Mingwu Zhang

From MaRDI portal
(Redirected from Person:433055)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Provably secure group authentication in the asynchronous communication model2024-04-19Paper
Leakage-resilient identity-based cryptography from minimal assumptions
Designs, Codes and Cryptography
2023-11-07Paper
Structure-preserving linearly homomorphic signature with designated combiner for subspace
Information Security and Privacy
2023-07-26Paper
An Efficient and Provably Secure Private Polynomial Evaluation Scheme
Information Security Practice and Experience
2023-06-30Paper
Key exposure resistant group key agreement protocol2023-04-13Paper
Measurement-device-independent quantum secure multiparty summation
Quantum Information Processing
2022-11-29Paper
Secure two-party integer comparison protocol without any third party
Quantum Information Processing
2022-11-24Paper
Verifiable quantum key exchange with authentication
International Journal of Theoretical Physics
2021-11-05Paper
Novel generic construction of leakage-resilient PKE scheme with CCA security
Designs, Codes and Cryptography
2021-06-24Paper
Improvement of attribute-based encryption using Blakley secret sharing2021-06-08Paper
Quantum secure multi-party private set intersection cardinality
International Journal of Theoretical Physics
2020-09-04Paper
Cryptanalysis and improvement of quantum sealed-bid auction
International Journal of Theoretical Physics
2020-06-19Paper
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
Theoretical Computer Science
2020-01-29Paper
Provably secure proactive secret sharing without the adjacent assumption2020-01-10Paper
Realizing secret sharing with general access structure
Information Sciences
2020-01-06Paper
Strong privacy-preserving two-party scalar product quantum protocol
International Journal of Theoretical Physics
2019-12-19Paper
Cloud-based data-sharing scheme using verifiable and CCA-secure re-encryption from indistinguishability obfuscation2019-10-31Paper
Verifiable secret sharing based on hyperplane geometry with its applications to optimal resilient proactive cryptosystems2018-09-26Paper
Secure publicly verifiable computation with polynomial commitment in cloud computing2018-09-26Paper
ADR-lrABE: new mechanism of direct-revocable attribute-based encryption with continual-leakage tolerances
Fundamenta Informaticae
2018-05-03Paper
Cryptographic reverse firewall via malleable smooth projective hash functions
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Anonymous spatial encryption under affine space delegation functionality with full security
Information Sciences
2017-01-31Paper
Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage
Provable Security
2017-01-06Paper
One-round strong oblivious signature-based envelope
Information Security and Privacy
2016-09-02Paper
Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks
Frontiers of Computer Science
2015-11-20Paper
Identity-based partially blind signature in the standard model for electronic cash
Mathematical and Computer Modelling
2014-10-21Paper
New Model and Construction of ABE: Achieving Key Resilient-Leakage and Attribute Direct-Revocation
Information Security and Privacy
2014-07-24Paper
A robust fuzzy extractor without ECCs
Information Security and Cryptology
2013-05-28Paper
LR-UESDE: a continual-leakage resilient encryption with unbounded extensible set delegation
Provable Security
2012-11-06Paper
An ID-based cryptographic mechanisms based on GDLP and IFP
Information Processing Letters
2012-10-23Paper
Group-oriented setting's multisigncryption scheme with threshold designcryption
Information Sciences
2012-07-13Paper
Efficient identity-based signcryption in the standard model
Provable Security
2011-09-16Paper
Anonymous encryption with partial-order subset delegation functionality
Provable Security
2011-09-16Paper
GeoENC: geometric area based keys and policies in functional encryption systems
Information Security and Privacy
2011-07-07Paper


Research outcomes over time


This page was built for person: Mingwu Zhang