Gongxian Zeng

Orcid: 0000-0002-8421-4916

According to our database1, Gongxian Zeng authored at least 19 papers between 2016 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Receiver selective opening security for identity-based encryption in the multi-challenge setting.
Des. Codes Cryptogr., April, 2023

Corrigendum to: A Self-Tallying Electronic Voting Based on Blockchain.
Comput. J., February, 2023

Strongly nonoutsourceable scratch-off puzzles in blockchain.
Soft Comput., 2023

Non-Interactive Zero-Knowledge Functional Proofs.
IACR Cryptol. ePrint Arch., 2023

Asymmetric Group Message Franking: Definitions & Constructions.
IACR Cryptol. ePrint Arch., 2023

Asymmetric Group Message Franking: Definitions and Constructions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Federated Learning with Emerging New Class: A Solution Using Isolation-Based Specification.
Proceedings of the Database Systems for Advanced Applications, 2023

2022
DAG-Σ: A DAG-based Sigma Protocol for Relations in CNF.
IACR Cryptol. ePrint Arch., 2022

A Self-Tallying Electronic Voting Based on Blockchain.
Comput. J., 2022

2019
Anonymous Counting Problem in Trust Level Warning System for VANET.
IEEE Trans. Veh. Technol., 2019

A Secure and Self-tallying E-voting System Based on Blockchain.
Proceedings of the Information Security Applications - 20th International Conference, 2019

OC-ORAM: Constant Bandwidth ORAM with Smaller Block Size using Oblivious Clear Algorithm.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

2018
Privacy-preserving verifiable elastic net among multiple institutions in the cloud.
J. Comput. Secur., 2018

Secure Compression and Pattern Matching Based on Burrows-Wheeler Transform.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

A New Privacy-Preserving Searching Model on Blockchain.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

2017
Constant bandwidth ORAM with small block size using PIR operations.
IACR Cryptol. ePrint Arch., 2017

A Nonoutsourceable Puzzle Under GHOST Rule.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

A Privacy-Preserving Multi-Pattern Matching Scheme for Searching Strings in Cloud Database.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

2016
LRCRYPT: Leakage-Resilient Cryptographic System (Design and Implementation).
Proceedings of the Information Security Applications - 17th International Workshop, 2016


  Loading...