default search action
Zhenfeng Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j58]Ke Wang, Zhenfeng Zhang, Haodong Jiang, Huiqin Xie, Yanjun Li, Ying Sun, Lidong Han:
Key Reuse Attacks on Post-quantum Cryptosystems, Revisited. Comput. J. 67(1): 323-337 (2024) - [j57]Kaiwen Guo, Kexin Hu, Zhenfeng Zhang:
Liveness Attacks On HotStuff: The Vulnerability Of Timer Doubling Mechanism. Comput. J. 67(8): 2586-2600 (2024) - [j56]Zhichuang Liang, Yunlei Zhao, Zhenfeng Zhang:
Generalized splitting-ring number theoretic transform. Frontiers Comput. Sci. 18(4): 184818 (2024) - [j55]Yimin Guo, Zhenfeng Zhang, Yajun Guo, Ping Xiong:
BSRA: Blockchain-Based Secure Remote Authentication Scheme for Fog-Enabled Internet of Things. IEEE Internet Things J. 11(2): 3348-3361 (2024) - [j54]Jiang Zhang, Yu Chen, Zhenfeng Zhang:
Lattice-Based Programmable Hash Functions and Applications. J. Cryptol. 37(1): 4 (2024) - [j53]Lingyuan Yin, Jing Xu, Kaitai Liang, Zhenfeng Zhang:
Sidechains With Optimally Succinct Proof. IEEE Trans. Dependable Secur. Comput. 21(4): 3375-3389 (2024) - [c82]Weihao Bai, Long Chen, Qianwen Gao, Zhenfeng Zhang:
MPC-in-the-Head Framework without Repetition and its Applications to the Lattice-based Cryptography. SP 2024: 578-596 - [i44]Hao Cheng, Yuan Lu, Zhenliang Lu, Qiang Tang, Yuxuan Zhang, Zhenfeng Zhang:
JUMBO: Fully Asynchronous BFT Consensus Made Truly Scalable. CoRR abs/2403.11238 (2024) - [i43]Guofeng Tang, Bo Pang, Long Chen, Zhenfeng Zhang:
Efficient Lattice-Based Threshold Signatures with Functional Interchangeability. IACR Cryptol. ePrint Arch. 2024: 1067 (2024) - [i42]Weihao Bai, Long Chen, Qianwen Gao, Zhenfeng Zhang:
MPC-in-the-Head Framework without Repetition and its Applications to the Lattice-based Cryptography. IACR Cryptol. ePrint Arch. 2024: 1591 (2024) - [i41]Hao Cheng, Jiliang Li, Yizhong Liu, Yuan Lu, Weizhi Meng, Zhenfeng Zhang:
Resilience-Optimal Lightweight High-threshold Asynchronous Verifiable Secret Sharing. IACR Cryptol. ePrint Arch. 2024: 1761 (2024) - 2023
- [j52]Guofeng Tang, Zhenfeng Zhang:
Two-Party Signing For ISO/IEC Digital Signature Standards. Comput. J. 66(5): 1111-1125 (2023) - [j51]Lingyuan Yin, Jing Xu, Zhenfeng Zhang:
Interopera: An Efficient Cross-Chain Trading Protocol. Comput. J. 66(7): 1609-1621 (2023) - [j50]Xiao Lan, Jing Xu, Zhenfeng Zhang, Xingshu Chen, Yonggang Luo:
A systematic security analysis of EMV protocol. Comput. Stand. Interfaces 84: 103700 (2023) - [j49]Kexin Hu, Zhenfeng Zhang, Kaiwen Guo, Weiyu Jiang, Xiaoman Li, Jiang Han:
An optimisation for a two-round good-case latency protocol. IET Inf. Secur. 17(4): 664-680 (2023) - [j48]Zhenfeng Zhang, Chuhua Huang, Renjing Huang, Yanan Li, Yifan Chen:
Illu-NASNet: unsupervised illumination estimation based on dense spatio-temporal smoothness. Multim. Syst. 29(3): 1453-1462 (2023) - [j47]Xinyu Li, Jing Xu, Lingyuan Yin, Yuan Lu, Qiang Tang, Zhenfeng Zhang:
Escaping From Consensus: Instantly Redactable Blockchain Protocols in Permissionless Setting. IEEE Trans. Dependable Secur. Comput. 20(5): 3699-3715 (2023) - [j46]Guofeng Tang, Bo Pang, Long Chen, Zhenfeng Zhang:
Efficient Lattice-Based Threshold Signatures With Functional Interchangeability. IEEE Trans. Inf. Forensics Secur. 18: 4173-4187 (2023) - [j45]Haodong Jiang, Jiang Han, Zhenfeng Zhang, Zhi Ma, Hong Wang:
Practical Algorithm Substitution Attacks on Real-World Public-Key Cryptosystems. IEEE Trans. Inf. Forensics Secur. 18: 5069-5081 (2023) - [c81]Haodong Jiang, Zhi Ma, Zhenfeng Zhang:
Post-quantum Security of Key Encapsulation Mechanism Against CCA Attacks with a Single Decapsulation Query. ASIACRYPT (4) 2023: 434-468 - [c80]Ruiqi Mi, Haodong Jiang, Zhenfeng Zhang:
Bit Security Analysis of Lattice-Based KEMs Under Plaintext-Checking Attacks. SAC 2023: 255-274 - [i40]Haodong Jiang, Zhi Ma, Zhenfeng Zhang:
Post-Quantum Security of Key Encapsulation Mechanism against CCA Attacks with a Single Decapsulation Query. IACR Cryptol. ePrint Arch. 2023: 7 (2023) - [i39]Jiang Zhang, Yu Chen, Zhenfeng Zhang:
Lattice-based Programmable Hash Functions and Applications. IACR Cryptol. ePrint Arch. 2023: 1849 (2023) - 2022
- [j44]Yimin Guo, Zhenfeng Zhang, Yajun Guo:
SecFHome: Secure remote authentication in fog-enabled smart home environment. Comput. Networks 207: 108818 (2022) - [j43]Yimin Guo, Zhenfeng Zhang, Yajun Guo:
Anonymous Authenticated Key Agreement and Group Proof Protocol for Wearable Computing. IEEE Trans. Mob. Comput. 21(8): 2718-2731 (2022) - [c79]Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang:
Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency. CCS 2022: 1187-1201 - [c78]Kexin Hu, Kaiwen Guo, Qiang Tang, Zhenfeng Zhang, Hao Cheng, Zhiyang Zhao:
Leopard: Towards High Throughput-Preserving BFT for Large-scale Systems. ICDCS 2022: 157-167 - [c77]Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang:
Efficient Asynchronous Byzantine Agreement without Private Setups. ICDCS 2022: 246-257 - [c76]Bingyong Guo, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang:
Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice. NDSS 2022 - [i38]Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang:
Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency. CoRR abs/2209.00750 (2022) - [i37]Bingyong Guo, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang:
Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice. IACR Cryptol. ePrint Arch. 2022: 27 (2022) - [i36]Ruiqi Mi, Haodong Jiang, Zhenfeng Zhang:
Lattice Reduction Meets Key-Mismatch: New Misuse Attack on Lattice-Based NIST Candidate KEMs. IACR Cryptol. ePrint Arch. 2022: 1064 (2022) - [i35]Siwei Sun, Tianyu Liu, Zhi Guan, Yifei He, Jiwu Jing, Lei Hu, Zhenfeng Zhang, Hailun Yan:
LMS-SM3 and HSS-SM3: Instantiating Hash-based Post-Quantum Signature Schemes with SM3. IACR Cryptol. ePrint Arch. 2022: 1491 (2022) - [i34]Siwei Sun, Tianyu Liu, Zhi Guan, Yifei He, Jiwu Jing, Lei Hu, Zhenfeng Zhang, Hailun Yan:
XMSS-SM3 and MT-XMSS-SM3: Instantiating Extended Merkle Signature Schemes with SM3. IACR Cryptol. ePrint Arch. 2022: 1552 (2022) - 2021
- [j42]Zhenfeng Zhang:
PAMSGAN: Pyramid Attention Mechanism-Oriented Symmetry Generative Adversarial Network for Motion Image Deblurring. IEEE Access 9: 105131-105143 (2021) - [j41]Yimin Guo, Zhenfeng Zhang, Yajun Guo:
Superword: A honeyword system for achieving higher security goals. Comput. Secur. 103: 101689 (2021) - [j40]Yimin Guo, Zhenfeng Zhang, Yajun Guo:
Fog-Centric Authenticated Key Agreement Scheme Without Trusted Parties. IEEE Syst. J. 15(4): 5057-5066 (2021) - [j39]Hui Guo, Zhenfeng Zhang, Jing Xu, Ningyu An, Xiao Lan:
Accountable Proxy Re-Encryption for Secure Data Sharing. IEEE Trans. Dependable Secur. Comput. 18(1): 145-159 (2021) - [j38]Kang Yang, Liqun Chen, Zhenfeng Zhang, Christopher J. P. Newton, Bo Yang, Li Xi:
Direct Anonymous Attestation With Optimal TPM Signing Efficiency. IEEE Trans. Inf. Forensics Secur. 16: 2260-2275 (2021) - [c75]Haodong Jiang, Zhenfeng Zhang, Zhi Ma:
On the Non-tightness of Measurement-Based Reductions for Key Encapsulation Mechanism in the Quantum Random Oracle Model. ASIACRYPT (1) 2021: 487-517 - [c74]Xinze Li, Qiang Tang, Zhenfeng Zhang:
Fooling an Unbounded Adversary with a Short Key, Repeatedly: The Honey Encryption Perspective. ITC 2021: 23:1-23:21 - [c73]Yuchen Wang, Zhenfeng Zhang, Yongquan Xie:
Privacy-Preserving and Standard-Compatible AKA Protocol for 5G. USENIX Security Symposium 2021: 3595-3612 - [i33]Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang:
Efficient Asynchronous Byzantine Agreement without Private Setups. CoRR abs/2106.07831 (2021) - [i32]Kexin Hu, Kaiwen Guo, Qiang Tang, Zhenfeng Zhang, Hao Cheng, Zhiyang Zhao:
Don't Count on One to Carry the Ball: Scaling BFT without Sacrifing Efficiency. CoRR abs/2106.08114 (2021) - [i31]Jing Xu, Xinyu Li, Lingyuan Yin, Yuan Lu, Qiang Tang, Zhenfeng Zhang:
Redactable Blockchain Protocol with Instant Redaction. IACR Cryptol. ePrint Arch. 2021: 223 (2021) - [i30]Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang:
Efficient Asynchronous Byzantine Agreement without Private Setups. IACR Cryptol. ePrint Arch. 2021: 810 (2021) - [i29]Tanping Zhou, Zhenfeng Zhang, Long Chen, Xiaoliang Che, Wenchao Liu, Xiaoyuan Yang:
Multi-key Fully Homomorphic Encryption Scheme with Compact Ciphertext. IACR Cryptol. ePrint Arch. 2021: 1131 (2021) - 2020
- [b1]Jiang Zhang, Zhenfeng Zhang:
Lattice-Based Cryptosystems - A Design Perspective. Springer 2020, ISBN 978-981-15-8426-8, pp. 1-174 - [j37]Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang:
Improved lattice-based CCA2-secure PKE in the standard model. Sci. China Inf. Sci. 63(8): 1-22 (2020) - [j36]Yimin Guo, Zhenfeng Zhang, Yajun Guo, Xiaowei Guo:
Nudging personalized password policies by understanding users' personality. Comput. Secur. 94: 101801 (2020) - [j35]Kexin Hu, Zhenfeng Zhang, Kaiwen Guo:
Corrigendum to "Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications" [Computers & Security, Volume 87, 2019, 101585]. Comput. Secur. 94: 101878 (2020) - [j34]Yimin Guo, Zhenfeng Zhang:
Corrigendum to "LPSE: Lightweight password-strength estimation for password meters" [Computers & Security, Volume 73, 2018, Pages 507-518]. Comput. Secur. 94: 101879 (2020) - [j33]Yimin Guo, Zhenfeng Zhang, Yajun Guo:
Corrigendum to "Optiwords: A new password policy for creating memorable and strong password" [Computers & Security, Volume 85, 2019, Pages 423-435]. Comput. Secur. 94: 101880 (2020) - [j32]Xinyu Li, Jing Xu, Xiong Fan, Yuchen Wang, Zhenfeng Zhang:
Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocols. IEEE Trans. Inf. Forensics Secur. 15: 3872-3885 (2020) - [j31]Xinyu Li, Jing Xu, Zhenfeng Zhang:
Correction to: Revisiting the Security of Qian et al.'s Revised Tree-$\hbox {LSHB}^+$ Protocol. Wirel. Pers. Commun. 110(2): 1073 (2020) - [c72]Bingyong Guo, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang:
Dumbo: Faster Asynchronous BFT Protocols. CCS 2020: 803-818 - [c71]Xinyu Li, Jing Xu, Zhenfeng Zhang, Xiao Lan, Yuchen Wang:
Modular Security Analysis of OAuth 2.0 in the Three-Party Setting. EuroS&P 2020: 276-293 - [c70]Abhishaike Mahajan, James D. Dormer, Qinmei Li, Deji Chen, Zhenfeng Zhang, Baowei Fei:
Siamese neural networks for the classification of high-dimensional radiomic features. Computer-Aided Diagnosis 2020 - [c69]Zhenfeng Zhang, Yuchen Wang, Kang Yang:
Strong Authentication without Temper-Resistant Hardware and Application to Federated Identities. NDSS 2020 - [c68]Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang, Kang Yang:
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes. Public Key Cryptography (2) 2020: 37-65 - [c67]Ke Wang, Zhenfeng Zhang, Haodong Jiang:
Key Recovery Under Plaintext Checking Attack on LAC. ProvSec 2020: 381-401 - [c66]Ke Wang, Zhenfeng Zhang, Haodong Jiang:
Security of Two NIST Candidates in the Presence of Randomness Reuse. ProvSec 2020: 402-421 - [i28]Bingyong Guo, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang:
Dumbo: Faster Asynchronous BFT Protocols. IACR Cryptol. ePrint Arch. 2020: 841 (2020) - [i27]Jiang Zhang, Yu Yu, Dengguo Feng, Shuqin Fan, Zhenfeng Zhang, Kang Yang:
Interactive Proofs for Quantum Black-Box Computations. IACR Cryptol. ePrint Arch. 2020: 1391 (2020)
2010 – 2019
- 2019
- [j30]Huakui Sun, Daosen Zhai, Zhenfeng Zhang, Jianbo Du, Zhiguo Ding:
Channel Allocation and Power Control for Device-to-Device Communications Underlaying Cellular Networks Incorporated With Non-Orthogonal Multiple Access. IEEE Access 7: 168593-168605 (2019) - [j29]Hui Guo, Zhenfeng Zhang, Jing Xu, Ningyu An:
Non-transferable Proxy Re-encryption. Comput. J. 62(4): 490-506 (2019) - [j28]Yimin Guo, Zhenfeng Zhang, Yajun Guo:
Optiwords: A new password policy for creating memorable and strong passwords. Comput. Secur. 85: 423-435 (2019) - [j27]Kexin Hu, Zhenfeng Zhang, Kaiwen Guo:
Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications. Comput. Secur. 87 (2019) - [j26]Xiao Lan, Jing Xu, Zhenfeng Zhang, Wen-Tao Zhu:
Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3. IEEE Trans. Dependable Secur. Comput. 16(2): 272-286 (2019) - [j25]Xinyu Li, Jing Xu, Zhenfeng Zhang:
Revisiting the Security of Qian et al.'s Revised Tree- $$\hbox {LSHB}^+$$ LSHB + Protocol. Wirel. Pers. Commun. 106(2): 321-343 (2019) - [c65]Qianlan Hu, Zhenfeng Zhang, Yanqing Wu:
High performance optoelectronics based on CVD Mos2. ASICON 2019: 1-3 - [c64]Hui Guo, Zhenfeng Zhang, Jing Xu, Mingyuan Xia:
Generic Traceable Proxy Re-encryption and Accountable Extension in Consensus Network. ESORICS (1) 2019: 234-256 - [c63]Yutong Wang, Daosen Zhai, Ruonan Zhang, Zhenfeng Zhang:
Sum-Rate Maximization for D2D and Cellular Hybrid Networks Enhanced by NOMA. HPSR 2019: 1-5 - [c62]Zhenfeng Zhang, Daosen Zhai, Ruonan Zhang, Yutong Wang:
Deep Neural Network based Channel Allocation for Interference-Limited Wireless Networks. HPSR 2019: 1-5 - [c61]Qinmei Li, James D. Dormer, Priyanka Daryani, Deji Chen, Zhenfeng Zhang, Baowei Fei:
Radiomics analysis of MRI for predicting molecular subtypes of breast cancer in young women. Computer-Aided Diagnosis 2019: 1095044 - [c60]Maysam Shahedi, Martin T. Halicek, Qinmei Li, Lizhi Liu, Zhenfeng Zhang, Sadhna Verma, David M. Schuster, Baowei Fei:
A semiautomatic approach for prostate segmentation in MR images using local texture classification and statistical shape modeling. Image-Guided Procedures 2019: 109512I - [c59]Daosen Zhai, Yutong Wang, Ruonan Zhang, Zhenfeng Zhang, Dawei Wang:
User Connectivity Maximization for D2D and Cellular Hybrid Networks with Non-Orthogonal Multiple Access. PIMRC 2019: 1-6 - [c58]Haodong Jiang, Zhenfeng Zhang, Zhi Ma:
Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model. Public Key Cryptography (2) 2019: 618-645 - [c57]Haodong Jiang, Zhenfeng Zhang, Zhi Ma:
Tighter Security Proofs for Generic Key Encapsulation Mechanism in the Quantum Random Oracle Model. PQCrypto 2019: 227-248 - [c56]Zhenfeng Zhang, Daosen Zhai, Ruonan Zhang, Xiao Tang, Yutong Wang:
A Convolutional Neural Network based Resource Management Algorithm for NOMA enhanced D2D and Cellular Hybrid Networks. WCSP 2019: 1-6 - [i26]Xinyu Li, Jing Xu, Xiong Fan, Yuchen Wang, Zhenfeng Zhang:
Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocol. CoRR abs/1909.03955 (2019) - [i25]Haodong Jiang, Zhenfeng Zhang, Zhi Ma:
Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model. IACR Cryptol. ePrint Arch. 2019: 52 (2019) - [i24]Haodong Jiang, Zhenfeng Zhang, Zhi Ma:
Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model. IACR Cryptol. ePrint Arch. 2019: 134 (2019) - [i23]Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang:
Improved Lattice-based CCA2-Secure PKE in the Standard Model. IACR Cryptol. ePrint Arch. 2019: 149 (2019) - [i22]Haodong Jiang, Zhenfeng Zhang, Zhi Ma:
On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model. IACR Cryptol. ePrint Arch. 2019: 494 (2019) - [i21]Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang, Kang Yang:
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes. IACR Cryptol. ePrint Arch. 2019: 510 (2019) - [i20]Jiang Zhang, Yu Yu, Dengguo Feng, Shuqin Fan, Zhenfeng Zhang:
On the (Quantum) Random Oracle Methodology: New Separations and More. IACR Cryptol. ePrint Arch. 2019: 1101 (2019) - 2018
- [j24]Yimin Guo, Zhenfeng Zhang:
LPSE: Lightweight password-strength estimation for password meters. Comput. Secur. 73: 507-518 (2018) - [j23]Kunpeng Bai, Chuankun Wu, Zhenfeng Zhang:
Protect white-box AES to resist table composition attacks. IET Inf. Secur. 12(4): 305-313 (2018) - [c55]Kexin Hu, Zhenfeng Zhang:
Fast Lottery-Based Micropayments for Decentralized Currencies. ACISP 2018: 669-686 - [c54]Long Chen, Zhenfeng Zhang, Zhenfei Zhang:
On the Hardness of the Computational Ring-LWR Problem and Its Applications. ASIACRYPT (1) 2018: 435-464 - [c53]Haodong Jiang, Zhenfeng Zhang, Long Chen, Hong Wang, Zhi Ma:
IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited. CRYPTO (3) 2018: 96-125 - [c52]Zhenfeng Zhang, Daosen Zhai, Ruonan Zhang, Jiaxin Wang:
Multi-frequency Large-Scale Channel Modeling and Green Networking Design. IoTaaS 2018: 367-375 - [c51]Zhenfeng Zhang, Limin Xiao, Xin Su, Jie Zeng, Xibin Xu:
A Channel Estimation Method Based on the Improved LMS Algorithm for MIMO-OFDM Systems. ISMICT 2018: 1-5 - [c50]Zhenyu Chen, Yanyan Fu, Min Zhang, Zhenfeng Zhang, Hao Li:
A Flexible Mix-Zone Selection Scheme Towards Trajectory Privacy Protection. TrustCom/BigDataSE 2018: 1180-1186 - [i19]Long Chen, Zhenfeng Zhang, Zhenfei Zhang:
On the Hardness of the Computational Ring-LWR Problem and its Applications. IACR Cryptol. ePrint Arch. 2018: 536 (2018) - [i18]Kang Yang, Liqun Chen, Zhenfeng Zhang, Chris Newton, Bo Yang, Li Xi:
Direct Anonymous Attestation with Optimal TPM Signing Efficiency. IACR Cryptol. ePrint Arch. 2018: 1128 (2018) - [i17]Kexin Hu, Zhenfeng Zhang, Kaiwen Guo:
Breaking the Binding: Attacks on the Merkle Approach to Prove Liabilities and its Applications. IACR Cryptol. ePrint Arch. 2018: 1139 (2018) - 2017
- [j22]Xuexian Hu, Jiang Zhang, Zhenfeng Zhang, Jing Xu:
Universally composable anonymous password authenticated key exchange. Sci. China Inf. Sci. 60(5): 52107 (2017) - [j21]Lin Zhang, Zhenfeng Zhang:
Security Analysis of an ID-Based Two-Server Password-Authenticated Key Exchange. IEEE Commun. Lett. 21(1): 302-305 (2017) - [j20]Jiang Zhang, Zhenfeng Zhang, Hui Guo:
Towards Secure Data Distribution Systems in Mobile Cloud Computing. IEEE Trans. Mob. Comput. 16(11): 3222-3235 (2017) - [j19]Xuexian Hu, Jiang Zhang, Zhenfeng Zhang, Fengmei Liu:
Anonymous Password Authenticated Key Exchange Protocol in the Standard Model. Wirel. Pers. Commun. 96(1): 1451-1474 (2017) - [c49]Jialin Chi, Cheng Hong, Min Zhang, Zhenfeng Zhang:
Fast Multi-dimensional Range Queries on Encrypted Cloud Databases. DASFAA (1) 2017: 559-575 - [c48]Zhenyu Chen, Yanyan Fu, Min Zhang, Zhenfeng Zhang, Hao Li:
The De-anonymization Method Based on User Spatio-Temporal Mobility Trace. ICICS 2017: 459-471 - [c47]Long Chen, Zhenfeng Zhang:
Bootstrapping Fully Homomorphic Encryption with Ring Plaintexts Within Polynomial Noise. ProvSec 2017: 285-304 - [c46]Long Chen, Zhenfeng Zhang, Xueqing Wang:
Batched Multi-hop Multi-key FHE from Ring-LWE with Compact Ciphertext Extension. TCC (2) 2017: 597-627 - [i16]Long Chen, Zhenfeng Zhang, Xueqing Wang:
Batched Multi-hop Multi-key FHE from ring-LWE with Compact Ciphertext Extension. IACR Cryptol. ePrint Arch. 2017: 923 (2017) - [i15]Haodong Jiang, Zhenfeng Zhang, Long Chen, Hong Wang, Zhi Ma:
Post-quantum IND-CCA-secure KEM without Additional Hash. IACR Cryptol. ePrint Arch. 2017: 1096 (2017) - 2016
- [j18]Minqian Wang, Zhenfeng Zhang, Cheng Chen:
Security analysis of a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme. Concurr. Comput. Pract. Exp. 28(4): 1237-1245 (2016) - [j17]Yu Chen, Jiang Zhang, Dongdai Lin, Zhenfeng Zhang:
Generic constructions of integrated PKE and PEKS. Des. Codes Cryptogr. 78(2): 493-526 (2016) - [j16]Yanfei Guo, Zhenfeng Zhang:
Authenticated key exchange with entities from different settings and varied groups. Secur. Commun. Networks 9(12): 1843-1863 (2016) - [j15]Zhiqiang Tian, Lizhi Liu, Zhenfeng Zhang, Baowei Fei:
Superpixel-Based Segmentation for 3D Prostate MR Images. IEEE Trans. Medical Imaging 35(3): 791-801 (2016) - [c45]Lin Zhang, Zhenfeng Zhang, Xuexian Hu:
UC-secure Two-Server Password-Based Authentication Protocol and Its Applications. AsiaCCS 2016: 153-164 - [c44]Zhenfeng Zhang, Kang Yang, Xuexian Hu, Yuchen Wang:
Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication. CCS 2016: 1179-1191 - [c43]Xiao Lan, Jing Xu, Hui Guo, Zhenfeng Zhang:
One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model. Inscrypt 2016: 386-400 - [c42]Jiang Zhang, Yu Chen, Zhenfeng Zhang:
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes. CRYPTO (3) 2016: 303-332 - [c41]Minqian Wang, Zhenfeng Zhang:
Expanded Framework for Dual System Encryption and Its Application. ICISC 2016: 145-160 - [c40]Lin Zhang, Zhenfeng Zhang:
UC-secure and Contributory Password-Authenticated Group Key Exchange. INDOCRYPT 2016: 119-134 - [c39]Bo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin, Dengguo Feng:
AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash. ISC 2016: 130-146 - [c38]Cong Zhao, Kui Song, Jeng-hun Lee, Shin Young Jeong, Lixie Hu, Xingsu Yu, Huifang Su, Zhenfeng Zhang, Yitshak Zohar, Yi-Kuen Lee:
Capillary number effect on the depletion of leucocytes of blood in microfiltration chips for the isolation of circulating tumor cells. NEMS 2016: 346-349 - [c37]Xinyu Li, Jing Xu, Zhenfeng Zhang, Dengguo Feng, Honggang Hu:
Multiple Handshakes Security of TLS 1.3 Candidates. IEEE Symposium on Security and Privacy 2016: 486-505 - [i14]Bo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin, Dengguo Feng:
AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version). IACR Cryptol. ePrint Arch. 2016: 494 (2016) - [i13]Jiang Zhang, Yu Chen, Zhenfeng Zhang:
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes. IACR Cryptol. ePrint Arch. 2016: 523 (2016) - 2015
- [j14]Jiang Zhang, Zhenfeng Zhang:
Secure and efficient data-sharing in clouds. Concurr. Comput. Pract. Exp. 27(8): 2125-2143 (2015) - [j13]Xuexian Hu, Zhenfeng Zhang, Qihui Zhang:
Universally composable three-party password-authenticated key exchange with contributiveness. Int. J. Commun. Syst. 28(6): 1100-1111 (2015) - [c36]Jing Xu, Xuexian Hu, Zhenfeng Zhang:
Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model. ACNS 2015: 42-61 - [c35]Jiang Zhang, Zhenfeng Zhang, Jintai Ding, Michael Snook, Özgür Dagdelen:
Authenticated Key Exchange from Ideal Lattices. EUROCRYPT (2) 2015: 719-751 - [c34]Phong Q. Nguyen, Jiang Zhang, Zhenfeng Zhang:
Simpler Efficient Group Signatures from Lattices. Public Key Cryptography 2015: 401-426 - [c33]Zhenfeng Zhang, Kang Yang, Jiang Zhang, Cheng Chen:
Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks. SSR 2015: 140-153 - [c32]Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng:
DAA-TZ: An Efficient DAA Scheme for Mobile Devices Using ARM TrustZone. TRUST 2015: 209-227 - [c31]Jialin Chi, Cheng Hong, Min Zhang, Zhenfeng Zhang:
Privacy-Enhancing Range Query Processing over Encrypted Cloud Databases. WISE (2) 2015: 63-77 - [i12]Phong Q. Nguyen, Jiang Zhang, Zhenfeng Zhang:
Simpler Efficient Group Signatures from Lattices. IACR Cryptol. ePrint Arch. 2015: 20 (2015) - [i11]Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng:
DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone. IACR Cryptol. ePrint Arch. 2015: 654 (2015) - [i10]Hui Guo, Zhenfeng Zhang, Jing Xu:
Non-Transferable Proxy Re-Encryption. IACR Cryptol. ePrint Arch. 2015: 1216 (2015) - 2014
- [j12]Jiang Zhang, Zhenfeng Zhang, Yu Chen:
PRE: Stronger security notions and efficient construction with non-interactive opening. Theor. Comput. Sci. 542: 1-16 (2014) - [c30]Jiang Zhang, Zhenfeng Zhang, Yu Chen, Yanfei Guo, Zongyang Zhang:
Black-Box Separations for One-More (Static) CDH and Its Generalization. ASIACRYPT (2) 2014: 366-385 - [c29]Hui Guo, Zhenfeng Zhang, Jiang Zhang:
Proxy Re-encryption with Unforgeable Re-encryption Keys. CANS 2014: 20-33 - [c28]Yanfei Guo, Zhenfeng Zhang, Jiang Zhang, Xuexian Hu:
Security Analysis of EMV Channel Establishment Protocol in An Enhanced Security Model. ICICS 2014: 305-320 - [c27]Li Xi, Kang Yang, Zhenfeng Zhang, Dengguo Feng:
DAA-Related APIs in TPM 2.0 Revisited. TRUST 2014: 1-18 - [i9]Jiang Zhang, Zhenfeng Zhang, Jintai Ding, Michael Snook:
Authenticated Key Exchange from Ideal Lattices. IACR Cryptol. ePrint Arch. 2014: 589 (2014) - 2013
- [j11]Fushan Wei, Zhenfeng Zhang, Chuangui Ma:
Analysis and Enhancement of an Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(9): 1864-1871 (2013) - [j10]Aijun Ge, Jiang Zhang, Rui Zhang, Chuangui Ma, Zhenfeng Zhang:
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme. IEEE Trans. Parallel Distributed Syst. 24(11): 2319-2321 (2013) - [c26]Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng, San Ling, Huaxiong Wang:
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures. CT-RSA 2013: 50-67 - [c25]Jiang Zhang, Zhenfeng Zhang:
Secure and Efficient Data-Sharing in Clouds. EIDWT 2013: 443-450 - [c24]Kang Yang, Jing Xu, Zhenfeng Zhang:
Certificateless Proxy Re-Encryption Without Pairings. ICISC 2013: 67-88 - [c23]Hui Guo, Zhenfeng Zhang, Jiang Zhang, Cheng Chen:
Towards a Secure Certificateless Proxy Re-Encryption Scheme. ProvSec 2013: 330-346 - 2012
- [j9]Ai-Jun Ge, Chuangui Ma Ma, Zhenfeng Zhang:
Attribute-based signature scheme with constant size signature in the standard model. IET Inf. Secur. 6(2): 47-54 (2012) - [j8]Fushan Wei, Zhenfeng Zhang, Chuangui Ma:
Gateway-oriented password-authenticated key exchange protocol in the standard model. J. Syst. Softw. 85(3): 760-768 (2012) - [j7]Fushan Wei, Zhenfeng Zhang, Chuangui Ma:
Corrigendum to "Gateway-oriented password-authenticated key exchange protocol in the standard model" [J. Syst. Softw. 85 (March (3)) (2012) 760-768]. J. Syst. Softw. 85(9): 2192 (2012) - [c22]Aijun Ge, Rui Zhang, Cheng Chen, Chuangui Ma, Zhenfeng Zhang:
Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts. ACISP 2012: 336-349 - [c21]Jiang Zhang, Zhenfeng Zhang, Aijun Ge:
Ciphertext policy attribute-based encryption from lattices. AsiaCCS 2012: 16-17 - [c20]Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng:
Combined Public-Key Schemes: The Case of ABE and ABS. ProvSec 2012: 53-69 - [c19]Cheng Chen, Zhenfeng Zhang, Dengguo Feng:
Fully Secure Doubly-Spatial Encryption under Simple Assumptions. ProvSec 2012: 253-263 - [c18]Yanfei Guo, Zhenfeng Zhang:
Authenticated Key Exchange with Entities from Different Settings and Varied Groups. ProvSec 2012: 276-287 - [i8]Jiang Zhang, Zhenfeng Zhang, Yu Chen:
PRE - Stronger Security Notion and Efficient Construction with New Property. IACR Cryptol. ePrint Arch. 2012: 664 (2012) - [i7]Yu Chen, Jiang Zhang, Zhenfeng Zhang, Dongdai Lin:
Integrated PKE and PEKS - Stronger Security Notions and New Constructions. IACR Cryptol. ePrint Arch. 2012: 692 (2012) - 2011
- [c17]Jiang Zhang, Xiang Xie, Rui Zhang, Zhenfeng Zhang:
A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening. Inscrypt 2011: 195-209 - [c16]Jiang Zhang, Zhenfeng Zhang:
A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings. Inscrypt 2011: 324-340 - [c15]Cheng Chen, Zhenfeng Zhang, Dengguo Feng:
Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost. ProvSec 2011: 84-101 - [c14]Fushan Wei, Chuangui Ma, Zhenfeng Zhang:
Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security. ProvSec 2011: 366-379 - [i6]Cheng Chen, Zhenfeng Zhang, Dengguo Feng:
Fully Secure (Doubly-)Spatial Encryption under Simpler Assumptions. IACR Cryptol. ePrint Arch. 2011: 692 (2011) - 2010
- [c13]Jing Zhao, Dengguo Feng, Zhenfeng Zhang:
Attribute-Based Conditional Proxy Re-Encryption with Chosen-Ciphertext Security. GLOBECOM 2010: 1-6 - [c12]Kehua Bao, Zhenfeng Zhang:
Collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor Networks. WISA 2010: 221-233
2000 – 2009
- 2009
- [j6]Xingyuan Wang, Ruihong Jia, Zhenfeng Zhang:
The generalized Mandelbrot set perturbed by composing noise of additive and multiplicative. Appl. Math. Comput. 210(1): 107-118 (2009) - [j5]Shuang Chang, Duncan S. Wong, Yi Mu, Zhenfeng Zhang:
Certificateless Threshold Ring Signature. Inf. Sci. 179(20): 3685-3696 (2009) - 2008
- [c11]Jing Yang, Zhenfeng Zhang:
A New Anonymous Password-Based Authenticated Key Exchange Protocol. INDOCRYPT 2008: 200-212 - 2007
- [j4]Bessie C. Hu, Duncan S. Wong, Zhenfeng Zhang, Xiaotie Deng:
Certificateless signature: a new security model and an improved generic construction. Des. Codes Cryptogr. 42(2): 109-126 (2007) - 2006
- [c10]Bessie C. Hu, Duncan S. Wong, Zhenfeng Zhang, Xiaotie Deng:
Key Replacement Attack Against a Generic Construction of Certificateless Signature. ACISP 2006: 235-246 - [c9]Zhenfeng Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng:
Certificateless Public-Key Signature: Security Model and Efficient Construction. ACNS 2006: 293-308 - [i5]Zhenfeng Zhang, Dengguo Feng:
Key Replacement Attack on a Certificateless Signature Scheme. IACR Cryptol. ePrint Arch. 2006: 453 (2006) - 2005
- [j3]Zhenfeng Zhang, Dengguo Feng:
Cryptanalysis of some signature schemes with message recovery. Appl. Math. Comput. 170(1): 103-114 (2005) - [j2]Yongbin Zhou, Zhenfeng Zhang, Dengguo Feng:
Cryptanalysis of the end-to-end security for mobile communications with end-user identification/authentication. IEEE Commun. Lett. 9(4): 372-374 (2005) - [c8]Jing Xu, Zhenfeng Zhang, Dengguo Feng:
ID-Based Aggregate Signatures from Bilinear Pairings. CANS 2005: 110-119 - [c7]Zhenfeng Zhang, Jing Xu, Dengguo Feng:
Efficient Identity-Based Protocol for Fair Certified E-mail Delivery. CANS 2005: 200-210 - [c6]Zhenfeng Zhang, Dengguo Feng, Jing Xu, Yongbin Zhou:
Efficient ID-Based Optimistic Fair Exchange with Provable Security. ICICS 2005: 14-26 - [c5]Jing Xu, Zhenfeng Zhang, Dengguo Feng:
ID-Based Proxy Signature Using Bilinear Pairings. ISPA Workshops 2005: 359-367 - [c4]Zhenfeng Zhang, Dengguo Feng:
Efficient Fair Certified E-Mail Delivery Based on RSA. ISPA Workshops 2005: 368-377 - [c3]Rui Xue, Dawn Song, Zhenfeng Zhang, Dengguo Feng:
A Generic Scheme for Zero-Knowledge Sets. IWAP 2005: 249-263 - [i4]Zhenfeng Zhang, Dengguo Feng:
On the Security of a Certificateless Public-Key Encryption. IACR Cryptol. ePrint Arch. 2005: 426 (2005) - 2004
- [c2]Yongbin Zhou, Zhenfeng Zhang, Sihan Qing, Juan Liu:
A New CEMBS Based on RSA Signatures and Its Application in Constructing Fair Exchange Protocol. EEE 2004: 560-564 - [c1]Jing Xu, Zhenfeng Zhang, Dengguo Feng:
A Ring Signature Scheme Using Bilinear Pairings. WISA 2004: 160-169 - [i3]Jing Xu, Zhenfeng Zhang, Dengguo Feng:
ID-Based Proxy Signature Using Bilinear Pairings. IACR Cryptol. ePrint Arch. 2004: 206 (2004) - [i2]Jing Xu, Zhenfeng Zhang, Dengguo Feng:
Identity Based Threshold Proxy Signature. IACR Cryptol. ePrint Arch. 2004: 250 (2004) - 2003
- [i1]Zhenfeng Zhang, Jing Xu, Dengguo Feng:
Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem. IACR Cryptol. ePrint Arch. 2003: 153 (2003) - 2002
- [j1]Zhenfeng Zhang, Dengguo Feng, Zongduo Dai:
Cryptanalysis on AW digital signature scheme based on error-correcting codes. Sci. China Ser. F Inf. Sci. 45(5): 397-400 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-23 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint