Fangguo Zhang

From MaRDI portal
(Redirected from Person:411042)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
TVES: threshold verifiably encrypted signature and its applications2024-07-17Paper
Deniable cryptosystems: simpler constructions and achieving leakage resilience2024-06-05Paper
Fast hashing to \(\mathbb{G}_2\) on pairing-friendly curves with the lack of twists
Finite Fields and their Applications
2023-08-31Paper
Quantum circuits for hyperelliptic curve discrete logarithms over the mersenne prime fields
Quantum Information Processing
2023-08-11Paper
Forward-secure revocable secret handshakes from lattices
Post-Quantum Cryptography
2023-07-07Paper
Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy
Lecture Notes in Computer Science
2023-05-26Paper
Secret handshakes: full dynamicity, deniability and lattice-based design
Theoretical Computer Science
2023-04-20Paper
Inner-product functional encryption from random linear codes: trial and challenges2023-04-13Paper
Forward-Secure Group Encryptions from Lattices2023-04-13Paper
Quantum algorithm for solving hyperelliptic curve discrete logarithm problem
Quantum Information Processing
2023-01-05Paper
CSH: A Post-quantum Secret Handshake Scheme from Coding Theory
1511.94164
2022-12-22Paper
New Practical Public-Key Deniable Encryption
1515.94059
2022-12-21Paper
Twisted Ate pairing on hyperelliptic curves and applications
Science China Information Sciences
2022-10-28Paper
Memory leakage-resilient secret sharing schemes
Science China Information Sciences
2022-10-28Paper
Improving ECDLP computation in characteristic 2
Information Security and Cryptology
2022-10-14Paper
Optimizing the evaluation of \(\ell\)-isogenous curve for isogeny-based cryptography
Information Processing Letters
2022-09-02Paper
Symmetric-key based proofs of retrievability supporting public verification
Computer Security -- ESORICS 2015
2022-08-19Paper
Identity based linkable ring signature with logarithmic size2022-07-01Paper
Lattice-based secret handshakes with reusable credentials2022-06-08Paper
Guruswami-Sudan Decoding of Elliptic Codes Through Module Basis Reduction
IEEE Transactions on Information Theory
2022-02-17Paper
An efficient blind signature scheme based on SM2 signature algorithm2021-12-08Paper
Functional encryption for cubic polynomials and implementation
Theoretical Computer Science
2021-09-06Paper
Research development on efficient elliptic curve isogenous computations2021-07-01Paper
Optimized arithmetic operations for isogeny-based cryptography on Huff curves2021-06-08Paper
ECC\(^2\): error correcting code and elliptic curve based cryptosystem
Information Sciences
2021-04-19Paper
Anonymous post-quantum cryptocash2021-03-17Paper
Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE
IEEE Transactions on Computers
2020-12-14Paper
Privacy preserving multi-party computation delegation for deep learning in cloud computing
Information Sciences
2020-09-09Paper
Deniable searchable symmetric encryption
Information Sciences
2020-02-07Paper
Solving ECDLP via list decoding2020-01-10Paper
Secure linear system computation in the presence of malicious adversaries
Science China Information Sciences
2019-11-18Paper
Efficient obfuscation for CNF circuits and applications in cloud computing
Soft Computing
2019-07-02Paper
Bit security of the hyperelliptic curves Diffie-Hellman problem2018-11-07Paper
Implementing indistinguishability obfuscation using GGH152018-04-20Paper
Computing elliptic curve discrete logarithms with improved baby-step giant-step algorithm
Advances in Mathematics of Communications
2017-10-12Paper
Faster Computation of Self-Pairings
IEEE Transactions on Information Theory
2017-07-12Paper
Efficient computation outsourcing for inverting a class of homomorphic functions
Information Sciences
2017-02-07Paper
Identity-based chameleon hashing and signatures without key exposure
Information Sciences
2016-01-14Paper
Solutions to the anti-piracy problem in oblivious transfer
Journal of Computer and System Sciences
2015-12-30Paper
Security model and analysis of FHMQV, revisited
Information Security and Cryptology
2015-12-02Paper
A new signature scheme without random oracles from bilinear pairings
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
scientific article; zbMATH DE number 6262935 (Why is no real title available?)2014-02-28Paper
Discrete logarithm based chameleon hashing and signatures without key exposure
Computers and Electrical Engineering
2013-05-31Paper
Speeding up elliptic curve discrete logarithm computations with point halving
Designs, Codes and Cryptography
2013-04-03Paper
Times limited accountable anonymous online submission control system from single-verifier \(k\)-times group signature2013-04-03Paper
On the resistance of Boolean functions against fast algebraic attacks
Information Security and Cryptology - ICISC 2011
2012-11-01Paper
Secret handshakes from ID-based message recovery signatures: a new generic approach
Computers and Electrical Engineering
2012-10-19Paper
Generic security-amplifying methods of ordinary digital signatures
Information Sciences
2012-10-17Paper
Computing elliptic curve discrete logarithms with the negation map
Information Sciences
2012-10-10Paper
Improved Pollard rho method for computing discrete logarithms over finite extension fields
Journal of Computational and Applied Mathematics
2012-08-03Paper
Efficient precomputation schemes of \(kP+lQ\)
Information Processing Letters
2012-07-25Paper
An efficient collision detection method for computing discrete logarithms with Pollard's rho
Journal of Applied Mathematics
2012-04-04Paper
Oblivious transfer with complex attribute-based access control
Information Security and Cryptology - ICISC 2010
2011-10-27Paper
Identity-based trapdoor mercurial commitments and applications
Theoretical Computer Science
2011-10-10Paper
Secure Obfuscation of Encrypted Verifiable Encrypted Signatures
Provable Security
2011-09-16Paper
Comments and improvements on key-exposure free chameleon hashing based on factoring
Information Security and Cryptology
2011-07-29Paper
Finding more Boolean functions with maximum algebraic immunity based on univariate polynomial representation
Information Security and Privacy
2011-07-07Paper
New receipt-free voting scheme using double-trapdoor commitment
Information Sciences
2011-06-17Paper
On relationship of computational Diffie-Hellman problem and computational square-root exponent problem
Lecture Notes in Computer Science
2011-06-08Paper
Traitor tracing against public collaboration
Information Security Practice and Experience
2011-05-19Paper
Computing bilinear pairings on elliptic curves with automorphisms
Designs, Codes and Cryptography
2011-03-10Paper
Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05
Information Processing Letters
2010-08-20Paper
Attack on an ID-based authenticated group key agreement scheme from PKC 2004
Information Processing Letters
2009-07-21Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure
Applied Cryptography and Network Security
2009-03-10Paper
Efficient Partially Blind Signatures with Provable Security
Computational Science and Its Applications - ICCSA 2006
2009-02-10Paper
Efficient generic on-line/off-line (threshold) signatures without key exposure
Information Sciences
2008-11-20Paper
Efficient Tate pairing computation using double-base chains
Science in China. Series F
2008-11-10Paper
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings
Financial Cryptography and Data Security
2008-09-09Paper
Generic Security-Amplifying Methods of Ordinary Digital Signatures
Applied Cryptography and Network Security
2008-06-13Paper
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature
Provable Security
2008-06-10Paper
Progress in Cryptology - INDOCRYPT 2003
Lecture Notes in Computer Science
2007-11-29Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Information Security
Lecture Notes in Computer Science
2006-10-16Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Financial Cryptography and Data Security
Lecture Notes in Computer Science
2005-12-22Paper
Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03
Applied Mathematics and Computation
2005-11-22Paper
scientific article; zbMATH DE number 2222187 (Why is no real title available?)2005-11-02Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making
Lecture Notes in Computer Science
2005-08-17Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
New identity-based society oriented signature schemes from pairings on elliptic curves
Applied Mathematics and Computation
2005-02-23Paper
Cryptanalysis of Lee-Hwang-Li's key authentication scheme
Applied Mathematics and Computation
2005-02-22Paper
scientific article; zbMATH DE number 2080678 (Why is no real title available?)2004-08-04Paper
Selection of secure hyperelliptic curves of \textit{g=2} based on a subfield
Journal of Computer Science and Technology
2004-07-01Paper
scientific article; zbMATH DE number 2043331 (Why is no real title available?)2004-02-16Paper
Secure Web transaction with anonymous mobile agent over Internet
Journal of Computer Science and Technology
2003-08-13Paper
scientific article; zbMATH DE number 1950344 (Why is no real title available?)2003-07-17Paper
ID-Based Blind Signature and Ring Signature from Pairings
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1942823 (Why is no real title available?)2002-01-01Paper


Research outcomes over time


This page was built for person: Fangguo Zhang