Peng Zhang

According to our database1, Peng Zhang authored at least 22 papers between 2014 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List.
IACR Cryptology ePrint Archive, 2018

An efficient access control scheme with outsourcing capability and attribute update for fog computing.
Future Generation Comp. Syst., 2018

Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control.
Future Generation Comp. Syst., 2018

Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
A Parallel Hash Function with Variable Initial Values.
Wireless Personal Communications, 2017

Research on the Hash Function Structures and its Application.
Wireless Personal Communications, 2017

Efficient Chosen-Ciphertext Secure Encryption from R-LWE.
Wireless Personal Communications, 2017

Utilizing fully homomorphic encryption to implement secure medical computation in smart cities.
Personal and Ubiquitous Computing, 2017

Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE.
TIIS, 2017

Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks Analytics.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Outsourcing Privacy Preserving ID3 Decision Tree Algorithm over Encrypted Data-sets for Two-Parties.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A New Blockchain-Based Value-Added Tax System.
Proceedings of the Provable Security, 2017

An Improved Leveled Fully Homomorphic Encryption Scheme over the Integers.
Proceedings of the Information Security Practice and Experience, 2017

Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Attribute-Based Encryption Scheme Supporting Decryption Outsourcing and Attribute Revocation in Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Efficient identity-based leveled fully homomorphic encryption from RLWE.
Security and Communication Networks, 2016

Efficient Signature Schemes from R-LWE.
TIIS, 2016

Towards Certificate-Based Group Encryption.
Proceedings of the Provable Security, 2016

An accelerated fully homomorphic encryption scheme over the integers.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

A Cloud-Based Access Control Scheme with User Revocation and Attribute Update.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication.
Comp. Math. Methods in Medicine, 2015

2014
Efficient Linear Homomorphic Encryption from LWE Over Rings.
Wireless Personal Communications, 2014


  Loading...