Zhenfeng Zhang

From MaRDI portal
(Redirected from Person:237120)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Bit security analysis of lattice-based KEMs under plaintext-checking attacks2024-10-16Paper
Post-quantum security of key encapsulation mechanism against CCA attacks with a single decapsulation query2024-09-13Paper
Existence and multiplicity of solutions for fractional \(p_1(x,\cdot)\& p_2(x,\cdot)\)-Laplacian Schrödinger-type equations with Robin boundary conditions
Boundary Value Problems
2024-07-12Paper
On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model
Lecture Notes in Computer Science
2023-05-12Paper
Generic traceable proxy re-encryption and accountable extension in consensus network2022-08-25Paper
Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes2021-12-01Paper
Lattice-based cryptosystems. A design perspective2020-12-07Paper
IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited2020-06-30Paper
Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model2020-02-25Paper
Key encapsulation mechanism with explicit rejection in the quantum random oracle model2020-01-28Paper
On the hardness of the computational ring-LWR problem and its applications2018-12-20Paper
Bootstrapping fully homomorphic encryption with ring plaintexts within polynomial noise2018-11-07Paper
Security of the SM2 signature scheme against generalized key substitution attacks2018-10-26Paper
Fast lottery-based micropayments for decentralized currencies2018-09-26Paper
Batched multi-hop multi-key FHE from ring-LWE with compact ciphertext extension2018-01-19Paper
Expanded Framework for Dual System Encryption and Its Application
Information Security and Cryptology – ICISC 2016
2017-05-19Paper
One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model
Information Security and Cryptology
2017-05-05Paper
UC-secure and contributory password-authenticated group key exchange
Progress in Cryptology – INDOCRYPT 2016
2016-12-21Paper
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
Advances in Cryptology – CRYPTO 2016
2016-11-09Paper
Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model
Applied Cryptography and Network Security
2016-03-10Paper
Generic constructions of integrated PKE and PEKS
Designs, Codes and Cryptography
2016-02-19Paper
Certificateless proxy re-encryption without pairings
Information Security and Cryptology -- ICISC 2013
2015-10-16Paper
Authenticated key exchange from ideal lattices
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol
Nonlinear Dynamics
2015-07-16Paper
Proxy re-encryption with unforgeable re-encryption keys
Cryptology and Network Security
2015-02-10Paper
Black-box separations for one-more (static) CDH and its generalization
Lecture Notes in Computer Science
2015-01-06Paper
PRE: stronger security notions and efficient construction with non-interactive opening
Theoretical Computer Science
2014-06-23Paper
Towards a secure certificateless proxy re-encryption scheme
Provable Security
2013-10-23Paper
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
A generic construction from selective-IBE to public-key encryption with non-interactive opening
Information Security and Cryptology
2013-01-07Paper
A ciphertext policy attribute-based encryption scheme without pairings
Information Security and Cryptology
2013-01-07Paper
Combined public-key schemes: the case of ABE and ABS
Provable Security
2012-11-06Paper
Fully secure doubly-spatial encryption under simple assumptions
Provable Security
2012-11-06Paper
Authenticated key exchange with entities from different settings and varied groups
Provable Security
2012-11-06Paper
Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts
Information Security and Privacy
2012-09-07Paper
Some results concerning a singular integral2012-02-22Paper
Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost
Provable Security
2011-09-16Paper
Gateway-oriented password-authenticated key exchange protocol with stronger security
Provable Security
2011-09-16Paper
Certificateless threshold ring signature
Information Sciences
2009-10-01Paper
scientific article; zbMATH DE number 5525620 (Why is no real title available?)2009-03-06Paper
A New Anonymous Password-Based Authenticated Key Exchange Protocol
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
Certificateless signature: a new security model and an improved generic construction
Designs, Codes and Cryptography
2007-09-20Paper
Key Replacement Attack Against a Generic Construction of Certificateless Signature
Information Security and Privacy
2007-09-07Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2007-05-02Paper
Cryptanalysis of AW digital signature scheme based on error-correcting codes
Science in China. Series F
2007-02-20Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Analysis and improvement of a security-provable mutually authenticated key agreement2006-10-10Paper
An additive problem with primes in arithmetic progressions
Acta Mathematica Sinica, English Series
2006-01-09Paper
Cryptanalysis of some signature schemes with message recovery
Applied Mathematics and Computation
2005-11-14Paper
scientific article; zbMATH DE number 2112427 (Why is no real title available?)2004-10-28Paper
scientific article; zbMATH DE number 2112170 (Why is no real title available?)2004-10-28Paper
scientific article; zbMATH DE number 2001304 (Why is no real title available?)2004-01-26Paper
The ternary Goldbach problem with primes in arithmetic progressions
Acta Mathematica Sinica, English Series
2002-04-16Paper


Research outcomes over time


This page was built for person: Zhenfeng Zhang