Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Fangguo Zhang
@article{DBLP:journals/csi/TianWZSL24, author = {Haibo Tian and Yanchuan Wen and Fangguo Zhang and Yunfeng Shao and Bingshuai Li}, title = {Lattice based distributed threshold additive homomorphic encryption with application in federated learning}, journal = {Comput. Stand. Interfaces}, volume = {87}, pages = {103765}, year = {2024}, url = {https://doi.org/10.1016/j.csi.2023.103765}, doi = {10.1016/J.CSI.2023.103765}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/TianWZSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/ZhangHZWD24, author = {Huang Zhang and Ting Huang and Fangguo Zhang and Baodian Wei and Yusong Du}, title = {Self-Bilinear Map from One Way Encoding System and i{\unicode{119978}}}, journal = {Inf.}, volume = {15}, number = {1}, pages = {54}, year = {2024}, url = {https://doi.org/10.3390/info15010054}, doi = {10.3390/INFO15010054}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/information/ZhangHZWD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangZ23, author = {Zheng Zhang and Fangguo Zhang}, title = {New Obfuscation Scheme for Conjunctions}, journal = {Comput. J.}, volume = {66}, number = {11}, pages = {2773--2781}, year = {2023}, url = {https://doi.org/10.1093/comjnl/bxac120}, doi = {10.1093/COMJNL/BXAC120}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ZhangZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersec/ChenZ23, author = {Chao Chen and Fangguo Zhang}, title = {Verifiable delay functions and delay encryptions from hyperelliptic curves}, journal = {Cybersecur.}, volume = {6}, number = {1}, pages = {54}, year = {2023}, url = {https://doi.org/10.1186/s42400-023-00189-2}, doi = {10.1186/S42400-023-00189-2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersec/ChenZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/DaiZZ23, author = {Yu Dai and Fangguo Zhang and Chang{-}An Zhao}, title = {Fast hashing to {G2} on pairing-friendly curves with the lack of twists}, journal = {Finite Fields Their Appl.}, volume = {91}, pages = {102263}, year = {2023}, url = {https://doi.org/10.1016/j.ffa.2023.102263}, doi = {10.1016/J.FFA.2023.102263}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/DaiZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenZZ23, author = {Chao Chen and Fangguo Zhang and Changan Zhao}, title = {Isogeny computation on Kummer lines and applications}, journal = {J. Inf. Secur. Appl.}, volume = {76}, pages = {103546}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103546}, doi = {10.1016/J.JISA.2023.103546}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ChenZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ChenGHZ23, author = {Chao Chen and Peidong Guan and Yan Huang and Fangguo Zhang}, title = {Quantum circuits for hyperelliptic curve discrete logarithms over the Mersenne prime fields}, journal = {Quantum Inf. Process.}, volume = {22}, number = {7}, pages = {274}, year = {2023}, url = {https://doi.org/10.1007/s11128-023-04017-x}, doi = {10.1007/S11128-023-04017-X}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/qip/ChenGHZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/DaiZZ23, author = {Yu Dai and Fangguo Zhang and Chang{-}An Zhao}, title = {Don't Forget Pairing-Friendly Curves with Odd Prime Embedding Degrees}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {4}, pages = {393--419}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i4.393-419}, doi = {10.46586/TCHES.V2023.I4.393-419}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/DaiZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/AnPWZ23, author = {Zhiyuan An and Jing Pan and Yamin Wen and Fangguo Zhang}, title = {Secret handshakes: Full dynamicity, deniability and lattice-based design}, journal = {Theor. Comput. Sci.}, volume = {940}, number = {Part}, pages = {14--35}, year = {2023}, url = {https://doi.org/10.1016/j.tcs.2022.10.035}, doi = {10.1016/J.TCS.2022.10.035}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/AnPWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisp/ZuoTZ23, author = {Ruozhou Zuo and Haibo Tian and Fangguo Zhang}, editor = {Jaideep Vaidya and Moncef Gabbouj and Jin Li}, title = {Post-quantum Dropout-Resilient Aggregation for Federated Learning via Lattice-Based {PRF}}, booktitle = {Artificial Intelligence Security and Privacy - First International Conference on Artificial Intelligence Security and Privacy, AIS{\&}P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14509}, pages = {382--399}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9785-5\_27}, doi = {10.1007/978-981-99-9785-5\_27}, timestamp = {Sun, 03 Mar 2024 19:07:53 +0100}, biburl = {https://dblp.org/rec/conf/aisp/ZuoTZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiTZ23, author = {Chen Li and Haibo Tian and Fangguo Zhang}, editor = {Chunpeng Ge and Moti Yung}, title = {{TVES:} Threshold Verifiably Encrypted Signature and Its Applications}, booktitle = {Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14526}, pages = {3--22}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-0942-7\_1}, doi = {10.1007/978-981-97-0942-7\_1}, timestamp = {Mon, 11 Mar 2024 15:20:47 +0100}, biburl = {https://dblp.org/rec/conf/cisc/LiTZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/ZhangDLZMLYZZ23, author = {Haibin Zhang and Sisi Duan and Chao Liu and Boxin Zhao and Xuanji Meng and Shengli Liu and Yong Yu and Fangguo Zhang and Liehuang Zhu}, title = {Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model}, booktitle = {53rd Annual {IEEE/IFIP} International Conference on Dependable Systems and Network, {DSN} 2023, Porto, Portugal, June 27-30, 2023}, pages = {568--581}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSN58367.2023.00059}, doi = {10.1109/DSN58367.2023.00059}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/ZhangDLZMLYZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AnTCZ23, author = {Zhiyuan An and Haibo Tian and Chao Chen and Fangguo Zhang}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14344}, pages = {24--44}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50594-2\_2}, doi = {10.1007/978-3-031-50594-2\_2}, timestamp = {Thu, 18 Jan 2024 08:27:15 +0100}, biburl = {https://dblp.org/rec/conf/esorics/AnTCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnTCZ23, author = {Zhiyuan An and Haibo Tian and Chao Chen and Fangguo Zhang}, title = {Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {705}, year = {2023}, url = {https://eprint.iacr.org/2023/705}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnTCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaiZZ23, author = {Yu Dai and Fangguo Zhang and Chang{-}An Zhao}, title = {Don't Forget Pairing-Friendly Curves with Odd Prime Embedding Degrees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1542}, year = {2023}, url = {https://eprint.iacr.org/2023/1542}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DaiZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/HuangZLT22, author = {Yan Huang and Fangguo Zhang and Zhijie Liu and Haibo Tian}, title = {Pseudorandom number generator based on supersingular elliptic curve isogenies}, journal = {Sci. China Inf. Sci.}, volume = {65}, number = {5}, pages = {1--3}, year = {2022}, url = {https://doi.org/10.1007/s11432-019-2669-6}, doi = {10.1007/S11432-019-2669-6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/HuangZLT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/PanZZCS22, author = {Jing Pan and Jiang Zhang and Fangguo Zhang and Xiaofeng Chen and Willy Susilo}, title = {Lattice-based group encryptions with only one trapdoor}, journal = {Sci. China Inf. Sci.}, volume = {65}, number = {5}, pages = {1--18}, year = {2022}, url = {https://doi.org/10.1007/s11432-020-3226-6}, doi = {10.1007/S11432-020-3226-6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/PanZZCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LiXWZ22, author = {Wanhua Li and Lingling Xu and Yamin Wen and Fangguo Zhang}, title = {Conjunctive multi-key searchable encryption with attribute-based access control for {EHR} systems}, journal = {Comput. Stand. Interfaces}, volume = {82}, pages = {103606}, year = {2022}, url = {https://doi.org/10.1016/j.csi.2021.103606}, doi = {10.1016/J.CSI.2021.103606}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/LiXWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/CaoWZXC22, author = {Yanmei Cao and Jianghong Wei and Fangguo Zhang and Yang Xiang and Xiaofeng Chen}, title = {Efficient public-key authenticated deniable encryption schemes}, journal = {Comput. Stand. Interfaces}, volume = {82}, pages = {103620}, year = {2022}, url = {https://doi.org/10.1016/j.csi.2022.103620}, doi = {10.1016/J.CSI.2022.103620}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/CaoWZXC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/DaiZZZ22, author = {Yu Dai and Zijian Zhou and Fangguo Zhang and Chang{-}An Zhao}, title = {Software Implementation of Optimal Pairings on Elliptic Curves with Odd Prime Embedding Degrees}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {105-A}, number = {5}, pages = {858--870}, year = {2022}, url = {https://doi.org/10.1587/transfun.2021eap1115}, doi = {10.1587/TRANSFUN.2021EAP1115}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieiceta/DaiZZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/LinZZ22, author = {Kaizhan Lin and Fangguo Zhang and Chang{-}An Zhao}, title = {Faster Key Generation of Supersingular Isogeny Diffie-Hellman}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {105-A}, number = {12}, pages = {1551--1558}, year = {2022}, url = {https://doi.org/10.1587/transfun.2022eap1026}, doi = {10.1587/TRANSFUN.2022EAP1026}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieiceta/LinZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/WangCLLSZ22, author = {Ping Wang and Weiqian Chen and Songlian Lin and Liyan Liu and Zhiwei Sun and Fangguo Zhang}, title = {Consensus algorithm based on verifiable quantum random numbers}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {10}, pages = {6857--6876}, year = {2022}, url = {https://doi.org/10.1002/int.22865}, doi = {10.1002/INT.22865}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/WangCLLSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ZhangXZ22, author = {Zheng Zhang and Shaohao Xie and Fangguo Zhang}, title = {Topology-hiding garbled circuits without universal circuits}, journal = {Int. J. Inf. Sec.}, volume = {21}, number = {2}, pages = {341--356}, year = {2022}, url = {https://doi.org/10.1007/s10207-021-00556-5}, doi = {10.1007/S10207-021-00556-5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/ZhangXZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/HuangJHZ22, author = {Yan Huang and Yan Jin and Zhi Hu and Fangguo Zhang}, title = {Optimizing the evaluation of \emph{{\(\mathscr{l}\)}}-isogenous curve for isogeny-based cryptography}, journal = {Inf. Process. Lett.}, volume = {178}, pages = {106301}, year = {2022}, url = {https://doi.org/10.1016/j.ipl.2022.106301}, doi = {10.1016/J.IPL.2022.106301}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/HuangJHZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/WanCZ22, author = {Yunqi Wan and Li Chen and Fangguo Zhang}, title = {Algebraic Soft Decoding of Elliptic Codes}, journal = {{IEEE} Trans. Commun.}, volume = {70}, number = {3}, pages = {1522--1534}, year = {2022}, url = {https://doi.org/10.1109/TCOMM.2022.3146278}, doi = {10.1109/TCOMM.2022.3146278}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/WanCZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/TianWZSL22, author = {Haibo Tian and Yanchuan Wen and Fangguo Zhang and Yunfeng Shao and Bingshuai Li}, editor = {Xiaofeng Chen and Jian Shen and Willy Susilo}, title = {A Distributed Threshold Additive Homomorphic Encryption for Federated Learning with Dropout Resiliency Based on Lattice}, booktitle = {Cyberspace Safety and Security - 14th International Symposium, {CSS} 2022, Xi'an, China, October 16-18, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13547}, pages = {277--292}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-18067-5\_20}, doi = {10.1007/978-3-031-18067-5\_20}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/css/TianWZSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/ZuoTAZ22, author = {Ruozhou Zuo and Haibo Tian and Zhiyuan An and Fangguo Zhang}, editor = {Xiaofeng Chen and Jian Shen and Willy Susilo}, title = {Post-quantum Privacy-Preserving Aggregation in Federated Learning Based on Lattice}, booktitle = {Cyberspace Safety and Security - 14th International Symposium, {CSS} 2022, Xi'an, China, October 16-18, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13547}, pages = {314--326}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-18067-5\_23}, doi = {10.1007/978-3-031-18067-5\_23}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/css/ZuoTAZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/WanCZ22, author = {Yunqi Wan and Li Chen and Fangguo Zhang}, title = {Algebraic Chase Decoding of Elliptic Codes Through Computing the Gr{\"{o}}bner Basis}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2022, Espoo, Finland, June 26 - July 1, 2022}, pages = {180--185}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISIT50566.2022.9834889}, doi = {10.1109/ISIT50566.2022.9834889}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/WanCZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ChenTZ22, author = {Jianzhang Chen and Haibo Tian and Fangguo Zhang}, editor = {Willy Susilo and Xiaofeng Chen and Fuchun Guo and Yudi Zhang and Rolly Intan}, title = {Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization}, booktitle = {Information Security - 25th International Conference, {ISC} 2022, Bali, Indonesia, December 18-22, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13640}, pages = {194--213}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22390-7\_13}, doi = {10.1007/978-3-031-22390-7\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/ChenTZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/AnPWZ22, author = {Zhiyuan An and Jing Pan and Yamin Wen and Fangguo Zhang}, editor = {Jung Hee Cheon and Thomas Johansson}, title = {Forward-Secure Revocable Secret Handshakes from Lattices}, booktitle = {Post-Quantum Cryptography - 13th International Workshop, PQCrypto 2022, Virtual Event, September 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13512}, pages = {453--479}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17234-2\_21}, doi = {10.1007/978-3-031-17234-2\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pqcrypto/AnPWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialsec/ZhangTZ22, author = {Zhuoran Zhang and Haibo Tian and Fangguo Zhang}, editor = {Xiaofeng Chen and Xinyi Huang and Miroslaw Kutylowski}, title = {Improved {WAVE} Signature and Apply to Post-quantum Blockchain}, booktitle = {Security and Privacy in Social Networks and Big Data - 8th International Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1663}, pages = {309--323}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-19-7242-3\_20}, doi = {10.1007/978-981-19-7242-3\_20}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialsec/ZhangTZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaiZZ22, author = {Yu Dai and Fangguo Zhang and Chang{-}An Zhao}, title = {Fast Hashing to G\({}_{\mbox{2}}\) in Direct Anonymous Attestation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {996}, year = {2022}, url = {https://eprint.iacr.org/2022/996}, timestamp = {Wed, 04 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaiZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangSZ22, author = {Ping Wang and Yiting Su and Fangguo Zhang}, title = {Secure Quantum Bit Commitment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1238}, year = {2022}, url = {https://eprint.iacr.org/2022/1238}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangDLZMLYZZ22, author = {Haibin Zhang and Sisi Duan and Chao Liu and Boxin Zhao and Xuanji Meng and Shengli Liu and Yong Yu and Fangguo Zhang and Liehuang Zhu}, title = {Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1678}, year = {2022}, url = {https://eprint.iacr.org/2022/1678}, timestamp = {Fri, 06 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangDLZMLYZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/ZhangZ21b, author = {Zheng Zhang and Fangguo Zhang}, title = {Functional encryption for cubic polynomials and implementation}, journal = {Theor. Comput. Sci.}, volume = {885}, pages = {41--54}, year = {2021}, url = {https://doi.org/10.1016/j.tcs.2021.06.020}, doi = {10.1016/J.TCS.2021.06.020}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/ZhangZ21b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuCZLWTX21, author = {Lingling Xu and Xiaofeng Chen and Fangguo Zhang and Wanhua Li and Hao{-}Tian Wu and Shaohua Tang and Yang Xiang}, title = {{ASBKS:} Towards Attribute Set Based Keyword Search Over Encrypted Personal Health Records}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {6}, pages = {2941--2952}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2020.2970928}, doi = {10.1109/TDSC.2020.2970928}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XuCZLWTX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/WanCZ21, author = {Yunqi Wan and Li Chen and Fangguo Zhang}, title = {Guruswami-Sudan Decoding of Elliptic Codes Through Module Basis Reduction}, journal = {{IEEE} Trans. Inf. Theory}, volume = {67}, number = {11}, pages = {7197--7209}, year = {2021}, url = {https://doi.org/10.1109/TIT.2021.3109447}, doi = {10.1109/TIT.2021.3109447}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/WanCZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/XieZC21, author = {Shaohao Xie and Fangguo Zhang and Rong Cheng}, title = {Security Enhanced {RFID} Authentication Protocols for Healthcare Environment}, journal = {Wirel. Pers. Commun.}, volume = {117}, number = {1}, pages = {71--86}, year = {2021}, url = {https://doi.org/10.1007/s11277-020-07042-6}, doi = {10.1007/S11277-020-07042-6}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wpc/XieZC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PanCZS21, author = {Jing Pan and Xiaofeng Chen and Fangguo Zhang and Willy Susilo}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Forward-Secure Group Encryptions from Lattices}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {610--629}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_31}, doi = {10.1007/978-3-030-90567-5\_31}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/PanCZS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PanCZS21, author = {Jing Pan and Xiaofeng Chen and Fangguo Zhang and Willy Susilo}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13093}, pages = {156--186}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92068-5\_6}, doi = {10.1007/978-3-030-92068-5\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/PanCZS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/NassurdineZZ21, author = {Mohamed Nassurdine and Huang Zhang and Fangguo Zhang}, editor = {Yu Yu and Moti Yung}, title = {Identity Based Linkable Ring Signature with Logarithmic Size}, booktitle = {Information Security and Cryptology - 17th International Conference, Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13007}, pages = {42--60}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88323-2\_3}, doi = {10.1007/978-3-030-88323-2\_3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/NassurdineZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/AnZWZ21, author = {Zhiyuan An and Zhuoran Zhang and Yamin Wen and Fangguo Zhang}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Lattice-Based Secret Handshakes with Reusable Credentials}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {231--248}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_14}, doi = {10.1007/978-3-030-88052-1\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/AnZWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/WanCZ21, author = {Yunqi Wan and Li Chen and Fangguo Zhang}, title = {Algebraic Soft Decoding of Elliptic Codes}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2021, Melbourne, Australia, July 12-20, 2021}, pages = {521--526}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISIT45174.2021.9518148}, doi = {10.1109/ISIT45174.2021.9518148}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/WanCZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcat/GuanWZZ21, author = {Peidong Guan and Yunqi Wan and Zhuoran Zhang and Fangguo Zhang}, editor = {Hong Shen and Yingpeng Sang and Yong Zhang and Nong Xiao and Hamid R. Arabnia and Geoffrey C. Fox and Ajay Gupta and Manu Malek}, title = {Efficient List Decoding Applied to {\textdollar}{\textbackslash}mathrm\{ECC\}{\^{}}2{\textdollar}}, booktitle = {Parallel and Distributed Computing, Applications and Technologies - 22nd International Conference, {PDCAT} 2021, Guangzhou, China, December 17-19, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13148}, pages = {560--567}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-96772-7\_52}, doi = {10.1007/978-3-030-96772-7\_52}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdcat/GuanWZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ZhangZZ21, author = {Zhuoran Zhang and Zheng Zhang and Fangguo Zhang}, editor = {Qiong Huang and Yu Yu}, title = {Inner-Product Functional Encryption from Random Linear Codes: Trial and Challenges}, booktitle = {Provable and Practical Security - 15th International Conference, ProvSec 2021, Guangzhou, China, November 5-8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13059}, pages = {259--276}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90402-9\_14}, doi = {10.1007/978-3-030-90402-9\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/ZhangZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-10753, author = {Haibo Tian and Fangguo Zhang and Yunfeng Shao and Bingshuai Li}, title = {Secure Linear Aggregation Using Decentralized Threshold Additive Homomorphic Encryption For Federated Learning}, journal = {CoRR}, volume = {abs/2111.10753}, year = {2021}, url = {https://arxiv.org/abs/2111.10753}, eprinttype = {arXiv}, eprint = {2111.10753}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-10753.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaiZZZ21, author = {Yu Dai and Zijian Zhou and Fangguo Zhang and Chang{-}An Zhao}, title = {Software Implementation of Optimal Pairings on Elliptic Curves with Odd Prime Embedding Degrees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1162}, year = {2021}, url = {https://eprint.iacr.org/2021/1162}, timestamp = {Wed, 04 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaiZZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinZZ21, author = {Kaizhan Lin and Fangguo Zhang and Chang{-}An Zhao}, title = {Faster Key Generation of Supersingular Isogeny Diffie-Hellman}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1320}, year = {2021}, url = {https://eprint.iacr.org/2021/1320}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZ21, author = {Chao Chen and Fangguo Zhang}, title = {Richelot Isogenies, Pairings on Squared Kummer Surfaces and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1617}, year = {2021}, url = {https://eprint.iacr.org/2021/1617}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChenZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WenZWMG20, author = {Yamin Wen and Fangguo Zhang and Huaxiong Wang and Yinbin Miao and Zheng Gong}, title = {Intersection-policy private mutual authentication from authorized private set intersection}, journal = {Sci. China Inf. Sci.}, volume = {63}, number = {2}, pages = {122101}, year = {2020}, url = {https://doi.org/10.1007/s11432-019-9907-x}, doi = {10.1007/S11432-019-9907-X}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/WenZWMG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ChenZZZ20, author = {Zehong Chen and Fangguo Zhang and Peng Zhang and Hanbang Zhao}, title = {Multi-user Boolean searchable encryption supporting fast ranking in mobile clouds}, journal = {Comput. Commun.}, volume = {164}, pages = {100--113}, year = {2020}, url = {https://doi.org/10.1016/j.comcom.2020.09.009}, doi = {10.1016/J.COMCOM.2020.09.009}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ChenZZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ZhangZWD20, author = {Huang Zhang and Fangguo Zhang and Baodian Wei and Yusong Du}, title = {Implementing confidential transactions with lattice techniques}, journal = {{IET} Inf. Secur.}, volume = {14}, number = {1}, pages = {30--38}, year = {2020}, url = {https://doi.org/10.1049/iet-ifs.2018.5491}, doi = {10.1049/IET-IFS.2018.5491}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/ZhangZWD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WenZWGMD20, author = {Yamin Wen and Fangguo Zhang and Huaxiong Wang and Zheng Gong and Yinbin Miao and Yuqiao Deng}, title = {A new secret handshake scheme with multi-symptom intersection for mobile healthcare social networks}, journal = {Inf. Sci.}, volume = {520}, pages = {142--154}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2020.02.007}, doi = {10.1016/J.INS.2020.02.007}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WenZWGMD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhangZG20, author = {Fangguo Zhang and Zhuoran Zhang and Peidong Guan}, title = {ECC\({}^{\mbox{2}}\): Error correcting code and elliptic curve based cryptosystem}, journal = {Inf. Sci.}, volume = {526}, pages = {301--320}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2020.03.069}, doi = {10.1016/J.INS.2020.03.069}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ZhangZG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/HuangSZDC20, author = {Yan Huang and Zhaofeng Su and Fangguo Zhang and Yong Ding and Rong Cheng}, title = {Quantum algorithm for solving hyperelliptic curve discrete logarithm problem}, journal = {Quantum Inf. Process.}, volume = {19}, number = {2}, pages = {62}, year = {2020}, url = {https://doi.org/10.1007/s11128-019-2562-5}, doi = {10.1007/S11128-019-2562-5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/qip/HuangSZDC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/0010YDG00Z020, author = {Fan Zhang and Bolin Yang and Xiaofei Dong and Sylvain Guilley and Zhe Liu and Wei He and Fangguo Zhang and Kui Ren}, title = {Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant {SIKE}}, journal = {{IEEE} Trans. Computers}, volume = {69}, number = {11}, pages = {1681--1693}, year = {2020}, url = {https://doi.org/10.1109/TC.2020.3020407}, doi = {10.1109/TC.2020.3020407}, timestamp = {Tue, 20 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/0010YDG00Z020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuLZCT20, author = {Lingling Xu and Wanhua Li and Fangguo Zhang and Rong Cheng and Shaohua Tang}, title = {Authorized Keyword Searches on Public Key Encrypted Data With Time Controlled Keyword Privacy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2096--2109}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2957691}, doi = {10.1109/TIFS.2019.2957691}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XuLZCT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/ShiWZLHF20, author = {Yang Shi and Wujing Wei and Fangguo Zhang and Xiapu Luo and Zongjian He and Hongfei Fan}, title = {{SDSRS:} {A} Novel White-Box Cryptography Scheme for Securing Embedded Devices in IIoT}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {16}, number = {3}, pages = {1602--1616}, year = {2020}, url = {https://doi.org/10.1109/TII.2019.2929431}, doi = {10.1109/TII.2019.2929431}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/ShiWZLHF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HuangZHL20, author = {Yan Huang and Fangguo Zhang and Zhi Hu and Zhijie Liu}, editor = {Joseph K. Liu and Hui Cui}, title = {Optimized Arithmetic Operations for Isogeny-Based Cryptography on Huff Curves}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {23--40}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_2}, doi = {10.1007/978-3-030-55304-3\_2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/HuangZHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/0001HZHL20, author = {Yudi Zhang and Debiao He and Fangguo Zhang and Xinyi Huang and Dawei Li}, editor = {Yongdong Wu and Moti Yung}, title = {An Efficient Blind Signature Scheme Based on {SM2} Signature Algorithm}, booktitle = {Information Security and Cryptology - 16th International Conference, Inscrypt 2020, Guangzhou, China, December 11-14, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12612}, pages = {368--384}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-71852-7\_25}, doi = {10.1007/978-3-030-71852-7\_25}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/0001HZHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ZhangZT20, author = {Zhuoran Zhang and Fangguo Zhang and Haibo Tian}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {{CSH:} {A} Post-quantum Secret Handshake Scheme from Coding Theory}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12309}, pages = {317--335}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59013-0\_16}, doi = {10.1007/978-3-030-59013-0\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ZhangZT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/TianLZ20, author = {Haibo Tian and Huizhi Lin and Fangguo Zhang}, editor = {Guangquan Xu and Kaitai Liang and Chunhua Su}, title = {Design a Proof of Stake Based Directed Acyclic Graph Chain}, booktitle = {Frontiers in Cyber Security - Third International Conference, {FCS} 2020, Tianjin, China, November 15-17, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1286}, pages = {150--165}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-9739-8\_13}, doi = {10.1007/978-981-15-9739-8\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/TianLZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/CaoZGC20, author = {Yanmei Cao and Fangguo Zhang and Chongzhi Gao and Xiaofeng Chen}, editor = {Weizhi Meng and Dieter Gollmann and Christian Damsgaard Jensen and Jianying Zhou}, title = {New Practical Public-Key Deniable Encryption}, booktitle = {Information and Communications Security - 22nd International Conference, {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12282}, pages = {147--163}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61078-4\_9}, doi = {10.1007/978-3-030-61078-4\_9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/CaoZGC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/WanCZ20, author = {Yunqi Wan and Li Chen and Fangguo Zhang}, title = {Algebraic List Decoding of Elliptic Codes Through Module Basis Reduction}, booktitle = {International Symposium on Information Theory and Its Applications, {ISITA} 2020, Kapolei, HI, USA, October 24-27, 2020}, pages = {185--189}, publisher = {{IEEE}}, year = {2020}, url = {https://ieeexplore.ieee.org/document/9366164}, timestamp = {Fri, 22 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isita/WanCZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HuangZLZ19, author = {Yan Huang and Fangguo Zhang and Zhijie Liu and Huang Zhang}, title = {An Efficient Signature Scheme From Supersingular Elliptic Curve Isogenies}, journal = {{IEEE} Access}, volume = {7}, pages = {129834--129847}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2938682}, doi = {10.1109/ACCESS.2019.2938682}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HuangZLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/LiTZH19, author = {Huige Li and Haibo Tian and Fangguo Zhang and Jiejie He}, title = {Blockchain-based searchable symmetric encryption scheme}, journal = {Comput. Electr. Eng.}, volume = {73}, pages = {32--45}, year = {2019}, url = {https://doi.org/10.1016/j.compeleceng.2018.10.015}, doi = {10.1016/J.COMPELECENG.2018.10.015}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/LiTZH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiZLTH19, author = {Huige Li and Fangguo Zhang and Peiran Luo and Haibo Tian and Jiejie He}, title = {How to retrieve the encrypted data on the blockchain}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {13}, number = {11}, pages = {5560--5579}, year = {2019}, url = {https://doi.org/10.3837/tiis.2019.11.016}, doi = {10.3837/TIIS.2019.11.016}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiZLTH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/ZhangZCT19, author = {Huang Zhang and Fangguo Zhang and Rong Cheng and Haibo Tian}, title = {Efficient obfuscation for {CNF} circuits and applications in cloud computing}, journal = {Soft Comput.}, volume = {23}, number = {6}, pages = {2061--2072}, year = {2019}, url = {https://doi.org/10.1007/s00500-017-2921-z}, doi = {10.1007/S00500-017-2921-Z}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/ZhangZCT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/WangZZ19, author = {Bingsen Wang and Zhuoran Zhang and Fangguo Zhang}, title = {Subliminal Channels in the Code-based Ring Signature Scheme}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {146--150}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.00011}, doi = {10.1109/ASIAJCIS.2019.00011}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/WangZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangLWT19, author = {Fangguo Zhang and Zhijie Liu and Ping Wang and Haibo Tian}, editor = {Zhe Liu and Moti Yung}, title = {Improving {ECDLP} Computation in Characteristic 2}, booktitle = {Information Security and Cryptology - 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12020}, pages = {535--550}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42921-8\_32}, doi = {10.1007/978-3-030-42921-8\_32}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/ZhangLWT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/ZhangZ19, author = {Fangguo Zhang and Zhuoran Zhang}, editor = {Jaideep Vaidya and Xiao Zhang and Jin Li}, title = {ECC\({}^{\mbox{2}}\): Error Correcting Code and Elliptic Curve Based Cryptosystem}, booktitle = {Cyberspace Safety and Security - 11th International Symposium, {CSS} 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11982}, pages = {214--229}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37337-5\_17}, doi = {10.1007/978-3-030-37337-5\_17}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/css/ZhangZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/WanCZ19, author = {Yunqi Wan and Li Chen and Fangguo Zhang}, title = {Design of Guruswami-Sudan List Decoding for Elliptic Codes}, booktitle = {2019 {IEEE} Information Theory Workshop, {ITW} 2019, Visby, Sweden, August 25-28, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ITW44776.2019.8989286}, doi = {10.1109/ITW44776.2019.8989286}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itw/WanCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ZhangL19, author = {Fangguo Zhang and Shengli Liu}, editor = {Ron Steinfeld and Tsz Hon Yuen}, title = {Solving {ECDLP} via List Decoding}, booktitle = {Provable Security - 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1-4, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11821}, pages = {222--244}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31919-9\_13}, doi = {10.1007/978-3-030-31919-9\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/ZhangL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ChenZZLHZS18, author = {Zehong Chen and Fangguo Zhang and Peng Zhang and Joseph K. Liu and Jiwu Huang and Hanbang Zhao and Jian Shen}, title = {Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control}, journal = {Future Gener. Comput. Syst.}, volume = {87}, pages = {712--724}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.10.022}, doi = {10.1016/J.FUTURE.2017.10.022}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/ChenZZLHZS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/DaiJZ18, author = {Shuguang Dai and Zhengjun Jiang and Fangguo Zhang}, title = {Efficient leakage-resilient blind and partially blind signatures}, journal = {Int. J. Embed. Syst.}, volume = {10}, number = {1}, pages = {52--61}, year = {2018}, url = {https://doi.org/10.1504/IJES.2018.10010501}, doi = {10.1504/IJES.2018.10010501}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/DaiJZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/MaZCS18, author = {Xu Ma and Fangguo Zhang and Xiaofeng Chen and Jian Shen}, title = {Privacy preserving multi-party computation delegation for deep learning in cloud computing}, journal = {Inf. Sci.}, volume = {459}, pages = {103--116}, year = {2018}, url = {https://doi.org/10.1016/j.ins.2018.05.005}, doi = {10.1016/J.INS.2018.05.005}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/MaZCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Tian0DZZ18, author = {Haibo Tian and Xiaofeng Chen and Yong Ding and Xiaoyan Zhu and Fangguo Zhang}, editor = {Fuchun Guo and Xinyi Huang and Moti Yung}, title = {AFCoin: {A} Framework for Digital Fiat Currency of Central Banks Based on Account Model}, booktitle = {Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11449}, pages = {70--85}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-14234-6\_4}, doi = {10.1007/978-3-030-14234-6\_4}, timestamp = {Tue, 12 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/Tian0DZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ZhangZTA18, author = {Huang Zhang and Fangguo Zhang and Haibo Tian and Man Ho Au}, editor = {Sarah Meiklejohn and Kazue Sako}, title = {Anonymous Post-Quantum Cryptocash}, booktitle = {Financial Cryptography and Data Security - 22nd International Conference, {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10957}, pages = {461--479}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-662-58387-6\_25}, doi = {10.1007/978-3-662-58387-6\_25}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/ZhangZTA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangL18, author = {Fangguo Zhang and Shengli Liu}, title = {Solving {ECDLP} via List Decoding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {795}, year = {2018}, url = {https://eprint.iacr.org/2018/795}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/GalbraithWZ17, author = {Steven D. Galbraith and Ping Wang and Fangguo Zhang}, title = {Computing elliptic curve discrete logarithms with improved baby-step giant-step algorithm}, journal = {Adv. Math. Commun.}, volume = {11}, number = {3}, pages = {453--469}, year = {2017}, url = {https://doi.org/10.3934/amc.2017038}, doi = {10.3934/AMC.2017038}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amco/GalbraithWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhpcn/TangZ17, author = {Jiayong Tang and Fangguo Zhang}, title = {A new code-based encryption scheme and its applications}, journal = {Int. J. High Perform. Comput. Netw.}, volume = {10}, number = {6}, pages = {515--523}, year = {2017}, url = {https://doi.org/10.1504/IJHPCN.2017.10008236}, doi = {10.1504/IJHPCN.2017.10008236}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhpcn/TangZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiZF17, author = {Huige Li and Fangguo Zhang and Chun{-}I Fan}, title = {Deniable Searchable Symmetric Encryption}, journal = {Inf. Sci.}, volume = {402}, pages = {233--243}, year = {2017}, url = {https://doi.org/10.1016/j.ins.2017.03.032}, doi = {10.1016/J.INS.2017.03.032}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/LiZF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/Chen0ZH17, author = {Zehong Chen and Peng Zhang and Fangguo Zhang and Jiwu Huang}, title = {Ciphertext policy attribute-based encryption supporting unbounded attribute space from {R-LWE}}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {11}, number = {4}, pages = {2292--2309}, year = {2017}, url = {https://doi.org/10.3837/tiis.2017.04.025}, doi = {10.3837/TIIS.2017.04.025}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/Chen0ZH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangZZ17, author = {Zheng Zhang and Fangguo Zhang and Huang Zhang}, editor = {Xiaofeng Chen and Dongdai Lin and Moti Yung}, title = {Implementing Indistinguishability Obfuscation Using {GGH15}}, booktitle = {Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10726}, pages = {27--43}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-75160-3\_4}, doi = {10.1007/978-3-319-75160-3\_4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/ZhangZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/Zhang17, author = {Fangguo Zhang}, editor = {Tatsuaki Okamoto and Yong Yu and Man Ho Au and Yannan Li}, title = {Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem}, booktitle = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10592}, pages = {219--235}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68637-0\_13}, doi = {10.1007/978-3-319-68637-0\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/Zhang17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1711-01030, author = {Huige Li and Fangguo Zhang and Jiejie He and Haibo Tian}, title = {A Searchable Symmetric Encryption Scheme using BlockChain}, journal = {CoRR}, volume = {abs/1711.01030}, year = {2017}, url = {http://arxiv.org/abs/1711.01030}, eprinttype = {arXiv}, eprint = {1711.01030}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1711-01030.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiTZ17, author = {Huige Li and Haibo Tian and Fangguo Zhang}, title = {Block Chain based Searchable Symmetric Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {447}, year = {2017}, url = {http://eprint.iacr.org/2017/447}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiTZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangZTA17, author = {Huang Zhang and Fangguo Zhang and Haibo Tian and Man Ho Au}, title = {Anonymous Post-Quantum Cryptocash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {716}, year = {2017}, url = {http://eprint.iacr.org/2017/716}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangZTA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/DaiLZ16, author = {Shuguang Dai and Huige Li and Fangguo Zhang}, title = {Memory leakage-resilient searchable symmetric encryption}, journal = {Future Gener. Comput. Syst.}, volume = {62}, pages = {76--84}, year = {2016}, url = {https://doi.org/10.1016/j.future.2015.11.003}, doi = {10.1016/J.FUTURE.2015.11.003}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/DaiLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/XuZSW16, author = {Lingling Xu and Fangguo Zhang and Willy Susilo and Yamin Wen}, title = {Solutions to the anti-piracy problem in oblivious transfer}, journal = {J. Comput. Syst. Sci.}, volume = {82}, number = {3}, pages = {466--476}, year = {2016}, url = {https://doi.org/10.1016/j.jcss.2015.11.003}, doi = {10.1016/J.JCSS.2015.11.003}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/XuZSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TianZW16, author = {Haibo Tian and Fangguo Zhang and Baodian Wei}, title = {A lattice-based partially blind signature}, journal = {Secur. Commun. Networks}, volume = {9}, number = {12}, pages = {1820--1828}, year = {2016}, url = {https://doi.org/10.1002/sec.1439}, doi = {10.1002/SEC.1439}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/TianZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HanLZC16, author = {Shuai Han and Shengli Liu and Fangguo Zhang and Kefei Chen}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {Homomorphic Linear Authentication Schemes from ({\(\epsilon\)})-Authentication Codes}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {487--498}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897859}, doi = {10.1145/2897845.2897859}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HanLZC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/DaiWH15, author = {Shuguang Dai and Jinfeng Wei and Fangguo Zhang}, title = {Memory leakage-resilient secret sharing schemes}, journal = {Sci. China Inf. Sci.}, volume = {58}, number = {11}, pages = {1--9}, year = {2015}, url = {https://doi.org/10.1007/s11432-015-5385-8}, doi = {10.1007/S11432-015-5385-8}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/DaiWH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/ChengZ15, author = {Rong Cheng and Fangguo Zhang}, title = {Obfuscation for multi-use re-encryption and its application in cloud computing}, journal = {Concurr. Comput. Pract. Exp.}, volume = {27}, number = {8}, pages = {2170--2190}, year = {2015}, url = {https://doi.org/10.1002/cpe.3399}, doi = {10.1002/CPE.3399}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/ChengZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Ma0Z15, author = {Xu Ma and Jin Li and Fangguo Zhang}, title = {Refereed Computation Delegation of Private Sequence Comparison in Cloud Computing}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {6}, pages = {743--753}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p743-753.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Ma0Z15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChengZ15, author = {Rong Cheng and Fangguo Zhang}, title = {Lattice-based obfuscation for re-encryption functions}, journal = {Secur. Commun. Networks}, volume = {8}, number = {9}, pages = {1648--1658}, year = {2015}, url = {https://doi.org/10.1002/sec.1112}, doi = {10.1002/SEC.1112}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ChengZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/DiaoZC15, author = {Feng Diao and Fangguo Zhang and Xiangguo Cheng}, title = {A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential}, journal = {{IEEE} Trans. Smart Grid}, volume = {6}, number = {1}, pages = {461--467}, year = {2015}, url = {https://doi.org/10.1109/TSG.2014.2358225}, doi = {10.1109/TSG.2014.2358225}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsg/DiaoZC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TianZR15, author = {Haibo Tian and Fangguo Zhang and Kui Ren}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {Secure Bilinear Pairing Outsourcing Made More Efficient and Flexible}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {417--426}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714615}, doi = {10.1145/2714576.2714615}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TianZR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChengYGZR15, author = {Rong Cheng and Jingbo Yan and Chaowen Guan and Fangguo Zhang and Kui Ren}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {Verifiable Searchable Symmetric Encryption from Indistinguishability Obfuscation}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {621--626}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714623}, doi = {10.1145/2714576.2714623}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChengYGZR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GuanRZKY15, author = {Chaowen Guan and Kui Ren and Fangguo Zhang and Florian Kerschbaum and Jia Yu}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Symmetric-Key Based Proofs of Retrievability Supporting Public Verification}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9326}, pages = {203--223}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24174-6\_11}, doi = {10.1007/978-3-319-24174-6\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/GuanRZKY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuWZZ15, author = {Yusong Du and Baodian Wei and Fangguo Zhang and Huang Zhang}, title = {On the (Fast) Algebraic Immunity of Boolean Power Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {435}, year = {2015}, url = {http://eprint.iacr.org/2015/435}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuWZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuWZZ15a, author = {Yusong Du and Baodian Wei and Fangguo Zhang and Huang Zhang}, title = {On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {436}, year = {2015}, url = {http://eprint.iacr.org/2015/436}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuWZZ15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithWZ15, author = {Steven D. Galbraith and Ping Wang and Fangguo Zhang}, title = {Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {605}, year = {2015}, url = {http://eprint.iacr.org/2015/605}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhang15a, author = {Fangguo Zhang}, title = {Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {614}, year = {2015}, url = {http://eprint.iacr.org/2015/614}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhang15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangZWD15, author = {Huang Zhang and Fangguo Zhang and Baodian Wei and Yusong Du}, title = {Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {747}, year = {2015}, url = {http://eprint.iacr.org/2015/747}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangZWD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/ZhangCZ14, author = {Bo Zhang and Rong Cheng and Fangguo Zhang}, title = {Secure Hamming distance based record linkage with malicious adversaries}, journal = {Comput. Electr. Eng.}, volume = {40}, number = {6}, pages = {1906--1916}, year = {2014}, url = {https://doi.org/10.1016/j.compeleceng.2013.07.008}, doi = {10.1016/J.COMPELECENG.2013.07.008}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/ZhangCZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhangZ14, author = {Bo Zhang and Fangguo Zhang}, title = {Secure linear system computation in the presence of malicious adversaries}, journal = {Sci. China Inf. Sci.}, volume = {57}, number = {9}, pages = {1--10}, year = {2014}, url = {https://doi.org/10.1007/s11432-014-5160-2}, doi = {10.1007/S11432-014-5160-2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ZhangZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/ZhangZ14, author = {Bo Zhang and Fangguo Zhang}, title = {Secure similarity coefficients computation for binary data and its extensions}, journal = {Concurr. Comput. Pract. Exp.}, volume = {26}, number = {5}, pages = {1023--1037}, year = {2014}, url = {https://doi.org/10.1002/cpe.3059}, doi = {10.1002/CPE.3059}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/ZhangZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/LiuZC14, author = {Shengli Liu and Fangguo Zhang and Kefei Chen}, title = {Public-key encryption scheme with selective opening chosen-ciphertext security based on the Decisional Diffie-Hellman assumption}, journal = {Concurr. Comput. Pract. Exp.}, volume = {26}, number = {8}, pages = {1506--1519}, year = {2014}, url = {https://doi.org/10.1002/cpe.3021}, doi = {10.1002/CPE.3021}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/LiuZC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/0001ZSTLK14, author = {Xiaofeng Chen and Fangguo Zhang and Willy Susilo and Haibo Tian and Jin Li and Kwangjo Kim}, title = {Identity-based chameleon hashing and signatures without key exposure}, journal = {Inf. Sci.}, volume = {265}, pages = {198--210}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2013.12.020}, doi = {10.1016/J.INS.2013.12.020}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/0001ZSTLK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhangML14a, author = {Fangguo Zhang and Xu Ma and Shengli Liu}, title = {Efficient computation outsourcing for inverting a class of homomorphic functions}, journal = {Inf. Sci.}, volume = {286}, pages = {19--28}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.07.017}, doi = {10.1016/J.INS.2014.07.017}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ZhangML14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XuZT14, author = {Lingling Xu and Fangguo Zhang and Shaohua Tang}, title = {Timed-release oblivious transfer}, journal = {Secur. Commun. Networks}, volume = {7}, number = {7}, pages = {1138--1149}, year = {2014}, url = {https://doi.org/10.1002/sec.845}, doi = {10.1002/SEC.845}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/XuZT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/ShaoCZ14, author = {Fei Shao and Rong Cheng and Fangguo Zhang}, editor = {Linawati and Made Sudiana Mahendra and Erich J. Neuhold and A Min Tjoa and Ilsun You}, title = {A Full Privacy-Preserving Scheme for Location-Based Services}, booktitle = {Information and Communication Technology - Second {IFIP} {TC5/8} International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8407}, pages = {596--601}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55032-4\_61}, doi = {10.1007/978-3-642-55032-4\_61}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ict-eurasia/ShaoCZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WeiDZZTG14, author = {Baodian Wei and Yusong Du and Huang Zhang and Fangguo Zhang and Haibo Tian and Chong{-}zhi Gao}, editor = {Man Ho Au and Barbara Carminati and C.{-}C. Jay Kuo}, title = {Identity Based Threshold Ring Signature from Lattices}, booktitle = {Network and System Security - 8th International Conference, {NSS} 2014, Xi'an, China, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8792}, pages = {233--245}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11698-3\_18}, doi = {10.1007/978-3-319-11698-3\_18}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/WeiDZZTG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pairing/2013, editor = {Zhenfu Cao and Fangguo Zhang}, title = {Pairing-Based Cryptography - Pairing 2013 - 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8365}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04873-4}, doi = {10.1007/978-3-319-04873-4}, isbn = {978-3-319-04872-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/TianZ0W13, author = {Haibo Tian and Fangguo Zhang and Xiaofeng Chen and Baodian Wei}, title = {Selectively unforgeable but existentially forgeable signature schemes and applications}, journal = {Sci. China Inf. Sci.}, volume = {56}, number = {1}, pages = {1--14}, year = {2013}, url = {https://doi.org/10.1007/s11432-012-4718-0}, doi = {10.1007/S11432-012-4718-0}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/TianZ0W13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/MaLZ13, author = {Xu Ma and Jin Li and Fangguo Zhang}, title = {Outsourcing computation of modular exponentiations in cloud computing}, journal = {Clust. Comput.}, volume = {16}, number = {4}, pages = {787--796}, year = {2013}, url = {https://doi.org/10.1007/s10586-013-0252-0}, doi = {10.1007/S10586-013-0252-0}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cluster/MaLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangW13, author = {Fangguo Zhang and Ping Wang}, title = {Speeding up elliptic curve discrete logarithm computations with point halving}, journal = {Des. Codes Cryptogr.}, volume = {67}, number = {2}, pages = {197--208}, year = {2013}, url = {https://doi.org/10.1007/s10623-011-9599-5}, doi = {10.1007/S10623-011-9599-5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ZhangW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/YangCLXZ13, author = {Jinfeng Yang and Rong Cheng and Wenming Liu and Yong Xiao and Fangguo Zhang}, title = {Cryptoanalysis and improvement of smart prepayment meter protocol in standard {Q/GDW} 365}, journal = {Int. J. Grid Util. Comput.}, volume = {4}, number = {1}, pages = {40--46}, year = {2013}, url = {https://doi.org/10.1504/IJGUC.2013.054489}, doi = {10.1504/IJGUC.2013.054489}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijguc/YangCLXZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/Tian0ZWJL13, author = {Haibo Tian and Xiaofeng Chen and Fangguo Zhang and Baodian Wei and Zhengtao Jiang and Yi Liu}, title = {A non-delegatable strong designated verifier signature in ID-based setting for mobile environment}, journal = {Math. Comput. Model.}, volume = {58}, number = {5-6}, pages = {1289--1300}, year = {2013}, url = {https://doi.org/10.1016/j.mcm.2013.01.010}, doi = {10.1016/J.MCM.2013.01.010}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mcm/Tian0ZWJL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiuSWZZ13, author = {Shengli Liu and Kouichi Sakurai and Jian Weng and Fangguo Zhang and Yunlei Zhao}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Security Model and Analysis of FHMQV, Revisited}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {255--269}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_16}, doi = {10.1007/978-3-319-12087-4\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/LiuSWZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eidwt/WangZ13, author = {Ping Wang and Fangguo Zhang}, title = {Improving the Parallelized Pollard Rho Method for Computing Elliptic Curve Discrete Logarithms}, booktitle = {2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013}, pages = {285--291}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/EIDWT.2013.55}, doi = {10.1109/EIDWT.2013.55}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eidwt/WangZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eidwt/MaZL13, author = {Xu Ma and Fangguo Zhang and Jin Li}, title = {Verifiable Evaluation of Private Polynomials}, booktitle = {2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013}, pages = {451--458}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/EIDWT.2013.82}, doi = {10.1109/EIDWT.2013.82}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eidwt/MaZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/ChengZ13, author = {Rong Cheng and Fangguo Zhang}, title = {Secure Obfuscation of Conditional Re-encryption with Keyword Search}, booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013}, pages = {30--37}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INCoS.2013.15}, doi = {10.1109/INCOS.2013.15}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/ChengZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/ChengDZ13, author = {Rong Cheng and Feng Diao and Fangguo Zhang}, title = {On Obfuscating Set-Membership Predicate Functions}, booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013}, pages = {304--308}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INCoS.2013.54}, doi = {10.1109/INCOS.2013.54}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/ChengDZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangML13, author = {Fangguo Zhang and Xu Ma and Shengli Liu}, title = {Efficient Computation Outsourcing for Inverting a Class of Homomorphic Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {44}, year = {2013}, url = {http://eprint.iacr.org/2013/044}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangML13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/WenZX12, author = {Yamin Wen and Fangguo Zhang and Lingling Xu}, title = {Secret handshakes from ID-based message recovery signatures: {A} new generic approach}, journal = {Comput. Electr. Eng.}, volume = {38}, number = {1}, pages = {96--104}, year = {2012}, url = {https://doi.org/10.1016/j.compeleceng.2011.11.020}, doi = {10.1016/J.COMPELECENG.2011.11.020}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/WenZX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhaoZ12, author = {Xingwen Zhao and Fangguo Zhang}, title = {Tracing and revoking scheme for dynamic privileges against pirate rebroadcast}, journal = {Comput. Secur.}, volume = {31}, number = {1}, pages = {59--69}, year = {2012}, url = {https://doi.org/10.1016/j.cose.2011.11.002}, doi = {10.1016/J.COSE.2011.11.002}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhaoZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LinZ12, author = {Qiping Lin and Fangguo Zhang}, title = {Scalar Multiplication on Kummer Surface Revisited}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {410--413}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.410}, doi = {10.1587/TRANSFUN.E95.A.410}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/LinZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/DuZ12, author = {Yusong Du and Fangguo Zhang}, title = {A Class of 1-Resilient Functions in Odd Variables with High Nonlinearity and Suboptimal Algebraic Immunity}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {417--420}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.417}, doi = {10.1587/TRANSFUN.E95.A.417}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/DuZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaSI/ZhaoZ12, author = {Xingwen Zhao and Fangguo Zhang}, title = {Times Limited Accountable Anonymous Online Submission Control System from Single-Verifier \emph{k}-times Group Signature}, journal = {Informatica (Slovenia)}, volume = {36}, number = {1}, pages = {75--82}, year = {2012}, url = {http://www.informatica.si/index.php/informatica/article/view/386}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/informaticaSI/ZhaoZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/LinZ12, author = {Qiping Lin and Fangguo Zhang}, title = {Efficient precomputation schemes of kP+IQ}, journal = {Inf. Process. Lett.}, volume = {112}, number = {11}, pages = {462--466}, year = {2012}, url = {https://doi.org/10.1016/j.ipl.2012.03.010}, doi = {10.1016/J.IPL.2012.03.010}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/LinZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangZ12, author = {Ping Wang and Fangguo Zhang}, title = {Computing elliptic curve discrete logarithms with the negation map}, journal = {Inf. Sci.}, volume = {195}, pages = {277--286}, year = {2012}, url = {https://doi.org/10.1016/j.ins.2012.01.044}, doi = {10.1016/J.INS.2012.01.044}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/WangZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiZCKW12, author = {Jin Li and Fangguo Zhang and Xiaofeng Chen and Kwangjo Kim and Duncan S. Wong}, title = {Generic security-amplifying methods of ordinary digital signatures}, journal = {Inf. Sci.}, volume = {201}, pages = {128--139}, year = {2012}, url = {https://doi.org/10.1016/j.ins.2012.03.006}, doi = {10.1016/J.INS.2012.03.006}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/LiZCKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jam/WangZ12, author = {Ping Wang and Fangguo Zhang}, title = {An Efficient Collision Detection Method for Computing Discrete Logarithms with Pollard's Rho}, journal = {J. Appl. Math.}, volume = {2012}, pages = {635909:1--635909:15}, year = {2012}, url = {https://doi.org/10.1155/2012/635909}, doi = {10.1155/2012/635909}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jam/WangZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcam/WangZ12, author = {Ping Wang and Fangguo Zhang}, title = {Improved Pollard rho method for computing discrete logarithms over finite extension fields}, journal = {J. Comput. Appl. Math.}, volume = {236}, number = {17}, pages = {4336--4343}, year = {2012}, url = {https://doi.org/10.1016/j.cam.2012.03.019}, doi = {10.1016/J.CAM.2012.03.019}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcam/WangZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/LinZ12, author = {Qiping Lin and Fangguo Zhang}, title = {ECC-Based Grouping-Proof {RFID} for Inpatient Medication Safety}, journal = {J. Medical Syst.}, volume = {36}, number = {6}, pages = {3527--3531}, year = {2012}, url = {https://doi.org/10.1007/s10916-011-9757-3}, doi = {10.1007/S10916-011-9757-3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jms/LinZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/ZhaoZ12, author = {Xingwen Zhao and Fangguo Zhang}, title = {Fully {CCA2} secure identity-based broadcast encryption with black-box accountable authority}, journal = {J. Syst. Softw.}, volume = {85}, number = {3}, pages = {708--716}, year = {2012}, url = {https://doi.org/10.1016/j.jss.2011.09.045}, doi = {10.1016/J.JSS.2011.09.045}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/ZhaoZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/ZhaoZX12, author = {Changan Zhao and Fangguo Zhang and Dongqing Xie}, title = {Faster Computation of Self-Pairings}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {5}, pages = {3266--3272}, year = {2012}, url = {https://doi.org/10.1109/TIT.2012.2184850}, doi = {10.1109/TIT.2012.2184850}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/ZhaoZX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ZhangLL12, author = {Fangguo Zhang and Qiping Lin and Shengli Liu}, editor = {Feng Bao and Pierangela Samarati and Jianying Zhou}, title = {Zero-Value Point Attacks on Kummer-Based Cryptosystem}, booktitle = {Applied Cryptography and Network Security - 10th International Conference, {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7341}, pages = {293--310}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31284-7\_18}, doi = {10.1007/978-3-642-31284-7\_18}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/ZhangLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/TianCZWJL12, author = {Haibo Tian and Xiaofeng Chen and Fangguo Zhang and Baodian Wei and Zhengtao Jiang and Yi Liu}, editor = {Ilsun You and Leonard Barolli and Antonio Gentile and Hae{-}Duck Joshua Jeong and Marek R. Ogiela and Fatos Xhafa}, title = {An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability}, booktitle = {Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2012, Palermo, Italy, July 4-6, 2012}, pages = {81--88}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/IMIS.2012.34}, doi = {10.1109/IMIS.2012.34}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imis/TianCZWJL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/ZhangZ12, author = {Bo Zhang and Fangguo Zhang}, editor = {Fatos Xhafa and Leonard Barolli and Florin Pop and Xiaofeng Chen and Valentin Cristea}, title = {Secure Similarity Coefficients Computation with Malicious Adversaries}, booktitle = {2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21, 2012}, pages = {303--310}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/iNCoS.2012.36}, doi = {10.1109/INCOS.2012.36}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/ZhangZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/MaLZ12, author = {Xu Ma and Jin Li and Fangguo Zhang}, editor = {Fatos Xhafa and Leonard Barolli and Florin Pop and Xiaofeng Chen and Valentin Cristea}, title = {Efficient and Secure Batch Exponentiations Outsourcing in Cloud Computing}, booktitle = {2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21, 2012}, pages = {600--605}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/iNCoS.2012.31}, doi = {10.1109/INCOS.2012.31}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/MaLZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/LiuZC12, author = {Shengli Liu and Fangguo Zhang and Kefei Chen}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {Selective Opening Chosen Ciphertext Security Directly from the {DDH} Assumption}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {100--112}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_8}, doi = {10.1007/978-3-642-34601-9\_8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/LiuZC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangZ12, author = {Bo Zhang and Fangguo Zhang}, title = {Secure Similarity Coefficients Computation with Malicious Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {202}, year = {2012}, url = {http://eprint.iacr.org/2012/202}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZhangZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuZ12, author = {Yusong Du and Fangguo Zhang}, title = {On the Existence of Boolean Functions with Optimal Resistance against Fast Algebraic Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {210}, year = {2012}, url = {http://eprint.iacr.org/2012/210}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/ZhaoZT11, author = {Xingwen Zhao and Fangguo Zhang and Haibo Tian}, title = {Dynamic asymmetric group key agreement for ad hoc networks}, journal = {Ad Hoc Networks}, volume = {9}, number = {5}, pages = {928--939}, year = {2011}, url = {https://doi.org/10.1016/j.adhoc.2010.11.002}, doi = {10.1016/J.ADHOC.2010.11.002}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/ZhaoZT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/ChenZTWK11, author = {Xiaofeng Chen and Fangguo Zhang and Haibo Tian and Baodian Wei and Kwangjo Kim}, title = {Discrete logarithm based chameleon hashing and signatures without key exposure}, journal = {Comput. Electr. Eng.}, volume = {37}, number = {4}, pages = {614--623}, year = {2011}, url = {https://doi.org/10.1016/j.compeleceng.2011.03.011}, doi = {10.1016/J.COMPELECENG.2011.03.011}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/ChenZTWK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhaoXZZC11, author = {Changan Zhao and Dongqing Xie and Fangguo Zhang and Jingwei Zhang and Binglong Chen}, title = {Computing bilinear pairings on elliptic curves with automorphisms}, journal = {Des. Codes Cryptogr.}, volume = {58}, number = {1}, pages = {35--44}, year = {2011}, url = {https://doi.org/10.1007/s10623-010-9383-y}, doi = {10.1007/S10623-010-9383-Y}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ZhaoXZZC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhaoZ11, author = {Xingwen Zhao and Fangguo Zhang}, title = {A New Type of ID-based Encryption System and Its Application to Pay-TV Systems}, journal = {Int. J. Netw. Secur.}, volume = {13}, number = {3}, pages = {161--166}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n3/ijns-2011-v13-n3-p161-166.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhaoZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhaoZ11a, author = {Xingwen Zhao and Fangguo Zhang}, title = {Analysis on Hu et al.'s Identity-based Broadcast Encryption}, journal = {Int. J. Netw. Secur.}, volume = {13}, number = {3}, pages = {178--180}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n3/ijns-2011-v13-n3-p178-180.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhaoZ11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ChenWZTWLLK11, author = {Xiaofeng Chen and Qianhong Wu and Fangguo Zhang and Haibo Tian and Baodian Wei and Byoungcheon Lee and Hyunrok Lee and Kwangjo Kim}, title = {New receipt-free voting scheme using double-trapdoor commitment}, journal = {Inf. Sci.}, volume = {181}, number = {8}, pages = {1493--1502}, year = {2011}, url = {https://doi.org/10.1016/j.ins.2010.12.012}, doi = {10.1016/J.INS.2010.12.012}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ChenWZTWLLK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZhangZ11, author = {Bo Zhang and Fangguo Zhang}, title = {An efficient public key encryption with conjunctive-subset keywords search}, journal = {J. Netw. Comput. Appl.}, volume = {34}, number = {1}, pages = {262--267}, year = {2011}, url = {https://doi.org/10.1016/j.jnca.2010.07.007}, doi = {10.1016/J.JNCA.2010.07.007}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ZhangZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/MaXZ11, author = {Xu Ma and Lingling Xu and Fangguo Zhang}, title = {Oblivious transfer with timed-release receiver's privacy}, journal = {J. Syst. Softw.}, volume = {84}, number = {3}, pages = {460--464}, year = {2011}, url = {https://doi.org/10.1016/j.jss.2010.11.886}, doi = {10.1016/J.JSS.2010.11.886}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/MaXZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/WenZ11, author = {Yamin Wen and Fangguo Zhang}, title = {Delegatable secret handshake scheme}, journal = {J. Syst. Softw.}, volume = {84}, number = {12}, pages = {2284--2292}, year = {2011}, url = {https://doi.org/10.1016/j.jss.2011.06.046}, doi = {10.1016/J.JSS.2011.06.046}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/WenZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/ChenSZTL11, author = {Xiaofeng Chen and Willy Susilo and Fangguo Zhang and Haibo Tian and Jin Li}, title = {Identity-based trapdoor mercurial commitments and applications}, journal = {Theor. Comput. Sci.}, volume = {412}, number = {39}, pages = {5498--5512}, year = {2011}, url = {https://doi.org/10.1016/j.tcs.2011.05.031}, doi = {10.1016/J.TCS.2011.05.031}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/ChenSZTL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DuZ11, author = {Yusong Du and Fangguo Zhang}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Finding More Boolean Functions with Maximum Algebraic Immunity Based on Univariate Polynomial Representation}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {47--60}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_4}, doi = {10.1007/978-3-642-22497-3\_4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/DuZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codcry/ZhangW11, author = {Fangguo Zhang and Ping Wang}, editor = {Yeow Meng Chee and Zhenbo Guo and San Ling and Fengjing Shao and Yuansheng Tang and Huaxiong Wang and Chaoping Xing}, title = {On Relationship of Computational Diffie-Hellman Problem and Computational Square-Root Exponent Problem}, booktitle = {Coding and Cryptology - Third International Workshop, {IWCC} 2011, Qingdao, China, May 30-June 3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6639}, pages = {283--293}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20901-7\_19}, doi = {10.1007/978-3-642-20901-7\_19}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codcry/ZhangW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/DuZ11, author = {Yusong Du and Fangguo Zhang}, editor = {Sihan Qing and Willy Susilo and Guilin Wang and Dongmei Liu}, title = {Two Applications of an Incomplete Additive Character Sum to Estimating Nonlinearity of Boolean Functions}, booktitle = {Information and Communications Security - 13th International Conference, {ICICS} 2011, Beijing, China, November 23-26, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7043}, pages = {190--201}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25243-3\_16}, doi = {10.1007/978-3-642-25243-3\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/DuZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/DuZL11, author = {Yusong Du and Fangguo Zhang and Meicheng Liu}, editor = {Howon Kim}, title = {On the Resistance of Boolean Functions against Fast Algebraic Attacks}, booktitle = {Information Security and Cryptology - {ICISC} 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7259}, pages = {261--274}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31912-9\_18}, doi = {10.1007/978-3-642-31912-9\_18}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/DuZL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhaoZ11, author = {Xingwen Zhao and Fangguo Zhang}, editor = {Feng Bao and Jian Weng}, title = {Traitor Tracing against Public Collaboration}, booktitle = {Information Security Practice and Experience - 7th International Conference, {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6672}, pages = {302--316}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21031-0\_23}, doi = {10.1007/978-3-642-21031-0\_23}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/ZhaoZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ChengZZ11, author = {Rong Cheng and Bo Zhang and Fangguo Zhang}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Secure Obfuscation of Encrypted Verifiable Encrypted Signatures}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {188--203}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_14}, doi = {10.1007/978-3-642-24316-5\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/ChengZZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangZ11, author = {Ping Wang and Fangguo Zhang}, title = {Computing Elliptic Curve Discrete Logarithms with the Negation Map}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {2011}, url = {http://eprint.iacr.org/2011/008}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoZ11, author = {Xingwen Zhao and Fangguo Zhang}, title = {Traitor Tracing against Public Collaboration (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {84}, year = {2011}, url = {http://eprint.iacr.org/2011/084}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhang11, author = {Fangguo Zhang}, title = {The Computational Square-Root Exponent Problem- Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {263}, year = {2011}, url = {http://eprint.iacr.org/2011/263}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangW11, author = {Fangguo Zhang and Ping Wang}, title = {Speeding Up Elliptic Curve Discrete Logarithm Computations with Point Halving}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {461}, year = {2011}, url = {http://eprint.iacr.org/2011/461}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/Zhang10, author = {Fangguo Zhang}, title = {Twisted Ate pairing on hyperelliptic curves and applications}, journal = {Sci. China Inf. Sci.}, volume = {53}, number = {8}, pages = {1528--1538}, year = {2010}, url = {https://doi.org/10.1007/s11432-010-4024-7}, doi = {10.1007/S11432-010-4024-7}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/Zhang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iasc/WeiZ010, author = {Baodian Wei and Fangguo Zhang and Xiaofeng Chen}, title = {Efficient Online/Offline Signcryption Scheme}, journal = {Intell. Autom. Soft Comput.}, volume = {16}, number = {3}, pages = {449--459}, year = {2010}, url = {https://doi.org/10.1080/10798587.2010.10643092}, doi = {10.1080/10798587.2010.10643092}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iasc/WeiZ010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenZSTLK10, author = {Xiaofeng Chen and Fangguo Zhang and Willy Susilo and Haibo Tian and Jin Li and Kwangjo Kim}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Identity-Based Chameleon Hash Scheme without Key Exposure}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {200--215}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_13}, doi = {10.1007/978-3-642-14081-5\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChenZSTLK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChenTZD10, author = {Xiaofeng Chen and Haibo Tian and Fangguo Zhang and Yong Ding}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {415--426}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_29}, doi = {10.1007/978-3-642-21518-6\_29}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/ChenTZD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/WenZ10, author = {Yamin Wen and Fangguo Zhang}, editor = {Jan Camenisch and Costas Lambrinoudakis}, title = {A New Revocable Secret Handshake Scheme with Backward Unlinkability}, booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6711}, pages = {17--30}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22633-5\_2}, doi = {10.1007/978-3-642-22633-5\_2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/europki/WenZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChenZTWMKK10, author = {Xiaofeng Chen and Fangguo Zhang and Haibo Tian and Qianhong Wu and Yi Mu and Jangseong Kim and Kwangjo Kim}, editor = {Radu Sion}, title = {Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {304--311}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_23}, doi = {10.1007/978-3-642-14577-3\_23}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/ChenZTWMKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/XuZ10, author = {Lingling Xu and Fangguo Zhang}, editor = {Kyung Hyune Rhee and DaeHun Nyang}, title = {Oblivious Transfer with Complex Attribute-Based Access Control}, booktitle = {Information Security and Cryptology - {ICISC} 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6829}, pages = {370--395}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-24209-0\_25}, doi = {10.1007/978-3-642-24209-0\_25}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/XuZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinZ10, author = {Qiping Lin and Fangguo Zhang}, title = {Halving on Binary Edwards Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {4}, year = {2010}, url = {http://eprint.iacr.org/2010/004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoZX10, author = {Changan Zhao and Fangguo Zhang and Dongqing Xie}, title = {Faster Computation of Self-pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {399}, year = {2010}, url = {http://eprint.iacr.org/2010/399}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoZX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChenCZWM09, author = {Xiaofeng Chen and Guomin Chen and Fangguo Zhang and Baodian Wei and Yi Mu}, title = {Identity-based Universal Designated Verifier Signature Proof System}, journal = {Int. J. Netw. Secur.}, volume = {8}, number = {1}, pages = {52--58}, year = {2009}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v8-n1/ijns-2009-v8-n1-p52-58.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChenCZWM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/ZhangC09, author = {Fangguo Zhang and Xiaofeng Chen}, title = {Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at {CT-RSA} 05}, journal = {Inf. Process. Lett.}, volume = {109}, number = {15}, pages = {846--849}, year = {2009}, url = {https://doi.org/10.1016/j.ipl.2009.04.002}, doi = {10.1016/J.IPL.2009.04.002}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/ZhangC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/ZhaoXZGZ09, author = {Changan Zhao and Dongqing Xie and Fangguo Zhang and Chong{-}zhi Gao and Jingwei Zhang}, editor = {Jong Hyuk Park and Hsiao{-}Hwa Chen and Mohammed Atiquzzaman and Changhoon Lee and Tai{-}Hoon Kim and Sang{-}Soo Yeo}, title = {Improved Implementations of Cryptosystems Based on Tate Pairing}, booktitle = {Advances in Information Security and Assurance, Third International Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5576}, pages = {145--151}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02617-1\_15}, doi = {10.1007/978-3-642-02617-1\_15}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/ZhaoXZGZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ZhangZC09, author = {Fangguo Zhang and Xingwen Zhao and Xiaofeng Chen}, editor = {Heung Youl Youm and Moti Yung}, title = {ID-Based Adaptive Oblivious Transfer}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {133--147}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_11}, doi = {10.1007/978-3-642-10838-9\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ZhangZC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/provsec/2009, editor = {Josef Pieprzyk and Fangguo Zhang}, title = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5848}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04642-1}, doi = {10.1007/978-3-642-04642-1}, isbn = {978-3-642-04641-4}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZTWK09, author = {Xiaofeng Chen and Fangguo Zhang and Haibo Tian and Baodian Wei and Kwangjo Kim}, title = {Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {35}, year = {2009}, url = {http://eprint.iacr.org/2009/035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenZTWK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenTZ09, author = {Xiaofeng Chen and Haibo Tian and Fangguo Zhang}, title = {Comments and Improvements on Chameleon Hashing Without Key Exposure Based on Factoring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {319}, year = {2009}, url = {http://eprint.iacr.org/2009/319}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenTZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZTK09, author = {Xiaofeng Chen and Fangguo Zhang and Haibo Tian and Kwangjo Kim}, title = {Identity-Based Chameleon Hash Scheme Without Key Exposure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {400}, year = {2009}, url = {http://eprint.iacr.org/2009/400}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenZTK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhaoZH08, author = {Changan Zhao and Fangguo Zhang and Jiwu Huang}, title = {Efficient Tate pairing computation using double-base chains}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {51}, number = {8}, pages = {1096--1105}, year = {2008}, url = {https://doi.org/10.1007/s11432-008-0070-9}, doi = {10.1007/S11432-008-0070-9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ZhaoZH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LinZZW08, author = {Xibin Lin and Changan Zhao and Fangguo Zhang and Yanming Wang}, title = {Computing the Ate Pairing on Elliptic Curves with Embedding Degree \emph{k} = 9}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {9}, pages = {2387--2393}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.9.2387}, doi = {10.1093/IETFEC/E91-A.9.2387}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/LinZZW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZhaoZH08, author = {Changan Zhao and Fangguo Zhang and Jiwu Huang}, title = {All Pairings Are in a Group}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {10}, pages = {3084--3087}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.10.3084}, doi = {10.1093/IETFEC/E91-A.10.3084}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/ZhaoZH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ZhaoZH08, author = {Changan Zhao and Fangguo Zhang and Jiwu Huang}, title = {A note on the Ate pairing}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {6}, pages = {379--382}, year = {2008}, url = {https://doi.org/10.1007/s10207-008-0054-1}, doi = {10.1007/S10207-008-0054-1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/ZhaoZH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhangCMS08, author = {Fangguo Zhang and Xiaofeng Chen and Yi Mu and Willy Susilo}, title = {A New and Efficient Signature on Commitment Values}, journal = {Int. J. Netw. Secur.}, volume = {7}, number = {1}, pages = {100--105}, year = {2008}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v7-n1/ijns-2008-v7-n1-p100-105.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhangCMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WeiZC08, author = {Baodian Wei and Fangguo Zhang and Xiaofeng Chen}, title = {A New Type of Designated Confirmer Signatures for a Group of Individuals}, journal = {Int. J. Netw. Secur.}, volume = {7}, number = {2}, pages = {293--300}, year = {2008}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v7-n2/ijns-2008-v7-n2-p293-300.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WeiZC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ChenZTWSMLK08, author = {Xiaofeng Chen and Fangguo Zhang and Haibo Tian and Baodian Wei and Willy Susilo and Yi Mu and Hyunrok Lee and Kwangjo Kim}, title = {Efficient generic on-line/off-line (threshold) signatures without key exposure}, journal = {Inf. Sci.}, volume = {178}, number = {21}, pages = {4192--4203}, year = {2008}, url = {https://doi.org/10.1016/j.ins.2008.06.022}, doi = {10.1016/J.INS.2008.06.022}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ChenZTWSMLK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/LiuCZ08, author = {Shengli Liu and Xiaofeng Chen and Fangguo Zhang}, title = {Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme}, journal = {J. Comput. Sci. Technol.}, volume = {23}, number = {2}, pages = {265--269}, year = {2008}, url = {https://doi.org/10.1007/s11390-008-9128-9}, doi = {10.1007/S11390-008-9128-9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcst/LiuCZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiKZW08, author = {Jin Li and Kwangjo Kim and Fangguo Zhang and Duncan S. Wong}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Generic Security-Amplifying Methods of Ordinary Digital Signatures}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {224--241}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_14}, doi = {10.1007/978-3-540-68914-0\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/LiKZW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangCW08, author = {Fangguo Zhang and Xiaofeng Chen and Baodian Wei}, editor = {Masayuki Abe and Virgil D. Gligor}, title = {Efficient designated confirmer signature from bilinear pairings}, booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20, 2008}, pages = {363--368}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1368310.1368363}, doi = {10.1145/1368310.1368363}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangCW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoZH08, author = {Changan Zhao and Fangguo Zhang and Jiwu Huang}, title = {All Pairings Are in a Group}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {85}, year = {2008}, url = {http://eprint.iacr.org/2008/085}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoZH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoXZZC08, author = {Changan Zhao and Dongqing Xie and Fangguo Zhang and Jingwei Zhang and Binglong Chen}, title = {Computing Bilinear Pairings on Elliptic Curves with Automorphisms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {209}, year = {2008}, url = {http://eprint.iacr.org/2008/209}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoXZZC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoZX08, author = {Changan Zhao and Fangguo Zhang and Dongqing Xie}, title = {Reducing the Complexity of the Weil Pairing Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {212}, year = {2008}, url = {http://eprint.iacr.org/2008/212}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoZX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhang08, author = {Fangguo Zhang}, title = {Twisted Ate Pairing on Hyperelliptic Curves and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {274}, year = {2008}, url = {http://eprint.iacr.org/2008/274}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhang08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/ChenZL07, author = {Xiaofeng Chen and Fangguo Zhang and Shengli Liu}, title = {ID-based restrictive partially blind signatures and applications}, journal = {J. Syst. Softw.}, volume = {80}, number = {2}, pages = {164--171}, year = {2007}, url = {https://doi.org/10.1016/j.jss.2006.02.046}, doi = {10.1016/J.JSS.2006.02.046}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/ChenZL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChenZSM07, author = {Xiaofeng Chen and Fangguo Zhang and Willy Susilo and Yi Mu}, editor = {Jonathan Katz and Moti Yung}, title = {Efficient Generic On-Line/Off-Line Signatures Without Key Exposure}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {18--30}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_2}, doi = {10.1007/978-3-540-72738-5\_2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/ChenZSM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/ZhangZZ07, author = {Lei Zhang and Futai Zhang and Fangguo Zhang}, editor = {Mieso K. Denko and Chi{-}Sheng Shih and Kuan{-}Ching Li and Shiao{-}Li Tsao and Qing{-}An Zeng and Soo{-}Hyun Park and Young{-}Bae Ko and Shih{-}Hao Hung and Jong Hyuk Park}, title = {New Efficient Certificateless Signature Scheme}, booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4809}, pages = {692--703}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77090-9\_64}, doi = {10.1007/978-3-540-77090-9\_64}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euc/ZhangZZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/WuSMZ07, author = {Qianhong Wu and Willy Susilo and Yi Mu and Fangguo Zhang}, editor = {Osvaldo Gervasi and Marina L. Gavrilova}, title = {Efficient Partially Blind Signatures with Provable Security}, booktitle = {Computational Science and Its Applications - {ICCSA} 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings. Part {III}}, series = {Lecture Notes in Computer Science}, volume = {4707}, pages = {1096--1105}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74484-9\_96}, doi = {10.1007/978-3-540-74484-9\_96}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/WuSMZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnc/WeiZ007, author = {Baodian Wei and Fangguo Zhang and Xiaofeng Chen}, editor = {Jingsheng Lei and JingTao Yao and Qingfu Zhang}, title = {Society-oriented Designated Confirmer Signatures}, booktitle = {Third International Conference on Natural Computation, {ICNC} 2007, Haikou, Hainan, China, 24-27 August 2007, Volume 5}, pages = {707--712}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICNC.2007.669}, doi = {10.1109/ICNC.2007.669}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnc/WeiZ007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/WeiZ007, author = {Baodian Wei and Fangguo Zhang and Xiaofeng Chen}, title = {ID-based Ring Proxy Signatures}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2007, Nice, France, June 24-29, 2007}, pages = {1031--1035}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ISIT.2007.4557359}, doi = {10.1109/ISIT.2007.4557359}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/WeiZ007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/LiKZC07, author = {Jin Li and Kwangjo Kim and Fangguo Zhang and Xiaofeng Chen}, editor = {Willy Susilo and Joseph K. Liu and Yi Mu}, title = {Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature}, booktitle = {Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4784}, pages = {208--217}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75670-5\_15}, doi = {10.1007/978-3-540-75670-5\_15}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/LiKZC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuCZ07, author = {Shengli Liu and Xiaofeng Chen and Fangguo Zhang}, title = {On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {225}, year = {2007}, url = {http://eprint.iacr.org/2007/225}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuCZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoZH07, author = {Changan Zhao and Fangguo Zhang and Jiwu Huang}, title = {A Note on the Ate Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {247}, year = {2007}, url = {http://eprint.iacr.org/2007/247}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoZH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinZZW07, author = {Xibin Lin and Changan Zhao and Fangguo Zhang and Yanming Wang}, title = {Computing the Ate Pairing on Elliptic Curves with Embedding Degree k=9}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {434}, year = {2007}, url = {http://eprint.iacr.org/2007/434}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinZZW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atc/WuMSZ06, author = {Qianhong Wu and Yi Mu and Willy Susilo and Fangguo Zhang}, editor = {Laurence Tianruo Yang and Hai Jin and Jianhua Ma and Theo Ungerer}, title = {Efficient Signcryption Without Random Oracles}, booktitle = {Autonomic and Trusted Computing, Third International Conference, {ATC} 2006, Wuhan, China, September 3-6, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4158}, pages = {449--458}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11839569\_43}, doi = {10.1007/11839569\_43}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atc/WuMSZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiCZW06, author = {Jin Li and Xiaofeng Chen and Fangguo Zhang and Yanming Wang}, editor = {Yuping Wang and Yiu{-}ming Cheung and Hai{-}Lin Liu}, title = {Generalization of the Selective-ID Security Model for {HIBS} Protocols}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4456}, pages = {894--902}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74377-4\_94}, doi = {10.1007/978-3-540-74377-4\_94}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiCZW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/LiZW06, author = {Jin Li and Fangguo Zhang and Yanming Wang}, editor = {Xiaobo Zhou and Oleg Sokolsky and Lu Yan and Eun{-}Sun Jung and Zili Shao and Yi Mu and Dong Chun Lee and Daeyoung Kim and Young{-}Sik Jeong and Cheng{-}Zhong Xu}, title = {A Strong Identity Based Key-Insulated Cryptosystem}, booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4097}, pages = {352--361}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11807964\_36}, doi = {10.1007/11807964\_36}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euc/LiZW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/LiZW06a, author = {Jin Li and Fangguo Zhang and Yanming Wang}, editor = {Xiaobo Zhou and Oleg Sokolsky and Lu Yan and Eun{-}Sun Jung and Zili Shao and Yi Mu and Dong Chun Lee and Daeyoung Kim and Young{-}Sik Jeong and Cheng{-}Zhong Xu}, title = {A New Hierarchical ID-Based Cryptosystem and CCA-Secure {PKE}}, booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4097}, pages = {362--371}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11807964\_37}, doi = {10.1007/11807964\_37}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/euc/LiZW06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChenZMS06, author = {Xiaofeng Chen and Fangguo Zhang and Yi Mu and Willy Susilo}, editor = {Giovanni Di Crescenzo and Aviel D. Rubin}, title = {Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings}, booktitle = {Financial Cryptography and Data Security, 10th International Conference, {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4107}, pages = {251--265}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11889663\_21}, doi = {10.1007/11889663\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/ChenZMS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/WuSMZ06, author = {Qianhong Wu and Willy Susilo and Yi Mu and Fangguo Zhang}, editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`{a}} and Youngsong Mun and Hyunseung Choo}, title = {Efficient Partially Blind Signatures with Provable Security}, booktitle = {Computational Science and Its Applications - {ICCSA} 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3982}, pages = {345--354}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11751595\_38}, doi = {10.1007/11751595\_38}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/WuSMZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WuMSZ06, author = {Qianhong Wu and Yi Mu and Willy Susilo and Fangguo Zhang}, editor = {Kefei Chen and Robert H. Deng and Xuejia Lai and Jianying Zhou}, title = {Privately Retrieve Data from Large Databases}, booktitle = {Information Security Practice and Experience, Second International Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3903}, pages = {367--378}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11689522\_34}, doi = {10.1007/11689522\_34}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/WuMSZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/WuSMZ06, author = {Qianhong Wu and Willy Susilo and Yi Mu and Fangguo Zhang}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin{-}ichi Kawamura}, title = {Ad Hoc Group Signatures}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4266}, pages = {120--135}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11908739\_9}, doi = {10.1007/11908739\_9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/WuSMZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vietcrypt/ZhangCSM06, author = {Fangguo Zhang and Xiaofeng Chen and Willy Susilo and Yi Mu}, editor = {Phong Q. Nguyen}, title = {A New Signature Scheme Without Random Oracles from Bilinear Pairings}, booktitle = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4341}, pages = {67--80}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11958239\_5}, doi = {10.1007/11958239\_5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vietcrypt/ZhangCSM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoZH06, author = {Changan Zhao and Fangguo Zhang and Jiwu Huang}, title = {Efficient Tate Pairing Computation Using Double-Base Chains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {201}, year = {2006}, url = {http://eprint.iacr.org/2006/201}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoZH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuMSCHZ06, author = {Shidi Xu and Yi Mu and Willy Susilo and Xiaofeng Chen and Xinyi Huang and Fangguo Zhang}, title = {Online/Offline Signatures and Multisignatures for {AODV} and {DSR} Routing Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {236}, year = {2006}, url = {http://eprint.iacr.org/2006/236}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuMSCHZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoZH06a, author = {Changan Zhao and Fangguo Zhang and Jiwu Huang}, title = {Speeding up the Bilinear Pairings Computation on Curves with Automorphisms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {474}, year = {2006}, url = {http://eprint.iacr.org/2006/474}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoZH06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuZ06, author = {Shengli Liu and Fangguo Zhang}, title = {Cryptanalysis of {REESSE1+} Public Key Cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {480}, year = {2006}, url = {http://eprint.iacr.org/2006/480}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/LinWZH05, author = {Chih{-}Yin Lin and Tzong{-}Chen Wu and Fangguo Zhang and Jing{-}Jang Hwang}, title = {New identity-based society oriented signature schemes from pairings on elliptic curves}, journal = {Appl. Math. Comput.}, volume = {160}, number = {1}, pages = {245--260}, year = {2005}, url = {https://doi.org/10.1016/j.amc.2003.07.016}, doi = {10.1016/J.AMC.2003.07.016}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amc/LinWZH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/ZhangK05, author = {Fangguo Zhang and Kwangjo Kim}, title = {Cryptanalysis of Lee-Hwang-Li's key authentication scheme}, journal = {Appl. Math. Comput.}, volume = {161}, number = {1}, pages = {101--107}, year = {2005}, url = {https://doi.org/10.1016/j.amc.2003.12.012}, doi = {10.1016/J.AMC.2003.12.012}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amc/ZhangK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/ZhangSS05, author = {Fangguo Zhang and Reihaneh Safavi{-}Naini and Willy Susilo}, title = {Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03}, journal = {Appl. Math. Comput.}, volume = {170}, number = {2}, pages = {1166--1169}, year = {2005}, url = {https://doi.org/10.1016/j.amc.2005.01.015}, doi = {10.1016/J.AMC.2005.01.015}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amc/ZhangSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/Zhang05a, author = {Fangguo Zhang}, title = {Cryptanalysis of Chang et al.'s signature scheme with message recovery}, journal = {{IEEE} Commun. Lett.}, volume = {9}, number = {4}, pages = {358--359}, year = {2005}, url = {https://doi.org/10.1109/LCOMM.2005.1413633}, doi = {10.1109/LCOMM.2005.1413633}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/Zhang05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChenZW05, author = {Xiaofeng Chen and Fangguo Zhang and Baodian Wei}, title = {Comment on the Public Key Substitution Attacks}, journal = {Int. J. Netw. Secur.}, volume = {1}, number = {3}, pages = {168--172}, year = {2005}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v1-n3/ijns-2005-v1-n3-p168-172.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChenZW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/ZhangC05, author = {Fangguo Zhang and Xiaofeng Chen}, title = {Cryptanalysis of Huang-Chang partially blind signature scheme}, journal = {J. Syst. Softw.}, volume = {76}, number = {3}, pages = {323--325}, year = {2005}, url = {https://doi.org/10.1016/j.jss.2004.07.249}, doi = {10.1016/J.JSS.2004.07.249}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/ZhangC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WeiYZ05, author = {Victor K. Wei and Tsz Hon Yuen and Fangguo Zhang}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Group Signature Where Group Manager, Members and Open Authority Are Identity-Based}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {468--480}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_39}, doi = {10.1007/11506157\_39}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/WeiYZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/ZhangMS05, author = {Fangguo Zhang and Yi Mu and Willy Susilo}, title = {Reducing Security Overhead for Mobile Networks}, booktitle = {19th International Conference on Advanced Information Networking and Applications {(AINA} 2005), 28-30 March 2005, Taipei, Taiwan}, pages = {398--403}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/AINA.2005.292}, doi = {10.1109/AINA.2005.292}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/ZhangMS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/SisiloZM05, author = {Willy Susilo and Fangguo Zhang and Yi Mu}, title = {Privacy-Enhanced Internet Storage}, booktitle = {19th International Conference on Advanced Information Networking and Applications {(AINA} 2005), 28-30 March 2005, Taipei, Taiwan}, pages = {603--608}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/AINA.2005.284}, doi = {10.1109/AINA.2005.284}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/SisiloZM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChenZL05, author = {Xiaofeng Chen and Fangguo Zhang and Shengli Liu}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {ID-Based Restrictive Partially Blind Signatures}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {117--124}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_17}, doi = {10.1007/11596981\_17}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ChenZL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/HuangMSZC05, author = {Xinyi Huang and Yi Mu and Willy Susilo and Fangguo Zhang and Xiaofeng Chen}, editor = {Tomoya Enokido and Lu Yan and Bin Xiao and Daeyoung Kim and Yuan{-}Shun Dai and Laurence Tianruo Yang}, title = {A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World}, booktitle = {Embedded and Ubiquitous Computing - {EUC} 2005 Workshops, {EUC} 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3823}, pages = {480--489}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596042\_50}, doi = {10.1007/11596042\_50}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euc/HuangMSZC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/ZhangSMC05, author = {Fangguo Zhang and Willy Susilo and Yi Mu and Xiaofeng Chen}, editor = {Tomoya Enokido and Lu Yan and Bin Xiao and Daeyoung Kim and Yuan{-}Shun Dai and Laurence Tianruo Yang}, title = {Identity-Based Universal Designated Verifier Signatures}, booktitle = {Embedded and Ubiquitous Computing - {EUC} 2005 Workshops, {EUC} 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3823}, pages = {825--834}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596042\_85}, doi = {10.1007/11596042\_85}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euc/ZhangSMC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ZhangSM05, author = {Fangguo Zhang and Willy Susilo and Yi Mu}, editor = {Andrew S. Patrick and Moti Yung}, title = {Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures)}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {45--56}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_5}, doi = {10.1007/11507840\_5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/ZhangSM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/WuZSM05, author = {Qianhong Wu and Fangguo Zhang and Willy Susilo and Yi Mu}, editor = {Dongho Won and Seungjoo Kim}, title = {An Efficient Static Blind Ring Signature Scheme}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {410--423}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_32}, doi = {10.1007/11734727\_32}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/WuZSM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangC05, author = {Fangguo Zhang and Xiaofeng Chen}, title = {Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at {CT-RSA} 05}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {103}, year = {2005}, url = {http://eprint.iacr.org/2005/103}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WeiYZ05, author = {Victor K. Wei and Tsz Hon Yuen and Fangguo Zhang}, title = {Group Signature where Group Manager, Members and Open Authority are Identity-Based}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2005}, url = {http://eprint.iacr.org/2005/188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WeiYZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangC05b, author = {Fangguo Zhang and Xiaofeng Chen}, title = {Attack on Okamoto et al.'s New Short Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {240}, year = {2005}, url = {http://eprint.iacr.org/2005/240}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangC05b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZL05, author = {Xiaofeng Chen and Fangguo Zhang and Shengli Liu}, title = {ID-based Restrictive Partially Blind Signatures and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {319}, year = {2005}, url = {http://eprint.iacr.org/2005/319}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenZL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangCSM05, author = {Fangguo Zhang and Xiaofeng Chen and Willy Susilo and Yi Mu}, title = {A New Short Signature Scheme Without Random Oracles from Bilinear Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {386}, year = {2005}, url = {http://eprint.iacr.org/2005/386}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangCSM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/ZhangC04, author = {Fangguo Zhang and Xiaofeng Chen}, title = {Attack on an ID-based authenticated group key agreement scheme from {PKC} 2004}, journal = {Inf. Process. Lett.}, volume = {91}, number = {4}, pages = {191--193}, year = {2004}, url = {https://doi.org/10.1016/j.ipl.2004.04.008}, doi = {10.1016/J.IPL.2004.04.008}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/ZhangC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/LiuZC04, author = {Shengli Liu and Fangguo Zhang and Kefei Chen}, title = {Authenticating Tripartite Key Agreement Protocol with Pairings}, journal = {J. Comput. Sci. Technol.}, volume = {19}, number = {2}, pages = {169--176}, year = {2004}, url = {https://doi.org/10.1007/BF02944794}, doi = {10.1007/BF02944794}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcst/LiuZC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SusiloZM04, author = {Willy Susilo and Fangguo Zhang and Yi Mu}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Identity-Based Strong Designated Verifier Signature Schemes}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {313--324}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_27}, doi = {10.1007/978-3-540-27800-9\_27}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/SusiloZM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChenZK04, author = {Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim}, editor = {Markus Jakobsson and Moti Yung and Jianying Zhou}, title = {Limited Verifier Signature from Bilinear Pairings}, booktitle = {Applied Cryptography and Network Security, Second International Conference, {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3089}, pages = {135--148}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24852-1\_10}, doi = {10.1007/978-3-540-24852-1\_10}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/ChenZK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asian/MuZS04, author = {Yi Mu and Fangguo Zhang and Willy Susilo}, editor = {Michael J. Maher}, title = {Deniable Partial Proxy Signatures}, booktitle = {Advances in Computer Science - {ASIAN} 2004, Higher-Level Decision Making, 9th Asian Computing Science Conference, Dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday, Chiang Mai, Thailand, December 8-10, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3321}, pages = {182--194}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30502-6\_13}, doi = {10.1007/978-3-540-30502-6\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asian/MuZS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/SusiloMZ04, author = {Willy Susilo and Yi Mu and Fangguo Zhang}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Perfect Concurrent Signature Schemes}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {14--26}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_2}, doi = {10.1007/978-3-540-30191-2\_2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/SusiloMZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/ChenZKK04, author = {Xiaofeng Chen and Fangguo Zhang and Divyan M. Konidala and Kwangjo Kim}, editor = {Anne Canteaut and Kapalee Viswanathan}, title = {New ID-Based Threshold Signature Scheme from Bilinear Pairings}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3348}, pages = {371--383}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30556-9\_29}, doi = {10.1007/978-3-540-30556-9\_29}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/ChenZKK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ChenZK04, author = {Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim}, editor = {Kan Zhang and Yuliang Zheng}, title = {Chameleon Hashing Without Key Exposure}, booktitle = {Information Security, 7th International Conference, {ISC} 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3225}, pages = {87--98}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30144-8\_8}, doi = {10.1007/978-3-540-30144-8\_8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/ChenZK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ZhangSS04, author = {Fangguo Zhang and Reihaneh Safavi{-}Naini and Willy Susilo}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {An Efficient Signature Scheme from Bilinear Pairings and Its Applications}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {277--290}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_20}, doi = {10.1007/978-3-540-24632-9\_20}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/ZhangSS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZK04, author = {Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim}, title = {Chameleon Hashing without Key Exposure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {38}, year = {2004}, url = {http://eprint.iacr.org/2004/038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenZK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhang04a, author = {Fangguo Zhang}, title = {Cryptanalysis of Chang et al.'s Signature Scheme with Message Recovery}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {213}, year = {2004}, url = {http://eprint.iacr.org/2004/213}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhang04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/ZhangK03, author = {Fangguo Zhang and Kwangjo Kim}, title = {A Universal Forgery on Araki et al.'s Convertible Limited Verifier Signature Scheme}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {86-A}, number = {2}, pages = {515--516}, year = {2003}, url = {http://search.ieice.org/bin/summary.php?id=e86-a\_2\_515}, timestamp = {Tue, 08 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/ZhangK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/WangZW03, author = {Changjie Wang and Fangguo Zhang and Yumin Wang}, title = {Secure Web Transaction with Anonymous Mobile Agent over Internet}, journal = {J. Comput. Sci. Technol.}, volume = {18}, number = {1}, pages = {84--89}, year = {2003}, url = {https://doi.org/10.1007/BF02946654}, doi = {10.1007/BF02946654}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcst/WangZW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangK03, author = {Fangguo Zhang and Kwangjo Kim}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {312--323}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_27}, doi = {10.1007/3-540-45067-X\_27}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhangK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/ToSZ03, author = {Vu Dong T{\^{o}} and Reihaneh Safavi{-}Naini and Fangguo Zhang}, editor = {Moti Yung}, title = {New traitor tracing schemes using bilinear map}, booktitle = {Proceedings of the 2003 {ACM} workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003}, pages = {67--76}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/947380.947389}, doi = {10.1145/947380.947389}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/ToSZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/XieZCK03, author = {Yan Xie and Fangguo Zhang and Xiaofeng Chen and Kwangjo Kim}, editor = {Sihan Qing and Dieter Gollmann and Jianying Zhou}, title = {ID-Based Distributed "Magic Ink" Signature from Pairings}, booktitle = {Information and Communications Security, 5th International Conference, {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2836}, pages = {249--259}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39927-8\_23}, doi = {10.1007/978-3-540-39927-8\_23}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/XieZCK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/ZhangSS03, author = {Fangguo Zhang and Reihaneh Safavi{-}Naini and Willy Susilo}, editor = {Thomas Johansson and Subhamoy Maitra}, title = {Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2904}, pages = {191--204}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24582-7\_14}, doi = {10.1007/978-3-540-24582-7\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/ZhangSS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangK03, author = {Fangguo Zhang and Kwangjo Kim}, title = {Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2003}, url = {http://eprint.iacr.org/2003/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZW03, author = {Xiaofeng Chen and Fangguo Zhang and Yumin Wang}, title = {A New Approach to Prevent Blackmailing in E-Cash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {55}, year = {2003}, url = {http://eprint.iacr.org/2003/055}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenZW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinWZ03, author = {Chih{-}Yin Lin and Tzong{-}Chen Wu and Fangguo Zhang}, title = {A Structured Multisignature Scheme from the Gap Diffie-Hellman Group}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {90}, year = {2003}, url = {http://eprint.iacr.org/2003/090}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinWZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangSL03, author = {Fangguo Zhang and Reihaneh Safavi{-}Naini and Chih{-}Yin Lin}, title = {New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {104}, year = {2003}, url = {http://eprint.iacr.org/2003/104}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangSL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZK03, author = {Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim}, title = {A New ID-based Group Signature Scheme from Bilinear Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {116}, year = {2003}, url = {http://eprint.iacr.org/2003/116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenZK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangSS03, author = {Fangguo Zhang and Reihaneh Safavi{-}Naini and Willy Susilo}, title = {Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {129}, year = {2003}, url = {http://eprint.iacr.org/2003/129}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangSS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangSS03a, author = {Fangguo Zhang and Reihaneh Safavi{-}Naini and Willy Susilo}, title = {ID-Based Chameleon Hashes from Bilinear Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {208}, year = {2003}, url = {http://eprint.iacr.org/2003/208}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangSS03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangC03, author = {Fangguo Zhang and Xiaofeng Chen}, title = {Attack on Two ID-based Authenticated Group Key Agreement Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {259}, year = {2003}, url = {http://eprint.iacr.org/2003/259}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/WangZW02, author = {Changjie Wang and Fangguo Zhang and Yumin Wang}, title = {{SAWT:} {A} New System for Secure and Anonymous Web Transactions over the Internet}, journal = {J. Res. Pract. Inf. Technol.}, volume = {34}, number = {1}, pages = {34--46}, year = {2002}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/acj/WangZW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaSI/WangWZ02, author = {Changjie Wang and Yumin Wang and Fangguo Zhang}, title = {An Anonymous Mobile Agents Scheme for Secure Web Transaction over the Internet}, journal = {Informatica (Slovenia)}, volume = {26}, number = {3}, year = {2002}, timestamp = {Mon, 15 Feb 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/informaticaSI/WangWZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/ZhangZW02, author = {Fangguo Zhang and Futai Zhang and Yumin Wang}, title = {Selection of Secure Hyperelliptic Curves of g{\_}2 Based on a Subfield}, journal = {J. Comput. Sci. Technol.}, volume = {17}, number = {6}, pages = {836--842}, year = {2002}, url = {https://doi.org/10.1007/BF02960774}, doi = {10.1007/BF02960774}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcst/ZhangZW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangLK02, author = {Fangguo Zhang and Shengli Liu and Kwangjo Kim}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {203--213}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_17}, doi = {10.1007/3-540-45450-0\_17}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ZhangLK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ZhangK02, author = {Fangguo Zhang and Kwangjo Kim}, editor = {Yuliang Zheng}, title = {ID-Based Blind Signature and Ring Signature from Pairings}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2501}, pages = {533--547}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36178-2\_33}, doi = {10.1007/3-540-36178-2\_33}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/ZhangK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangLK02, author = {Fangguo Zhang and Shengli Liu and Kwangjo Kim}, title = {ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {122}, year = {2002}, url = {http://eprint.iacr.org/2002/122}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangLK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangK02, author = {Fangguo Zhang and Kwangjo Kim}, title = {Cryptanalysis of Two New Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {167}, year = {2002}, url = {http://eprint.iacr.org/2002/167}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangLK02a, author = {Fangguo Zhang and Shengli Liu and Kwangjo Kim}, title = {Attack on {A} New Public Key Cryptosystem from ISC'02 {(LNCS} 2433)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {178}, year = {2002}, url = {http://eprint.iacr.org/2002/178}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangLK02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhangZW01, author = {Fangguo Zhang and Futai Zhang and Yumin Wang}, editor = {Sihan Qing and Tatsuaki Okamoto and Jianying Zhou}, title = {Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves}, booktitle = {Information and Communications Security, Third International Conference, {ICICS} 2001, Xian, China, November 13-16, 2001}, series = {Lecture Notes in Computer Science}, volume = {2229}, pages = {74--83}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45600-7\_9}, doi = {10.1007/3-540-45600-7\_9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/ZhangZW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ZhangZW00, author = {Fangguo Zhang and Futai Zhang and Yumin Wang}, editor = {Sihan Qing and Jan H. P. Eloff}, title = {Fair Electronic Cash Systems with Multiple Banks}, booktitle = {Information Security for Global Information Infrastructures, {IFIP} {TC11} Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China}, series = {{IFIP} Conference Proceedings}, volume = {175}, pages = {461--470}, publisher = {Kluwer}, year = {2000}, timestamp = {Fri, 26 Jul 2002 13:04:43 +0200}, biburl = {https://dblp.org/rec/conf/sec/ZhangZW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.