Huafei Zhu

According to our database1, Huafei Zhu authored at least 83 papers between 2001 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Highly Scalable Beaver Triple Generator from Additive-only Homomorphic Encryption.
CoRR, 2022

Highly Scalable Beaver Triple Generator from Additively Homomorphic Encryption.
Proceedings of the Advanced Information Networking and Applications, 2022

Beaver Triple Generator from Multiplicatively Homomorphic Key Management Protocol.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
A Lightweight, Anonymous and Confidential Genomic Computing for Industrial Scale Deployment.
CoRR, 2021

2020
On the relationship between (secure) multi-party computation and (secure) federated learning.
CoRR, 2020

Privacy-preserving Weighted Federated Learning within Oracle-Aided MPC Framework.
CoRR, 2020

Privacy-Preserving Weighted Federated Learning Within the Secret Sharing Framework.
IEEE Access, 2020

2019
Transitive Pseudonyms Mediated EHRs Sharing for Very Important Patients.
Proceedings of the Web Services - ICWS 2019, 2019

2018
Sustainable Data Management Strategies and Systems in Untrust Cloud Environments.
Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, 2018

2017
An efficient protocol for secure multicast key distribution in the presence of adaptive adversaries.
Sci. China Inf. Sci., 2017

Stochastic Game Approach for Long-Term Fairness-Aware Radio Resource Allocation.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2015
Verifiably anonymous data collection on web.
Proceedings of the International Telecommunication Networks and Applications Conference, 2015

Universally Composable Oblivious Database in the Presence of Malicious Adversaries.
Proceedings of the Trusted Systems - 7th International Conference, 2015

Distributed Multi-user, Multi-key Searchable Encryptions Resilient Fault Tolerance.
Proceedings of the Trusted Systems - 7th International Conference, 2015

2013
Sustainable Pseudo-random Number Generator.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

2012
Private data deduplication protocols in cloud storage.
Proceedings of the ACM Symposium on Applied Computing, 2012

Cloud-enabled data sharing model.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Optimal Trust Mining and Computing on Keyed MapReduce.
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012

2011
Non-black-Box Computation of Linear Regression Protocols with Malicious Adversaries.
Proceedings of the Information Security Practice and Experience, 2011

Public-Key Encryptions Tolerating Adaptive and Composable Adversaries.
Proceedings of the Information Security Practice and Experience, 2011

2010
Private Searching on MapReduce.
Proceedings of the Trust, 2010

Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries.
Proceedings of the SECRYPT 2010, 2010

Adaptive and Composable Non-interactive String-commitment Protocols.
Proceedings of the SECRYPT 2010, 2010

Towards a Theory of Cloud Computing in the Protocol-Composition Framework.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

Error-free, Multi-bit Non-committing Encryption with Constant Round Complexity.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Adaptive and Composable Non-committing Encryptions.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
New Constructions for Reusable, Non-erasure and Universally Composable Commitments.
Proceedings of the Information Security Practice and Experience, 2009

Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems.
Proceedings of the Progress in Cryptology, 2009

Adaptive and Composable Oblivious Transfer Protocols (Short Paper).
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Towards a Theory of Universally Composable Cloud Computing.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

Mixed Commitments Mediated Transcoders: A Simple Implementation of Mercurial Mediated Transcoders.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Somewhat Secure Mobile Electronic-Voting Systems Based on the Cut-and-Choose Mechanism.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions.
Proceedings of the Progress in Cryptology, 2009

2008
Round Optimal Universally Composable Oblivious Transfer Protocols.
Proceedings of the Provable Security, Second International Conference, 2008

Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks.
Proceedings of IEEE International Conference on Communications, 2008

Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

Fully-Simulatable Oblivious Set Transfer.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Quantifying Trust Metrics of Recommendation Systems in Ad-Hoc Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Securing RFID Tags: Authentication Protocols with Completeness, Soundness, and Non-Traceability.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Compact sequential aggregate signatures.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures.
Proceedings of the Public Key Cryptography, 2007

Or-protocols for Anonymous Membership Proofs in Ad-hoc Networks.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Securing Mobile Auctions in the Presence of Malicious Adversaries.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Computing of Trust in Complex Environments.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Price Negotiation Systems for M-commerce.
Proceedings of IEEE International Conference on Communications, 2007

Light-Weight Fair-Dealing Infrastructures (FADIS) for M-Commerce.
Proceedings of IEEE International Conference on Communications, 2007

Oblivious Keyword Search Protocols in the Public Database Model.
Proceedings of IEEE International Conference on Communications, 2007

Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
Setup-driving Verifiably Committed Signatures Within Standard Complexity Mode.
Int. J. Netw. Secur., 2006

Turing assessor: a new tool for cyber security quantification.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Compact routing discovery protocol with lower communication complexity.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

An Efficient Scheme for Encrypted Data Aggregation on Sensor Networks.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

More on Shared-Scalar-Product Protocols.
Proceedings of the Information Security Practice and Experience, 2006

Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Stand-Alone and Setup-Free Verifiably Committed Signatures.
Proceedings of the Topics in Cryptology, 2006

Computing of Trust in Ad-Hoc Networks.
Proceedings of the Communications and Multimedia Security, 2006

Oblivious Scalar-Product Protocols.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

More on Stand-Alone and Setup-Free Verifiably Committed Signatures.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
Sequential aggregate signatures for wireless routing protocols.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Practical device association protocols for wireless enabled personal devices.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

A Novel Construction of Two-Party Private Bidding Protocols from Yao's Millionaires Problem.
Proceedings of the Trust, 2005

Provably secure anonymous identification protocols for ad-hoc access structures.
Proceedings of the IEEE 16th International Symposium on Personal, 2005

Provably secure public key management protocols for self-organized ad hoc networks.
Proceedings of the IEEE 16th International Symposium on Personal, 2005

Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Augmented Oblivious Polynomial Evaluation Protocol and Its Applications.
Proceedings of the Computer Security, 2005

Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks.
Proceedings of the Communications and Multimedia Security, 2005

Efficient Group Signatures from Bilinear Pairing.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

2004
Universal Undeniable Signatures.
IACR Cryptol. ePrint Arch., 2004

Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model.
Proceedings of the Public Key Cryptography, 2004

Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Trust Establishment in Large Scale Grid Settings.
Proceedings of the Grid and Cooperative Computing, 2004

Analysis and Improvement of Micali's Fair Contract Signing Protocol.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
Computing of Trust in Distributed Networks.
IACR Cryptol. ePrint Arch., 2003

Verifiably Committed Signatures Provably Secure in The Standard Complexity Model.
IACR Cryptol. ePrint Arch., 2003

Constructing Optimistic Fair Exchange Protocols from Committed Signatures.
IACR Cryptol. ePrint Arch., 2003

A Formal Proof of Zhu's Signature Scheme.
IACR Cryptol. ePrint Arch., 2003

A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack.
IACR Cryptol. ePrint Arch., 2003

A Novel Two-Level Trust Model for Grid.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Variations of Diffie-Hellman Problem.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

2002
Design and Security Analysis of Anonymous Group Identification Protocols.
Proceedings of the Public Key Cryptography, 2002

2001
An Identification Scheme Provably Secure against Reset Attack.
Proceedings of the Information and Communications Security, Third International Conference, 2001


  Loading...