![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Ke-Jia Zhang 0002
Person information
- affiliation: Heilongjiang University, School of Mathematical Science, Harbin, China
- affiliation: Tsinghua University, Department of Physics, Beijing, China
- affiliation (2016 - 2020): Harbin Engineering University, School of Computer Science, China
- affiliation (2016 - 2017): National University of Singapore, Centure for Quantum Technologies, Singapore
- affiliation (PhD 2015): Beijing University of Posts and Telecommunications, China
Other persons with the same name
- Kejia Zhang (aka: Ke-Jia Zhang) — disambiguation page
- Kejia Zhang 0003
(aka: Ke-Jia Zhang 0003) — Anhui University, School of Mathematical Science, Hefei, China
- Kejia Zhang 0001
— Harbin Engineering University, School of Computer Science and Technology, China (and 1 more)
- Kejia Zhang 0004 — Northeast Petroleum University, School of Computer and Information Technology, Daqing, China
- Kejia Zhang 0005
— Guangzhou Academy of Fine Arts, China
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j22]Yue Dai, Lulu Xue, Bo Yang, Tao Wang, Kejia Zhang
:
A traceable and revocable decentralized attribute-based encryption scheme with fully hidden access policy for cloud-based smart healthcare. Comput. Stand. Interfaces 92: 103936 (2025) - [j21]Gang Xu, De-Lun Kong, Kejia Zhang, Shiyuan Xu, Yibo Cao, Yanhui Mao, Jianyong Duan, Jiawen Kang, Xiu-Bo Chen:
A Model Value Transfer Incentive Mechanism for Federated Learning With Smart Contracts in AIoT. IEEE Internet Things J. 12(3): 2530-2544 (2025) - 2024
- [j20]Qiandong Zhang, Kejia Zhang
, Kunchi Hou, Long Zhang:
A New Semi-Quantum Two-Way Authentication Protocol between Control Centers and Neighborhood Gateways in Smart Grids. Entropy 26(8): 644 (2024) - 2023
- [j19]Zhe Zhang
, Shiyao Ma
, Zhaohui Yang, Zehui Xiong
, Jiawen Kang
, Yi Wu
, Kejia Zhang
, Dusit Niyato
:
Robust Semisupervised Federated Learning for Images Automatic Recognition in Internet of Drones. IEEE Internet Things J. 10(7): 5733-5746 (2023) - [j18]Yu Zhang, Long Zhang, Kejia Zhang
, Weijian Wang, Kunchi Hou:
A new quantum-inspired solution to blind millionaires' problem. Quantum Inf. Process. 22(1): 80 (2023) - [c2]Qiaoqiao Feng, Jialong Sun, Kejia Zhang, Sainan Wang:
Energy Efficient Federated Learning Joint Communication and Computation Framework Over Wireless Networks. ICCEIC 2023: 351-355 - 2022
- [j17]Xiang Li, Kejia Zhang
, Long Zhang, Xu Zhao:
A New Quantum Multiparty Simultaneous Identity Authentication Protocol with the Classical Third-Party. Entropy 24(4): 483 (2022) - [j16]Na Hua, Juyan Li, Kejia Zhang, Long Zhang
:
A Novel Deterministic Threshold Proxy Re-Encryption Scheme From Lattices. Int. J. Inf. Secur. Priv. 16(1): 1-17 (2022) - [j15]Yukun Wang
, Xinhui Li, Yunguang Han, Kejia Zhang:
Practical anonymous entanglement with noisy measurement. Quantum Inf. Process. 21(2): 49 (2022) - [j14]Li Duan
, Yangyang Sun
, Kejia Zhang
, Yong Ding
:
Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures. Secur. Commun. Networks 2022: 5307697:1-5307697:11 (2022) - [c1]Na Hua
, Long Zhang
, Kejia Zhang
:
Identity-Based Deterministic Proxy Re-Encryption Scheme on Lattice. CSAE 2022: 24:1-24:7 - [i1]Zhe Zhang, Shiyao Ma, Zhaohui Yang, Zehui Xiong, Jiawen Kang, Yi Wu, Kejia Zhang, Dusit Niyato:
Robust Semi-supervised Federated Learning for Images Automatic Recognition in Internet of Drones. CoRR abs/2201.01230 (2022) - 2021
- [j13]Xu Zhao
, Ke-Jia Zhang
, Bao-Min Zhou
:
A Novel Quantum Sequential Signature Protocol With Y-SNOP States. IEEE Access 9: 63491-63499 (2021) - [j12]Kejia Zhang
, Xu Zhao
, Long Zhang, Guojing Tian, Tingting Song:
A Quantum Dual-Signature Protocol Based on SNOP States without Trusted Participant. Entropy 23(10): 1294 (2021) - [j11]Li Duan
, Kejia Zhang
, Bo Cheng, Bingfei Ren
:
Privacy Threats of Acoustic Covert Communication among Smart Mobile Devices. Wirel. Commun. Mob. Comput. 2021: 9179100:1-9179100:16 (2021) - 2020
- [j10]Qingle Wang
, Yuancheng Li
, Chaohang Yu, Hui He, Kejia Zhang:
Quantum anonymous ranking and selection with verifiability. Quantum Inf. Process. 19(5): 166 (2020)
2010 – 2019
- 2019
- [j9]Ke-Jia Zhang, Xue Zhang, Heng-Yue Jia, Long Zhang:
A new n-party quantum secret sharing model based on multiparty entangled states. Quantum Inf. Process. 18(3): 81 (2019) - 2018
- [j8]Ke-Jia Zhang, Leong-Chuan Kwek
, Chun-Guang Ma, Long Zhang, Hong-Wei Sun:
Security analysis with improved design of post-confirmation mechanism for quantum sealed-bid auction with single photons. Quantum Inf. Process. 17(2): 38 (2018) - 2017
- [j7]Long Zhang, Hong-Wei Sun, Ke-Jia Zhang, Heng-Yue Jia:
An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption. Quantum Inf. Process. 16(3): 70 (2017) - 2015
- [j6]Guang-Bao Xu, Ke-Jia Zhang:
A novel quantum group signature scheme without using entangled states. Quantum Inf. Process. 14(7): 2577-2587 (2015) - 2013
- [j5]Wei-Wei Zhang
, Ke-Jia Zhang:
Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party. Quantum Inf. Process. 12(5): 1981-1990 (2013) - [j4]Wei-Wei Zhang
, Dan Li, Ke-Jia Zhang, Huijuan Zuo:
A quantum protocol for millionaire problem with Bell states. Quantum Inf. Process. 12(6): 2241-2249 (2013) - [j3]Huijuan Zuo
, Ke-Jia Zhang, Ting-Ting Song:
Security analysis of quantum multi-signature protocol based on teleportation. Quantum Inf. Process. 12(7): 2343-2353 (2013) - [j2]Ke-Jia Zhang, Wei-Wei Zhang
, Dan Li:
Improving the security of arbitrated quantum signature against the forgery attack. Quantum Inf. Process. 12(8): 2655-2669 (2013) - [j1]Ke-Jia Zhang, Su-Juan Qin, Ying Sun, Ting-Ting Song, Qi Su:
Reexamination of arbitrated quantum signature: the impossible and the possible. Quantum Inf. Process. 12(9): 3127-3141 (2013)
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-13 01:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint