Futai Zhang

According to our database1, Futai Zhang
  • authored at least 56 papers between 2000 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Provably secure certificate-based encryption with leakage resilience.
Theor. Comput. Sci., 2018

2017
Continuous Leakage Resilient Lossy Trapdoor Functions.
Information, 2017

An efficient revocable ID-based encryption scheme in the standard model.
IJES, 2017

A Provably Secure Ring Signature Scheme in Certificateless Cryptography.
CoRR, 2017

2016
Attacks to some verifiable multi-secret sharing schemes and two improved schemes.
Inf. Sci., 2016

Continuous leakage-resilient certificate-based encryption.
Inf. Sci., 2016

Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage.
Proceedings of the Provable Security, 2016

2015
Efficient revocable certificateless encryption against decryption key exposure.
IET Information Security, 2015

Information-theoretical secure verifiable secret sharing with vector space access structures over bilinear groups and its applications.
Future Generation Comp. Syst., 2015

2014
Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles.
Security and Communication Networks, 2014

A Revocable Certificateless Signature Scheme.
JCP, 2014

Notes on the security of certificateless aggregate signature schemes.
Inf. Sci., 2014

Cryptanalysis and improvement on a certificateless encryption scheme in the standard model.
IJICS, 2014

Efficient Revocable Certificateless Encryption Secure in the Standard Model.
Comput. J., 2014

Information-Theoretical Secure Verifiable Secret Sharing with Vector Space Access Structures over Bilinear Groups.
Proceedings of the Information Security Practice and Experience, 2014

A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience.
Proceedings of the Information Security Practice and Experience, 2014

2013
On security of a certificateless signcryption scheme.
Inf. Sci., 2013

Linear threshold verifiable secret sharing in bilinear groups.
IJGUC, 2013

Leakage-resilient identity-based encryption scheme.
IJGUC, 2013

A revocable certificateless signature scheme.
IACR Cryptology ePrint Archive, 2013

Corrigendum: "Provably-secure electronic cash based on certicateless partially-blind signatures".
Electronic Commerce Research and Applications, 2013

Efficient leakage-resilient public key encryption from DDH assumption.
Cluster Computing, 2013

Secure Distributed Key Generation on Vector Space Access Structures in Bilinear Groups.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Revocable Identity-Based Signature without Pairing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
Delegation of signing rights using certificateless proxy signatures.
Inf. Sci., 2012

Practical Certificateless Public Key Encryption in the Standard Model.
Proceedings of the Network and System Security - 6th International Conference, 2012

Cryptanalysis of a Certificateless Encryption Scheme in the Standard Model.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A New Variant of the Cramer-Shoup Leakage-Resilient Public Key Encryption.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
Provably-secure electronic cash based on certificateless partially-blind signatures.
Electronic Commerce Research and Applications, 2011

2010
Simulatable certificateless two-party authenticated key agreement protocol.
Inf. Sci., 2010

Certificateless threshold signature scheme from bilinear maps.
Inf. Sci., 2010

Efficient many-to-one authentication with certificateless aggregate signatures.
Computer Networks, 2010

2009
Cryptanalysis of a Generalized Ring Signature Scheme.
IEEE Trans. Dependable Sec. Comput., 2009

A new certificateless aggregate signature scheme.
Computer Communications, 2009

Batch Verification for Certificateless Signature Schemes.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Provably Secure Certificateless Two-Party Authenticated Key Agreement Protocol without Pairing.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Novel Efficient Certificateless Aggregate Signatures.
Proceedings of the Applied Algebra, 2009

2008
Short Designated Verifier Signature Scheme and Its Identity-based Variant.
I. J. Network Security, 2008

Secure Certificateless Public Key Encryption without Redundancy.
IACR Cryptology ePrint Archive, 2008

A New Provably Secure Certificateless Signature Scheme.
Proceedings of IEEE International Conference on Communications, 2008

Efficient ID.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Security Model for Certificateless Aggregate Signature Schemes.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Cryptanalysis and Improvement of Shacham-Waters Ring Signature Scheme.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004.
J. Comput. Sci. Technol., 2007

A Provably Secure Ring Signature Scheme in Certificateless Cryptography.
Proceedings of the Provable Security, 2007

New Efficient Certificateless Signature Scheme.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Strongly Secure Certificateless Public Key Encryption Without Pairing.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

2006
Restricted Universal Designated Verifier Signature.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Short (Identity-Based) Strong Designated Verifier Signature Schemes.
Proceedings of the Information Security Practice and Experience, 2006

Certificateless Designated Verifier Signature Schemes.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Short Designated Verifier Proxy Signature from Pairings.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

On the Security of Certificateless Signature Schemes from Asiacrypt 2003.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2002
Selection of Secure Hyperelliptic Curves of g_2 Based on a Subfield.
J. Comput. Sci. Technol., 2002

2001
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
Fair Electronic Cash Systems with Multiple Banks.
Proceedings of the Information Security for Global Information Infrastructures, 2000


  Loading...