Peng Zhang

Orcid: 0000-0002-5335-5994

Affiliations:
  • Shenzhen University, ATR Key Laboratory of National Defense Technology, China


According to our database1, Peng Zhang authored at least 45 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Efficient Homomorphic Argmax Approximation for Privacy-Preserving Neural Networks.
Cryptogr., June, 2024

2023
Privacy-Preserving and Outsourced Multi-Party K-Means Clustering Based on Multi-Key Fully Homomorphic Encryption.
IEEE Trans. Dependable Secur. Comput., 2023

Achieving Maximum Efficiency in Schnorr-based Multi-signature and Applications in Blockchain.
CoRR, 2023

A Secure and Cost-Efficient Blockchain Facilitated IoT Software Update Framework.
IEEE Access, 2023

A Blockchain-based Co-Simulation Platform for Transparent and Fair Energy Trading and Management.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

2022
A Survey on Cyber-Security of Connected and Autonomous Vehicles (CAVs).
IEEE Trans. Intell. Transp. Syst., 2022

PEMT-CoSim: A Co-Simulation Platform for Packetized Energy Management and Trading in Distributed Energy Systems.
Proceedings of the IEEE International Conference on Communications, 2022

2021
Secure and Efficient Multi-Signature Schemes for Fabric: An Enterprise Blockchain Platform.
IEEE Trans. Inf. Forensics Secur., 2021

A Survey on Zero-Knowledge Proof in Blockchain.
IEEE Netw., 2021

2020
Private Machine Learning Classification Based on Fully Homomorphic Encryption.
IEEE Trans. Emerg. Top. Comput., 2020

A Survey on Secure Computation Based on Homomorphic Encryption in Vehicular Ad Hoc Networks.
Sensors, 2020

Building a dynamic searchable encrypted medical database for multi-client.
Inf. Sci., 2020

Multi-user Boolean searchable encryption supporting fast ranking in mobile clouds.
Comput. Commun., 2020

Efficient Repair Algorithm for Information Column of EVENODD(p, 4) Codes.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020

2019
Blockchain Based Owner-Controlled Secure Software Updates for Resource-Constrained IoT.
Proceedings of the Network and System Security - 13th International Conference, 2019

Multi-keyword Ranked Searchable Encryption Supporting CP-ABE Test.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019

2018
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List.
IACR Cryptol. ePrint Arch., 2018

An efficient access control scheme with outsourcing capability and attribute update for fog computing.
Future Gener. Comput. Syst., 2018

Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control.
Future Gener. Comput. Syst., 2018

A Survey on Access Control in Fog Computing.
IEEE Commun. Mag., 2018

Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs.
Proceedings of the Network and System Security - 12th International Conference, 2018

Compact Ring Signature in the Standard Model for Blockchain.
Proceedings of the Information Security Practice and Experience, 2018

An Efficient Multi-keyword Searchable Encryption Supporting Multi-user Access Control.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Outsourced Privacy Preserving SVM with Multiple Keys.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Evaluating CryptoNote-Style Blockchains.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
A Parallel Hash Function with Variable Initial Values.
Wirel. Pers. Commun., 2017

Research on the Hash Function Structures and its Application.
Wirel. Pers. Commun., 2017

Efficient Chosen-Ciphertext Secure Encryption from R-LWE.
Wirel. Pers. Commun., 2017

Utilizing fully homomorphic encryption to implement secure medical computation in smart cities.
Pers. Ubiquitous Comput., 2017

Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE.
KSII Trans. Internet Inf. Syst., 2017

Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks Analytics.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Outsourcing Privacy Preserving ID3 Decision Tree Algorithm over Encrypted Data-sets for Two-Parties.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A New Blockchain-Based Value-Added Tax System.
Proceedings of the Provable Security, 2017

An Improved Leveled Fully Homomorphic Encryption Scheme over the Integers.
Proceedings of the Information Security Practice and Experience, 2017

Ranked Searchable Symmetric Encryption Supporting Conjunctive Queries.
Proceedings of the Information Security Practice and Experience, 2017

A Multi-client Dynamic Searchable Symmetric Encryption System with Physical Deletion.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Attribute-Based Encryption Scheme Supporting Decryption Outsourcing and Attribute Revocation in Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Efficient identity-based leveled fully homomorphic encryption from RLWE.
Secur. Commun. Networks, 2016

Efficient Signature Schemes from R-LWE.
KSII Trans. Internet Inf. Syst., 2016

Towards Certificate-Based Group Encryption.
Proceedings of the Provable Security, 2016

An accelerated fully homomorphic encryption scheme over the integers.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

A Cloud-Based Access Control Scheme with User Revocation and Attribute Update.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication.
Comput. Math. Methods Medicine, 2015

2014
Efficient Linear Homomorphic Encryption from LWE Over Rings.
Wirel. Pers. Commun., 2014


  Loading...