Zhen Zhao

Orcid: 0000-0003-2654-624X

Affiliations:
  • Xidian University, State Key Laboratory of Integrated Service Networks, Xi'an, China


According to our database1, Zhen Zhao authored at least 31 papers between 2015 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
Logarithmic identity-based ring signature over lattices and linkable variant.
Comput. Stand. Interfaces, 2026

2025
Verifiable and Privacy-Preserving $k$k-NN Query Scheme With Multiple Keys.
IEEE Trans. Big Data, June, 2025

Identity-Based Encryption with Equality Test Supporting Accountable Authorization in Cloud Computing.
J. Comput. Sci. Technol., January, 2025

Introduction to Cryptographic Definitions - A Step-by-Step Guide for Beginners
Undergraduate Topics in Computer Science, Springer, ISBN: 978-3-031-91968-8, 2025

EPBNN: Efficient and Private Inference for Binary Neural Network.
IEEE Internet Things J., 2025

2024
Privacy-preserving medical diagnosis system with Gaussian kernel-based support vector machine.
Peer Peer Netw. Appl., September, 2024

Secure k-NN Query With Multiple Keys Based on Random Projection Forests.
IEEE Internet Things J., May, 2024

Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures.
Cryptogr., March, 2024

Parallel private information retrieval protocol with index anonymity for untrusted databases.
J. King Saud Univ. Comput. Inf. Sci., February, 2024

Privacy-preserving compromised credential checking protocol for account protection.
Comput. Stand. Interfaces, 2024

Post-Quantum Secure ID-Based (Threshold) Linkable Dual-Ring Signature and Its Application in Blockchain Transactions.
Cryptogr., 2024

2023
PPeFL: Privacy-Preserving Edge Federated Learning With Local Differential Privacy.
IEEE Internet Things J., September, 2023

Full black-box retrievable and accountable identity-based encryption.
Comput. Stand. Interfaces, August, 2023

Secure Replication-Based Outsourced Computation Using Smart Contracts.
IEEE Trans. Serv. Comput., 2023

EthereumX: Improving Signature Security With Randomness Preprocessing Module.
IEEE Trans. Serv. Comput., 2023

Public-Key Encryption With Tester Verifiable Equality Test for Cloud Computing.
IEEE Trans. Cloud Comput., 2023

Research Philosophy of Modern Cryptography.
IACR Cryptol. ePrint Arch., 2023

2022
An Anonymous Authentication System for Pay-As-You-Go Cloud Computing$^*$*.
IEEE Trans. Dependable Secur. Comput., 2022

PKE-MET: Public-Key Encryption With Multi-Ciphertext Equality Test in Cloud Computing.
IEEE Trans. Cloud Comput., 2022

Secure Infectious Diseases Detection System With IoT-Based e-Health Platforms.
IEEE Internet Things J., 2022

2021
Generic construction for tightly-secure signatures from discrete log.
Theor. Comput. Sci., 2021

Lightweight Public Key Encryption With Equality Test Supporting Partial Authorization in Cloud Storage.
Comput. J., 2021

Secure Privacy-Preserving Association Rule Mining With Single Cloud Server.
IEEE Access, 2021

2020
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts.
Theor. Comput. Sci., 2020

Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing.
Secur. Commun. Networks, 2020

Black-Box Accountable Authority Identity-Based Revocation System.
Comput. J., 2020

On the General Construction of Tightly Secure Identity-Based Signature Schemes.
Comput. J., 2020

2019
A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks.
Sensors, 2019

Accountable identity-based encryption with distributed private key generators.
Inf. Sci., 2019

Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption.
IEEE Access, 2019

2015
An Efficient Revocable Group Signature Scheme in Vehicular Ad Hoc Networks.
KSII Trans. Internet Inf. Syst., 2015


  Loading...