Fangguo Zhang

From MaRDI portal
Person:411042

Available identifiers

zbMath Open zhang.fangguoMaRDI QIDQ411042

List of research outcomes

PublicationDate of PublicationType
Fast hashing to \(\mathbb{G}_2\) on pairing-friendly curves with the lack of twists2023-08-31Paper
Quantum circuits for hyperelliptic curve discrete logarithms over the mersenne prime fields2023-08-11Paper
Forward-secure revocable secret handshakes from lattices2023-07-07Paper
Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy2023-05-26Paper
Secret handshakes: full dynamicity, deniability and lattice-based design2023-04-20Paper
Inner-product functional encryption from random linear codes: trial and challenges2023-04-13Paper
Quantum algorithm for solving hyperelliptic curve discrete logarithm problem2023-01-05Paper
CSH: A Post-quantum Secret Handshake Scheme from Coding Theory2022-12-22Paper
New Practical Public-Key Deniable Encryption2022-12-21Paper
Twisted Ate pairing on hyperelliptic curves and applications2022-10-28Paper
Memory leakage-resilient secret sharing schemes2022-10-28Paper
Improving ECDLP Computation in Characteristic 22022-10-14Paper
Optimizing the evaluation of \(\ell\)-isogenous curve for isogeny-based cryptography2022-09-02Paper
Symmetric-Key Based Proofs of Retrievability Supporting Public Verification2022-08-19Paper
Identity based linkable ring signature with logarithmic size2022-07-01Paper
Lattice-based secret handshakes with reusable credentials2022-06-08Paper
Guruswami-Sudan Decoding of Elliptic Codes Through Module Basis Reduction2022-02-17Paper
An efficient blind signature scheme based on SM2 signature algorithm2021-12-08Paper
Functional encryption for cubic polynomials and implementation2021-09-06Paper
https://portal.mardi4nfdi.de/entity/Q49962412021-07-01Paper
Optimized arithmetic operations for isogeny-based cryptography on Huff curves2021-06-08Paper
ECC\(^2\): error correcting code and elliptic curve based cryptosystem2021-04-19Paper
Anonymous post-quantum cryptocash2021-03-17Paper
Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE2020-12-14Paper
Privacy preserving multi-party computation delegation for deep learning in cloud computing2020-09-09Paper
Deniable searchable symmetric encryption2020-02-07Paper
Solving ECDLP via list decoding2020-01-10Paper
Secure linear system computation in the presence of malicious adversaries2019-11-18Paper
Efficient obfuscation for CNF circuits and applications in cloud computing2019-07-02Paper
Bit security of the hyperelliptic curves Diffie-Hellman problem2018-11-07Paper
Implementing indistinguishability obfuscation using GGH152018-04-20Paper
Computing elliptic curve discrete logarithms with improved baby-step giant-step algorithm2017-10-12Paper
Faster Computation of Self-Pairings2017-07-12Paper
Efficient computation outsourcing for inverting a class of homomorphic functions2017-02-07Paper
Identity-based chameleon hashing and signatures without key exposure2016-01-14Paper
Solutions to the anti-piracy problem in oblivious transfer2015-12-30Paper
Security Model and Analysis of FHMQV, Revisited2015-12-02Paper
A New Signature Scheme Without Random Oracles from Bilinear Pairings2014-08-21Paper
https://portal.mardi4nfdi.de/entity/Q53990042014-02-28Paper
Discrete logarithm based chameleon hashing and signatures without key exposure2013-05-31Paper
Speeding up elliptic curve discrete logarithm computations with point halving2013-04-03Paper
https://portal.mardi4nfdi.de/entity/Q49121022013-04-03Paper
On the Resistance of Boolean Functions against Fast Algebraic Attacks2012-11-01Paper
Secret handshakes from ID-based message recovery signatures: a new generic approach2012-10-19Paper
Generic security-amplifying methods of ordinary digital signatures2012-10-17Paper
Computing elliptic curve discrete logarithms with the negation map2012-10-10Paper
Improved Pollard rho method for computing discrete logarithms over finite extension fields2012-08-03Paper
Efficient precomputation schemes of \(kP+lQ\)2012-07-25Paper
An efficient collision detection method for computing discrete logarithms with Pollard's rho2012-04-04Paper
Oblivious Transfer with Complex Attribute-Based Access Control2011-10-27Paper
Identity-based trapdoor mercurial commitments and applications2011-10-10Paper
Secure Obfuscation of Encrypted Verifiable Encrypted Signatures2011-09-16Paper
Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring2011-07-29Paper
Finding More Boolean Functions with Maximum Algebraic Immunity Based on Univariate Polynomial Representation2011-07-07Paper
New receipt-free voting scheme using double-trapdoor commitment2011-06-17Paper
On Relationship of Computational Diffie-Hellman Problem and Computational Square-Root Exponent Problem2011-06-08Paper
Traitor Tracing against Public Collaboration2011-05-19Paper
Computing bilinear pairings on elliptic curves with automorphisms2011-03-10Paper
Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 052010-08-20Paper
Attack on an ID-based authenticated group key agreement scheme from PKC 20042009-07-21Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure2009-03-10Paper
Efficient Partially Blind Signatures with Provable Security2009-02-10Paper
Efficient generic on-line/off-line (threshold) signatures without key exposure2008-11-20Paper
Efficient Tate pairing computation using double-base chains2008-11-10Paper
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings2008-09-09Paper
Generic Security-Amplifying Methods of Ordinary Digital Signatures2008-06-13Paper
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature2008-06-10Paper
Progress in Cryptology - INDOCRYPT 20032007-11-29Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Information Security2006-10-16Paper
Information Security and Privacy2006-06-22Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Financial Cryptography and Data Security2005-12-22Paper
Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'032005-11-22Paper
https://portal.mardi4nfdi.de/entity/Q57009802005-11-02Paper
Information Security and Privacy2005-09-07Paper
Information and Communications Security2005-08-19Paper
Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making2005-08-17Paper
Applied Cryptography and Network Security2005-06-13Paper
New identity-based society oriented signature schemes from pairings on elliptic curves2005-02-23Paper
Cryptanalysis of Lee-Hwang-Li's key authentication scheme2005-02-22Paper
https://portal.mardi4nfdi.de/entity/Q44735742004-08-04Paper
Selection of secure hyperelliptic curves of \textit{g=2} based on a subfield2004-07-01Paper
https://portal.mardi4nfdi.de/entity/Q44507582004-02-16Paper
Secure Web transaction with anonymous mobile agent over Internet2003-08-13Paper
https://portal.mardi4nfdi.de/entity/Q44129772003-07-17Paper
ID-Based Blind Signature and Ring Signature from Pairings2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q44093622002-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Fangguo Zhang