Zengpeng Li

Orcid: 0000-0003-0758-7230

Affiliations:
  • Shandong University, School of Cyber Science and Technology, Jinan, China


According to our database1, Zengpeng Li authored at least 47 papers between 2016 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Purse: Post-Quantum Unique Ring Signature for Anonymous Transactions.
IEEE Internet Things J., August, 2025

Bandwidth-Efficient Robust Threshold ECDSA in Three Rounds.
IACR Cryptol. ePrint Arch., 2025

StealthHub: Utxo-Based Stealth Address Protocol.
Proceedings of the IEEE International Conference on Web Services, 2025

Threshold ECDSA in Two Rounds.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

2024
Lightweight Infrared and Visible Image Fusion Technique: Guided Gradient Optimization Driven.
IEEE Trans. Consumer Electron., November, 2024

Funder: Future-Proof Unbiased Decentralized Randomness.
IEEE Internet Things J., March, 2024

Controlled Search: Building Inverted-Index PEKS With Less Leakage in Multiuser Setting.
IEEE Internet Things J., January, 2024

Benchmarking ZK-Friendly Hash Functions and SNARK Proving Systems for EVM-compatible Blockchains.
CoRR, 2024

F-FHEW: High-Precision Approximate Homomorphic Encryption with Batch Bootstrapping.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
Sustainable and Round-Optimized Group Authenticated Key Exchange in Vehicle Communication.
IEEE Trans. Intell. Transp. Syst., December, 2023

Retrieval Transformation: Dynamic Searchable Symmetric Encryption With Strong Security.
IEEE Syst. J., December, 2023

Decentralized Identity Authentication with Auditability and Privacy.
Algorithms, January, 2023

QR-PUF: Design and Implementation of a RFID-Based Secure Inpatient Management System Using XOR-Arbiter-PUF and QR-Code.
IEEE Trans. Netw. Sci. Eng., 2023

BBB-Voting: Self-Tallying End-to-End Verifiable 1-out-of-k Blockchain-Based Boardroom Voting.
Proceedings of the IEEE International Conference on Blockchain, 2023

ZKBdf: A ZKBoo-Based Quantum-Secure Verifiable Delay Function with Prover-Secret.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
Achieving One-Round Password-Based Authenticated Key Exchange over Lattices.
IEEE Trans. Serv. Comput., 2022

Quantum-Safe Round-Optimal Password Authentication for Mobile Devices.
IEEE Trans. Dependable Secur. Comput., 2022

PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices.
Future Gener. Comput. Syst., 2022

Reinshard: An Optimally Sharded Dual-Blockchain for Concurrency Resolution.
Distributed Ledger Technol. Res. Pract., 2022

2021
PriParkRec: Privacy-Preserving Decentralized Parking Recommendation Service.
IEEE Trans. Veh. Technol., 2021

Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification.
IEEE Trans. Dependable Secur. Comput., 2021

Leakage Resilient Leveled FHE on Multiple Bits Message.
IEEE Trans. Big Data, 2021

Building Low-Interactivity Multifactor Authenticated Key Exchange for Industrial Internet of Things.
IEEE Internet Things J., 2021

Post-Quantum VRF and its Applications in Future-Proof Blockchain System.
CoRR, 2021

UC Modelling and Security Analysis of the Estonian IVXV Internet Voting System.
CoRR, 2021

Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs.
Sci. China Inf. Sci., 2021

LaKSA: A Probabilistic Proof-of-Stake Protocol.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Biometrics-Authenticated Key Exchange for Secure Messaging.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Achieving Multi-Hop PRE via Branching Program.
IEEE Trans. Cloud Comput., 2020

Revisiting post-quantum hash proof systems over lattices for Internet of Thing authentications.
J. Ambient Intell. Humaniz. Comput., 2020

BBB-Voting: 1-out-of-k Blockchain-Based Boardroom Voting.
CoRR, 2020

ProPoS: A Probabilistic Proof-of-Stake Protocol.
CoRR, 2020

Preserving Data Privacy via Federated Learning: Challenges and Solutions.
IEEE Consumer Electron. Mag., 2020

SecDedup: Secure Encrypted Data Deduplication With Dynamic Ownership Updating.
IEEE Access, 2020

2018
Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography.
Wirel. Commun. Mob. Comput., 2018

Multi-key FHE for multi-bit messages.
Sci. China Inf. Sci., 2018

Two-Round PAKE Protocol over Lattices Without NIZK.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Toward single-server private information retrieval protocol via learning with errors.
J. Inf. Secur. Appl., 2017

Towards Multi-Hop Homomorphic Identity-Based Proxy Re-Encryption via Branching Program.
IEEE Access, 2017

Toward Proxy Re-encryption From Learning with Errors in the Exponent.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

An Uncertain Continuous Collaborative Users Finding Algorithm for Location Privacy Protection.
Proceedings of the 20th ACM International Conference on Modelling, 2017

Towards Fully Homomorphic Encryption From Gentry-Peikert-Vaikuntanathan Scheme.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme.
IACR Cryptol. ePrint Arch., 2016

Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme.
Proceedings of the Provable Security, 2016

Dual LWE-Based Fully Homomorphic Encryption with Errorless Key Switching.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Multi-bit Leveled Homomorphic Encryption via \mathsf Dual.LWE -Based.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016


  Loading...