Zongyang Zhang
Orcid: 0000-0003-1358-4933
According to our database1,
Zongyang Zhang
authored at least 61 papers
between 2009 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Efficient inner product arguments with sublogarithmic proof and sub-square-root verifier.
Cybersecur., December, 2025
Cybersecur., December, 2025
Peer Peer Netw. Appl., June, 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
A consensus-based solution for cryptocurrencies arbitrage bots in intelligent blockchain.
Digit. Commun. Networks, 2025
2024
IEEE Trans. Dependable Secur. Comput., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Lightweight Instance Batch Schemes Towards Prover-Efficient Decentralized Private Computation.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
IET Inf. Secur., May, 2023
TI-BIoV: Traffic Information Interaction for Blockchain-Based IoV With Trust and Incentive.
IEEE Internet Things J., 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Building blocks of sharding blockchain systems: Concepts, approaches, and open problems.
Comput. Sci. Rev., 2022
Comput. Secur., 2022
2021
A comprehensive survey on smart contract construction and execution: paradigms, tools, and systems.
Patterns, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
UC-Secure Cryptographic Reverse Firewall-Guarding Corrupted Systems with the Minimum Trusted Module.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
Redactable Transactions in Consortium Blockchain: Controlled by Multi-authority CP-ABE.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
Secure Outsourced Medical Data against Unexpected Leakage with Flexible Access Control in a Cloud Storage System.
Secur. Commun. Networks, 2020
Int. J. Inf. Sec., 2020
More realistic analysis of mass surveillance - security in multi-surveillant settings.
IET Inf. Secur., 2020
Comput. Secur., 2020
2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
IEEE Access, 2018
Proceedings of the Information Security - 21st International Conference, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
2016
Secur. Commun. Networks, 2016
J. Comput. Secur., 2016
Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange revisited and more.
Int. J. Inf. Sec., 2016
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Information Security Practice and Experience, 2016
2015
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model.
Proceedings of the Provable Security, 2015
2014
Sakai-Ohgishi-Kasahara Non-Interactive Identity-Based Key Exchange Scheme, Revisited.
IACR Cryptol. ePrint Arch., 2014
Comput. J., 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
IACR Cryptol. ePrint Arch., 2013
2012
Secur. Commun. Networks, 2012
Proceedings of the Provable Security - 6th International Conference, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
2010
Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments.
Proceedings of the Public Key Cryptography, 2010
2009
An Observation on Non-Malleable Witness-Indistinguishability and Non-Malleable Zero-Knowledge.
Proceedings of the Theory and Applications of Models of Computation, 6th Annual Conference, 2009
Proceedings of the Advances in Cryptology, 2009