Security2006-11-14Paper
Cryptology and Network Security2006-11-14Paper
Information and Communications Security2006-10-24Paper
https://portal.mardi4nfdi.de/entity/Q54911952006-10-10Paper
An additive problem with primes in arithmetic progressions2006-01-09Paper
Cryptanalysis of some signature schemes with message recovery2005-11-14Paper
https://portal.mardi4nfdi.de/entity/Q48239292004-10-28Paper
https://portal.mardi4nfdi.de/entity/Q48236302004-10-28Paper
https://portal.mardi4nfdi.de/entity/Q44343142004-01-26Paper
The ternary Goldbach problem with primes in arithmetic progressions2002-04-16Paper

Research outcomes over time

This page was built for person: Zhenfeng Zhang