default search action
Futai Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j46]Shiyang Li, Wenjie Yang, Futai Zhang, Xinyi Huang, Rongmao Chen:
Practical two-party SM2 signing using multiplicative-to-additive functionality. Comput. Stand. Interfaces 92: 103928 (2025) - 2024
- [j45]Wenjie Yang, Junzhe Fan, Futai Zhang:
An Efficient Aggregate Signature Scheme With Designated Verifier Based on the Schnorr Signature in Healthcare Wireless Sensor Networks. IEEE Internet Things J. 11(20): 33788-33797 (2024) - [c30]Yichi Huang, Futai Zhang, Wenjie Yang, Shaojun Yang:
Efficient Identity-Based Dynamic Cloud Storage Data Integrity Auditing with Incremental Updates for Handheld Mobile Devices. DSPP (2) 2024: 67-87 - 2022
- [j44]Sujuan Li, Futai Zhang:
eCK-Secure Authenticated Key Exchange against Auxiliary Input Leakage. Comput. J. 65(8): 2063-2072 (2022) - [j43]Jie Zhang, Futai Zhang:
Identity-Based Key Agreement for Blockchain-Powered Intelligent Edge. IEEE Internet Things J. 9(9): 6688-6702 (2022) - [j42]Yumei Li, Futai Zhang:
An Efficient Certificate-Based Data Integrity Auditing Protocol for Cloud-Assisted WBANs. IEEE Internet Things J. 9(13): 11513-11523 (2022) - [j41]Haixia Chen, Xinyi Huang, Jianting Ning, Futai Zhang, Chao Lin:
VILS: A Verifiable Image Licensing System. IEEE Trans. Inf. Forensics Secur. 17: 1420-1434 (2022) - [j40]Yumei Li, Futai Zhang, Xin Liu:
Secure Data Delivery With Identity-Based Linearly Homomorphic Network Coding Signature Scheme in IoT. IEEE Trans. Serv. Comput. 15(4): 2202-2212 (2022) - [j39]Jianchang Lai, Fuchun Guo, Willy Susilo, Xinyi Huang, Peng Jiang, Futai Zhang:
Data Access Control in Cloud Computing: Flexible and Receiver Extendable. IEEE Trans. Serv. Comput. 15(5): 2658-2670 (2022) - [c29]Yumei Li, Mingwu Zhang, Futai Zhang:
Structure-Preserving Linearly Homomorphic Signature with Designated Combiner for Subspace. ACISP 2022: 229-243 - 2021
- [j38]Yumei Li, Futai Zhang, Yinxia Sun:
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system. IET Inf. Secur. 15(1): 131-146 (2021) - [j37]Jie Zhang, Futai Zhang, Xin Huang, Xin Liu:
Leakage-Resilient Authenticated Key Exchange for Edge Artificial Intelligence. IEEE Trans. Dependable Secur. Comput. 18(6): 2835-2847 (2021) - 2020
- [j36]Ge Wu, Zhen Zhao, Fuchun Guo, Willy Susilo, Futai Zhang:
On the General Construction of Tightly Secure Identity-Based Signature Schemes. Comput. J. 63(12): 1835-1848 (2020) - [j35]Yinxia Sun, Futai Zhang, Anmin Fu, Zhe Xia:
CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution. Int. J. Found. Comput. Sci. 31(2): 175-191 (2020) - [j34]Ge Wu, Futai Zhang, Limin Shen, Fuchun Guo, Willy Susilo:
Certificateless aggregate signature scheme secure against fully chosen-key attacks. Inf. Sci. 514: 288-301 (2020) - [j33]Yinxia Sun, Yi Mu, Willy Susilo, Futai Zhang, Anmin Fu:
Revocable identity-based encryption with server-aided ciphertext evolution. Theor. Comput. Sci. 815: 11-24 (2020)
2010 – 2019
- 2019
- [j32]Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo, Futai Zhang:
Threshold privacy-preserving cloud auditing with multiple uploaders. Int. J. Inf. Sec. 18(3): 321-331 (2019) - [j31]Ge Wu, Jianchang Lai, Fuchun Guo, Willy Susilo, Futai Zhang:
Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions. J. Comput. Sci. Technol. 34(6): 1366-1379 (2019) - [j30]Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo, Futai Zhang:
Privacy-Preserving Certificateless Cloud Auditing with Multiple Users. Wirel. Pers. Commun. 106(3): 1161-1182 (2019) - 2018
- [j29]Yinxia Sun, Willy Susilo, Futai Zhang, Anmin Fu:
CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud. IEEE Access 6: 56977-56983 (2018) - [j28]Yuyan Guo, Jiguo Li, Yang Lu, Yichen Zhang, Futai Zhang:
Provably secure certificate-based encryption with leakage resilience. Theor. Comput. Sci. 711: 1-10 (2018) - [c28]Yinxia Sun, Futai Zhang, Anmin Fu:
Revocable Certificateless Encryption with Ciphertext Evolution. ACISP 2018: 741-749 - 2017
- [j27]Limin Shen, Futai Zhang, Yinxia Sun, Jianfeng Ma:
An efficient revocable ID-based encryption scheme in the standard model. Int. J. Embed. Syst. 9(2): 168-176 (2017) - [j26]Sujuan Li, Yi Mu, Mingwu Zhang, Futai Zhang:
Continuous Leakage Resilient Lossy Trapdoor Functions. Inf. 8(2): 38 (2017) - [c27]Wenjie Yang, Jian Weng, Futai Zhang:
New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model. ICICS 2017: 236-247 - [i3]Lei Zhang, Futai Zhang, Wei Wu:
A Provably Secure Ring Signature Scheme in Certificateless Cryptography. CoRR abs/1712.09145 (2017) - 2016
- [j25]Yanhong Liu, Futai Zhang, Jie Zhang:
Attacks to some verifiable multi-secret sharing schemes and two improved schemes. Inf. Sci. 329: 524-539 (2016) - [j24]Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu, Yichen Zhang, Futai Zhang:
Continuous leakage-resilient certificate-based encryption. Inf. Sci. 355-356: 1-14 (2016) - [c26]Sujuan Li, Yi Mu, Mingwu Zhang, Futai Zhang:
Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage. ProvSec 2016: 309-319 - 2015
- [j23]Jie Zhang, Futai Zhang:
Information-theoretical secure verifiable secret sharing with vector space access structures over bilinear groups and its applications. Future Gener. Comput. Syst. 52: 109-115 (2015) - [j22]Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng:
Efficient revocable certificateless encryption against decryption key exposure. IET Inf. Secur. 9(3): 158-166 (2015) - 2014
- [j21]Limin Shen, Futai Zhang, Yinxia Sun:
Efficient Revocable Certificateless Encryption Secure in the Standard Model. Comput. J. 57(4): 592-601 (2014) - [j20]Limin Shen, Futai Zhang, Yinxia Sun, Sujuan Li:
Cryptanalysis and improvement on a certificateless encryption scheme in the standard model. Int. J. Inf. Comput. Secur. 6(4): 354-371 (2014) - [j19]Futai Zhang, Limin Shen, Ge Wu:
Notes on the security of certificateless aggregate signature schemes. Inf. Sci. 287: 32-37 (2014) - [j18]Yinxia Sun, Futai Zhang, Limin Shen:
A Revocable Certificateless Signature Scheme. J. Comput. 9(8): 1843-1850 (2014) - [j17]Wenjie Yang, Futai Zhang, Limin Shen:
Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles. Secur. Commun. Networks 7(2): 445-454 (2014) - [c25]Jie Zhang, Futai Zhang:
Information-Theoretical Secure Verifiable Secret Sharing with Vector Space Access Structures over Bilinear Groups. ISPEC 2014: 318-329 - [c24]Huaqun Wang, Qianhong Wu, Bo Qin, Futai Zhang, Josep Domingo-Ferrer:
A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience. ISPEC 2014: 388-402 - 2013
- [j16]Sujuan Li, Futai Zhang, Yinxia Sun, Limin Shen:
Efficient leakage-resilient public key encryption from DDH assumption. Clust. Comput. 16(4): 797-806 (2013) - [j15]Lei Zhang, Futai Zhang, Bo Qin, Shubo Liu:
Corrigendum: "Provably-secure electronic cash based on certicateless partially-blind signatures". Electron. Commer. Res. Appl. 12(1): 60 (2013) - [j14]Sujuan Li, Futai Zhang:
Leakage-resilient identity-based encryption scheme. Int. J. Grid Util. Comput. 4(2/3): 187-196 (2013) - [j13]Jie Zhang, Futai Zhang:
Linear threshold verifiable secret sharing in bilinear groups. Int. J. Grid Util. Comput. 4(2/3): 212-218 (2013) - [j12]Songqin Miao, Futai Zhang, Sujuan Li, Yi Mu:
On security of a certificateless signcryption scheme. Inf. Sci. 232: 475-481 (2013) - [c23]Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng:
Revocable Identity-Based Signature without Pairing. INCoS 2013: 363-365 - [c22]Jie Zhang, Futai Zhang:
Secure Distributed Key Generation on Vector Space Access Structures in Bilinear Groups. INCoS 2013: 803-808 - [i2]Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng:
A revocable certificateless signature scheme. IACR Cryptol. ePrint Arch. 2013: 53 (2013) - 2012
- [j11]Lei Zhang, Futai Zhang, Qianhong Wu:
Delegation of signing rights using certificateless proxy signatures. Inf. Sci. 184(1): 298-309 (2012) - [c21]Limin Shen, Futai Zhang, Yinxia Sun, Sujuan Li:
Cryptanalysis of a Certificateless Encryption Scheme in the Standard Model. INCoS 2012: 329-333 - [c20]Sujuan Li, Futai Zhang, Yinxia Sun, Limin Shen:
A New Variant of the Cramer-Shoup Leakage-Resilient Public Key Encryption. INCoS 2012: 342-346 - [c19]Wenjie Yang, Futai Zhang, Limin Shen:
Practical Certificateless Public Key Encryption in the Standard Model. NSS 2012: 320-333 - 2011
- [j10]Lei Zhang, Futai Zhang, Bo Qin, Shubo Liu:
Provably-secure electronic cash based on certificateless partially-blind signatures. Electron. Commer. Res. Appl. 10(5): 545-552 (2011) - 2010
- [j9]Lei Zhang, Bo Qin, Qianhong Wu, Futai Zhang:
Efficient many-to-one authentication with certificateless aggregate signatures. Comput. Networks 54(14): 2482-2491 (2010) - [j8]Futai Zhang, Sujuan Li, Songqin Miao, Yi Mu, Willy Susilo, Xinyi Huang:
Cryptanalysis on Two Certificateless Signature Schemes. Int. J. Comput. Commun. Control 5(4): 586-591 (2010) - [j7]Lei Zhang, Futai Zhang, Qianhong Wu, Josep Domingo-Ferrer:
Simulatable certificateless two-party authenticated key agreement protocol. Inf. Sci. 180(6): 1020-1030 (2010) - [j6]Hong Yuan, Futai Zhang, Xinyi Huang, Yi Mu, Willy Susilo, Lei Zhang:
Certificateless threshold signature scheme from bilinear maps. Inf. Sci. 180(23): 4714-4728 (2010)
2000 – 2009
- 2009
- [j5]Lei Zhang, Futai Zhang:
A new certificateless aggregate signature scheme. Comput. Commun. 32(6): 1079-1085 (2009) - [j4]Huaqun Wang, Futai Zhang, Yanfei Sun:
Cryptanalysis of a Generalized Ring Signature Scheme. IEEE Trans. Dependable Secur. Comput. 6(2): 149-151 (2009) - [c18]Lei Zhang, Bo Qin, Qianhong Wu, Futai Zhang:
Novel Efficient Certificateless Aggregate Signatures. AAECC 2009: 235-238 - [c17]Manman Geng, Futai Zhang:
Provably Secure Certificateless Two-Party Authenticated Key Agreement Protocol without Pairing. CIS (2) 2009: 208-212 - [c16]Manman Geng, Futai Zhang:
Batch Verification for Certificateless Signature Schemes. CIS (2) 2009: 288-292 - 2008
- [j3]Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang:
Short Designated Verifier Signature Scheme and Its Identity-based Variant. Int. J. Netw. Secur. 6(1): 82-93 (2008) - [c15]Lijun Zhun, Futai Zhang:
Efficient ID. CIS (2) 2008: 303-307 - [c14]Lei Zhang, Futai Zhang:
Security Model for Certificateless Aggregate Signature Schemes. CIS (2) 2008: 364-368 - [c13]Huaqun Wang, Changhui Deng, Shuping Zhao, Futai Zhang:
Cryptanalysis and Improvement of Shacham-Waters Ring Signature Scheme. CIS (2) 2008: 374-377 - [c12]Lei Zhang, Futai Zhang:
A New Provably Secure Certificateless Signature Scheme. ICC 2008: 1685-1689 - [i1]Yinxia Sun, Futai Zhang:
Secure Certificateless Public Key Encryption without Redundancy. IACR Cryptol. ePrint Arch. 2008: 487 (2008) - 2007
- [j2]Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang:
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004. J. Comput. Sci. Technol. 22(1): 71-74 (2007) - [c11]Yinxia Sun, Futai Zhang, Joonsang Baek:
Strongly Secure Certificateless Public Key Encryption Without Pairing. CANS 2007: 194-208 - [c10]Lei Zhang, Futai Zhang, Fangguo Zhang:
New Efficient Certificateless Signature Scheme. EUC Workshops 2007: 692-703 - [c9]Lei Zhang, Futai Zhang, Wei Wu:
A Provably Secure Ring Signature Scheme in Certificateless Cryptography. ProvSec 2007: 103-121 - 2006
- [c8]Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang:
Certificateless Designated Verifier Signature Schemes. AINA (2) 2006: 15-19 - [c7]Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang:
Short (Identity-Based) Strong Designated Verifier Signature Schemes. ISPEC 2006: 214-225 - [c6]Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang:
Restricted Universal Designated Verifier Signature. UIC 2006: 874-882 - 2005
- [c5]Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang:
Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. AINA 2005: 649-654 - [c4]Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang:
On the Security of Certificateless Signature Schemes from Asiacrypt 2003. CANS 2005: 13-25 - [c3]Xinyi Huang, Yi Mu, Willy Susilo, Futai Zhang:
Short Designated Verifier Proxy Signature from Pairings. EUC Workshops 2005: 835-844 - 2002
- [j1]Fangguo Zhang, Futai Zhang, Yumin Wang:
Selection of Secure Hyperelliptic Curves of g_2 Based on a Subfield. J. Comput. Sci. Technol. 17(6): 836-842 (2002) - 2001
- [c2]Fangguo Zhang, Futai Zhang, Yumin Wang:
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves. ICICS 2001: 74-83 - 2000
- [c1]Fangguo Zhang, Futai Zhang, Yumin Wang:
Fair Electronic Cash Systems with Multiple Banks. SEC 2000: 461-470
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint