default search action
Zongyang Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Zongyang Zhang, Lingyue Zhang, Zhuo Wang, Yichen Li, Rongxing Lu, Yong Yu:
Chronos: An Efficient Asynchronous Byzantine Ordered Consensus. Comput. J. 67(3): 1153-1162 (2024) - [j22]Zongyang Zhang, Weihan Li, Ximeng Liu, Xin Chen, Qihang Peng:
Ligerolight: Optimized IOP-Based Zero-Knowledge Argument for Blockchain Scalability. IEEE Trans. Dependable Secur. Comput. 21(4): 3656-3670 (2024) - [c23]Ziyu Meng, Zibo Zhou, Zongyang Zhang, Yu Jin:
Lightweight Instance Batch Schemes Towards Prover-Efficient Decentralized Private Computation. ACISP (3) 2024: 64-83 - [c22]Zongyang Zhang, Weihan Li, Yanpei Guo, Kexin Shi, Sherman S. M. Chow, Ximeng Liu, Jin Dong:
Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing. USENIX Security Symposium 2024 - 2023
- [j21]Zibo Zhou, Zongyang Zhang, Hongyu Tao, Tianyu Li, Boyu Zhao:
Efficient inner product arguments and their applications in range proofs. IET Inf. Secur. 17(3): 485-504 (2023) - [j20]Wei Tong, Xuewen Dong, Yushu Zhang, Zongyang Zhang, Lingxiao Yang, Weidong Yang, Yulong Shen:
TI-BIoV: Traffic Information Interaction for Blockchain-Based IoV With Trust and Incentive. IEEE Internet Things J. 10(24): 21528-21543 (2023) - [i13]Zibo Zhou, Zongyang Zhang, Jin Dong:
Proof-Carrying Data from Multi-folding Schemes. IACR Cryptol. ePrint Arch. 2023: 1282 (2023) - 2022
- [j19]Zongyang Zhang, Jiayuan Yin, Bin Hu, Ting Gao, Weihan Li, Qianhong Wu, Jianwei Liu:
CLTracer: A Cross-Ledger Tracing framework based on address relationships. Comput. Secur. 113: 102558 (2022) - [j18]Yizhong Liu, Jianwei Liu, Marcos Antonio Vaz Salles, Zongyang Zhang, Tong Li, Bin Hu, Fritz Henglein, Rongxing Lu:
Building blocks of sharding blockchain systems: Concepts, approaches, and open problems. Comput. Sci. Rev. 46: 100513 (2022) - [i12]Bin Hu, Zongyang Zhang, Han Chen, You Zhou, Huazu Jiang, Jianwei Liu:
DyCAPS: Asynchronous Proactive Secret Sharing for Dynamic Committees. IACR Cryptol. ePrint Arch. 2022: 1169 (2022) - [i11]You Zhou, Zongyang Zhang, Haibin Zhang, Sisi Duan, Bin Hu, Licheng Wang, Jianwei Liu:
Dory: Asynchronous BFT with Reduced Communication and Improved Efficiency. IACR Cryptol. ePrint Arch. 2022: 1709 (2022) - 2021
- [j17]Bin Hu, Zongyang Zhang, Jianwei Liu, Yizhong Liu, Jiayuan Yin, Rongxing Lu, Xiaodong Lin:
A comprehensive survey on smart contract construction and execution: paradigms, tools, and systems. Patterns 2(2): 100179 (2021) - [c21]Zongyang Zhang, Tong Li, Zhuo Wang, Jianwei Liu:
Redactable Transactions in Consortium Blockchain: Controlled by Multi-authority CP-ABE. ACISP 2021: 408-429 - [c20]Geng Li, Jianwei Liu, Zongyang Zhang, Yanting Zhang:
UC-Secure Cryptographic Reverse Firewall-Guarding Corrupted Systems with the Minimum Trusted Module. Inscrypt 2021: 85-110 - [c19]Zongyang Zhang, Zibo Zhou, Weihan Li, Hongyu Tao:
An Optimized Inner Product Argument with More Application Scenarios. ICICS (2) 2021: 341-357 - [i10]Yizhong Liu, Jianwei Liu, Marcos Antonio Vaz Salles, Zongyang Zhang, Tong Li, Bin Hu, Fritz Henglein, Rongxing Lu:
Building Blocks of Sharding Blockchain Systems: Concepts, Approaches, and Open Problems. CoRR abs/2102.13364 (2021) - 2020
- [j16]Zongyang Zhang, Weihan Li, Haitao Liu, Jianwei Liu:
A Refined Analysis of Zcash Anonymity. IEEE Access 8: 31845-31853 (2020) - [j15]Yizhong Liu, Jianwei Liu, Zongyang Zhang, Hui Yu:
A fair selection protocol for committee-based permissionless blockchains. Comput. Secur. 91: 101718 (2020) - [j14]Ziyu Wang, Hui Yu, Zongyang Zhang, Jiaming Piao, Jianwei Liu:
ECDSA weak randomness in Bitcoin. Future Gener. Comput. Syst. 102: 507-513 (2020) - [j13]Geng Li, Jianwei Liu, Zongyang Zhang:
More realistic analysis of mass surveillance - security in multi-surveillant settings. IET Inf. Secur. 14(6): 641-653 (2020) - [j12]Yanting Zhang, Jianwei Liu, Zongyang Zhang, Weiran Liu:
FDCO: attribute-based fast data cloud-outsourcing scheme for mobile devices. Int. J. Inf. Sec. 19(6): 639-656 (2020) - [j11]Xingguang Zhou, Jianwei Liu, Zongyang Zhang, Qianhong Wu:
Secure Outsourced Medical Data against Unexpected Leakage with Flexible Access Control in a Cloud Storage System. Secur. Commun. Networks 2020: 8347213:1-8347213:20 (2020) - [i9]Bin Hu, Zongyang Zhang, Jianwei Liu, Yizhong Liu, Jiayuan Yin, Rongxing Lu, Xiaodong Lin:
A Comprehensive Survey on Smart Contract Construction and Execution: Paradigms, Tools and Systems. CoRR abs/2008.13413 (2020)
2010 – 2019
- 2019
- [c18]Ziyu Wang, Jianwei Liu, Zongyang Zhang, Yanting Zhang, Jiayuan Yin, Hui Yu, Wenmao Liu:
A Combined Micro-block Chain Truncation Attack on Bitcoin-NG. ACISP 2019: 322-339 - [c17]Geng Li, Jianwei Liu, Zongyang Zhang:
Security Against Subversion in a Multi-surveillant Setting. ACISP 2019: 419-437 - 2018
- [j10]Xingguang Zhou, Jianwei Liu, Qianhong Wu, Zongyang Zhang:
Privacy Preservation for Outsourced Medical Data With Flexible Access Control. IEEE Access 6: 14827-14841 (2018) - [c16]Jiayuan Yin, Changren Wang, Zongyang Zhang, Jianwei Liu:
Revisiting the Incentive Mechanism of Bitcoin-NG. ACISP 2018: 706-719 - [c15]Yanting Zhang, Jianwei Liu, Zongyang Zhang, Yang Hu:
Multi-authority Fast Data Cloud-Outsourcing for Mobile Devices. ISC 2018: 231-249 - 2017
- [c14]Xingguang Zhou, Jie Chen, Zongyang Zhang, Jianwei Liu, Qianhong Wu:
Secure Role-Based Access Control over Outsourced EMRs Against Unwanted Leakage. CSS 2017: 411-426 - 2016
- [j9]Yu Chen, Qiong Huang, Zongyang Zhang:
Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange revisited and more. Int. J. Inf. Sec. 15(1): 15-33 (2016) - [j8]Yu Chen, Zongyang Zhang:
Publicly evaluable pseudorandom functions and their applications. J. Comput. Secur. 24(2): 289-320 (2016) - [j7]Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
Generalized (identity-based) hash proof system and its applications. Secur. Commun. Networks 9(12): 1698-1716 (2016) - [c13]Yuyu Wang, Zongyang Zhang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones. ASIACRYPT (2) 2016: 465-495 - [c12]Hongbing Wang, Yingjiu Li, Zongyang Zhang, Yunlei Zhao:
Efficient Tag Path Authentication Protocol with Less Tag Memory. ISPEC 2016: 255-270 - [i8]Yuyu Wang, Zongyang Zhang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones. IACR Cryptol. ePrint Arch. 2016: 877 (2016) - 2015
- [j6]Zongyang Zhang, Sherman S. M. Chow, Zhenfu Cao:
Post-challenge leakage in public-key encryption. Theor. Comput. Sci. 572: 25-49 (2015) - [c11]Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao:
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model. ProvSec 2015: 435-454 - 2014
- [j5]Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof System. Comput. J. 57(10): 1537-1556 (2014) - [j4]Zongyang Zhang, Zhenfu Cao, Haojin Zhu:
Constant-round adaptive zero-knowledge proofs for NP. Inf. Sci. 261: 219-236 (2014) - [c10]Yu Chen, Qiong Huang, Zongyang Zhang:
Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited. ACISP 2014: 274-289 - [c9]Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao:
All-but-One Dual Projective Hashing and Its Applications. ACNS 2014: 181-198 - [c8]Jiang Zhang, Zhenfeng Zhang, Yu Chen, Yanfei Guo, Zongyang Zhang:
Black-Box Separations for One-More (Static) CDH and Its Generalization. ASIACRYPT (2) 2014: 366-385 - [c7]Yu Chen, Zongyang Zhang:
Publicly Evaluable Pseudorandom Functions and Their Applications. SCN 2014: 115-134 - [i7]Yu Chen, Zongyang Zhang:
Publicly Evaluable Pseudorandom Functions and Their Applications. IACR Cryptol. ePrint Arch. 2014: 306 (2014) - [i6]Yu Chen, Qiong Huang, Zongyang Zhang:
Sakai-Ohgishi-Kasahara Non-Interactive Identity-Based Key Exchange Scheme, Revisited. IACR Cryptol. ePrint Arch. 2014: 310 (2014) - 2013
- [i5]Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
Generalized (Identity-Based) Hash Proof System and Its Applications. IACR Cryptol. ePrint Arch. 2013: 2 (2013) - [i4]Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof Systems. IACR Cryptol. ePrint Arch. 2013: 33 (2013) - 2012
- [j3]Zongyang Zhang, Zhenfu Cao:
Concurrent non-malleable statistically hiding commitment. Inf. Process. Lett. 112(11): 443-448 (2012) - [j2]Zongyang Zhang, Zhenfu Cao, Haifeng Qian:
Chosen-ciphertext attack secure public key encryption with auxiliary inputs. Secur. Commun. Networks 5(12): 1404-1411 (2012) - [c6]Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
Identity-Based Extractable Hash Proofs and Their Applications. ACNS 2012: 153-170 - [c5]Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
Anonymous Identity-Based Hash Proof System and Its Applications. ProvSec 2012: 143-160 - 2011
- [j1]Zhenfu Cao, Ivan Visconti, Zongyang Zhang:
On constant-round concurrent non-malleable proof systems. Inf. Process. Lett. 111(18): 883-890 (2011) - [c4]Yu Chen, Liqun Chen, Zongyang Zhang:
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model. ICISC 2011: 275-301 - [i3]Yu Chen, Liqun Chen, Zongyang Zhang:
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model. IACR Cryptol. ePrint Arch. 2011: 593 (2011) - [i2]Zhenfu Cao, Zongyang Zhang, Yunlei Zhao:
Adaptive Security of Concurrent Non-Malleable Zero-Knowledge. IACR Cryptol. ePrint Arch. 2011: 621 (2011) - [i1]Huajun Zhang, Zongyang Zhang, Zhenfu Cao:
Position-Verification in Multi-Channel Models. IACR Cryptol. ePrint Arch. 2011: 714 (2011) - 2010
- [c3]Zhenfu Cao, Ivan Visconti, Zongyang Zhang:
Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments. Public Key Cryptography 2010: 193-208
2000 – 2009
- 2009
- [c2]Zongyang Zhang, Zhenfu Cao, Ning Ding, Rong Ma:
Non-malleable Statistically Hiding Commitment from Any One-Way Function. ASIACRYPT 2009: 303-318 - [c1]Zongyang Zhang, Zhenfu Cao, Rong Ma:
An Observation on Non-Malleable Witness-Indistinguishability and Non-Malleable Zero-Knowledge. TAMC 2009: 470-479
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 21:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint