Fangguo Zhang

According to our database1, Fangguo Zhang authored at least 199 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Efficient obfuscation for CNF circuits and applications in cloud computing.
Soft Comput., 2019

Blockchain-based searchable symmetric encryption scheme.
Computers & Electrical Engineering, 2019

2018
Privacy preserving multi-party computation delegation for deep learning in cloud computing.
Inf. Sci., 2018

Efficient leakage-resilient blind and partially blind signatures.
IJES, 2018

Code-based Cryptosystem from Quasi-Cyclic Elliptic Codes.
IACR Cryptology ePrint Archive, 2018

Solving ECDLP via List Decoding.
IACR Cryptology ePrint Archive, 2018

Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control.
Future Generation Comp. Syst., 2018

AFCoin: A Framework for Digital Fiat Currency of Central Banks Based on Account Model.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE.
TIIS, 2017

Deniable Searchable Symmetric Encryption.
Inf. Sci., 2017

A new code-based encryption scheme and its applications.
IJHPCN, 2017

Anonymous Post-Quantum Cryptocash.
IACR Cryptology ePrint Archive, 2017

Block Chain based Searchable Symmetric Encryption.
IACR Cryptology ePrint Archive, 2017

A Searchable Symmetric Encryption Scheme using BlockChain.
CoRR, 2017

Computing elliptic curve discrete logarithms with improved baby-step giant-step algorithm.
Adv. in Math. of Comm., 2017

Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem.
Proceedings of the Provable Security, 2017

Implementing Indistinguishability Obfuscation Using GGH15.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
A lattice-based partially blind signature.
Security and Communication Networks, 2016

Solutions to the anti-piracy problem in oblivious transfer.
J. Comput. Syst. Sci., 2016

Memory leakage-resilient searchable symmetric encryption.
Future Generation Comp. Syst., 2016

Homomorphic Linear Authentication Schemes from (ε)-Authentication Codes.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential.
IEEE Trans. Smart Grid, 2015

Lattice-based obfuscation for re-encryption functions.
Security and Communication Networks, 2015

Refereed Computation Delegation of Private Sequence Comparison in Cloud Computing.
I. J. Network Security, 2015

Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation.
IACR Cryptology ePrint Archive, 2015

Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem.
IACR Cryptology ePrint Archive, 2015

Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm.
IACR Cryptology ePrint Archive, 2015

On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks.
IACR Cryptology ePrint Archive, 2015

On the (Fast) Algebraic Immunity of Boolean Power Functions.
IACR Cryptology ePrint Archive, 2015

Obfuscation for multi-use re-encryption and its application in cloud computing.
Concurrency and Computation: Practice and Experience, 2015

Symmetric-Key Based Proofs of Retrievability Supporting Public Verification.
Proceedings of the Computer Security - ESORICS 2015, 2015

Secure Bilinear Pairing Outsourcing Made More Efficient and Flexible.
Proceedings of the 10th ACM Symposium on Information, 2015

Verifiable Searchable Symmetric Encryption from Indistinguishability Obfuscation.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Timed-release oblivious transfer.
Security and Communication Networks, 2014

Efficient computation outsourcing for inverting a class of homomorphic functions.
Inf. Sci., 2014

Identity-based chameleon hashing and signatures without key exposure.
Inf. Sci., 2014

Secure similarity coefficients computation for binary data and its extensions.
Concurrency and Computation: Practice and Experience, 2014

Public-key encryption scheme with selective opening chosen-ciphertext security based on the Decisional Diffie-Hellman assumption.
Concurrency and Computation: Practice and Experience, 2014

Secure linear system computation in the presence of malicious adversaries.
SCIENCE CHINA Information Sciences, 2014

Secure Hamming distance based record linkage with malicious adversaries.
Computers & Electrical Engineering, 2014

Identity Based Threshold Ring Signature from Lattices.
Proceedings of the Network and System Security - 8th International Conference, 2014

A Full Privacy-Preserving Scheme for Location-Based Services.
Proceedings of the Information and Communication Technology, 2014

2013
A non-delegatable strong designated verifier signature in ID-based setting for mobile environment.
Mathematical and Computer Modelling, 2013

Cryptoanalysis and improvement of smart prepayment meter protocol in standard Q/GDW 365.
IJGUC, 2013

Efficient Computation Outsourcing for Inverting a Class of Homomorphic Functions.
IACR Cryptology ePrint Archive, 2013

Speeding up elliptic curve discrete logarithm computations with point halving.
Des. Codes Cryptography, 2013

Outsourcing computation of modular exponentiations in cloud computing.
Cluster Computing, 2013

Selectively unforgeable but existentially forgeable signature schemes and applications.
SCIENCE CHINA Information Sciences, 2013

Secure Obfuscation of Conditional Re-encryption with Keyword Search.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

On Obfuscating Set-Membership Predicate Functions.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Improving the Parallelized Pollard Rho Method for Computing Elliptic Curve Discrete Logarithms.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Verifiable Evaluation of Private Polynomials.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Security Model and Analysis of FHMQV, Revisited.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

2012
Faster Computation of Self-Pairings.
IEEE Trans. Information Theory, 2012

Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority.
Journal of Systems and Software, 2012

ECC-Based Grouping-Proof RFID for Inpatient Medication Safety.
J. Medical Systems, 2012

Improved Pollard rho method for computing discrete logarithms over finite extension fields.
J. Computational Applied Mathematics, 2012

An Efficient Collision Detection Method for Computing Discrete Logarithms with Pollard's Rho.
J. Applied Mathematics, 2012

Computing elliptic curve discrete logarithms with the negation map.
Inf. Sci., 2012

Generic security-amplifying methods of ordinary digital signatures.
Inf. Sci., 2012

Efficient precomputation schemes of kP+IQ.
Inf. Process. Lett., 2012

Times Limited Accountable Anonymous Online Submission Control System from Single-Verifier k-times Group Signature.
Informatica (Slovenia), 2012

Scalar Multiplication on Kummer Surface Revisited.
IEICE Transactions, 2012

A Class of 1-Resilient Functions in Odd Variables with High Nonlinearity and Suboptimal Algebraic Immunity.
IEICE Transactions, 2012

Secure Similarity Coefficients Computation with Malicious Adversaries.
IACR Cryptology ePrint Archive, 2012

On the Existence of Boolean Functions with Optimal Resistance against Fast Algebraic Attacks.
IACR Cryptology ePrint Archive, 2012

Tracing and revoking scheme for dynamic privileges against pirate rebroadcast.
Computers & Security, 2012

Secret handshakes from ID-based message recovery signatures: A new generic approach.
Computers & Electrical Engineering, 2012

Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption.
Proceedings of the Network and System Security - 6th International Conference, 2012

Secure Similarity Coefficients Computation with Malicious Adversaries.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Efficient and Secure Batch Exponentiations Outsourcing in Cloud Computing.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Zero-Value Point Attacks on Kummer-Based Cryptosystem.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Identity-based trapdoor mercurial commitments and applications.
Theor. Comput. Sci., 2011

Delegatable secret handshake scheme.
Journal of Systems and Software, 2011

Oblivious transfer with timed-release receiver's privacy.
Journal of Systems and Software, 2011

An efficient public key encryption with conjunctive-subset keywords search.
J. Network and Computer Applications, 2011

New receipt-free voting scheme using double-trapdoor commitment.
Inf. Sci., 2011

Analysis on Hu et al.'s Identity-based Broadcast Encryption.
I. J. Network Security, 2011

A New Type of ID-based Encryption System and Its Application to Pay-TV Systems.
I. J. Network Security, 2011

Traitor Tracing against Public Collaboration (Full Version).
IACR Cryptology ePrint Archive, 2011

Speeding Up Elliptic Curve Discrete Logarithm Computations with Point Halving.
IACR Cryptology ePrint Archive, 2011

The Computational Square-Root Exponent Problem- Revisited.
IACR Cryptology ePrint Archive, 2011

Computing Elliptic Curve Discrete Logarithms with the Negation Map.
IACR Cryptology ePrint Archive, 2011

Computing bilinear pairings on elliptic curves with automorphisms.
Des. Codes Cryptography, 2011

Discrete logarithm based chameleon hashing and signatures without key exposure.
Computers & Electrical Engineering, 2011

Dynamic asymmetric group key agreement for ad hoc networks.
Ad Hoc Networks, 2011

Secure Obfuscation of Encrypted Verifiable Encrypted Signatures.
Proceedings of the Provable Security - 5th International Conference, 2011

Traitor Tracing against Public Collaboration.
Proceedings of the Information Security Practice and Experience, 2011

On the Resistance of Boolean Functions against Fast Algebraic Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

Two Applications of an Incomplete Additive Character Sum to Estimating Nonlinearity of Boolean Functions.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

On Relationship of Computational Diffie-Hellman Problem and Computational Square-Root Exponent Problem.
Proceedings of the Coding and Cryptology - Third International Workshop, 2011

Finding More Boolean Functions with Maximum Algebraic Immunity Based on Univariate Polynomial Representation.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Efficient Online/Offline Signcryption Scheme.
Intelligent Automation & Soft Computing, 2010

Faster Computation of Self-pairings.
IACR Cryptology ePrint Archive, 2010

Halving on Binary Edwards Curves.
IACR Cryptology ePrint Archive, 2010

Twisted Ate pairing on hyperelliptic curves and applications.
SCIENCE CHINA Information Sciences, 2010

Oblivious Transfer with Complex Attribute-Based Access Control.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

A New Revocable Secret Handshake Scheme with Backward Unlinkability.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010

Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Identity-Based Chameleon Hash Scheme without Key Exposure.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05.
Inf. Process. Lett., 2009

Identity-based Universal Designated Verifier Signature Proof System.
I. J. Network Security, 2009

Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems.
IACR Cryptology ePrint Archive, 2009

Identity-Based Chameleon Hash Scheme Without Key Exposure.
IACR Cryptology ePrint Archive, 2009

Comments and Improvements on Chameleon Hashing Without Key Exposure Based on Factoring.
IACR Cryptology ePrint Archive, 2009

ID-Based Adaptive Oblivious Transfer.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Improved Implementations of Cryptosystems Based on Tate Pairing.
Proceedings of the Advances in Information Security and Assurance, 2009

2008
Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme.
J. Comput. Sci. Technol., 2008

Efficient generic on-line/off-line (threshold) signatures without key exposure.
Inf. Sci., 2008

A New and Efficient Signature on Commitment Values.
I. J. Network Security, 2008

A New Type of Designated Confirmer Signatures for a Group of Individuals.
I. J. Network Security, 2008

A note on the Ate pairing.
Int. J. Inf. Sec., 2008

All Pairings Are in a Group.
IEICE Transactions, 2008

Computing the Ate Pairing on Elliptic Curves with Embedding Degree k = 9.
IEICE Transactions, 2008

Reducing the Complexity of the Weil Pairing Computation.
IACR Cryptology ePrint Archive, 2008

All Pairings Are in a Group.
IACR Cryptology ePrint Archive, 2008

Computing Bilinear Pairings on Elliptic Curves with Automorphisms.
IACR Cryptology ePrint Archive, 2008

Twisted Ate Pairing on Hyperelliptic Curves and Applications.
IACR Cryptology ePrint Archive, 2008

Efficient Tate pairing computation using double-base chains.
Science in China Series F: Information Sciences, 2008

Efficient designated confirmer signature from bilinear pairings.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

Generic Security-Amplifying Methods of Ordinary Digital Signatures.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
ID-based restrictive partially blind signatures and applications.
Journal of Systems and Software, 2007

A Note on the Ate Pairing.
IACR Cryptology ePrint Archive, 2007

On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature.
IACR Cryptology ePrint Archive, 2007

Computing the Ate Pairing on Elliptic Curves with Embedding Degree k=9.
IACR Cryptology ePrint Archive, 2007

Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature.
Proceedings of the Provable Security, 2007

ID-based Ring Proxy Signatures.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Society-oriented Designated Confirmer Signatures.
Proceedings of the Third International Conference on Natural Computation, 2007

Efficient Partially Blind Signatures with Provable Security.
Proceedings of the Computational Science and Its Applications, 2007

New Efficient Certificateless Signature Scheme.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Efficient Generic On-Line/Off-Line Signatures Without Key Exposure.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Speeding up the Bilinear Pairings Computation on Curves with Automorphisms.
IACR Cryptology ePrint Archive, 2006

Efficient Tate Pairing Computation Using Double-Base Chains.
IACR Cryptology ePrint Archive, 2006

Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security.
IACR Cryptology ePrint Archive, 2006

Cryptanalysis of REESSE1+ Public Key Cryptosystem.
IACR Cryptology ePrint Archive, 2006

A New Signature Scheme Without Random Oracles from Bilinear Pairings.
Proceedings of the Progressin Cryptology, 2006

Ad Hoc Group Signatures.
Proceedings of the Advances in Information and Computer Security, 2006

Privately Retrieve Data from Large Databases.
Proceedings of the Information Security Practice and Experience, 2006

Efficient Partially Blind Signatures with Provable Security.
Proceedings of the Computational Science and Its Applications, 2006

Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings.
Proceedings of the Financial Cryptography and Data Security, 2006

A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

A Strong Identity Based Key-Insulated Cryptosystem.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

Generalization of the Selective-ID Security Model for HIBS Protocols.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Efficient Signcryption Without Random Oracles.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

2005
Cryptanalysis of Huang-Chang partially blind signature scheme.
Journal of Systems and Software, 2005

Comment on the Public Key Substitution Attacks.
I. J. Network Security, 2005

Cryptanalysis of Chang et al.'s signature scheme with message recovery.
IEEE Communications Letters, 2005

A New Short Signature Scheme Without Random Oracles from Bilinear Pairings.
IACR Cryptology ePrint Archive, 2005

Attack on Okamoto et al.'s New Short Signature Schemes.
IACR Cryptology ePrint Archive, 2005

Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05.
IACR Cryptology ePrint Archive, 2005

Group Signature where Group Manager, Members and Open Authority are Identity-Based.
IACR Cryptology ePrint Archive, 2005

ID-based Restrictive Partially Blind Signatures and Applications.
IACR Cryptology ePrint Archive, 2005

Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03.
Applied Mathematics and Computation, 2005

Cryptanalysis of Lee-Hwang-Li's key authentication scheme.
Applied Mathematics and Computation, 2005

New identity-based society oriented signature schemes from pairings on elliptic curves.
Applied Mathematics and Computation, 2005

An Efficient Static Blind Ring Signature Scheme.
Proceedings of the Information Security and Cryptology, 2005

Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures).
Proceedings of the Financial Cryptography and Data Security, 2005

Identity-Based Universal Designated Verifier Signatures.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

ID-Based Restrictive Partially Blind Signatures.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Reducing Security Overhead for Mobile Networks.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Privacy-Enhanced Internet Storage.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Group Signature Where Group Manager, Members and Open Authority Are Identity-Based.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
Authenticating Tripartite Key Agreement Protocol with Pairings.
J. Comput. Sci. Technol., 2004

Attack on an ID-based authenticated group key agreement scheme from PKC 2004.
Inf. Process. Lett., 2004

Cryptanalysis of Chang et al.'s Signature Scheme with Message Recovery.
IACR Cryptology ePrint Archive, 2004

Chameleon Hashing without Key Exposure.
IACR Cryptology ePrint Archive, 2004

An Efficient Signature Scheme from Bilinear Pairings and Its Applications.
Proceedings of the Public Key Cryptography, 2004

Chameleon Hashing Without Key Exposure.
Proceedings of the Information Security, 7th International Conference, 2004

New ID-Based Threshold Signature Scheme from Bilinear Pairings.
Proceedings of the Progress in Cryptology, 2004

Perfect Concurrent Signature Schemes.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Deniable Partial Proxy Signatures.
Proceedings of the Advances in Computer Science, 2004

Limited Verifier Signature from Bilinear Pairings.
Proceedings of the Applied Cryptography and Network Security, 2004

Identity-Based Strong Designated Verifier Signature Schemes.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
Secure Web Transaction with Anonymous Mobile Agent over Internet.
J. Comput. Sci. Technol., 2003

ID-Based Chameleon Hashes from Bilinear Pairings.
IACR Cryptology ePrint Archive, 2003

Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03.
IACR Cryptology ePrint Archive, 2003

New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing.
IACR Cryptology ePrint Archive, 2003

Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme.
IACR Cryptology ePrint Archive, 2003

Attack on Two ID-based Authenticated Group Key Agreement Schemes.
IACR Cryptology ePrint Archive, 2003

A Structured Multisignature Scheme from the Gap Diffie-Hellman Group.
IACR Cryptology ePrint Archive, 2003

A New Approach to Prevent Blackmailing in E-Cash.
IACR Cryptology ePrint Archive, 2003

A New ID-based Group Signature Scheme from Bilinear Pairings.
IACR Cryptology ePrint Archive, 2003

Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings.
Proceedings of the Progress in Cryptology, 2003

ID-Based Distributed "Magic Ink" Signature from Pairings.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

New traitor tracing schemes using bilinear map.
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003

Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
Selection of Secure Hyperelliptic Curves of g_2 Based on a Subfield.
J. Comput. Sci. Technol., 2002

An Anonymous Mobile Agents Scheme for Secure Web Transaction over the Internet.
Informatica (Slovenia), 2002

Attack on A New Public Key Cryptosystem from ISC'02 (LNCS 2433).
IACR Cryptology ePrint Archive, 2002

ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings.
IACR Cryptology ePrint Archive, 2002

Cryptanalysis of Two New Signature Schemes.
IACR Cryptology ePrint Archive, 2002

SAWT: A New System for Secure and Anonymous Web Transactions over the Internet.
Journal of Research and Practice in Information Technology, 2002

ID-Based Blind Signature and Ring Signature from Pairings.
Proceedings of the Advances in Cryptology, 2002

Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
Fair Electronic Cash Systems with Multiple Banks.
Proceedings of the Information Security for Global Information Infrastructures, 2000


  Loading...