BibTeX records: Fangguo Zhang

download as .bib file

@article{DBLP:journals/csi/TianWZSL24,
  author       = {Haibo Tian and
                  Yanchuan Wen and
                  Fangguo Zhang and
                  Yunfeng Shao and
                  Bingshuai Li},
  title        = {Lattice based distributed threshold additive homomorphic encryption
                  with application in federated learning},
  journal      = {Comput. Stand. Interfaces},
  volume       = {87},
  pages        = {103765},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csi.2023.103765},
  doi          = {10.1016/J.CSI.2023.103765},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/TianWZSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/ZhangHZWD24,
  author       = {Huang Zhang and
                  Ting Huang and
                  Fangguo Zhang and
                  Baodian Wei and
                  Yusong Du},
  title        = {Self-Bilinear Map from One Way Encoding System and i{\unicode{119978}}},
  journal      = {Inf.},
  volume       = {15},
  number       = {1},
  pages        = {54},
  year         = {2024},
  url          = {https://doi.org/10.3390/info15010054},
  doi          = {10.3390/INFO15010054},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/information/ZhangHZWD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhangZ23,
  author       = {Zheng Zhang and
                  Fangguo Zhang},
  title        = {New Obfuscation Scheme for Conjunctions},
  journal      = {Comput. J.},
  volume       = {66},
  number       = {11},
  pages        = {2773--2781},
  year         = {2023},
  url          = {https://doi.org/10.1093/comjnl/bxac120},
  doi          = {10.1093/COMJNL/BXAC120},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/ZhangZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersec/ChenZ23,
  author       = {Chao Chen and
                  Fangguo Zhang},
  title        = {Verifiable delay functions and delay encryptions from hyperelliptic
                  curves},
  journal      = {Cybersecur.},
  volume       = {6},
  number       = {1},
  pages        = {54},
  year         = {2023},
  url          = {https://doi.org/10.1186/s42400-023-00189-2},
  doi          = {10.1186/S42400-023-00189-2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersec/ChenZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/DaiZZ23,
  author       = {Yu Dai and
                  Fangguo Zhang and
                  Chang{-}An Zhao},
  title        = {Fast hashing to {G2} on pairing-friendly curves with the lack of twists},
  journal      = {Finite Fields Their Appl.},
  volume       = {91},
  pages        = {102263},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ffa.2023.102263},
  doi          = {10.1016/J.FFA.2023.102263},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/DaiZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenZZ23,
  author       = {Chao Chen and
                  Fangguo Zhang and
                  Changan Zhao},
  title        = {Isogeny computation on Kummer lines and applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103546},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103546},
  doi          = {10.1016/J.JISA.2023.103546},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ChenZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ChenGHZ23,
  author       = {Chao Chen and
                  Peidong Guan and
                  Yan Huang and
                  Fangguo Zhang},
  title        = {Quantum circuits for hyperelliptic curve discrete logarithms over
                  the Mersenne prime fields},
  journal      = {Quantum Inf. Process.},
  volume       = {22},
  number       = {7},
  pages        = {274},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11128-023-04017-x},
  doi          = {10.1007/S11128-023-04017-X},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/qip/ChenGHZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DaiZZ23,
  author       = {Yu Dai and
                  Fangguo Zhang and
                  Chang{-}An Zhao},
  title        = {Don't Forget Pairing-Friendly Curves with Odd Prime Embedding Degrees},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {4},
  pages        = {393--419},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i4.393-419},
  doi          = {10.46586/TCHES.V2023.I4.393-419},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/DaiZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/AnPWZ23,
  author       = {Zhiyuan An and
                  Jing Pan and
                  Yamin Wen and
                  Fangguo Zhang},
  title        = {Secret handshakes: Full dynamicity, deniability and lattice-based
                  design},
  journal      = {Theor. Comput. Sci.},
  volume       = {940},
  number       = {Part},
  pages        = {14--35},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.tcs.2022.10.035},
  doi          = {10.1016/J.TCS.2022.10.035},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/AnPWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisp/ZuoTZ23,
  author       = {Ruozhou Zuo and
                  Haibo Tian and
                  Fangguo Zhang},
  editor       = {Jaideep Vaidya and
                  Moncef Gabbouj and
                  Jin Li},
  title        = {Post-quantum Dropout-Resilient Aggregation for Federated Learning
                  via Lattice-Based {PRF}},
  booktitle    = {Artificial Intelligence Security and Privacy - First International
                  Conference on Artificial Intelligence Security and Privacy, AIS{\&}P
                  2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14509},
  pages        = {382--399},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-9785-5\_27},
  doi          = {10.1007/978-981-99-9785-5\_27},
  timestamp    = {Sun, 03 Mar 2024 19:07:53 +0100},
  biburl       = {https://dblp.org/rec/conf/aisp/ZuoTZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiTZ23,
  author       = {Chen Li and
                  Haibo Tian and
                  Fangguo Zhang},
  editor       = {Chunpeng Ge and
                  Moti Yung},
  title        = {{TVES:} Threshold Verifiably Encrypted Signature and Its Applications},
  booktitle    = {Information Security and Cryptology - 19th International Conference,
                  Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected
                  Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14526},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-0942-7\_1},
  doi          = {10.1007/978-981-97-0942-7\_1},
  timestamp    = {Mon, 11 Mar 2024 15:20:47 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/LiTZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/ZhangDLZMLYZZ23,
  author       = {Haibin Zhang and
                  Sisi Duan and
                  Chao Liu and
                  Boxin Zhao and
                  Xuanji Meng and
                  Shengli Liu and
                  Yong Yu and
                  Fangguo Zhang and
                  Liehuang Zhu},
  title        = {Practical Asynchronous Distributed Key Generation: Improved Efficiency,
                  Weaker Assumption, and Standard Model},
  booktitle    = {53rd Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Network, {DSN} 2023, Porto, Portugal, June 27-30, 2023},
  pages        = {568--581},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DSN58367.2023.00059},
  doi          = {10.1109/DSN58367.2023.00059},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/ZhangDLZMLYZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AnTCZ23,
  author       = {Zhiyuan An and
                  Haibo Tian and
                  Chao Chen and
                  Fangguo Zhang},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Deniable Cryptosystems: Simpler Constructions and Achieving Leakage
                  Resilience},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14344},
  pages        = {24--44},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50594-2\_2},
  doi          = {10.1007/978-3-031-50594-2\_2},
  timestamp    = {Thu, 18 Jan 2024 08:27:15 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/AnTCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnTCZ23,
  author       = {Zhiyuan An and
                  Haibo Tian and
                  Chao Chen and
                  Fangguo Zhang},
  title        = {Deniable Cryptosystems: Simpler Constructions and Achieving Leakage
                  Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {705},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/705},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnTCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaiZZ23,
  author       = {Yu Dai and
                  Fangguo Zhang and
                  Chang{-}An Zhao},
  title        = {Don't Forget Pairing-Friendly Curves with Odd Prime Embedding Degrees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1542},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1542},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DaiZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/HuangZLT22,
  author       = {Yan Huang and
                  Fangguo Zhang and
                  Zhijie Liu and
                  Haibo Tian},
  title        = {Pseudorandom number generator based on supersingular elliptic curve
                  isogenies},
  journal      = {Sci. China Inf. Sci.},
  volume       = {65},
  number       = {5},
  pages        = {1--3},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11432-019-2669-6},
  doi          = {10.1007/S11432-019-2669-6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/HuangZLT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/PanZZCS22,
  author       = {Jing Pan and
                  Jiang Zhang and
                  Fangguo Zhang and
                  Xiaofeng Chen and
                  Willy Susilo},
  title        = {Lattice-based group encryptions with only one trapdoor},
  journal      = {Sci. China Inf. Sci.},
  volume       = {65},
  number       = {5},
  pages        = {1--18},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11432-020-3226-6},
  doi          = {10.1007/S11432-020-3226-6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/PanZZCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LiXWZ22,
  author       = {Wanhua Li and
                  Lingling Xu and
                  Yamin Wen and
                  Fangguo Zhang},
  title        = {Conjunctive multi-key searchable encryption with attribute-based access
                  control for {EHR} systems},
  journal      = {Comput. Stand. Interfaces},
  volume       = {82},
  pages        = {103606},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.csi.2021.103606},
  doi          = {10.1016/J.CSI.2021.103606},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/LiXWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/CaoWZXC22,
  author       = {Yanmei Cao and
                  Jianghong Wei and
                  Fangguo Zhang and
                  Yang Xiang and
                  Xiaofeng Chen},
  title        = {Efficient public-key authenticated deniable encryption schemes},
  journal      = {Comput. Stand. Interfaces},
  volume       = {82},
  pages        = {103620},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.csi.2022.103620},
  doi          = {10.1016/J.CSI.2022.103620},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/CaoWZXC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/DaiZZZ22,
  author       = {Yu Dai and
                  Zijian Zhou and
                  Fangguo Zhang and
                  Chang{-}An Zhao},
  title        = {Software Implementation of Optimal Pairings on Elliptic Curves with
                  Odd Prime Embedding Degrees},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {105-A},
  number       = {5},
  pages        = {858--870},
  year         = {2022},
  url          = {https://doi.org/10.1587/transfun.2021eap1115},
  doi          = {10.1587/TRANSFUN.2021EAP1115},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieiceta/DaiZZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/LinZZ22,
  author       = {Kaizhan Lin and
                  Fangguo Zhang and
                  Chang{-}An Zhao},
  title        = {Faster Key Generation of Supersingular Isogeny Diffie-Hellman},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {105-A},
  number       = {12},
  pages        = {1551--1558},
  year         = {2022},
  url          = {https://doi.org/10.1587/transfun.2022eap1026},
  doi          = {10.1587/TRANSFUN.2022EAP1026},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieiceta/LinZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/WangCLLSZ22,
  author       = {Ping Wang and
                  Weiqian Chen and
                  Songlian Lin and
                  Liyan Liu and
                  Zhiwei Sun and
                  Fangguo Zhang},
  title        = {Consensus algorithm based on verifiable quantum random numbers},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {10},
  pages        = {6857--6876},
  year         = {2022},
  url          = {https://doi.org/10.1002/int.22865},
  doi          = {10.1002/INT.22865},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijis/WangCLLSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ZhangXZ22,
  author       = {Zheng Zhang and
                  Shaohao Xie and
                  Fangguo Zhang},
  title        = {Topology-hiding garbled circuits without universal circuits},
  journal      = {Int. J. Inf. Sec.},
  volume       = {21},
  number       = {2},
  pages        = {341--356},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10207-021-00556-5},
  doi          = {10.1007/S10207-021-00556-5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/ZhangXZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/HuangJHZ22,
  author       = {Yan Huang and
                  Yan Jin and
                  Zhi Hu and
                  Fangguo Zhang},
  title        = {Optimizing the evaluation of \emph{{\(\mathscr{l}\)}}-isogenous curve
                  for isogeny-based cryptography},
  journal      = {Inf. Process. Lett.},
  volume       = {178},
  pages        = {106301},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ipl.2022.106301},
  doi          = {10.1016/J.IPL.2022.106301},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/HuangJHZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/WanCZ22,
  author       = {Yunqi Wan and
                  Li Chen and
                  Fangguo Zhang},
  title        = {Algebraic Soft Decoding of Elliptic Codes},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {70},
  number       = {3},
  pages        = {1522--1534},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCOMM.2022.3146278},
  doi          = {10.1109/TCOMM.2022.3146278},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/WanCZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/TianWZSL22,
  author       = {Haibo Tian and
                  Yanchuan Wen and
                  Fangguo Zhang and
                  Yunfeng Shao and
                  Bingshuai Li},
  editor       = {Xiaofeng Chen and
                  Jian Shen and
                  Willy Susilo},
  title        = {A Distributed Threshold Additive Homomorphic Encryption for Federated
                  Learning with Dropout Resiliency Based on Lattice},
  booktitle    = {Cyberspace Safety and Security - 14th International Symposium, {CSS}
                  2022, Xi'an, China, October 16-18, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13547},
  pages        = {277--292},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-18067-5\_20},
  doi          = {10.1007/978-3-031-18067-5\_20},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/css/TianWZSL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/ZuoTAZ22,
  author       = {Ruozhou Zuo and
                  Haibo Tian and
                  Zhiyuan An and
                  Fangguo Zhang},
  editor       = {Xiaofeng Chen and
                  Jian Shen and
                  Willy Susilo},
  title        = {Post-quantum Privacy-Preserving Aggregation in Federated Learning
                  Based on Lattice},
  booktitle    = {Cyberspace Safety and Security - 14th International Symposium, {CSS}
                  2022, Xi'an, China, October 16-18, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13547},
  pages        = {314--326},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-18067-5\_23},
  doi          = {10.1007/978-3-031-18067-5\_23},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/css/ZuoTAZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/WanCZ22,
  author       = {Yunqi Wan and
                  Li Chen and
                  Fangguo Zhang},
  title        = {Algebraic Chase Decoding of Elliptic Codes Through Computing the Gr{\"{o}}bner
                  Basis},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2022,
                  Espoo, Finland, June 26 - July 1, 2022},
  pages        = {180--185},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISIT50566.2022.9834889},
  doi          = {10.1109/ISIT50566.2022.9834889},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/WanCZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ChenTZ22,
  author       = {Jianzhang Chen and
                  Haibo Tian and
                  Fangguo Zhang},
  editor       = {Willy Susilo and
                  Xiaofeng Chen and
                  Fuchun Guo and
                  Yudi Zhang and
                  Rolly Intan},
  title        = {Searching for Encrypted Data on Blockchain: An Efficient, Secure and
                  Fair Realization},
  booktitle    = {Information Security - 25th International Conference, {ISC} 2022,
                  Bali, Indonesia, December 18-22, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13640},
  pages        = {194--213},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22390-7\_13},
  doi          = {10.1007/978-3-031-22390-7\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/ChenTZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/AnPWZ22,
  author       = {Zhiyuan An and
                  Jing Pan and
                  Yamin Wen and
                  Fangguo Zhang},
  editor       = {Jung Hee Cheon and
                  Thomas Johansson},
  title        = {Forward-Secure Revocable Secret Handshakes from Lattices},
  booktitle    = {Post-Quantum Cryptography - 13th International Workshop, PQCrypto
                  2022, Virtual Event, September 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13512},
  pages        = {453--479},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17234-2\_21},
  doi          = {10.1007/978-3-031-17234-2\_21},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/AnPWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialsec/ZhangTZ22,
  author       = {Zhuoran Zhang and
                  Haibo Tian and
                  Fangguo Zhang},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Miroslaw Kutylowski},
  title        = {Improved {WAVE} Signature and Apply to Post-quantum Blockchain},
  booktitle    = {Security and Privacy in Social Networks and Big Data - 8th International
                  Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1663},
  pages        = {309--323},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-981-19-7242-3\_20},
  doi          = {10.1007/978-981-19-7242-3\_20},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialsec/ZhangTZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaiZZ22,
  author       = {Yu Dai and
                  Fangguo Zhang and
                  Chang{-}An Zhao},
  title        = {Fast Hashing to G\({}_{\mbox{2}}\) in Direct Anonymous Attestation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {996},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/996},
  timestamp    = {Wed, 04 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaiZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangSZ22,
  author       = {Ping Wang and
                  Yiting Su and
                  Fangguo Zhang},
  title        = {Secure Quantum Bit Commitment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1238},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1238},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangDLZMLYZZ22,
  author       = {Haibin Zhang and
                  Sisi Duan and
                  Chao Liu and
                  Boxin Zhao and
                  Xuanji Meng and
                  Shengli Liu and
                  Yong Yu and
                  Fangguo Zhang and
                  Liehuang Zhu},
  title        = {Practical Asynchronous Distributed Key Generation: Improved Efficiency,
                  Weaker Assumption, and Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1678},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1678},
  timestamp    = {Fri, 06 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangDLZMLYZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/ZhangZ21b,
  author       = {Zheng Zhang and
                  Fangguo Zhang},
  title        = {Functional encryption for cubic polynomials and implementation},
  journal      = {Theor. Comput. Sci.},
  volume       = {885},
  pages        = {41--54},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.tcs.2021.06.020},
  doi          = {10.1016/J.TCS.2021.06.020},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/ZhangZ21b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuCZLWTX21,
  author       = {Lingling Xu and
                  Xiaofeng Chen and
                  Fangguo Zhang and
                  Wanhua Li and
                  Hao{-}Tian Wu and
                  Shaohua Tang and
                  Yang Xiang},
  title        = {{ASBKS:} Towards Attribute Set Based Keyword Search Over Encrypted
                  Personal Health Records},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {6},
  pages        = {2941--2952},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2020.2970928},
  doi          = {10.1109/TDSC.2020.2970928},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/XuCZLWTX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/WanCZ21,
  author       = {Yunqi Wan and
                  Li Chen and
                  Fangguo Zhang},
  title        = {Guruswami-Sudan Decoding of Elliptic Codes Through Module Basis Reduction},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {67},
  number       = {11},
  pages        = {7197--7209},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIT.2021.3109447},
  doi          = {10.1109/TIT.2021.3109447},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/WanCZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/XieZC21,
  author       = {Shaohao Xie and
                  Fangguo Zhang and
                  Rong Cheng},
  title        = {Security Enhanced {RFID} Authentication Protocols for Healthcare Environment},
  journal      = {Wirel. Pers. Commun.},
  volume       = {117},
  number       = {1},
  pages        = {71--86},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11277-020-07042-6},
  doi          = {10.1007/S11277-020-07042-6},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wpc/XieZC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PanCZS21,
  author       = {Jing Pan and
                  Xiaofeng Chen and
                  Fangguo Zhang and
                  Willy Susilo},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Forward-Secure Group Encryptions from Lattices},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {610--629},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_31},
  doi          = {10.1007/978-3-030-90567-5\_31},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/PanCZS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PanCZS21,
  author       = {Jing Pan and
                  Xiaofeng Chen and
                  Fangguo Zhang and
                  Willy Susilo},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Lattice-Based Group Encryption with Full Dynamicity and Message Filtering
                  Policy},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13093},
  pages        = {156--186},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92068-5\_6},
  doi          = {10.1007/978-3-030-92068-5\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PanCZS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/NassurdineZZ21,
  author       = {Mohamed Nassurdine and
                  Huang Zhang and
                  Fangguo Zhang},
  editor       = {Yu Yu and
                  Moti Yung},
  title        = {Identity Based Linkable Ring Signature with Logarithmic Size},
  booktitle    = {Information Security and Cryptology - 17th International Conference,
                  Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13007},
  pages        = {42--60},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88323-2\_3},
  doi          = {10.1007/978-3-030-88323-2\_3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/NassurdineZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/AnZWZ21,
  author       = {Zhiyuan An and
                  Zhuoran Zhang and
                  Yamin Wen and
                  Fangguo Zhang},
  editor       = {Debin Gao and
                  Qi Li and
                  Xiaohong Guan and
                  Xiaofeng Liao},
  title        = {Lattice-Based Secret Handshakes with Reusable Credentials},
  booktitle    = {Information and Communications Security - 23rd International Conference,
                  {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12919},
  pages        = {231--248},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88052-1\_14},
  doi          = {10.1007/978-3-030-88052-1\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/AnZWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/WanCZ21,
  author       = {Yunqi Wan and
                  Li Chen and
                  Fangguo Zhang},
  title        = {Algebraic Soft Decoding of Elliptic Codes},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2021,
                  Melbourne, Australia, July 12-20, 2021},
  pages        = {521--526},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISIT45174.2021.9518148},
  doi          = {10.1109/ISIT45174.2021.9518148},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/WanCZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcat/GuanWZZ21,
  author       = {Peidong Guan and
                  Yunqi Wan and
                  Zhuoran Zhang and
                  Fangguo Zhang},
  editor       = {Hong Shen and
                  Yingpeng Sang and
                  Yong Zhang and
                  Nong Xiao and
                  Hamid R. Arabnia and
                  Geoffrey C. Fox and
                  Ajay Gupta and
                  Manu Malek},
  title        = {Efficient List Decoding Applied to {\textdollar}{\textbackslash}mathrm\{ECC\}{\^{}}2{\textdollar}},
  booktitle    = {Parallel and Distributed Computing, Applications and Technologies
                  - 22nd International Conference, {PDCAT} 2021, Guangzhou, China, December
                  17-19, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13148},
  pages        = {560--567},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-96772-7\_52},
  doi          = {10.1007/978-3-030-96772-7\_52},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdcat/GuanWZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ZhangZZ21,
  author       = {Zhuoran Zhang and
                  Zheng Zhang and
                  Fangguo Zhang},
  editor       = {Qiong Huang and
                  Yu Yu},
  title        = {Inner-Product Functional Encryption from Random Linear Codes: Trial
                  and Challenges},
  booktitle    = {Provable and Practical Security - 15th International Conference, ProvSec
                  2021, Guangzhou, China, November 5-8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13059},
  pages        = {259--276},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90402-9\_14},
  doi          = {10.1007/978-3-030-90402-9\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/ZhangZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-10753,
  author       = {Haibo Tian and
                  Fangguo Zhang and
                  Yunfeng Shao and
                  Bingshuai Li},
  title        = {Secure Linear Aggregation Using Decentralized Threshold Additive Homomorphic
                  Encryption For Federated Learning},
  journal      = {CoRR},
  volume       = {abs/2111.10753},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.10753},
  eprinttype    = {arXiv},
  eprint       = {2111.10753},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-10753.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaiZZZ21,
  author       = {Yu Dai and
                  Zijian Zhou and
                  Fangguo Zhang and
                  Chang{-}An Zhao},
  title        = {Software Implementation of Optimal Pairings on Elliptic Curves with
                  Odd Prime Embedding Degrees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1162},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1162},
  timestamp    = {Wed, 04 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaiZZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinZZ21,
  author       = {Kaizhan Lin and
                  Fangguo Zhang and
                  Chang{-}An Zhao},
  title        = {Faster Key Generation of Supersingular Isogeny Diffie-Hellman},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1320},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1320},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZ21,
  author       = {Chao Chen and
                  Fangguo Zhang},
  title        = {Richelot Isogenies, Pairings on Squared Kummer Surfaces and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1617},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1617},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WenZWMG20,
  author       = {Yamin Wen and
                  Fangguo Zhang and
                  Huaxiong Wang and
                  Yinbin Miao and
                  Zheng Gong},
  title        = {Intersection-policy private mutual authentication from authorized
                  private set intersection},
  journal      = {Sci. China Inf. Sci.},
  volume       = {63},
  number       = {2},
  pages        = {122101},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11432-019-9907-x},
  doi          = {10.1007/S11432-019-9907-X},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/WenZWMG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ChenZZZ20,
  author       = {Zehong Chen and
                  Fangguo Zhang and
                  Peng Zhang and
                  Hanbang Zhao},
  title        = {Multi-user Boolean searchable encryption supporting fast ranking in
                  mobile clouds},
  journal      = {Comput. Commun.},
  volume       = {164},
  pages        = {100--113},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.09.009},
  doi          = {10.1016/J.COMCOM.2020.09.009},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ChenZZZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ZhangZWD20,
  author       = {Huang Zhang and
                  Fangguo Zhang and
                  Baodian Wei and
                  Yusong Du},
  title        = {Implementing confidential transactions with lattice techniques},
  journal      = {{IET} Inf. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {30--38},
  year         = {2020},
  url          = {https://doi.org/10.1049/iet-ifs.2018.5491},
  doi          = {10.1049/IET-IFS.2018.5491},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ZhangZWD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WenZWGMD20,
  author       = {Yamin Wen and
                  Fangguo Zhang and
                  Huaxiong Wang and
                  Zheng Gong and
                  Yinbin Miao and
                  Yuqiao Deng},
  title        = {A new secret handshake scheme with multi-symptom intersection for
                  mobile healthcare social networks},
  journal      = {Inf. Sci.},
  volume       = {520},
  pages        = {142--154},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ins.2020.02.007},
  doi          = {10.1016/J.INS.2020.02.007},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/WenZWGMD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangZG20,
  author       = {Fangguo Zhang and
                  Zhuoran Zhang and
                  Peidong Guan},
  title        = {ECC\({}^{\mbox{2}}\): Error correcting code and elliptic curve based
                  cryptosystem},
  journal      = {Inf. Sci.},
  volume       = {526},
  pages        = {301--320},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ins.2020.03.069},
  doi          = {10.1016/J.INS.2020.03.069},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhangZG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/HuangSZDC20,
  author       = {Yan Huang and
                  Zhaofeng Su and
                  Fangguo Zhang and
                  Yong Ding and
                  Rong Cheng},
  title        = {Quantum algorithm for solving hyperelliptic curve discrete logarithm
                  problem},
  journal      = {Quantum Inf. Process.},
  volume       = {19},
  number       = {2},
  pages        = {62},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11128-019-2562-5},
  doi          = {10.1007/S11128-019-2562-5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/qip/HuangSZDC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/0010YDG00Z020,
  author       = {Fan Zhang and
                  Bolin Yang and
                  Xiaofei Dong and
                  Sylvain Guilley and
                  Zhe Liu and
                  Wei He and
                  Fangguo Zhang and
                  Kui Ren},
  title        = {Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant
                  {SIKE}},
  journal      = {{IEEE} Trans. Computers},
  volume       = {69},
  number       = {11},
  pages        = {1681--1693},
  year         = {2020},
  url          = {https://doi.org/10.1109/TC.2020.3020407},
  doi          = {10.1109/TC.2020.3020407},
  timestamp    = {Tue, 20 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/0010YDG00Z020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuLZCT20,
  author       = {Lingling Xu and
                  Wanhua Li and
                  Fangguo Zhang and
                  Rong Cheng and
                  Shaohua Tang},
  title        = {Authorized Keyword Searches on Public Key Encrypted Data With Time
                  Controlled Keyword Privacy},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2096--2109},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2957691},
  doi          = {10.1109/TIFS.2019.2957691},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuLZCT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/ShiWZLHF20,
  author       = {Yang Shi and
                  Wujing Wei and
                  Fangguo Zhang and
                  Xiapu Luo and
                  Zongjian He and
                  Hongfei Fan},
  title        = {{SDSRS:} {A} Novel White-Box Cryptography Scheme for Securing Embedded
                  Devices in IIoT},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {16},
  number       = {3},
  pages        = {1602--1616},
  year         = {2020},
  url          = {https://doi.org/10.1109/TII.2019.2929431},
  doi          = {10.1109/TII.2019.2929431},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/ShiWZLHF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HuangZHL20,
  author       = {Yan Huang and
                  Fangguo Zhang and
                  Zhi Hu and
                  Zhijie Liu},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Optimized Arithmetic Operations for Isogeny-Based Cryptography on
                  Huff Curves},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {23--40},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_2},
  doi          = {10.1007/978-3-030-55304-3\_2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/HuangZHL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/0001HZHL20,
  author       = {Yudi Zhang and
                  Debiao He and
                  Fangguo Zhang and
                  Xinyi Huang and
                  Dawei Li},
  editor       = {Yongdong Wu and
                  Moti Yung},
  title        = {An Efficient Blind Signature Scheme Based on {SM2} Signature Algorithm},
  booktitle    = {Information Security and Cryptology - 16th International Conference,
                  Inscrypt 2020, Guangzhou, China, December 11-14, 2020, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12612},
  pages        = {368--384},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-71852-7\_25},
  doi          = {10.1007/978-3-030-71852-7\_25},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/0001HZHL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZhangZT20,
  author       = {Zhuoran Zhang and
                  Fangguo Zhang and
                  Haibo Tian},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {{CSH:} {A} Post-quantum Secret Handshake Scheme from Coding Theory},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12309},
  pages        = {317--335},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59013-0\_16},
  doi          = {10.1007/978-3-030-59013-0\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ZhangZT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcs2/TianLZ20,
  author       = {Haibo Tian and
                  Huizhi Lin and
                  Fangguo Zhang},
  editor       = {Guangquan Xu and
                  Kaitai Liang and
                  Chunhua Su},
  title        = {Design a Proof of Stake Based Directed Acyclic Graph Chain},
  booktitle    = {Frontiers in Cyber Security - Third International Conference, {FCS}
                  2020, Tianjin, China, November 15-17, 2020, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1286},
  pages        = {150--165},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-15-9739-8\_13},
  doi          = {10.1007/978-981-15-9739-8\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fcs2/TianLZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/CaoZGC20,
  author       = {Yanmei Cao and
                  Fangguo Zhang and
                  Chongzhi Gao and
                  Xiaofeng Chen},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {New Practical Public-Key Deniable Encryption},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {147--163},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_9},
  doi          = {10.1007/978-3-030-61078-4\_9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/CaoZGC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/WanCZ20,
  author       = {Yunqi Wan and
                  Li Chen and
                  Fangguo Zhang},
  title        = {Algebraic List Decoding of Elliptic Codes Through Module Basis Reduction},
  booktitle    = {International Symposium on Information Theory and Its Applications,
                  {ISITA} 2020, Kapolei, HI, USA, October 24-27, 2020},
  pages        = {185--189},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://ieeexplore.ieee.org/document/9366164},
  timestamp    = {Fri, 22 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/WanCZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HuangZLZ19,
  author       = {Yan Huang and
                  Fangguo Zhang and
                  Zhijie Liu and
                  Huang Zhang},
  title        = {An Efficient Signature Scheme From Supersingular Elliptic Curve Isogenies},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {129834--129847},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2938682},
  doi          = {10.1109/ACCESS.2019.2938682},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HuangZLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/LiTZH19,
  author       = {Huige Li and
                  Haibo Tian and
                  Fangguo Zhang and
                  Jiejie He},
  title        = {Blockchain-based searchable symmetric encryption scheme},
  journal      = {Comput. Electr. Eng.},
  volume       = {73},
  pages        = {32--45},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.compeleceng.2018.10.015},
  doi          = {10.1016/J.COMPELECENG.2018.10.015},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/LiTZH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/LiZLTH19,
  author       = {Huige Li and
                  Fangguo Zhang and
                  Peiran Luo and
                  Haibo Tian and
                  Jiejie He},
  title        = {How to retrieve the encrypted data on the blockchain},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {13},
  number       = {11},
  pages        = {5560--5579},
  year         = {2019},
  url          = {https://doi.org/10.3837/tiis.2019.11.016},
  doi          = {10.3837/TIIS.2019.11.016},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/LiZLTH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/ZhangZCT19,
  author       = {Huang Zhang and
                  Fangguo Zhang and
                  Rong Cheng and
                  Haibo Tian},
  title        = {Efficient obfuscation for {CNF} circuits and applications in cloud
                  computing},
  journal      = {Soft Comput.},
  volume       = {23},
  number       = {6},
  pages        = {2061--2072},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00500-017-2921-z},
  doi          = {10.1007/S00500-017-2921-Z},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/ZhangZCT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/WangZZ19,
  author       = {Bingsen Wang and
                  Zhuoran Zhang and
                  Fangguo Zhang},
  title        = {Subliminal Channels in the Code-based Ring Signature Scheme},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {146--150},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.00011},
  doi          = {10.1109/ASIAJCIS.2019.00011},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/WangZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhangLWT19,
  author       = {Fangguo Zhang and
                  Zhijie Liu and
                  Ping Wang and
                  Haibo Tian},
  editor       = {Zhe Liu and
                  Moti Yung},
  title        = {Improving {ECDLP} Computation in Characteristic 2},
  booktitle    = {Information Security and Cryptology - 15th International Conference,
                  Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12020},
  pages        = {535--550},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-42921-8\_32},
  doi          = {10.1007/978-3-030-42921-8\_32},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhangLWT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/ZhangZ19,
  author       = {Fangguo Zhang and
                  Zhuoran Zhang},
  editor       = {Jaideep Vaidya and
                  Xiao Zhang and
                  Jin Li},
  title        = {ECC\({}^{\mbox{2}}\): Error Correcting Code and Elliptic Curve Based
                  Cryptosystem},
  booktitle    = {Cyberspace Safety and Security - 11th International Symposium, {CSS}
                  2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11982},
  pages        = {214--229},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37337-5\_17},
  doi          = {10.1007/978-3-030-37337-5\_17},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/css/ZhangZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/WanCZ19,
  author       = {Yunqi Wan and
                  Li Chen and
                  Fangguo Zhang},
  title        = {Design of Guruswami-Sudan List Decoding for Elliptic Codes},
  booktitle    = {2019 {IEEE} Information Theory Workshop, {ITW} 2019, Visby, Sweden,
                  August 25-28, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ITW44776.2019.8989286},
  doi          = {10.1109/ITW44776.2019.8989286},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itw/WanCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ZhangL19,
  author       = {Fangguo Zhang and
                  Shengli Liu},
  editor       = {Ron Steinfeld and
                  Tsz Hon Yuen},
  title        = {Solving {ECDLP} via List Decoding},
  booktitle    = {Provable Security - 13th International Conference, ProvSec 2019, Cairns,
                  QLD, Australia, October 1-4, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11821},
  pages        = {222--244},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31919-9\_13},
  doi          = {10.1007/978-3-030-31919-9\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/ZhangL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ChenZZLHZS18,
  author       = {Zehong Chen and
                  Fangguo Zhang and
                  Peng Zhang and
                  Joseph K. Liu and
                  Jiwu Huang and
                  Hanbang Zhao and
                  Jian Shen},
  title        = {Verifiable keyword search for secure big data-based mobile healthcare
                  networks with fine-grained authorization control},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {87},
  pages        = {712--724},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.10.022},
  doi          = {10.1016/J.FUTURE.2017.10.022},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/ChenZZLHZS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/DaiJZ18,
  author       = {Shuguang Dai and
                  Zhengjun Jiang and
                  Fangguo Zhang},
  title        = {Efficient leakage-resilient blind and partially blind signatures},
  journal      = {Int. J. Embed. Syst.},
  volume       = {10},
  number       = {1},
  pages        = {52--61},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJES.2018.10010501},
  doi          = {10.1504/IJES.2018.10010501},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/DaiJZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/MaZCS18,
  author       = {Xu Ma and
                  Fangguo Zhang and
                  Xiaofeng Chen and
                  Jian Shen},
  title        = {Privacy preserving multi-party computation delegation for deep learning
                  in cloud computing},
  journal      = {Inf. Sci.},
  volume       = {459},
  pages        = {103--116},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ins.2018.05.005},
  doi          = {10.1016/J.INS.2018.05.005},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/MaZCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/Tian0DZZ18,
  author       = {Haibo Tian and
                  Xiaofeng Chen and
                  Yong Ding and
                  Xiaoyan Zhu and
                  Fangguo Zhang},
  editor       = {Fuchun Guo and
                  Xinyi Huang and
                  Moti Yung},
  title        = {AFCoin: {A} Framework for Digital Fiat Currency of Central Banks Based
                  on Account Model},
  booktitle    = {Information Security and Cryptology - 14th International Conference,
                  Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11449},
  pages        = {70--85},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-14234-6\_4},
  doi          = {10.1007/978-3-030-14234-6\_4},
  timestamp    = {Tue, 12 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/Tian0DZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ZhangZTA18,
  author       = {Huang Zhang and
                  Fangguo Zhang and
                  Haibo Tian and
                  Man Ho Au},
  editor       = {Sarah Meiklejohn and
                  Kazue Sako},
  title        = {Anonymous Post-Quantum Cryptocash},
  booktitle    = {Financial Cryptography and Data Security - 22nd International Conference,
                  {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10957},
  pages        = {461--479},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-662-58387-6\_25},
  doi          = {10.1007/978-3-662-58387-6\_25},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/ZhangZTA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangL18,
  author       = {Fangguo Zhang and
                  Shengli Liu},
  title        = {Solving {ECDLP} via List Decoding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {795},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/795},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/GalbraithWZ17,
  author       = {Steven D. Galbraith and
                  Ping Wang and
                  Fangguo Zhang},
  title        = {Computing elliptic curve discrete logarithms with improved baby-step
                  giant-step algorithm},
  journal      = {Adv. Math. Commun.},
  volume       = {11},
  number       = {3},
  pages        = {453--469},
  year         = {2017},
  url          = {https://doi.org/10.3934/amc.2017038},
  doi          = {10.3934/AMC.2017038},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amco/GalbraithWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpcn/TangZ17,
  author       = {Jiayong Tang and
                  Fangguo Zhang},
  title        = {A new code-based encryption scheme and its applications},
  journal      = {Int. J. High Perform. Comput. Netw.},
  volume       = {10},
  number       = {6},
  pages        = {515--523},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJHPCN.2017.10008236},
  doi          = {10.1504/IJHPCN.2017.10008236},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijhpcn/TangZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiZF17,
  author       = {Huige Li and
                  Fangguo Zhang and
                  Chun{-}I Fan},
  title        = {Deniable Searchable Symmetric Encryption},
  journal      = {Inf. Sci.},
  volume       = {402},
  pages        = {233--243},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ins.2017.03.032},
  doi          = {10.1016/J.INS.2017.03.032},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/LiZF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/Chen0ZH17,
  author       = {Zehong Chen and
                  Peng Zhang and
                  Fangguo Zhang and
                  Jiwu Huang},
  title        = {Ciphertext policy attribute-based encryption supporting unbounded
                  attribute space from {R-LWE}},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {11},
  number       = {4},
  pages        = {2292--2309},
  year         = {2017},
  url          = {https://doi.org/10.3837/tiis.2017.04.025},
  doi          = {10.3837/TIIS.2017.04.025},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/Chen0ZH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhangZZ17,
  author       = {Zheng Zhang and
                  Fangguo Zhang and
                  Huang Zhang},
  editor       = {Xiaofeng Chen and
                  Dongdai Lin and
                  Moti Yung},
  title        = {Implementing Indistinguishability Obfuscation Using {GGH15}},
  booktitle    = {Information Security and Cryptology - 13th International Conference,
                  Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10726},
  pages        = {27--43},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-75160-3\_4},
  doi          = {10.1007/978-3-319-75160-3\_4},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhangZZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Zhang17,
  author       = {Fangguo Zhang},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {219--235},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_13},
  doi          = {10.1007/978-3-319-68637-0\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/Zhang17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-01030,
  author       = {Huige Li and
                  Fangguo Zhang and
                  Jiejie He and
                  Haibo Tian},
  title        = {A Searchable Symmetric Encryption Scheme using BlockChain},
  journal      = {CoRR},
  volume       = {abs/1711.01030},
  year         = {2017},
  url          = {http://arxiv.org/abs/1711.01030},
  eprinttype    = {arXiv},
  eprint       = {1711.01030},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1711-01030.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiTZ17,
  author       = {Huige Li and
                  Haibo Tian and
                  Fangguo Zhang},
  title        = {Block Chain based Searchable Symmetric Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {447},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/447},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiTZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangZTA17,
  author       = {Huang Zhang and
                  Fangguo Zhang and
                  Haibo Tian and
                  Man Ho Au},
  title        = {Anonymous Post-Quantum Cryptocash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {716},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/716},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangZTA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/DaiLZ16,
  author       = {Shuguang Dai and
                  Huige Li and
                  Fangguo Zhang},
  title        = {Memory leakage-resilient searchable symmetric encryption},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {62},
  pages        = {76--84},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.future.2015.11.003},
  doi          = {10.1016/J.FUTURE.2015.11.003},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/DaiLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/XuZSW16,
  author       = {Lingling Xu and
                  Fangguo Zhang and
                  Willy Susilo and
                  Yamin Wen},
  title        = {Solutions to the anti-piracy problem in oblivious transfer},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {82},
  number       = {3},
  pages        = {466--476},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jcss.2015.11.003},
  doi          = {10.1016/J.JCSS.2015.11.003},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/XuZSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TianZW16,
  author       = {Haibo Tian and
                  Fangguo Zhang and
                  Baodian Wei},
  title        = {A lattice-based partially blind signature},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {12},
  pages        = {1820--1828},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1439},
  doi          = {10.1002/SEC.1439},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/TianZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HanLZC16,
  author       = {Shuai Han and
                  Shengli Liu and
                  Fangguo Zhang and
                  Kefei Chen},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {Homomorphic Linear Authentication Schemes from ({\(\epsilon\)})-Authentication
                  Codes},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {487--498},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897859},
  doi          = {10.1145/2897845.2897859},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HanLZC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/DaiWH15,
  author       = {Shuguang Dai and
                  Jinfeng Wei and
                  Fangguo Zhang},
  title        = {Memory leakage-resilient secret sharing schemes},
  journal      = {Sci. China Inf. Sci.},
  volume       = {58},
  number       = {11},
  pages        = {1--9},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11432-015-5385-8},
  doi          = {10.1007/S11432-015-5385-8},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/DaiWH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/ChengZ15,
  author       = {Rong Cheng and
                  Fangguo Zhang},
  title        = {Obfuscation for multi-use re-encryption and its application in cloud
                  computing},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {27},
  number       = {8},
  pages        = {2170--2190},
  year         = {2015},
  url          = {https://doi.org/10.1002/cpe.3399},
  doi          = {10.1002/CPE.3399},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/ChengZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Ma0Z15,
  author       = {Xu Ma and
                  Jin Li and
                  Fangguo Zhang},
  title        = {Refereed Computation Delegation of Private Sequence Comparison in
                  Cloud Computing},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {6},
  pages        = {743--753},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p743-753.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Ma0Z15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChengZ15,
  author       = {Rong Cheng and
                  Fangguo Zhang},
  title        = {Lattice-based obfuscation for re-encryption functions},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1648--1658},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1112},
  doi          = {10.1002/SEC.1112},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ChengZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/DiaoZC15,
  author       = {Feng Diao and
                  Fangguo Zhang and
                  Xiangguo Cheng},
  title        = {A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous
                  Credential},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {6},
  number       = {1},
  pages        = {461--467},
  year         = {2015},
  url          = {https://doi.org/10.1109/TSG.2014.2358225},
  doi          = {10.1109/TSG.2014.2358225},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/DiaoZC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TianZR15,
  author       = {Haibo Tian and
                  Fangguo Zhang and
                  Kui Ren},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {Secure Bilinear Pairing Outsourcing Made More Efficient and Flexible},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {417--426},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714615},
  doi          = {10.1145/2714576.2714615},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TianZR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChengYGZR15,
  author       = {Rong Cheng and
                  Jingbo Yan and
                  Chaowen Guan and
                  Fangguo Zhang and
                  Kui Ren},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {Verifiable Searchable Symmetric Encryption from Indistinguishability
                  Obfuscation},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {621--626},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714623},
  doi          = {10.1145/2714576.2714623},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChengYGZR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GuanRZKY15,
  author       = {Chaowen Guan and
                  Kui Ren and
                  Fangguo Zhang and
                  Florian Kerschbaum and
                  Jia Yu},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Symmetric-Key Based Proofs of Retrievability Supporting Public Verification},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9326},
  pages        = {203--223},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24174-6\_11},
  doi          = {10.1007/978-3-319-24174-6\_11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/GuanRZKY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuWZZ15,
  author       = {Yusong Du and
                  Baodian Wei and
                  Fangguo Zhang and
                  Huang Zhang},
  title        = {On the (Fast) Algebraic Immunity of Boolean Power Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {435},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/435},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuWZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuWZZ15a,
  author       = {Yusong Du and
                  Baodian Wei and
                  Fangguo Zhang and
                  Huang Zhang},
  title        = {On the Resistance of Prime-variable Rotation Symmetric Boolean Functions
                  against Fast Algebraic Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {436},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/436},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuWZZ15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithWZ15,
  author       = {Steven D. Galbraith and
                  Ping Wang and
                  Fangguo Zhang},
  title        = {Computing Elliptic Curve Discrete Logarithms with Improved Baby-step
                  Giant-step Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {605},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/605},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhang15a,
  author       = {Fangguo Zhang},
  title        = {Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {614},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/614},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhang15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangZWD15,
  author       = {Huang Zhang and
                  Fangguo Zhang and
                  Baodian Wei and
                  Yusong Du},
  title        = {Self-bilinear Map from One Way Encoding System and Indistinguishability
                  Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {747},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/747},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangZWD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/ZhangCZ14,
  author       = {Bo Zhang and
                  Rong Cheng and
                  Fangguo Zhang},
  title        = {Secure Hamming distance based record linkage with malicious adversaries},
  journal      = {Comput. Electr. Eng.},
  volume       = {40},
  number       = {6},
  pages        = {1906--1916},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.compeleceng.2013.07.008},
  doi          = {10.1016/J.COMPELECENG.2013.07.008},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/ZhangCZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhangZ14,
  author       = {Bo Zhang and
                  Fangguo Zhang},
  title        = {Secure linear system computation in the presence of malicious adversaries},
  journal      = {Sci. China Inf. Sci.},
  volume       = {57},
  number       = {9},
  pages        = {1--10},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11432-014-5160-2},
  doi          = {10.1007/S11432-014-5160-2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhangZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/ZhangZ14,
  author       = {Bo Zhang and
                  Fangguo Zhang},
  title        = {Secure similarity coefficients computation for binary data and its
                  extensions},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {26},
  number       = {5},
  pages        = {1023--1037},
  year         = {2014},
  url          = {https://doi.org/10.1002/cpe.3059},
  doi          = {10.1002/CPE.3059},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/ZhangZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/LiuZC14,
  author       = {Shengli Liu and
                  Fangguo Zhang and
                  Kefei Chen},
  title        = {Public-key encryption scheme with selective opening chosen-ciphertext
                  security based on the Decisional Diffie-Hellman assumption},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {26},
  number       = {8},
  pages        = {1506--1519},
  year         = {2014},
  url          = {https://doi.org/10.1002/cpe.3021},
  doi          = {10.1002/CPE.3021},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/LiuZC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/0001ZSTLK14,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Willy Susilo and
                  Haibo Tian and
                  Jin Li and
                  Kwangjo Kim},
  title        = {Identity-based chameleon hashing and signatures without key exposure},
  journal      = {Inf. Sci.},
  volume       = {265},
  pages        = {198--210},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2013.12.020},
  doi          = {10.1016/J.INS.2013.12.020},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/0001ZSTLK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangML14a,
  author       = {Fangguo Zhang and
                  Xu Ma and
                  Shengli Liu},
  title        = {Efficient computation outsourcing for inverting a class of homomorphic
                  functions},
  journal      = {Inf. Sci.},
  volume       = {286},
  pages        = {19--28},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.07.017},
  doi          = {10.1016/J.INS.2014.07.017},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ZhangML14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XuZT14,
  author       = {Lingling Xu and
                  Fangguo Zhang and
                  Shaohua Tang},
  title        = {Timed-release oblivious transfer},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {7},
  pages        = {1138--1149},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.845},
  doi          = {10.1002/SEC.845},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/XuZT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/ShaoCZ14,
  author       = {Fei Shao and
                  Rong Cheng and
                  Fangguo Zhang},
  editor       = {Linawati and
                  Made Sudiana Mahendra and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Ilsun You},
  title        = {A Full Privacy-Preserving Scheme for Location-Based Services},
  booktitle    = {Information and Communication Technology - Second {IFIP} {TC5/8} International
                  Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8407},
  pages        = {596--601},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55032-4\_61},
  doi          = {10.1007/978-3-642-55032-4\_61},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/ShaoCZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/WeiDZZTG14,
  author       = {Baodian Wei and
                  Yusong Du and
                  Huang Zhang and
                  Fangguo Zhang and
                  Haibo Tian and
                  Chong{-}zhi Gao},
  editor       = {Man Ho Au and
                  Barbara Carminati and
                  C.{-}C. Jay Kuo},
  title        = {Identity Based Threshold Ring Signature from Lattices},
  booktitle    = {Network and System Security - 8th International Conference, {NSS}
                  2014, Xi'an, China, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8792},
  pages        = {233--245},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11698-3\_18},
  doi          = {10.1007/978-3-319-11698-3\_18},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/WeiDZZTG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pairing/2013,
  editor       = {Zhenfu Cao and
                  Fangguo Zhang},
  title        = {Pairing-Based Cryptography - Pairing 2013 - 6th International Conference,
                  Beijing, China, November 22-24, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8365},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04873-4},
  doi          = {10.1007/978-3-319-04873-4},
  isbn         = {978-3-319-04872-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/TianZ0W13,
  author       = {Haibo Tian and
                  Fangguo Zhang and
                  Xiaofeng Chen and
                  Baodian Wei},
  title        = {Selectively unforgeable but existentially forgeable signature schemes
                  and applications},
  journal      = {Sci. China Inf. Sci.},
  volume       = {56},
  number       = {1},
  pages        = {1--14},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11432-012-4718-0},
  doi          = {10.1007/S11432-012-4718-0},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/TianZ0W13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/MaLZ13,
  author       = {Xu Ma and
                  Jin Li and
                  Fangguo Zhang},
  title        = {Outsourcing computation of modular exponentiations in cloud computing},
  journal      = {Clust. Comput.},
  volume       = {16},
  number       = {4},
  pages        = {787--796},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10586-013-0252-0},
  doi          = {10.1007/S10586-013-0252-0},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cluster/MaLZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangW13,
  author       = {Fangguo Zhang and
                  Ping Wang},
  title        = {Speeding up elliptic curve discrete logarithm computations with point
                  halving},
  journal      = {Des. Codes Cryptogr.},
  volume       = {67},
  number       = {2},
  pages        = {197--208},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10623-011-9599-5},
  doi          = {10.1007/S10623-011-9599-5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/YangCLXZ13,
  author       = {Jinfeng Yang and
                  Rong Cheng and
                  Wenming Liu and
                  Yong Xiao and
                  Fangguo Zhang},
  title        = {Cryptoanalysis and improvement of smart prepayment meter protocol
                  in standard {Q/GDW} 365},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {4},
  number       = {1},
  pages        = {40--46},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJGUC.2013.054489},
  doi          = {10.1504/IJGUC.2013.054489},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijguc/YangCLXZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/Tian0ZWJL13,
  author       = {Haibo Tian and
                  Xiaofeng Chen and
                  Fangguo Zhang and
                  Baodian Wei and
                  Zhengtao Jiang and
                  Yi Liu},
  title        = {A non-delegatable strong designated verifier signature in ID-based
                  setting for mobile environment},
  journal      = {Math. Comput. Model.},
  volume       = {58},
  number       = {5-6},
  pages        = {1289--1300},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.mcm.2013.01.010},
  doi          = {10.1016/J.MCM.2013.01.010},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/Tian0ZWJL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiuSWZZ13,
  author       = {Shengli Liu and
                  Kouichi Sakurai and
                  Jian Weng and
                  Fangguo Zhang and
                  Yunlei Zhao},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Security Model and Analysis of FHMQV, Revisited},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {255--269},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_16},
  doi          = {10.1007/978-3-319-12087-4\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/LiuSWZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eidwt/WangZ13,
  author       = {Ping Wang and
                  Fangguo Zhang},
  title        = {Improving the Parallelized Pollard Rho Method for Computing Elliptic
                  Curve Discrete Logarithms},
  booktitle    = {2013 Fourth International Conference on Emerging Intelligent Data
                  and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013},
  pages        = {285--291},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/EIDWT.2013.55},
  doi          = {10.1109/EIDWT.2013.55},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eidwt/WangZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eidwt/MaZL13,
  author       = {Xu Ma and
                  Fangguo Zhang and
                  Jin Li},
  title        = {Verifiable Evaluation of Private Polynomials},
  booktitle    = {2013 Fourth International Conference on Emerging Intelligent Data
                  and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013},
  pages        = {451--458},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/EIDWT.2013.82},
  doi          = {10.1109/EIDWT.2013.82},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eidwt/MaZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/ChengZ13,
  author       = {Rong Cheng and
                  Fangguo Zhang},
  title        = {Secure Obfuscation of Conditional Re-encryption with Keyword Search},
  booktitle    = {2013 5th International Conference on Intelligent Networking and Collaborative
                  Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages        = {30--37},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INCoS.2013.15},
  doi          = {10.1109/INCOS.2013.15},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/ChengZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/ChengDZ13,
  author       = {Rong Cheng and
                  Feng Diao and
                  Fangguo Zhang},
  title        = {On Obfuscating Set-Membership Predicate Functions},
  booktitle    = {2013 5th International Conference on Intelligent Networking and Collaborative
                  Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages        = {304--308},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INCoS.2013.54},
  doi          = {10.1109/INCOS.2013.54},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/ChengDZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangML13,
  author       = {Fangguo Zhang and
                  Xu Ma and
                  Shengli Liu},
  title        = {Efficient Computation Outsourcing for Inverting a Class of Homomorphic
                  Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {44},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/044},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangML13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/WenZX12,
  author       = {Yamin Wen and
                  Fangguo Zhang and
                  Lingling Xu},
  title        = {Secret handshakes from ID-based message recovery signatures: {A} new
                  generic approach},
  journal      = {Comput. Electr. Eng.},
  volume       = {38},
  number       = {1},
  pages        = {96--104},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.compeleceng.2011.11.020},
  doi          = {10.1016/J.COMPELECENG.2011.11.020},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/WenZX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhaoZ12,
  author       = {Xingwen Zhao and
                  Fangguo Zhang},
  title        = {Tracing and revoking scheme for dynamic privileges against pirate
                  rebroadcast},
  journal      = {Comput. Secur.},
  volume       = {31},
  number       = {1},
  pages        = {59--69},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.cose.2011.11.002},
  doi          = {10.1016/J.COSE.2011.11.002},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhaoZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LinZ12,
  author       = {Qiping Lin and
                  Fangguo Zhang},
  title        = {Scalar Multiplication on Kummer Surface Revisited},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {410--413},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.410},
  doi          = {10.1587/TRANSFUN.E95.A.410},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/LinZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/DuZ12,
  author       = {Yusong Du and
                  Fangguo Zhang},
  title        = {A Class of 1-Resilient Functions in Odd Variables with High Nonlinearity
                  and Suboptimal Algebraic Immunity},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {417--420},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.417},
  doi          = {10.1587/TRANSFUN.E95.A.417},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/DuZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaSI/ZhaoZ12,
  author       = {Xingwen Zhao and
                  Fangguo Zhang},
  title        = {Times Limited Accountable Anonymous Online Submission Control System
                  from Single-Verifier \emph{k}-times Group Signature},
  journal      = {Informatica (Slovenia)},
  volume       = {36},
  number       = {1},
  pages        = {75--82},
  year         = {2012},
  url          = {http://www.informatica.si/index.php/informatica/article/view/386},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/informaticaSI/ZhaoZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/LinZ12,
  author       = {Qiping Lin and
                  Fangguo Zhang},
  title        = {Efficient precomputation schemes of kP+IQ},
  journal      = {Inf. Process. Lett.},
  volume       = {112},
  number       = {11},
  pages        = {462--466},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ipl.2012.03.010},
  doi          = {10.1016/J.IPL.2012.03.010},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/LinZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangZ12,
  author       = {Ping Wang and
                  Fangguo Zhang},
  title        = {Computing elliptic curve discrete logarithms with the negation map},
  journal      = {Inf. Sci.},
  volume       = {195},
  pages        = {277--286},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ins.2012.01.044},
  doi          = {10.1016/J.INS.2012.01.044},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/WangZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiZCKW12,
  author       = {Jin Li and
                  Fangguo Zhang and
                  Xiaofeng Chen and
                  Kwangjo Kim and
                  Duncan S. Wong},
  title        = {Generic security-amplifying methods of ordinary digital signatures},
  journal      = {Inf. Sci.},
  volume       = {201},
  pages        = {128--139},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ins.2012.03.006},
  doi          = {10.1016/J.INS.2012.03.006},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/LiZCKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jam/WangZ12,
  author       = {Ping Wang and
                  Fangguo Zhang},
  title        = {An Efficient Collision Detection Method for Computing Discrete Logarithms
                  with Pollard's Rho},
  journal      = {J. Appl. Math.},
  volume       = {2012},
  pages        = {635909:1--635909:15},
  year         = {2012},
  url          = {https://doi.org/10.1155/2012/635909},
  doi          = {10.1155/2012/635909},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jam/WangZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcam/WangZ12,
  author       = {Ping Wang and
                  Fangguo Zhang},
  title        = {Improved Pollard rho method for computing discrete logarithms over
                  finite extension fields},
  journal      = {J. Comput. Appl. Math.},
  volume       = {236},
  number       = {17},
  pages        = {4336--4343},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.cam.2012.03.019},
  doi          = {10.1016/J.CAM.2012.03.019},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcam/WangZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/LinZ12,
  author       = {Qiping Lin and
                  Fangguo Zhang},
  title        = {ECC-Based Grouping-Proof {RFID} for Inpatient Medication Safety},
  journal      = {J. Medical Syst.},
  volume       = {36},
  number       = {6},
  pages        = {3527--3531},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10916-011-9757-3},
  doi          = {10.1007/S10916-011-9757-3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jms/LinZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/ZhaoZ12,
  author       = {Xingwen Zhao and
                  Fangguo Zhang},
  title        = {Fully {CCA2} secure identity-based broadcast encryption with black-box
                  accountable authority},
  journal      = {J. Syst. Softw.},
  volume       = {85},
  number       = {3},
  pages        = {708--716},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jss.2011.09.045},
  doi          = {10.1016/J.JSS.2011.09.045},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/ZhaoZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/ZhaoZX12,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Dongqing Xie},
  title        = {Faster Computation of Self-Pairings},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {5},
  pages        = {3266--3272},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2012.2184850},
  doi          = {10.1109/TIT.2012.2184850},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/ZhaoZX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ZhangLL12,
  author       = {Fangguo Zhang and
                  Qiping Lin and
                  Shengli Liu},
  editor       = {Feng Bao and
                  Pierangela Samarati and
                  Jianying Zhou},
  title        = {Zero-Value Point Attacks on Kummer-Based Cryptosystem},
  booktitle    = {Applied Cryptography and Network Security - 10th International Conference,
                  {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7341},
  pages        = {293--310},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31284-7\_18},
  doi          = {10.1007/978-3-642-31284-7\_18},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/ZhangLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/TianCZWJL12,
  author       = {Haibo Tian and
                  Xiaofeng Chen and
                  Fangguo Zhang and
                  Baodian Wei and
                  Zhengtao Jiang and
                  Yi Liu},
  editor       = {Ilsun You and
                  Leonard Barolli and
                  Antonio Gentile and
                  Hae{-}Duck Joshua Jeong and
                  Marek R. Ogiela and
                  Fatos Xhafa},
  title        = {An Efficient Identity-Based Strong Designated Verifier Signature without
                  Delegatability},
  booktitle    = {Sixth International Conference on Innovative Mobile and Internet Services
                  in Ubiquitous Computing, {IMIS} 2012, Palermo, Italy, July 4-6, 2012},
  pages        = {81--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/IMIS.2012.34},
  doi          = {10.1109/IMIS.2012.34},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imis/TianCZWJL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/ZhangZ12,
  author       = {Bo Zhang and
                  Fangguo Zhang},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Florin Pop and
                  Xiaofeng Chen and
                  Valentin Cristea},
  title        = {Secure Similarity Coefficients Computation with Malicious Adversaries},
  booktitle    = {2012 Fourth International Conference on Intelligent Networking and
                  Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21,
                  2012},
  pages        = {303--310},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/iNCoS.2012.36},
  doi          = {10.1109/INCOS.2012.36},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/ZhangZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/MaLZ12,
  author       = {Xu Ma and
                  Jin Li and
                  Fangguo Zhang},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Florin Pop and
                  Xiaofeng Chen and
                  Valentin Cristea},
  title        = {Efficient and Secure Batch Exponentiations Outsourcing in Cloud Computing},
  booktitle    = {2012 Fourth International Conference on Intelligent Networking and
                  Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21,
                  2012},
  pages        = {600--605},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/iNCoS.2012.31},
  doi          = {10.1109/INCOS.2012.31},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/MaLZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/LiuZC12,
  author       = {Shengli Liu and
                  Fangguo Zhang and
                  Kefei Chen},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Selective Opening Chosen Ciphertext Security Directly from the {DDH}
                  Assumption},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {100--112},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_8},
  doi          = {10.1007/978-3-642-34601-9\_8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/LiuZC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangZ12,
  author       = {Bo Zhang and
                  Fangguo Zhang},
  title        = {Secure Similarity Coefficients Computation with Malicious Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {202},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/202},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuZ12,
  author       = {Yusong Du and
                  Fangguo Zhang},
  title        = {On the Existence of Boolean Functions with Optimal Resistance against
                  Fast Algebraic Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {210},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/210},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/ZhaoZT11,
  author       = {Xingwen Zhao and
                  Fangguo Zhang and
                  Haibo Tian},
  title        = {Dynamic asymmetric group key agreement for ad hoc networks},
  journal      = {Ad Hoc Networks},
  volume       = {9},
  number       = {5},
  pages        = {928--939},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.adhoc.2010.11.002},
  doi          = {10.1016/J.ADHOC.2010.11.002},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/ZhaoZT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/ChenZTWK11,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Haibo Tian and
                  Baodian Wei and
                  Kwangjo Kim},
  title        = {Discrete logarithm based chameleon hashing and signatures without
                  key exposure},
  journal      = {Comput. Electr. Eng.},
  volume       = {37},
  number       = {4},
  pages        = {614--623},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.compeleceng.2011.03.011},
  doi          = {10.1016/J.COMPELECENG.2011.03.011},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/ChenZTWK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhaoXZZC11,
  author       = {Changan Zhao and
                  Dongqing Xie and
                  Fangguo Zhang and
                  Jingwei Zhang and
                  Binglong Chen},
  title        = {Computing bilinear pairings on elliptic curves with automorphisms},
  journal      = {Des. Codes Cryptogr.},
  volume       = {58},
  number       = {1},
  pages        = {35--44},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10623-010-9383-y},
  doi          = {10.1007/S10623-010-9383-Y},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhaoXZZC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhaoZ11,
  author       = {Xingwen Zhao and
                  Fangguo Zhang},
  title        = {A New Type of ID-based Encryption System and Its Application to Pay-TV
                  Systems},
  journal      = {Int. J. Netw. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {161--166},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n3/ijns-2011-v13-n3-p161-166.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhaoZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhaoZ11a,
  author       = {Xingwen Zhao and
                  Fangguo Zhang},
  title        = {Analysis on Hu et al.'s Identity-based Broadcast Encryption},
  journal      = {Int. J. Netw. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {178--180},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n3/ijns-2011-v13-n3-p178-180.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhaoZ11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChenWZTWLLK11,
  author       = {Xiaofeng Chen and
                  Qianhong Wu and
                  Fangguo Zhang and
                  Haibo Tian and
                  Baodian Wei and
                  Byoungcheon Lee and
                  Hyunrok Lee and
                  Kwangjo Kim},
  title        = {New receipt-free voting scheme using double-trapdoor commitment},
  journal      = {Inf. Sci.},
  volume       = {181},
  number       = {8},
  pages        = {1493--1502},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ins.2010.12.012},
  doi          = {10.1016/J.INS.2010.12.012},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ChenWZTWLLK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ZhangZ11,
  author       = {Bo Zhang and
                  Fangguo Zhang},
  title        = {An efficient public key encryption with conjunctive-subset keywords
                  search},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {34},
  number       = {1},
  pages        = {262--267},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.jnca.2010.07.007},
  doi          = {10.1016/J.JNCA.2010.07.007},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ZhangZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/MaXZ11,
  author       = {Xu Ma and
                  Lingling Xu and
                  Fangguo Zhang},
  title        = {Oblivious transfer with timed-release receiver's privacy},
  journal      = {J. Syst. Softw.},
  volume       = {84},
  number       = {3},
  pages        = {460--464},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.jss.2010.11.886},
  doi          = {10.1016/J.JSS.2010.11.886},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/MaXZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/WenZ11,
  author       = {Yamin Wen and
                  Fangguo Zhang},
  title        = {Delegatable secret handshake scheme},
  journal      = {J. Syst. Softw.},
  volume       = {84},
  number       = {12},
  pages        = {2284--2292},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.jss.2011.06.046},
  doi          = {10.1016/J.JSS.2011.06.046},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/WenZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/ChenSZTL11,
  author       = {Xiaofeng Chen and
                  Willy Susilo and
                  Fangguo Zhang and
                  Haibo Tian and
                  Jin Li},
  title        = {Identity-based trapdoor mercurial commitments and applications},
  journal      = {Theor. Comput. Sci.},
  volume       = {412},
  number       = {39},
  pages        = {5498--5512},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.tcs.2011.05.031},
  doi          = {10.1016/J.TCS.2011.05.031},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/ChenSZTL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DuZ11,
  author       = {Yusong Du and
                  Fangguo Zhang},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Finding More Boolean Functions with Maximum Algebraic Immunity Based
                  on Univariate Polynomial Representation},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {47--60},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_4},
  doi          = {10.1007/978-3-642-22497-3\_4},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/DuZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codcry/ZhangW11,
  author       = {Fangguo Zhang and
                  Ping Wang},
  editor       = {Yeow Meng Chee and
                  Zhenbo Guo and
                  San Ling and
                  Fengjing Shao and
                  Yuansheng Tang and
                  Huaxiong Wang and
                  Chaoping Xing},
  title        = {On Relationship of Computational Diffie-Hellman Problem and Computational
                  Square-Root Exponent Problem},
  booktitle    = {Coding and Cryptology - Third International Workshop, {IWCC} 2011,
                  Qingdao, China, May 30-June 3, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6639},
  pages        = {283--293},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20901-7\_19},
  doi          = {10.1007/978-3-642-20901-7\_19},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codcry/ZhangW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/DuZ11,
  author       = {Yusong Du and
                  Fangguo Zhang},
  editor       = {Sihan Qing and
                  Willy Susilo and
                  Guilin Wang and
                  Dongmei Liu},
  title        = {Two Applications of an Incomplete Additive Character Sum to Estimating
                  Nonlinearity of Boolean Functions},
  booktitle    = {Information and Communications Security - 13th International Conference,
                  {ICICS} 2011, Beijing, China, November 23-26, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7043},
  pages        = {190--201},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25243-3\_16},
  doi          = {10.1007/978-3-642-25243-3\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/DuZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/DuZL11,
  author       = {Yusong Du and
                  Fangguo Zhang and
                  Meicheng Liu},
  editor       = {Howon Kim},
  title        = {On the Resistance of Boolean Functions against Fast Algebraic Attacks},
  booktitle    = {Information Security and Cryptology - {ICISC} 2011 - 14th International
                  Conference, Seoul, Korea, November 30 - December 2, 2011. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7259},
  pages        = {261--274},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31912-9\_18},
  doi          = {10.1007/978-3-642-31912-9\_18},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/DuZL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhaoZ11,
  author       = {Xingwen Zhao and
                  Fangguo Zhang},
  editor       = {Feng Bao and
                  Jian Weng},
  title        = {Traitor Tracing against Public Collaboration},
  booktitle    = {Information Security Practice and Experience - 7th International Conference,
                  {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6672},
  pages        = {302--316},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21031-0\_23},
  doi          = {10.1007/978-3-642-21031-0\_23},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhaoZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ChengZZ11,
  author       = {Rong Cheng and
                  Bo Zhang and
                  Fangguo Zhang},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Secure Obfuscation of Encrypted Verifiable Encrypted Signatures},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {188--203},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_14},
  doi          = {10.1007/978-3-642-24316-5\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/ChengZZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangZ11,
  author       = {Ping Wang and
                  Fangguo Zhang},
  title        = {Computing Elliptic Curve Discrete Logarithms with the Negation Map},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/008},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoZ11,
  author       = {Xingwen Zhao and
                  Fangguo Zhang},
  title        = {Traitor Tracing against Public Collaboration (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {84},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/084},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhang11,
  author       = {Fangguo Zhang},
  title        = {The Computational Square-Root Exponent Problem- Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {263},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/263},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangW11,
  author       = {Fangguo Zhang and
                  Ping Wang},
  title        = {Speeding Up Elliptic Curve Discrete Logarithm Computations with Point
                  Halving},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {461},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/461},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/Zhang10,
  author       = {Fangguo Zhang},
  title        = {Twisted Ate pairing on hyperelliptic curves and applications},
  journal      = {Sci. China Inf. Sci.},
  volume       = {53},
  number       = {8},
  pages        = {1528--1538},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11432-010-4024-7},
  doi          = {10.1007/S11432-010-4024-7},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/Zhang10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iasc/WeiZ010,
  author       = {Baodian Wei and
                  Fangguo Zhang and
                  Xiaofeng Chen},
  title        = {Efficient Online/Offline Signcryption Scheme},
  journal      = {Intell. Autom. Soft Comput.},
  volume       = {16},
  number       = {3},
  pages        = {449--459},
  year         = {2010},
  url          = {https://doi.org/10.1080/10798587.2010.10643092},
  doi          = {10.1080/10798587.2010.10643092},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iasc/WeiZ010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenZSTLK10,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Willy Susilo and
                  Haibo Tian and
                  Jin Li and
                  Kwangjo Kim},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Identity-Based Chameleon Hash Scheme without Key Exposure},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {200--215},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_13},
  doi          = {10.1007/978-3-642-14081-5\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenZSTLK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ChenTZD10,
  author       = {Xiaofeng Chen and
                  Haibo Tian and
                  Fangguo Zhang and
                  Yong Ding},
  editor       = {Xuejia Lai and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Comments and Improvements on Key-Exposure Free Chameleon Hashing Based
                  on Factoring},
  booktitle    = {Information Security and Cryptology - 6th International Conference,
                  Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6584},
  pages        = {415--426},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-21518-6\_29},
  doi          = {10.1007/978-3-642-21518-6\_29},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/ChenTZD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/WenZ10,
  author       = {Yamin Wen and
                  Fangguo Zhang},
  editor       = {Jan Camenisch and
                  Costas Lambrinoudakis},
  title        = {A New Revocable Secret Handshake Scheme with Backward Unlinkability},
  booktitle    = {Public Key Infrastructures, Services and Applications - 7th European
                  Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6711},
  pages        = {17--30},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22633-5\_2},
  doi          = {10.1007/978-3-642-22633-5\_2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/europki/WenZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ChenZTWMKK10,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Haibo Tian and
                  Qianhong Wu and
                  Yi Mu and
                  Jangseong Kim and
                  Kwangjo Kim},
  editor       = {Radu Sion},
  title        = {Three-Round Abuse-Free Optimistic Contract Signing with Everlasting
                  Secrecy},
  booktitle    = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {304--311},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3\_23},
  doi          = {10.1007/978-3-642-14577-3\_23},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/ChenZTWMKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/XuZ10,
  author       = {Lingling Xu and
                  Fangguo Zhang},
  editor       = {Kyung Hyune Rhee and
                  DaeHun Nyang},
  title        = {Oblivious Transfer with Complex Attribute-Based Access Control},
  booktitle    = {Information Security and Cryptology - {ICISC} 2010 - 13th International
                  Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6829},
  pages        = {370--395},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-24209-0\_25},
  doi          = {10.1007/978-3-642-24209-0\_25},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/XuZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinZ10,
  author       = {Qiping Lin and
                  Fangguo Zhang},
  title        = {Halving on Binary Edwards Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {4},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoZX10,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Dongqing Xie},
  title        = {Faster Computation of Self-pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {399},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/399},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoZX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChenCZWM09,
  author       = {Xiaofeng Chen and
                  Guomin Chen and
                  Fangguo Zhang and
                  Baodian Wei and
                  Yi Mu},
  title        = {Identity-based Universal Designated Verifier Signature Proof System},
  journal      = {Int. J. Netw. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {52--58},
  year         = {2009},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v8-n1/ijns-2009-v8-n1-p52-58.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChenCZWM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/ZhangC09,
  author       = {Fangguo Zhang and
                  Xiaofeng Chen},
  title        = {Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification
                  scheme at {CT-RSA} 05},
  journal      = {Inf. Process. Lett.},
  volume       = {109},
  number       = {15},
  pages        = {846--849},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ipl.2009.04.002},
  doi          = {10.1016/J.IPL.2009.04.002},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/ZhangC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/ZhaoXZGZ09,
  author       = {Changan Zhao and
                  Dongqing Xie and
                  Fangguo Zhang and
                  Chong{-}zhi Gao and
                  Jingwei Zhang},
  editor       = {Jong Hyuk Park and
                  Hsiao{-}Hwa Chen and
                  Mohammed Atiquzzaman and
                  Changhoon Lee and
                  Tai{-}Hoon Kim and
                  Sang{-}Soo Yeo},
  title        = {Improved Implementations of Cryptosystems Based on Tate Pairing},
  booktitle    = {Advances in Information Security and Assurance, Third International
                  Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5576},
  pages        = {145--151},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02617-1\_15},
  doi          = {10.1007/978-3-642-02617-1\_15},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/ZhaoXZGZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ZhangZC09,
  author       = {Fangguo Zhang and
                  Xingwen Zhao and
                  Xiaofeng Chen},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {ID-Based Adaptive Oblivious Transfer},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {133--147},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_11},
  doi          = {10.1007/978-3-642-10838-9\_11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ZhangZC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2009,
  editor       = {Josef Pieprzyk and
                  Fangguo Zhang},
  title        = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
                  China, November 11-13, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5848},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04642-1},
  doi          = {10.1007/978-3-642-04642-1},
  isbn         = {978-3-642-04641-4},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZTWK09,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Haibo Tian and
                  Baodian Wei and
                  Kwangjo Kim},
  title        = {Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete
                  Logarithm Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZTWK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenTZ09,
  author       = {Xiaofeng Chen and
                  Haibo Tian and
                  Fangguo Zhang},
  title        = {Comments and Improvements on Chameleon Hashing Without Key Exposure
                  Based on Factoring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {319},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/319},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenTZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZTK09,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Haibo Tian and
                  Kwangjo Kim},
  title        = {Identity-Based Chameleon Hash Scheme Without Key Exposure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {400},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/400},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZTK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhaoZH08,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Jiwu Huang},
  title        = {Efficient Tate pairing computation using double-base chains},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {51},
  number       = {8},
  pages        = {1096--1105},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11432-008-0070-9},
  doi          = {10.1007/S11432-008-0070-9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhaoZH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LinZZW08,
  author       = {Xibin Lin and
                  Changan Zhao and
                  Fangguo Zhang and
                  Yanming Wang},
  title        = {Computing the Ate Pairing on Elliptic Curves with Embedding Degree
                  \emph{k} = 9},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {9},
  pages        = {2387--2393},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.9.2387},
  doi          = {10.1093/IETFEC/E91-A.9.2387},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/LinZZW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhaoZH08,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Jiwu Huang},
  title        = {All Pairings Are in a Group},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {10},
  pages        = {3084--3087},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.10.3084},
  doi          = {10.1093/IETFEC/E91-A.10.3084},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhaoZH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ZhaoZH08,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Jiwu Huang},
  title        = {A note on the Ate pairing},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {6},
  pages        = {379--382},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-008-0054-1},
  doi          = {10.1007/S10207-008-0054-1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/ZhaoZH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhangCMS08,
  author       = {Fangguo Zhang and
                  Xiaofeng Chen and
                  Yi Mu and
                  Willy Susilo},
  title        = {A New and Efficient Signature on Commitment Values},
  journal      = {Int. J. Netw. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {100--105},
  year         = {2008},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v7-n1/ijns-2008-v7-n1-p100-105.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhangCMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WeiZC08,
  author       = {Baodian Wei and
                  Fangguo Zhang and
                  Xiaofeng Chen},
  title        = {A New Type of Designated Confirmer Signatures for a Group of Individuals},
  journal      = {Int. J. Netw. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {293--300},
  year         = {2008},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v7-n2/ijns-2008-v7-n2-p293-300.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WeiZC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChenZTWSMLK08,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Haibo Tian and
                  Baodian Wei and
                  Willy Susilo and
                  Yi Mu and
                  Hyunrok Lee and
                  Kwangjo Kim},
  title        = {Efficient generic on-line/off-line (threshold) signatures without
                  key exposure},
  journal      = {Inf. Sci.},
  volume       = {178},
  number       = {21},
  pages        = {4192--4203},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ins.2008.06.022},
  doi          = {10.1016/J.INS.2008.06.022},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ChenZTWSMLK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/LiuCZ08,
  author       = {Shengli Liu and
                  Xiaofeng Chen and
                  Fangguo Zhang},
  title        = {Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind
                  Signature Scheme},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {23},
  number       = {2},
  pages        = {265--269},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11390-008-9128-9},
  doi          = {10.1007/S11390-008-9128-9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcst/LiuCZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiKZW08,
  author       = {Jin Li and
                  Kwangjo Kim and
                  Fangguo Zhang and
                  Duncan S. Wong},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Generic Security-Amplifying Methods of Ordinary Digital Signatures},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {224--241},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_14},
  doi          = {10.1007/978-3-540-68914-0\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/LiKZW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangCW08,
  author       = {Fangguo Zhang and
                  Xiaofeng Chen and
                  Baodian Wei},
  editor       = {Masayuki Abe and
                  Virgil D. Gligor},
  title        = {Efficient designated confirmer signature from bilinear pairings},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
                  2008},
  pages        = {363--368},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1368310.1368363},
  doi          = {10.1145/1368310.1368363},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangCW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoZH08,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Jiwu Huang},
  title        = {All Pairings Are in a Group},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {85},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoZH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoXZZC08,
  author       = {Changan Zhao and
                  Dongqing Xie and
                  Fangguo Zhang and
                  Jingwei Zhang and
                  Binglong Chen},
  title        = {Computing Bilinear Pairings on Elliptic Curves with Automorphisms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {209},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/209},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoXZZC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoZX08,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Dongqing Xie},
  title        = {Reducing the Complexity of the Weil Pairing Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {212},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/212},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoZX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhang08,
  author       = {Fangguo Zhang},
  title        = {Twisted Ate Pairing on Hyperelliptic Curves and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {274},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/274},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhang08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/ChenZL07,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Shengli Liu},
  title        = {ID-based restrictive partially blind signatures and applications},
  journal      = {J. Syst. Softw.},
  volume       = {80},
  number       = {2},
  pages        = {164--171},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jss.2006.02.046},
  doi          = {10.1016/J.JSS.2006.02.046},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/ChenZL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChenZSM07,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Efficient Generic On-Line/Off-Line Signatures Without Key Exposure},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {18--30},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_2},
  doi          = {10.1007/978-3-540-72738-5\_2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/ChenZSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/ZhangZZ07,
  author       = {Lei Zhang and
                  Futai Zhang and
                  Fangguo Zhang},
  editor       = {Mieso K. Denko and
                  Chi{-}Sheng Shih and
                  Kuan{-}Ching Li and
                  Shiao{-}Li Tsao and
                  Qing{-}An Zeng and
                  Soo{-}Hyun Park and
                  Young{-}Bae Ko and
                  Shih{-}Hao Hung and
                  Jong Hyuk Park},
  title        = {New Efficient Certificateless Signature Scheme},
  booktitle    = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2007
                  Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei,
                  Taiwan, December 17-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4809},
  pages        = {692--703},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77090-9\_64},
  doi          = {10.1007/978-3-540-77090-9\_64},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/euc/ZhangZZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/WuSMZ07,
  author       = {Qianhong Wu and
                  Willy Susilo and
                  Yi Mu and
                  Fangguo Zhang},
  editor       = {Osvaldo Gervasi and
                  Marina L. Gavrilova},
  title        = {Efficient Partially Blind Signatures with Provable Security},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2007, International
                  Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings.
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4707},
  pages        = {1096--1105},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74484-9\_96},
  doi          = {10.1007/978-3-540-74484-9\_96},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/WuSMZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnc/WeiZ007,
  author       = {Baodian Wei and
                  Fangguo Zhang and
                  Xiaofeng Chen},
  editor       = {Jingsheng Lei and
                  JingTao Yao and
                  Qingfu Zhang},
  title        = {Society-oriented Designated Confirmer Signatures},
  booktitle    = {Third International Conference on Natural Computation, {ICNC} 2007,
                  Haikou, Hainan, China, 24-27 August 2007, Volume 5},
  pages        = {707--712},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICNC.2007.669},
  doi          = {10.1109/ICNC.2007.669},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnc/WeiZ007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/WeiZ007,
  author       = {Baodian Wei and
                  Fangguo Zhang and
                  Xiaofeng Chen},
  title        = {ID-based Ring Proxy Signatures},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2007,
                  Nice, France, June 24-29, 2007},
  pages        = {1031--1035},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ISIT.2007.4557359},
  doi          = {10.1109/ISIT.2007.4557359},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/WeiZ007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LiKZC07,
  author       = {Jin Li and
                  Kwangjo Kim and
                  Fangguo Zhang and
                  Xiaofeng Chen},
  editor       = {Willy Susilo and
                  Joseph K. Liu and
                  Yi Mu},
  title        = {Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature},
  booktitle    = {Provable Security, First International Conference, ProvSec 2007, Wollongong,
                  Australia, November 1-2, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4784},
  pages        = {208--217},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75670-5\_15},
  doi          = {10.1007/978-3-540-75670-5\_15},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/LiKZC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuCZ07,
  author       = {Shengli Liu and
                  Xiaofeng Chen and
                  Fangguo Zhang},
  title        = {On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially
                  Blind Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {225},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/225},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuCZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoZH07,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Jiwu Huang},
  title        = {A Note on the Ate Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {247},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/247},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoZH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinZZW07,
  author       = {Xibin Lin and
                  Changan Zhao and
                  Fangguo Zhang and
                  Yanming Wang},
  title        = {Computing the Ate Pairing on Elliptic Curves with Embedding Degree
                  k=9},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {434},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/434},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinZZW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atc/WuMSZ06,
  author       = {Qianhong Wu and
                  Yi Mu and
                  Willy Susilo and
                  Fangguo Zhang},
  editor       = {Laurence Tianruo Yang and
                  Hai Jin and
                  Jianhua Ma and
                  Theo Ungerer},
  title        = {Efficient Signcryption Without Random Oracles},
  booktitle    = {Autonomic and Trusted Computing, Third International Conference, {ATC}
                  2006, Wuhan, China, September 3-6, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4158},
  pages        = {449--458},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11839569\_43},
  doi          = {10.1007/11839569\_43},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atc/WuMSZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiCZW06,
  author       = {Jin Li and
                  Xiaofeng Chen and
                  Fangguo Zhang and
                  Yanming Wang},
  editor       = {Yuping Wang and
                  Yiu{-}ming Cheung and
                  Hai{-}Lin Liu},
  title        = {Generalization of the Selective-ID Security Model for {HIBS} Protocols},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2006, Guangzhou, China, November 3-6, 2006, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4456},
  pages        = {894--902},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74377-4\_94},
  doi          = {10.1007/978-3-540-74377-4\_94},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiCZW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/LiZW06,
  author       = {Jin Li and
                  Fangguo Zhang and
                  Yanming Wang},
  editor       = {Xiaobo Zhou and
                  Oleg Sokolsky and
                  Lu Yan and
                  Eun{-}Sun Jung and
                  Zili Shao and
                  Yi Mu and
                  Dong Chun Lee and
                  Daeyoung Kim and
                  Young{-}Sik Jeong and
                  Cheng{-}Zhong Xu},
  title        = {A Strong Identity Based Key-Insulated Cryptosystem},
  booktitle    = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2006
                  Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea,
                  August 1-4, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4097},
  pages        = {352--361},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11807964\_36},
  doi          = {10.1007/11807964\_36},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/euc/LiZW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/LiZW06a,
  author       = {Jin Li and
                  Fangguo Zhang and
                  Yanming Wang},
  editor       = {Xiaobo Zhou and
                  Oleg Sokolsky and
                  Lu Yan and
                  Eun{-}Sun Jung and
                  Zili Shao and
                  Yi Mu and
                  Dong Chun Lee and
                  Daeyoung Kim and
                  Young{-}Sik Jeong and
                  Cheng{-}Zhong Xu},
  title        = {A New Hierarchical ID-Based Cryptosystem and CCA-Secure {PKE}},
  booktitle    = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2006
                  Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea,
                  August 1-4, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4097},
  pages        = {362--371},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11807964\_37},
  doi          = {10.1007/11807964\_37},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/euc/LiZW06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ChenZMS06,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Yi Mu and
                  Willy Susilo},
  editor       = {Giovanni Di Crescenzo and
                  Aviel D. Rubin},
  title        = {Efficient Provably Secure Restrictive Partially Blind Signatures from
                  Bilinear Pairings},
  booktitle    = {Financial Cryptography and Data Security, 10th International Conference,
                  {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4107},
  pages        = {251--265},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11889663\_21},
  doi          = {10.1007/11889663\_21},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/ChenZMS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/WuSMZ06,
  author       = {Qianhong Wu and
                  Willy Susilo and
                  Yi Mu and
                  Fangguo Zhang},
  editor       = {Marina L. Gavrilova and
                  Osvaldo Gervasi and
                  Vipin Kumar and
                  Chih Jeng Kenneth Tan and
                  David Taniar and
                  Antonio Lagan{\`{a}} and
                  Youngsong Mun and
                  Hyunseung Choo},
  title        = {Efficient Partially Blind Signatures with Provable Security},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2006, International
                  Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3982},
  pages        = {345--354},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11751595\_38},
  doi          = {10.1007/11751595\_38},
  timestamp    = {Thu, 28 Apr 2022 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/WuSMZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WuMSZ06,
  author       = {Qianhong Wu and
                  Yi Mu and
                  Willy Susilo and
                  Fangguo Zhang},
  editor       = {Kefei Chen and
                  Robert H. Deng and
                  Xuejia Lai and
                  Jianying Zhou},
  title        = {Privately Retrieve Data from Large Databases},
  booktitle    = {Information Security Practice and Experience, Second International
                  Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3903},
  pages        = {367--378},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11689522\_34},
  doi          = {10.1007/11689522\_34},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/WuMSZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/WuSMZ06,
  author       = {Qianhong Wu and
                  Willy Susilo and
                  Yi Mu and
                  Fangguo Zhang},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {Ad Hoc Group Signatures},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {120--135},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_9},
  doi          = {10.1007/11908739\_9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/WuSMZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vietcrypt/ZhangCSM06,
  author       = {Fangguo Zhang and
                  Xiaofeng Chen and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Phong Q. Nguyen},
  title        = {A New Signature Scheme Without Random Oracles from Bilinear Pairings},
  booktitle    = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference
                  on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4341},
  pages        = {67--80},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11958239\_5},
  doi          = {10.1007/11958239\_5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vietcrypt/ZhangCSM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoZH06,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Jiwu Huang},
  title        = {Efficient Tate Pairing Computation Using Double-Base Chains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {201},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/201},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoZH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuMSCHZ06,
  author       = {Shidi Xu and
                  Yi Mu and
                  Willy Susilo and
                  Xiaofeng Chen and
                  Xinyi Huang and
                  Fangguo Zhang},
  title        = {Online/Offline Signatures and Multisignatures for {AODV} and {DSR}
                  Routing Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {236},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/236},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuMSCHZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoZH06a,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Jiwu Huang},
  title        = {Speeding up the Bilinear Pairings Computation on Curves with Automorphisms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {474},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/474},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoZH06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuZ06,
  author       = {Shengli Liu and
                  Fangguo Zhang},
  title        = {Cryptanalysis of {REESSE1+} Public Key Cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {480},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/480},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/LinWZH05,
  author       = {Chih{-}Yin Lin and
                  Tzong{-}Chen Wu and
                  Fangguo Zhang and
                  Jing{-}Jang Hwang},
  title        = {New identity-based society oriented signature schemes from pairings
                  on elliptic curves},
  journal      = {Appl. Math. Comput.},
  volume       = {160},
  number       = {1},
  pages        = {245--260},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.amc.2003.07.016},
  doi          = {10.1016/J.AMC.2003.07.016},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amc/LinWZH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/ZhangK05,
  author       = {Fangguo Zhang and
                  Kwangjo Kim},
  title        = {Cryptanalysis of Lee-Hwang-Li's key authentication scheme},
  journal      = {Appl. Math. Comput.},
  volume       = {161},
  number       = {1},
  pages        = {101--107},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.amc.2003.12.012},
  doi          = {10.1016/J.AMC.2003.12.012},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amc/ZhangK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/ZhangSS05,
  author       = {Fangguo Zhang and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo},
  title        = {Attack on Han et al.'s ID-based confirmer (undeniable) signature at
                  ACM-EC'03},
  journal      = {Appl. Math. Comput.},
  volume       = {170},
  number       = {2},
  pages        = {1166--1169},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.amc.2005.01.015},
  doi          = {10.1016/J.AMC.2005.01.015},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amc/ZhangSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/Zhang05a,
  author       = {Fangguo Zhang},
  title        = {Cryptanalysis of Chang et al.'s signature scheme with message recovery},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {9},
  number       = {4},
  pages        = {358--359},
  year         = {2005},
  url          = {https://doi.org/10.1109/LCOMM.2005.1413633},
  doi          = {10.1109/LCOMM.2005.1413633},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/Zhang05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChenZW05,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Baodian Wei},
  title        = {Comment on the Public Key Substitution Attacks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {1},
  number       = {3},
  pages        = {168--172},
  year         = {2005},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v1-n3/ijns-2005-v1-n3-p168-172.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChenZW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/ZhangC05,
  author       = {Fangguo Zhang and
                  Xiaofeng Chen},
  title        = {Cryptanalysis of Huang-Chang partially blind signature scheme},
  journal      = {J. Syst. Softw.},
  volume       = {76},
  number       = {3},
  pages        = {323--325},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jss.2004.07.249},
  doi          = {10.1016/J.JSS.2004.07.249},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/ZhangC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WeiYZ05,
  author       = {Victor K. Wei and
                  Tsz Hon Yuen and
                  Fangguo Zhang},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Group Signature Where Group Manager, Members and Open Authority Are
                  Identity-Based},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {468--480},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_39},
  doi          = {10.1007/11506157\_39},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/WeiYZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/ZhangMS05,
  author       = {Fangguo Zhang and
                  Yi Mu and
                  Willy Susilo},
  title        = {Reducing Security Overhead for Mobile Networks},
  booktitle    = {19th International Conference on Advanced Information Networking and
                  Applications {(AINA} 2005), 28-30 March 2005, Taipei, Taiwan},
  pages        = {398--403},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/AINA.2005.292},
  doi          = {10.1109/AINA.2005.292},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/ZhangMS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/SisiloZM05,
  author       = {Willy Susilo and
                  Fangguo Zhang and
                  Yi Mu},
  title        = {Privacy-Enhanced Internet Storage},
  booktitle    = {19th International Conference on Advanced Information Networking and
                  Applications {(AINA} 2005), 28-30 March 2005, Taipei, Taiwan},
  pages        = {603--608},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/AINA.2005.284},
  doi          = {10.1109/AINA.2005.284},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/SisiloZM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChenZL05,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Shengli Liu},
  editor       = {Yue Hao and
                  Jiming Liu and
                  Yu{-}Ping Wang and
                  Yiu{-}ming Cheung and
                  Hujun Yin and
                  Licheng Jiao and
                  Jianfeng Ma and
                  Yong{-}Chang Jiao},
  title        = {ID-Based Restrictive Partially Blind Signatures},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3802},
  pages        = {117--124},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596981\_17},
  doi          = {10.1007/11596981\_17},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChenZL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/HuangMSZC05,
  author       = {Xinyi Huang and
                  Yi Mu and
                  Willy Susilo and
                  Fangguo Zhang and
                  Xiaofeng Chen},
  editor       = {Tomoya Enokido and
                  Lu Yan and
                  Bin Xiao and
                  Daeyoung Kim and
                  Yuan{-}Shun Dai and
                  Laurence Tianruo Yang},
  title        = {A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous
                  World},
  booktitle    = {Embedded and Ubiquitous Computing - {EUC} 2005 Workshops, {EUC} 2005
                  Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December
                  6-9, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3823},
  pages        = {480--489},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596042\_50},
  doi          = {10.1007/11596042\_50},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/euc/HuangMSZC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/ZhangSMC05,
  author       = {Fangguo Zhang and
                  Willy Susilo and
                  Yi Mu and
                  Xiaofeng Chen},
  editor       = {Tomoya Enokido and
                  Lu Yan and
                  Bin Xiao and
                  Daeyoung Kim and
                  Yuan{-}Shun Dai and
                  Laurence Tianruo Yang},
  title        = {Identity-Based Universal Designated Verifier Signatures},
  booktitle    = {Embedded and Ubiquitous Computing - {EUC} 2005 Workshops, {EUC} 2005
                  Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December
                  6-9, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3823},
  pages        = {825--834},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596042\_85},
  doi          = {10.1007/11596042\_85},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/euc/ZhangSMC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ZhangSM05,
  author       = {Fangguo Zhang and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Identity-Based Partial Message Recovery Signatures (or How to Shorten
                  ID-Based Signatures)},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {45--56},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_5},
  doi          = {10.1007/11507840\_5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/ZhangSM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/WuZSM05,
  author       = {Qianhong Wu and
                  Fangguo Zhang and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {An Efficient Static Blind Ring Signature Scheme},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {410--423},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_32},
  doi          = {10.1007/11734727\_32},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/WuZSM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangC05,
  author       = {Fangguo Zhang and
                  Xiaofeng Chen},
  title        = {Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification
                  scheme at {CT-RSA} 05},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {103},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/103},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WeiYZ05,
  author       = {Victor K. Wei and
                  Tsz Hon Yuen and
                  Fangguo Zhang},
  title        = {Group Signature where Group Manager, Members and Open Authority are
                  Identity-Based},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WeiYZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangC05b,
  author       = {Fangguo Zhang and
                  Xiaofeng Chen},
  title        = {Attack on Okamoto et al.'s New Short Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {240},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/240},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangC05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZL05,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Shengli Liu},
  title        = {ID-based Restrictive Partially Blind Signatures and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {319},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/319},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangCSM05,
  author       = {Fangguo Zhang and
                  Xiaofeng Chen and
                  Willy Susilo and
                  Yi Mu},
  title        = {A New Short Signature Scheme Without Random Oracles from Bilinear
                  Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {386},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/386},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangCSM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/ZhangC04,
  author       = {Fangguo Zhang and
                  Xiaofeng Chen},
  title        = {Attack on an ID-based authenticated group key agreement scheme from
                  {PKC} 2004},
  journal      = {Inf. Process. Lett.},
  volume       = {91},
  number       = {4},
  pages        = {191--193},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.ipl.2004.04.008},
  doi          = {10.1016/J.IPL.2004.04.008},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/ZhangC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/LiuZC04,
  author       = {Shengli Liu and
                  Fangguo Zhang and
                  Kefei Chen},
  title        = {Authenticating Tripartite Key Agreement Protocol with Pairings},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {19},
  number       = {2},
  pages        = {169--176},
  year         = {2004},
  url          = {https://doi.org/10.1007/BF02944794},
  doi          = {10.1007/BF02944794},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcst/LiuZC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SusiloZM04,
  author       = {Willy Susilo and
                  Fangguo Zhang and
                  Yi Mu},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Identity-Based Strong Designated Verifier Signature Schemes},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {313--324},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_27},
  doi          = {10.1007/978-3-540-27800-9\_27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/SusiloZM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChenZK04,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Kwangjo Kim},
  editor       = {Markus Jakobsson and
                  Moti Yung and
                  Jianying Zhou},
  title        = {Limited Verifier Signature from Bilinear Pairings},
  booktitle    = {Applied Cryptography and Network Security, Second International Conference,
                  {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3089},
  pages        = {135--148},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24852-1\_10},
  doi          = {10.1007/978-3-540-24852-1\_10},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/ChenZK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asian/MuZS04,
  author       = {Yi Mu and
                  Fangguo Zhang and
                  Willy Susilo},
  editor       = {Michael J. Maher},
  title        = {Deniable Partial Proxy Signatures},
  booktitle    = {Advances in Computer Science - {ASIAN} 2004, Higher-Level Decision
                  Making, 9th Asian Computing Science Conference, Dedicated to Jean-Louis
                  Lassez on the Occasion of His 5th Cycle Birthday, Chiang Mai, Thailand,
                  December 8-10, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3321},
  pages        = {182--194},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30502-6\_13},
  doi          = {10.1007/978-3-540-30502-6\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asian/MuZS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/SusiloMZ04,
  author       = {Willy Susilo and
                  Yi Mu and
                  Fangguo Zhang},
  editor       = {Javier L{\'{o}}pez and
                  Sihan Qing and
                  Eiji Okamoto},
  title        = {Perfect Concurrent Signature Schemes},
  booktitle    = {Information and Communications Security, 6th International Conference,
                  {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3269},
  pages        = {14--26},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30191-2\_2},
  doi          = {10.1007/978-3-540-30191-2\_2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/SusiloMZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ChenZKK04,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Divyan M. Konidala and
                  Kwangjo Kim},
  editor       = {Anne Canteaut and
                  Kapalee Viswanathan},
  title        = {New ID-Based Threshold Signature Scheme from Bilinear Pairings},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference
                  on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3348},
  pages        = {371--383},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30556-9\_29},
  doi          = {10.1007/978-3-540-30556-9\_29},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/ChenZKK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ChenZK04,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Kwangjo Kim},
  editor       = {Kan Zhang and
                  Yuliang Zheng},
  title        = {Chameleon Hashing Without Key Exposure},
  booktitle    = {Information Security, 7th International Conference, {ISC} 2004, Palo
                  Alto, CA, USA, September 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3225},
  pages        = {87--98},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30144-8\_8},
  doi          = {10.1007/978-3-540-30144-8\_8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/ChenZK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ZhangSS04,
  author       = {Fangguo Zhang and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {An Efficient Signature Scheme from Bilinear Pairings and Its Applications},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {277--290},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_20},
  doi          = {10.1007/978-3-540-24632-9\_20},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/ZhangSS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZK04,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Kwangjo Kim},
  title        = {Chameleon Hashing without Key Exposure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {38},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhang04a,
  author       = {Fangguo Zhang},
  title        = {Cryptanalysis of Chang et al.'s Signature Scheme with Message Recovery},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {213},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/213},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhang04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/ZhangK03,
  author       = {Fangguo Zhang and
                  Kwangjo Kim},
  title        = {A Universal Forgery on Araki et al.'s Convertible Limited Verifier
                  Signature Scheme},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {86-A},
  number       = {2},
  pages        = {515--516},
  year         = {2003},
  url          = {http://search.ieice.org/bin/summary.php?id=e86-a\_2\_515},
  timestamp    = {Tue, 08 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/ZhangK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/WangZW03,
  author       = {Changjie Wang and
                  Fangguo Zhang and
                  Yumin Wang},
  title        = {Secure Web Transaction with Anonymous Mobile Agent over Internet},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {18},
  number       = {1},
  pages        = {84--89},
  year         = {2003},
  url          = {https://doi.org/10.1007/BF02946654},
  doi          = {10.1007/BF02946654},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcst/WangZW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangK03,
  author       = {Fangguo Zhang and
                  Kwangjo Kim},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Efficient ID-Based Blind Signature and Proxy Signature from Bilinear
                  Pairings},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {312--323},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_27},
  doi          = {10.1007/3-540-45067-X\_27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/ToSZ03,
  author       = {Vu Dong T{\^{o}} and
                  Reihaneh Safavi{-}Naini and
                  Fangguo Zhang},
  editor       = {Moti Yung},
  title        = {New traitor tracing schemes using bilinear map},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Digital rights management
                  2003, Washington, DC, USA, October 27, 2003},
  pages        = {67--76},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/947380.947389},
  doi          = {10.1145/947380.947389},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/ToSZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/XieZCK03,
  author       = {Yan Xie and
                  Fangguo Zhang and
                  Xiaofeng Chen and
                  Kwangjo Kim},
  editor       = {Sihan Qing and
                  Dieter Gollmann and
                  Jianying Zhou},
  title        = {ID-Based Distributed "Magic Ink" Signature from Pairings},
  booktitle    = {Information and Communications Security, 5th International Conference,
                  {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2836},
  pages        = {249--259},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39927-8\_23},
  doi          = {10.1007/978-3-540-39927-8\_23},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/XieZCK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ZhangSS03,
  author       = {Fangguo Zhang and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo},
  editor       = {Thomas Johansson and
                  Subhamoy Maitra},
  title        = {Efficient Verifiably Encrypted Signature and Partially Blind Signature
                  from Bilinear Pairings},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference
                  on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2904},
  pages        = {191--204},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24582-7\_14},
  doi          = {10.1007/978-3-540-24582-7\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/ZhangSS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangK03,
  author       = {Fangguo Zhang and
                  Kwangjo Kim},
  title        = {Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZW03,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Yumin Wang},
  title        = {A New Approach to Prevent Blackmailing in E-Cash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {55},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/055},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinWZ03,
  author       = {Chih{-}Yin Lin and
                  Tzong{-}Chen Wu and
                  Fangguo Zhang},
  title        = {A Structured Multisignature Scheme from the Gap Diffie-Hellman Group},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {90},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/090},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinWZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangSL03,
  author       = {Fangguo Zhang and
                  Reihaneh Safavi{-}Naini and
                  Chih{-}Yin Lin},
  title        = {New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature
                  Schemes from Bilinear Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {104},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/104},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangSL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZK03,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Kwangjo Kim},
  title        = {A New ID-based Group Signature Scheme from Bilinear Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangSS03,
  author       = {Fangguo Zhang and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo},
  title        = {Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at
                  ACM-EC'03},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {129},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/129},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangSS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangSS03a,
  author       = {Fangguo Zhang and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo},
  title        = {ID-Based Chameleon Hashes from Bilinear Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {208},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/208},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangSS03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangC03,
  author       = {Fangguo Zhang and
                  Xiaofeng Chen},
  title        = {Attack on Two ID-based Authenticated Group Key Agreement Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {259},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/259},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/acj/WangZW02,
  author       = {Changjie Wang and
                  Fangguo Zhang and
                  Yumin Wang},
  title        = {{SAWT:} {A} New System for Secure and Anonymous Web Transactions over
                  the Internet},
  journal      = {J. Res. Pract. Inf. Technol.},
  volume       = {34},
  number       = {1},
  pages        = {34--46},
  year         = {2002},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/acj/WangZW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaSI/WangWZ02,
  author       = {Changjie Wang and
                  Yumin Wang and
                  Fangguo Zhang},
  title        = {An Anonymous Mobile Agents Scheme for Secure Web Transaction over
                  the Internet},
  journal      = {Informatica (Slovenia)},
  volume       = {26},
  number       = {3},
  year         = {2002},
  timestamp    = {Mon, 15 Feb 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/informaticaSI/WangWZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/ZhangZW02,
  author       = {Fangguo Zhang and
                  Futai Zhang and
                  Yumin Wang},
  title        = {Selection of Secure Hyperelliptic Curves of g{\_}2 Based on a Subfield},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {17},
  number       = {6},
  pages        = {836--842},
  year         = {2002},
  url          = {https://doi.org/10.1007/BF02960774},
  doi          = {10.1007/BF02960774},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcst/ZhangZW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangLK02,
  author       = {Fangguo Zhang and
                  Shengli Liu and
                  Kwangjo Kim},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Compact Representation of Domain Parameters of Hyperelliptic Curve
                  Cryptosystems},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {203--213},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_17},
  doi          = {10.1007/3-540-45450-0\_17},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangLK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ZhangK02,
  author       = {Fangguo Zhang and
                  Kwangjo Kim},
  editor       = {Yuliang Zheng},
  title        = {ID-Based Blind Signature and Ring Signature from Pairings},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2501},
  pages        = {533--547},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36178-2\_33},
  doi          = {10.1007/3-540-36178-2\_33},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ZhangK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangLK02,
  author       = {Fangguo Zhang and
                  Shengli Liu and
                  Kwangjo Kim},
  title        = {ID-Based One Round Authenticated Tripartite Key Agreement Protocol
                  with Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {122},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/122},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangLK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangK02,
  author       = {Fangguo Zhang and
                  Kwangjo Kim},
  title        = {Cryptanalysis of Two New Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {167},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/167},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangLK02a,
  author       = {Fangguo Zhang and
                  Shengli Liu and
                  Kwangjo Kim},
  title        = {Attack on {A} New Public Key Cryptosystem from ISC'02 {(LNCS} 2433)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {178},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/178},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangLK02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhangZW01,
  author       = {Fangguo Zhang and
                  Futai Zhang and
                  Yumin Wang},
  editor       = {Sihan Qing and
                  Tatsuaki Okamoto and
                  Jianying Zhou},
  title        = {Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic
                  Curves},
  booktitle    = {Information and Communications Security, Third International Conference,
                  {ICICS} 2001, Xian, China, November 13-16, 2001},
  series       = {Lecture Notes in Computer Science},
  volume       = {2229},
  pages        = {74--83},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45600-7\_9},
  doi          = {10.1007/3-540-45600-7\_9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/ZhangZW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ZhangZW00,
  author       = {Fangguo Zhang and
                  Futai Zhang and
                  Yumin Wang},
  editor       = {Sihan Qing and
                  Jan H. P. Eloff},
  title        = {Fair Electronic Cash Systems with Multiple Banks},
  booktitle    = {Information Security for Global Information Infrastructures, {IFIP}
                  {TC11} Fifteenth Annual Working Conference on Information Security,
                  August 22-24, 2000, Beijing, China},
  series       = {{IFIP} Conference Proceedings},
  volume       = {175},
  pages        = {461--470},
  publisher    = {Kluwer},
  year         = {2000},
  timestamp    = {Fri, 26 Jul 2002 13:04:43 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ZhangZW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics