Cong Zhang

Orcid: 0009-0003-7173-8846

Affiliations:
  • Rutgers University, USA


According to our database1, Cong Zhang authored at least 18 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Exponent-Inversion P-Signatures and Accountable Identity-Based Encryption from SXDH.
IACR Commun. Cryptol., 2024

2023
The Relationship Between Idealized Models Under Computationally Bounded Adversaries.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Don't Tamper with Dual System Encryption - Beyond Polynomial Related-Key Security of IBE.
Proceedings of the Applied Cryptography and Network Security, 2022

2020
Indifferentiability for Public Key Cryptosystems.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2018
Impossibility of Order-Revealing Encryption in Idealized Models.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

A Ciphertext-Size Lower Bound for Order-Preserving Encryption with Limited Leakage.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Parameter-Hiding Order Revealing Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2016
Reducing the Leakage in Practical Order-Revealing Encryption.
IACR Cryptol. ePrint Arch., 2016

Combiners for Chosen-Ciphertext Security.
Proceedings of the Computing and Combinatorics - 22nd International Conference, 2016

2015
Related Randomness Attacks for Public Key Cryptosystems.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Exponent-inversion Signatures and IBE under Static Assumptions.
IACR Cryptol. ePrint Arch., 2014

2013
Towards Anonymous Ciphertext Indistinguishability with Identity Leakage.
Proceedings of the Provable Security - 7th International Conference, 2013

Attribute Specified Identity-Based Encryption.
Proceedings of the Information Security Practice and Experience, 2013

Multi-key leakage-resilient threshold cryptography.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Leakage-resilient certificateless public key encryption.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

2012
Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

A Covert Channel Using Core Alternation.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Poster: LBMS: load balancing based on multilateral security in cloud.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011


  Loading...