default search action
Cong Peng 0005
Person information
- affiliation: Wuhan University, School of Cyber Science and Engineering, China
Other persons with the same name
- Cong Peng — disambiguation page
- Cong Peng 0001 — Nanjing University of Aeronautics and Astronautics, College of Automation Engineering, China
- Cong Peng 0002 — Blekinge Institute of Technology, Department of Creative Technologies, Karlskrona, Sweden
- Cong Peng 0003 — Beihang University, State Key Laboratory of Virtual Reality Technology and Systems, Beijing, China
- Cong Peng 0004 — Tongji University, School of Electronic Information Engineering, Shanghai, China (and 1 more)
- Cong Peng 0006 — University of Nevada, Department of Electrical and Biomedical Engineering, NV, USA
- Cong Peng 0007 — Hong Kong University of Science and Technology, Department of Computer Science, Kowloon, Hong Kong (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Guocheng Zhu, Debiao He, Haoyang An, Min Luo, Cong Peng:
The governance technology for blockchain systems: a survey. Frontiers Comput. Sci. 18(2): 182813 (2024) - [j33]Yulin Liu, Debiao He, Zijian Bao, Min Luo, Cong Peng:
PEACS: A Privacy-Enhancing and Accountable Car Sharing System. IEEE Internet Things J. 11(9): 16422-16435 (2024) - [j32]Hongyi Qiao, Cong Peng, Qi Feng, Min Luo, Debiao He:
Ciphertext Range Query Scheme Against Agent Transfer and Permission Extension Attacks for Cloud Computing. IEEE Internet Things J. 11(10): 17975-17988 (2024) - [j31]Chenkai Zeng, Debiao He, Qi Feng, Cong Peng, Min Luo:
The implementation of polynomial multiplication for lattice-based cryptography: A survey. J. Inf. Secur. Appl. 83: 103782 (2024) - [j30]Mengze Li, Cong Peng, Lingyan Han, Qi Feng, Min Luo:
High-speed batch verification for discrete-logarithm-based signatures via Multi-Scalar Multiplication Algorithm. J. Inf. Secur. Appl. 87: 103898 (2024) - [j29]Jiabin Bao, Min Luo, Yitao Chen, Cong Peng, Zijian Bao:
A Certificateless Anonymous Authentication Scheme for VANETs Based on Ring Signature. J. Circuits Syst. Comput. 33(3) (2024) - [j28]Xin Chen, Debiao He, Cong Peng, Min Luo, Xinyi Huang:
A Secure and Effective Hierarchical Identity-Based Signature Scheme for ADS-B Systems. IEEE Trans. Aerosp. Electron. Syst. 60(4): 5157-5168 (2024) - [j27]Haoyang An, Debiao He, Cong Peng, Min Luo, Lianhai Wang:
Efficient Certificateless Online/Offline Signcryption Scheme Without Bilinear Pairing for Smart Home Consumer Electronics. IEEE Trans. Consumer Electron. 70(1): 4005-4015 (2024) - [j26]Yutian Chen, Cong Peng, Yu Dai, Min Luo, Debiao He:
Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication Algorithm. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 522-544 (2024) - [j25]Runqing Xu, Debiao He, Min Luo, Cong Peng, Xiangyong Zeng:
Optimizing Dilithium Implementation with AVX2/-512. ACM Trans. Embed. Comput. Syst. 23(6): 98:1-98:30 (2024) - [j24]Ruonan Wang, Min Luo, Qi Feng, Cong Peng, Debiao He:
Multi-Party Privacy-Preserving Faster R-CNN Framework for Object Detection. IEEE Trans. Emerg. Top. Comput. Intell. 8(1): 956-967 (2024) - [j23]Zijian Bao, Debiao He, Huaqun Wang, Min Luo, Cong Peng:
BAP: A Blockchain-Assisted Privacy-Preserving Authentication Protocol With User-Controlled Data Linkability for VANETs. IEEE Trans. Intell. Veh. 9(2): 4206-4220 (2024) - [c9]Congrong Peng, Cong Peng, Xiaolin Yang, Qingcai Luo, Min Luo:
Isogeny-Based Password-Authenticated Key Exchange Based on Shuffle Algorithm. ISPEC 2024: 112-132 - [c8]Cong Peng, Rongmao Chen, Yi Wang, Debiao He, Xinyi Huang:
Parameter-Hiding Order-Revealing Encryption Without Pairings. Public Key Cryptography (4) 2024: 227-256 - [i3]Cong Peng, Rongmao Chen, Yi Wang, Debiao He, Xinyi Huang:
Parameter-Hiding Order-Revealing Encryption without Pairings. IACR Cryptol. ePrint Arch. 2024: 434 (2024) - [i2]Yu Dai, Debiao He, Dmitrii I. Koshelev, Cong Peng, Zhijian Yang:
Revisiting subgroup membership testing on pairing-friendly curves via the Tate pairing. IACR Cryptol. ePrint Arch. 2024: 1790 (2024) - 2023
- [j22]Zhiyan Xu, Min Luo, Cong Peng, Qi Feng:
Sanitizable signature scheme with privacy protection for electronic medical data sharing. Cyber Secur. Appl. 1: 100018 (2023) - [j21]Xin Chen, Debiao He, Muhammad Khurram Khan, Min Luo, Cong Peng:
A Secure Certificateless Signcryption Scheme Without Pairing for Internet of Medical Things. IEEE Internet Things J. 10(10): 9136-9147 (2023) - [j20]Zijian Bao, Debiao He, Huaqun Wang, Min Luo, Cong Peng:
A Group Signature Scheme With Selective Linkability and Traceability for Blockchain-Based Data Sharing Systems in E-Health Services. IEEE Internet Things J. 10(23): 21115-21128 (2023) - [j19]Haoyang An, Debiao He, Zijian Bao, Cong Peng, Qin Liu:
An identity-based dynamic group signature scheme for reputation evaluation systems. J. Syst. Archit. 139: 102875 (2023) - [j18]Zijian Bao, Debiao He, Cong Peng, Min Luo, Kim-Kwang Raymond Choo:
An Identity-Based Adaptor Signature Scheme and its Applications in the Blockchain System. IEEE Open J. Comput. Soc. 4: 231-242 (2023) - [j17]Xinjie Zhu, Debiao He, Zijian Bao, Cong Peng, Min Luo:
Two-Party Adaptor Signature Scheme Based on IEEE P1363 Identity-Based Signature. IEEE Open J. Commun. Soc. 4: 2717-2728 (2023) - [j16]Qing Fan, Debiao He, Jianhua Chen, Cong Peng, Lianhai Wang:
Isoga: An Isogeny-Based Quantum-Resist Searchable Encryption Scheme Against Keyword Guessing Attacks. IEEE Syst. J. 17(2): 2101-2112 (2023) - [j15]Hangcheng Zheng, Min Luo, Yunru Zhang, Cong Peng, Qi Feng:
A Security-Enhanced Pairing-Free Certificateless Aggregate Signature for Vehicular Ad-Hoc Networks. IEEE Syst. J. 17(3): 3822-3833 (2023) - [j14]Zijian Bao, Debiao He, Wei Wei, Cong Peng, Xinyi Huang:
LedgerMaze: An Efficient Privacy-Preserving Noninteractive Zero-Knowledge Scheme Over Account-Model Blockchain. IEEE Trans. Computers 72(12): 3489-3502 (2023) - [j13]Xinyi Hu, Debiao He, Min Luo, Cong Peng, Qi Feng, Xinyi Huang:
High-Performance Implementation of the Identity-Based Signature Scheme in IEEE P1363 on GPU. ACM Trans. Embed. Comput. Syst. 22(2): 25:1-25:35 (2023) - [j12]Douwei Lei, Debiao He, Cong Peng, Min Luo, Zhe Liu, Xinyi Huang:
Faster Implementation of Ideal Lattice-Based Cryptography Using AVX512. ACM Trans. Embed. Comput. Syst. 22(5): 83:1-83:18 (2023) - [c7]Hongyi Qiao, Cong Peng, Min Luo, Po Wu, Debiao He:
Power Grid Encrypted Data Range Filtering Scheme Based on Order-revealing Encryption. ISPA/BDCloud/SocialCom/SustainCom 2023: 715-723 - [c6]Sijia Liu, Min Luo, Cong Peng, Debiao He:
Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM. ICICS 2023: 35-50 - [c5]Weihan Huang, Min Luo, Cong Peng, Debiao He:
FleS: A Compact and Parameter-Flexible Supersingular Isogeny Based Public Key Encryption Scheme. ProvSec 2023: 290-308 - [c4]Wei Wei, Min Luo, Zijian Bao, Cong Peng, Debiao He:
Traceable Ring Signatures from Group Actions: Logarithmic, Flexible, and Quantum Resistant. SAC 2023: 169-188 - [i1]Yu Dai, Debiao He, Cong Peng, Zhijian Yang, Chang-an Zhao:
Revisiting Pairing-friendly Curves with Embedding Degrees 10 and 14. IACR Cryptol. ePrint Arch. 2023: 1958 (2023) - 2022
- [j11]Cong Peng, Min Luo, Huaqun Wang, Muhammad Khurram Khan, Debiao He:
An Efficient Privacy-Preserving Aggregation Scheme for Multidimensional Data in IoT. IEEE Internet Things J. 9(1): 589-600 (2022) - [j10]Cong Peng, Min Luo, Pandi Vijayakumar, Debiao He, Omar Said, Amr Tolba:
Multifunctional and Multidimensional Secure Data Aggregation Scheme in WSNs. IEEE Internet Things J. 9(4): 2657-2668 (2022) - [j9]Xiaotong Zhou, Min Luo, Pandi Vijayakumar, Cong Peng, Debiao He:
Efficient Certificateless Conditional Privacy-Preserving Authentication for VANETs. IEEE Trans. Veh. Technol. 71(7): 7863-7875 (2022) - [c3]Zijian Bao, Debiao He, Yulin Liu, Cong Peng, Qi Feng, Min Luo:
Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing. CSS 2022: 56-70 - [c2]Yang Liu, Qi Feng, Cong Peng, Min Luo, Debiao He:
Asymmetric Secure Multi-party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography. EISA 2022: 1-20 - 2021
- [j8]Cong Peng, Min Luo, Li Li, Kim-Kwang Raymond Choo, Debiao He:
Efficient Certificateless Online/Offline Signature Scheme for Wireless Body Area Networks. IEEE Internet Things J. 8(18): 14287-14298 (2021) - [j7]Cong Peng, Jianhua Chen, Pandi Vijayakumar, Neeraj Kumar, Debiao He:
Efficient Distributed Decryption Scheme for IoT Gateway-based Applications. ACM Trans. Internet Techn. 21(1): 19:1-19:23 (2021) - [j6]Cong Peng, Debiao He, Jianhua Chen, Neeraj Kumar, Muhammad Khurram Khan:
EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System. ACM Trans. Internet Techn. 21(3): 61:1-61:24 (2021) - [c1]Yihong Wen, Cong Peng, Shicheng Wang, Li Li, Min Luo:
An Identity-Based Blind Signature Scheme with Message Recovery from Pairings. ACNS Workshops 2021: 42-55 - 2020
- [j5]Cong Peng, Jianhua Chen, Mohammad S. Obaidat, Pandi Vijayakumar, Debiao He:
Efficient and Provably Secure Multireceiver Signcryption Scheme for Multicast Communication in Edge Computing. IEEE Internet Things J. 7(7): 6056-6068 (2020) - [j4]Cong Peng, Jianhua Chen, Lu Zhou, Kim-Kwang Raymond Choo, Debiao He:
CsiIBS: A post-quantum identity-based signature scheme based on isogenies. J. Inf. Secur. Appl. 54: 102504 (2020)
2010 – 2019
- 2019
- [j3]Cong Peng, Jianhua Chen, Sherali Zeadally, Debiao He:
Isogeny-Based Cryptography: A Promising Post-Quantum Technique. IT Prof. 21(6): 27-32 (2019) - [j2]Haorui Du, Jianhua Chen, Mingping Qi, Cong Peng, Qing Fan:
一个前向安全的基于RSA的多服务器的认证协议 (Forward-secure RSA-based Multi-server Authentication Protocol). 计算机科学 46(11A): 409-413 (2019) - 2014
- [j1]Yuanyuan Zhang, Jianhua Chen, Baojun Huang, Cong Peng:
An Efficient Password Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography. Inf. Technol. Control. 43(4): 390-401 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 21:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint