Cong Zhang

Affiliations:
  • Rutgers University, USA


According to our database1, Cong Zhang authored at least 17 papers between 2011 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Don't Tamper with Dual System Encryption - Beyond Polynomial Related-Key Security of IBE.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
The Relationship Between Idealized Models Under Computationally Bounded Adversaries.
IACR Cryptol. ePrint Arch., 2021

2019
Indifferentiability for Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2019

2018
Parameter-Hiding Order Revealing Encryption.
IACR Cryptol. ePrint Arch., 2018

2017
Impossibility of Order-Revealing Encryption in Idealized Models.
IACR Cryptol. ePrint Arch., 2017

A Ciphertext-Size Lower Bound for Order-Preserving Encryption with Limited Leakage.
IACR Cryptol. ePrint Arch., 2017

2016
Reducing the Leakage in Practical Order-Revealing Encryption.
IACR Cryptol. ePrint Arch., 2016

Combiners for Chosen-Ciphertext Security.
Proceedings of the Computing and Combinatorics - 22nd International Conference, 2016

2015
Related Randomness Attacks for Public Key Cryptosystems.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Exponent-inversion Signatures and IBE under Static Assumptions.
IACR Cryptol. ePrint Arch., 2014

2013
Towards Anonymous Ciphertext Indistinguishability with Identity Leakage.
Proceedings of the Provable Security - 7th International Conference, 2013

Attribute Specified Identity-Based Encryption.
Proceedings of the Information Security Practice and Experience, 2013

Multi-key leakage-resilient threshold cryptography.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Leakage-resilient certificateless public key encryption.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

2012
Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

A Covert Channel Using Core Alternation.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Poster: LBMS: load balancing based on multilateral security in cloud.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011


  Loading...