Zhengan Huang

According to our database1, Zhengan Huang
  • authored at least 17 papers between 2012 and 2018.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A remotely keyed file encryption scheme under mobile cloud computing.
J. Network and Computer Applications, 2018

Outsourced privacy-preserving classification service over encrypted data.
J. Network and Computer Applications, 2018

Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures.
IACR Cryptology ePrint Archive, 2018

A Short Linearly Homomorphic Proxy Signature Scheme.
IEEE Access, 2018

Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

2017
Insight of the protection for data security under selective opening attacks.
Inf. Sci., 2017

Multi-key privacy-preserving deep learning in cloud computing.
Future Generation Comp. Syst., 2017

Towards secure and flexible EHR sharing in mobile health cloud under static assumptions.
Cluster Computing, 2017

2015
n-Evasive all-but-many lossy trapdoor function and its constructions.
Security and Communication Networks, 2015

Non-malleability under Selective Opening Attacks: Implication and Separation.
IACR Cryptology ePrint Archive, 2015

Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks.
Comput. J., 2015

Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited.
Applied Mathematics and Computer Science, 2015

Non-malleability Under Selective Opening Attacks: Implication and Separation.
Proceedings of the Applied Cryptography and Network Security, 2015

2013
Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Fixing the Sender-Equivocable Encryption Scheme in Eurocrypt 2010.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited.
IACR Cryptology ePrint Archive, 2012


  Loading...