BibTeX records: Jing Xu 0002

download as .bib file

@article{DBLP:journals/cj/YinXZ23,
  author       = {Lingyuan Yin and
                  Jing Xu and
                  Zhenfeng Zhang},
  title        = {Interopera: An Efficient Cross-Chain Trading Protocol},
  journal      = {Comput. J.},
  volume       = {66},
  number       = {7},
  pages        = {1609--1621},
  year         = {2023},
  url          = {https://doi.org/10.1093/comjnl/bxac030},
  doi          = {10.1093/COMJNL/BXAC030},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/YinXZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LanXZCL23,
  author       = {Xiao Lan and
                  Jing Xu and
                  Zhenfeng Zhang and
                  Xingshu Chen and
                  Yonggang Luo},
  title        = {A systematic security analysis of {EMV} protocol},
  journal      = {Comput. Stand. Interfaces},
  volume       = {84},
  pages        = {103700},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csi.2022.103700},
  doi          = {10.1016/J.CSI.2022.103700},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/LanXZCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiXYLTZ23,
  author       = {Xinyu Li and
                  Jing Xu and
                  Lingyuan Yin and
                  Yuan Lu and
                  Qiang Tang and
                  Zhenfeng Zhang},
  title        = {Escaping From Consensus: Instantly Redactable Blockchain Protocols
                  in Permissionless Setting},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {5},
  pages        = {3699--3715},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3212601},
  doi          = {10.1109/TDSC.2022.3212601},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiXYLTZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DouYLX22,
  author       = {Hanyue Dou and
                  Lingyuan Yin and
                  Yuan Lu and
                  Jing Xu},
  title        = {A probabilistic Proof-of-Stake protocol with fast confirmation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {68},
  pages        = {103268},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103268},
  doi          = {10.1016/J.JISA.2022.103268},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DouYLX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YinXT22,
  author       = {Lingyuan Yin and
                  Jing Xu and
                  Qiang Tang},
  title        = {Sidechains With Fast Cross-Chain Transfers},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {6},
  pages        = {3925--3940},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3114151},
  doi          = {10.1109/TDSC.2021.3114151},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/YinXT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NiX22,
  author       = {Peifang Ni and
                  Jing Xu},
  editor       = {Jianying Zhou and
                  Sridhar Adepu and
                  Cristina Alcaraz and
                  Lejla Batina and
                  Emiliano Casalicchio and
                  Sudipta Chattopadhyay and
                  Chenglu Jin and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Stjepan Picek and
                  Jun Shao and
                  Chunhua Su and
                  Cong Wang and
                  Yury Zhauniarovich and
                  Saman A. Zonouz},
  title        = {UniqueChain: Achieving (Near) Optimal Transaction Settlement Time
                  via Single Leader Election},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2022
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
                  SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13285},
  pages        = {427--446},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-16815-4\_23},
  doi          = {10.1007/978-3-031-16815-4\_23},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/NiX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Gao0L00Z22,
  author       = {Yingzi Gao and
                  Yuan Lu and
                  Zhenliang Lu and
                  Qiang Tang and
                  Jing Xu and
                  Zhenfeng Zhang},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Dumbo-NG: Fast Asynchronous {BFT} Consensus with Throughput-Oblivious
                  Latency},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {1187--1201},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3559379},
  doi          = {10.1145/3548606.3559379},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Gao0L00Z22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/GaoLLTXZ22,
  author       = {Yingzi Gao and
                  Yuan Lu and
                  Zhenliang Lu and
                  Qiang Tang and
                  Jing Xu and
                  Zhenfeng Zhang},
  title        = {Efficient Asynchronous Byzantine Agreement without Private Setups},
  booktitle    = {42nd {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2022, Bologna, Italy, July 10-13, 2022},
  pages        = {246--257},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICDCS54860.2022.00032},
  doi          = {10.1109/ICDCS54860.2022.00032},
  timestamp    = {Thu, 20 Oct 2022 09:13:03 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/GaoLLTXZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Guo0L00Z22,
  author       = {Bingyong Guo and
                  Yuan Lu and
                  Zhenliang Lu and
                  Qiang Tang and
                  Jing Xu and
                  Zhenfeng Zhang},
  title        = {Speeding Dumbo: Pushing Asynchronous {BFT} Closer to Practice},
  booktitle    = {29th Annual Network and Distributed System Security Symposium, {NDSS}
                  2022, San Diego, California, USA, April 24-28, 2022},
  publisher    = {The Internet Society},
  year         = {2022},
  url          = {https://www.ndss-symposium.org/ndss-paper/auto-draft-256/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/Guo0L00Z22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-00750,
  author       = {Yingzi Gao and
                  Yuan Lu and
                  Zhenliang Lu and
                  Qiang Tang and
                  Jing Xu and
                  Zhenfeng Zhang},
  title        = {Dumbo-NG: Fast Asynchronous {BFT} Consensus with Throughput-Oblivious
                  Latency},
  journal      = {CoRR},
  volume       = {abs/2209.00750},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.00750},
  doi          = {10.48550/ARXIV.2209.00750},
  eprinttype    = {arXiv},
  eprint       = {2209.00750},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-00750.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoLLTXZ22,
  author       = {Bingyong Guo and
                  Yuan Lu and
                  Zhenliang Lu and
                  Qiang Tang and
                  Jing Xu and
                  Zhenfeng Zhang},
  title        = {Speeding Dumbo: Pushing Asynchronous {BFT} Closer to Practice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/027},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoLLTXZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GuoZXAL21,
  author       = {Hui Guo and
                  Zhenfeng Zhang and
                  Jing Xu and
                  Ningyu An and
                  Xiao Lan},
  title        = {Accountable Proxy Re-Encryption for Secure Data Sharing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {1},
  pages        = {145--159},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2018.2877601},
  doi          = {10.1109/TDSC.2018.2877601},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GuoZXAL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-07831,
  author       = {Yingzi Gao and
                  Yuan Lu and
                  Zhenliang Lu and
                  Qiang Tang and
                  Jing Xu and
                  Zhenfeng Zhang},
  title        = {Efficient Asynchronous Byzantine Agreement without Private Setups},
  journal      = {CoRR},
  volume       = {abs/2106.07831},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.07831},
  eprinttype    = {arXiv},
  eprint       = {2106.07831},
  timestamp    = {Tue, 29 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-07831.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0002LYL0Z21,
  author       = {Jing Xu and
                  Xinyu Li and
                  Lingyuan Yin and
                  Yuan Lu and
                  Qiang Tang and
                  Zhenfeng Zhang},
  title        = {Redactable Blockchain Protocol with Instant Redaction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {223},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/223},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0002LYL0Z21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoLLTXZ21,
  author       = {Yingzi Gao and
                  Yuan Lu and
                  Zhenliang Lu and
                  Qiang Tang and
                  Jing Xu and
                  Zhenfeng Zhang},
  title        = {Efficient Asynchronous Byzantine Agreement without Private Setups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {810},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/810},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoLLTXZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiXFWZ20,
  author       = {Xinyu Li and
                  Jing Xu and
                  Xiong Fan and
                  Yuchen Wang and
                  Zhenfeng Zhang},
  title        = {Puncturable Signatures and Applications in Proof-of-Stake Blockchain
                  Protocols},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3872--3885},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.3001738},
  doi          = {10.1109/TIFS.2020.3001738},
  timestamp    = {Tue, 04 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiXFWZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/LiXZ20,
  author       = {Xinyu Li and
                  Jing Xu and
                  Zhenfeng Zhang},
  title        = {Correction to: Revisiting the Security of Qian et al.'s Revised Tree-{\textdollar}{\textbackslash}hbox
                  \{LSHB\}{\^{}}+{\textdollar} Protocol},
  journal      = {Wirel. Pers. Commun.},
  volume       = {110},
  number       = {2},
  pages        = {1073},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11277-019-07009-2},
  doi          = {10.1007/S11277-019-07009-2},
  timestamp    = {Tue, 04 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/LiXZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GuoL0XZ20,
  author       = {Bingyong Guo and
                  Zhenliang Lu and
                  Qiang Tang and
                  Jing Xu and
                  Zhenfeng Zhang},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Dumbo: Faster Asynchronous {BFT} Protocols},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {803--818},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417262},
  doi          = {10.1145/3372297.3417262},
  timestamp    = {Wed, 30 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GuoL0XZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/LiXZLW20,
  author       = {Xinyu Li and
                  Jing Xu and
                  Zhenfeng Zhang and
                  Xiao Lan and
                  Yuchen Wang},
  title        = {Modular Security Analysis of OAuth 2.0 in the Three-Party Setting},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2020, Genoa, Italy, September 7-11, 2020},
  pages        = {276--293},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSP48549.2020.00025},
  doi          = {10.1109/EUROSP48549.2020.00025},
  timestamp    = {Tue, 04 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/LiXZLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoLTXZ20,
  author       = {Bingyong Guo and
                  Zhenliang Lu and
                  Qiang Tang and
                  Jing Xu and
                  Zhenfeng Zhang},
  title        = {Dumbo: Faster Asynchronous {BFT} Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {841},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/841},
  timestamp    = {Wed, 30 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoLTXZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/GuoZXA19,
  author       = {Hui Guo and
                  Zhenfeng Zhang and
                  Jing Xu and
                  Ningyu An},
  title        = {Non-transferable Proxy Re-encryption},
  journal      = {Comput. J.},
  volume       = {62},
  number       = {4},
  pages        = {490--506},
  year         = {2019},
  url          = {https://doi.org/10.1093/comjnl/bxy096},
  doi          = {10.1093/COMJNL/BXY096},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/GuoZXA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LanXZZ19,
  author       = {Xiao Lan and
                  Jing Xu and
                  Zhenfeng Zhang and
                  Wen{-}Tao Zhu},
  title        = {Investigating the Multi-Ciphersuite and Backwards-Compatibility Security
                  of the Upcoming {TLS} 1.3},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {16},
  number       = {2},
  pages        = {272--286},
  year         = {2019},
  url          = {https://doi.org/10.1109/TDSC.2017.2685382},
  doi          = {10.1109/TDSC.2017.2685382},
  timestamp    = {Tue, 08 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LanXZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/LiXZ19,
  author       = {Xinyu Li and
                  Jing Xu and
                  Zhenfeng Zhang},
  title        = {Revisiting the Security of Qian et al.'s Revised Tree- {\textdollar}{\textdollar}{\textbackslash}hbox
                  \{LSHB\}{\^{}}+{\textdollar}{\textdollar} {LSHB} + Protocol},
  journal      = {Wirel. Pers. Commun.},
  volume       = {106},
  number       = {2},
  pages        = {321--343},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11277-019-06164-w},
  doi          = {10.1007/S11277-019-06164-W},
  timestamp    = {Tue, 04 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/LiXZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GuoZ0X19,
  author       = {Hui Guo and
                  Zhenfeng Zhang and
                  Jing Xu and
                  Mingyuan Xia},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Generic Traceable Proxy Re-encryption and Accountable Extension in
                  Consensus Network},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {234--256},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_12},
  doi          = {10.1007/978-3-030-29959-0\_12},
  timestamp    = {Fri, 07 Aug 2020 17:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GuoZ0X19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-03955,
  author       = {Xinyu Li and
                  Jing Xu and
                  Xiong Fan and
                  Yuchen Wang and
                  Zhenfeng Zhang},
  title        = {Puncturable Signatures and Applications in Proof-of-Stake Blockchain
                  Protocol},
  journal      = {CoRR},
  volume       = {abs/1909.03955},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.03955},
  eprinttype    = {arXiv},
  eprint       = {1909.03955},
  timestamp    = {Tue, 04 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-03955.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/HuZZX17,
  author       = {Xuexian Hu and
                  Jiang Zhang and
                  Zhenfeng Zhang and
                  Jing Xu},
  title        = {Universally composable anonymous password authenticated key exchange},
  journal      = {Sci. China Inf. Sci.},
  volume       = {60},
  number       = {5},
  pages        = {52107},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11432-016-5522-z},
  doi          = {10.1007/S11432-016-5522-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/HuZZX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LanXGZ16,
  author       = {Xiao Lan and
                  Jing Xu and
                  Hui Guo and
                  Zhenfeng Zhang},
  editor       = {Kefei Chen and
                  Dongdai Lin and
                  Moti Yung},
  title        = {One-Round Cross-Domain Group Key Exchange Protocol in the Standard
                  Model},
  booktitle    = {Information Security and Cryptology - 12th International Conference,
                  Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10143},
  pages        = {386--400},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54705-3\_24},
  doi          = {10.1007/978-3-319-54705-3\_24},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LanXGZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiXZFH16,
  author       = {Xinyu Li and
                  Jing Xu and
                  Zhenfeng Zhang and
                  Dengguo Feng and
                  Honggang Hu},
  title        = {Multiple Handshakes Security of {TLS} 1.3 Candidates},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {486--505},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.36},
  doi          = {10.1109/SP.2016.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/LiXZFH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/XuHZ15,
  author       = {Jing Xu and
                  Xuexian Hu and
                  Zhenfeng Zhang},
  editor       = {Tal Malkin and
                  Vladimir Kolesnikov and
                  Allison Bishop Lewko and
                  Michalis Polychronakis},
  title        = {Round-Optimal Password-Based Group Key Exchange Protocols in the Standard
                  Model},
  booktitle    = {Applied Cryptography and Network Security - 13th International Conference,
                  {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9092},
  pages        = {42--61},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28166-7\_3},
  doi          = {10.1007/978-3-319-28166-7\_3},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/XuHZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoZX15,
  author       = {Hui Guo and
                  Zhenfeng Zhang and
                  Jing Xu},
  title        = {Non-Transferable Proxy Re-Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1216},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1216},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoZX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/XuZ13,
  author       = {Jing Xu and
                  Wen Tao Zhu},
  title        = {A Generic Framework for Anonymous Authentication in Mobile Networks},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {28},
  number       = {4},
  pages        = {732--742},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11390-013-1371-z},
  doi          = {10.1007/S11390-013-1371-Z},
  timestamp    = {Thu, 19 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/XuZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DuanXF13,
  author       = {Meijiao Duan and
                  Jing Xu and
                  Dengguo Feng},
  title        = {Efficient identity-based strong designated verifier signature schemes},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {7},
  pages        = {902--911},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.645},
  doi          = {10.1002/SEC.645},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DuanXF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YangXZ13,
  author       = {Kang Yang and
                  Jing Xu and
                  Zhenfeng Zhang},
  editor       = {Hyang{-}Sook Lee and
                  Dong{-}Guk Han},
  title        = {Certificateless Proxy Re-Encryption Without Pairings},
  booktitle    = {Information Security and Cryptology - {ICISC} 2013 - 16th International
                  Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8565},
  pages        = {67--88},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12160-4\_5},
  doi          = {10.1007/978-3-319-12160-4\_5},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/YangXZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/XuZF11,
  author       = {Jing Xu and
                  Wen Tao Zhu and
                  Dengguo Feng},
  title        = {An efficient mutual authentication and key agreement protocol preserving
                  user anonymity in mobile networks},
  journal      = {Comput. Commun.},
  volume       = {34},
  number       = {3},
  pages        = {319--325},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comcom.2010.04.041},
  doi          = {10.1016/J.COMCOM.2010.04.041},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/XuZF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/XuZJ11,
  author       = {Jing Xu and
                  Wen Tao Zhu and
                  Wenting Jin},
  title        = {A generic framework for constructing cross-realm {C2C-PAKA} protocols
                  based on the smart card},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {23},
  number       = {12},
  pages        = {1386--1398},
  year         = {2011},
  url          = {https://doi.org/10.1002/cpe.1616},
  doi          = {10.1002/CPE.1616},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/XuZJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/DuanX11,
  author       = {Meijiao Duan and
                  Jing Xu},
  title        = {An efficient location-based compromise-tolerant key management scheme
                  for sensor networks},
  journal      = {Inf. Process. Lett.},
  volume       = {111},
  number       = {11},
  pages        = {503--507},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ipl.2011.02.017},
  doi          = {10.1016/J.IPL.2011.02.017},
  timestamp    = {Thu, 19 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/DuanX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jips/FengXC11,
  author       = {Dengguo Feng and
                  Jing Xu and
                  Weidong Chen},
  title        = {Generic Constructions for Strong Designated Verifier Signature},
  journal      = {J. Inf. Process. Syst.},
  volume       = {7},
  number       = {1},
  pages        = {159--172},
  year         = {2011},
  url          = {https://doi.org/10.3745/JIPS.2011.7.1.159},
  doi          = {10.3745/JIPS.2011.7.1.159},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jips/FengXC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/XuF11,
  author       = {Jing Xu and
                  Dengguo Feng},
  editor       = {Dongdai Lin and
                  Gene Tsudik and
                  Xiaoyun Wang},
  title        = {Comments on the {SM2} Key Exchange Protocol},
  booktitle    = {Cryptology and Network Security - 10th International Conference, {CANS}
                  2011, Sanya, China, December 10-12, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7092},
  pages        = {160--171},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25513-7\_12},
  doi          = {10.1007/978-3-642-25513-7\_12},
  timestamp    = {Mon, 25 Nov 2019 15:32:12 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/XuF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/XuZF11,
  author       = {Jing Xu and
                  Wen Tao Zhu and
                  Dengguo Feng},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {A Smart Card based Generic Construction for Anonymous Authentication
                  in Mobile Networks},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {269--274},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/XuZF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/XuZF09,
  author       = {Jing Xu and
                  Wen Tao Zhu and
                  Dengguo Feng},
  title        = {An improved smart card based password authentication scheme with provable
                  security},
  journal      = {Comput. Stand. Interfaces},
  volume       = {31},
  number       = {4},
  pages        = {723--728},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.csi.2008.09.006},
  doi          = {10.1016/J.CSI.2008.09.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/XuZF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/JinX09,
  author       = {Wenting Jin and
                  Jing Xu},
  editor       = {Juan A. Garay and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated
                  Key Agreement Protocol with Smart Cards},
  booktitle    = {Cryptology and Network Security, 8th International Conference, {CANS}
                  2009, Kanazawa, Japan, December 12-14, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5888},
  pages        = {299--314},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10433-6\_20},
  doi          = {10.1007/978-3-642-10433-6\_20},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/JinX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codcry/FengX09,
  author       = {Dengguo Feng and
                  Jing Xu},
  editor       = {Yeow Meng Chee and
                  Chao Li and
                  San Ling and
                  Huaxiong Wang and
                  Chaoping Xing},
  title        = {A New Client-to-Client Password-Authenticated Key Agreement Protocol},
  booktitle    = {Coding and Cryptology, Second International Workshop, {IWCC} 2009,
                  Zhangjiajie, China, June 1-5, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5557},
  pages        = {63--76},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01877-0\_7},
  doi          = {10.1007/978-3-642-01877-0\_7},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/codcry/FengX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ZhangWXF06,
  author       = {Zhenfeng Zhang and
                  Duncan S. Wong and
                  Jing Xu and
                  Dengguo Feng},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Feng Bao},
  title        = {Certificateless Public-Key Signature: Security Model and Efficient
                  Construction},
  booktitle    = {Applied Cryptography and Network Security, 4th International Conference,
                  {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3989},
  pages        = {293--308},
  year         = {2006},
  url          = {https://doi.org/10.1007/11767480\_20},
  doi          = {10.1007/11767480\_20},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ZhangWXF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/XuZF05,
  author       = {Jing Xu and
                  Zhenfeng Zhang and
                  Dengguo Feng},
  editor       = {Yvo Desmedt and
                  Huaxiong Wang and
                  Yi Mu and
                  Yongqing Li},
  title        = {ID-Based Aggregate Signatures from Bilinear Pairings},
  booktitle    = {Cryptology and Network Security, 4th International Conference, {CANS}
                  2005, Xiamen, China, December 14-16, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3810},
  pages        = {110--119},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599371\_10},
  doi          = {10.1007/11599371\_10},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/XuZF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/ZhangXF05,
  author       = {Zhenfeng Zhang and
                  Jing Xu and
                  Dengguo Feng},
  editor       = {Yvo Desmedt and
                  Huaxiong Wang and
                  Yi Mu and
                  Yongqing Li},
  title        = {Efficient Identity-Based Protocol for Fair Certified E-mail Delivery},
  booktitle    = {Cryptology and Network Security, 4th International Conference, {CANS}
                  2005, Xiamen, China, December 14-16, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3810},
  pages        = {200--210},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599371\_17},
  doi          = {10.1007/11599371\_17},
  timestamp    = {Wed, 18 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/ZhangXF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhangFXZ05,
  author       = {Zhenfeng Zhang and
                  Dengguo Feng and
                  Jing Xu and
                  Yongbin Zhou},
  editor       = {Sihan Qing and
                  Wenbo Mao and
                  Javier L{\'{o}}pez and
                  Guilin Wang},
  title        = {Efficient ID-Based Optimistic Fair Exchange with Provable Security},
  booktitle    = {Information and Communications Security, 7th International Conference,
                  {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3783},
  pages        = {14--26},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11602897\_2},
  doi          = {10.1007/11602897\_2},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/ZhangFXZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/XuZF05,
  author       = {Jing Xu and
                  Zhenfeng Zhang and
                  Dengguo Feng},
  editor       = {Guihai Chen and
                  Yi Pan and
                  Minyi Guo and
                  Jian Lu},
  title        = {ID-Based Proxy Signature Using Bilinear Pairings},
  booktitle    = {Parallel and Distributed Processing and Applications - {ISPA} 2005
                  Workshops, {ISPA} 2005 International Workshops AEPP, ASTD, BIOS, GCIC,
                  IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3759},
  pages        = {359--367},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11576259\_40},
  doi          = {10.1007/11576259\_40},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispa/XuZF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/XuZF04,
  author       = {Jing Xu and
                  Zhenfeng Zhang and
                  Dengguo Feng},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {A Ring Signature Scheme Using Bilinear Pairings},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {160--169},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_14},
  doi          = {10.1007/978-3-540-31815-6\_14},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/XuZF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuZF04,
  author       = {Jing Xu and
                  Zhenfeng Zhang and
                  Dengguo Feng},
  title        = {ID-Based Proxy Signature Using Bilinear Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {206},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/206},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuZF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuZF04a,
  author       = {Jing Xu and
                  Zhenfeng Zhang and
                  Dengguo Feng},
  title        = {Identity Based Threshold Proxy Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {250},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/250},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuZF04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangXF03,
  author       = {Zhenfeng Zhang and
                  Jing Xu and
                  Dengguo Feng},
  title        = {Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {153},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/153},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangXF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics