default search action
Zhenfu Cao
Person information
- affiliation: East China Normal University, Shanghai, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j203]Panyu Wu, Jiachen Shen, Zhenfu Cao, Xiaolei Dong:
MMKFB: multi-client and multi-keyword searchable symmetric encryption with forward and backward privacy. Frontiers Comput. Sci. 19(3): 193804 (2025) - 2024
- [j202]Miao Wang, Liwang Sun, Zhenfu Cao, Xiaolei Dong:
IPO-PEKS: Effective Inner Product Outsourcing Public Key Searchable Encryption From Lattice in the IoT. IEEE Access 12: 28926-28937 (2024) - [j201]Haiqin Wu, Boris Düdder, Liangmin Wang, Zhenfu Cao, Jun Zhou, Xia Feng:
Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture. ACM Comput. Surv. 56(3): 63:1-63:40 (2024) - [j200]Yunbo Yang, Xiaolei Dong, Zhenfu Cao, Jiachen Shen, Ruofan Li, Yihao Yang, Shangmin Dou:
EMPSI: Efficient multiparty private set intersection (with cardinality). Frontiers Comput. Sci. 18(1): 181804 (2024) - [j199]Yunbo Yang, Yiwei Hu, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, Guomin Yang, Robert H. Deng:
OpenSE: Efficient Verifiable Searchable Encryption With Access and Search Pattern Hidden for Cloud-IoT. IEEE Internet Things J. 11(8): 13793-13809 (2024) - [j198]Zihou Zhang, Jiangtao Li, Yufeng Li, Chenhong Cao, Zhenfu Cao:
Hardware Secure Module Based Lightweight Conditional Privacy-Preserving Authentication for VANETs. IEEE Trans. Inf. Forensics Secur. 19: 6337-6350 (2024) - [j197]Zhusen Liu, Weizheng Wang, Yutong Ye, Nan Min, Zhenfu Cao, Lu Zhou, Zhe Liu:
Collusion-Resilient and Maliciously Secure Cloud- Assisted Two-Party Computation Scheme in Mobile Cloud Computing. IEEE Trans. Inf. Forensics Secur. 19: 7019-7032 (2024) - [j196]Ruochen Wang, Jun Zhou, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo:
Updatable Private Set Intersection With Forward Privacy. IEEE Trans. Inf. Forensics Secur. 19: 8573-8586 (2024) - [j195]Yunbo Yang, Xiang Chen, Yuhao Pan, Jiachen Shen, Zhenfu Cao, Xiaolei Dong, Xiaoguo Li, Jianfei Sun, Guomin Yang, Robert H. Deng:
OpenVFL: A Vertical Federated Learning Framework With Stronger Privacy-Preserving. IEEE Trans. Inf. Forensics Secur. 19: 9670-9681 (2024) - [j194]Zhusen Liu, Luyao Wang, Haiyong Bao, Zhenfu Cao, Lu Zhou, Zhe Liu:
Efficient and Privacy-Preserving Cloud-Assisted Two-Party Computation Scheme in Heterogeneous Networks. IEEE Trans. Ind. Informatics 20(5): 8007-8018 (2024) - [j193]Yihao Yang, Yunbo Yang, Xiang Chen, Xiaolei Dong, Zhenfu Cao, Jiachen Shen:
DMPSI: Efficient Scalable Delegated Multiparty PSI and PSI-CA With Oblivious PRF. IEEE Trans. Serv. Comput. 17(2): 497-508 (2024) - [j192]Yunbo Yang, Yiwei Hu, Ruofan Li, Xiaolei Dong, Zhenfu Cao, Jiachen Shen, Shangmin Dou:
LSE: Efficient Symmetric Searchable Encryption Based on Labeled PSI. IEEE Trans. Serv. Comput. 17(2): 563-574 (2024) - [c156]Yi Huang, Junping Wan, Zoe L. Jiang, Jun Zhou, Junbin Fang, Zhenfu Cao:
An Efficient Integer-Wise ReLU on TFHE. ACISP (1) 2024: 161-179 - [c155]Huilin He, Jiachen Shen, Zhenfu Cao, Xiaolei Dong, Haiqin Wu:
Proof of Privacy-Preserving Machine Learning: A Blockchain Consensus Mechanism with Secure Deep Learning Process. Blockchain 2024: 193-200 - [c154]Liang Li, Haiqin Wu, Boris Düdder, Jiachen Shen, Zhenfu Cao:
Bilateral Secure and Decentralized Crowdsourcing Task Matching Atop Consortium Blockchain. Blockchain 2024: 294-301 - [i54]Zhengjun Cao, Zhenfu Cao:
The Systemic Errors of Banded Quantum Fourier Transformation. IACR Cryptol. ePrint Arch. 2024: 454 (2024) - [i53]Yunbo Yang, Yuejia Cheng, Kailun Wang, Xiaoguo Li, Jianfei Sun, Jiachen Shen, Xiaolei Dong, Zhenfu Cao, Guomin Yang, Robert H. Deng:
Siniel: Distributed Privacy-Preserving zkSNARK. IACR Cryptol. ePrint Arch. 2024: 1803 (2024) - 2023
- [j191]Yuanjian Zhou, Zhenfu Cao, Xiaolei Dong:
Dynamic identity-based broadcast proxy re-encryption for data sharing in autonomous vehicles. Trans. Emerg. Telecommun. Technol. 34(11) (2023) - [j190]Yunbo Yang, Xiaolei Dong, Zhenfu Cao, Jiachen Shen, Shangmin Dou:
IXT: Improved searchable encryption for multi-word queries based on PSI. Frontiers Comput. Sci. 17(5): 175811 (2023) - [j189]Yuanjian Zhou, Zhenfu Cao, Xiaolei Dong, Jun Zhou:
BLDSS: A Blockchain-Based Lightweight Searchable Data Sharing Scheme in Vehicular Social Networks. IEEE Internet Things J. 10(9, May 1): 7974-7992 (2023) - [j188]Liwang Sun, Zhenfu Cao, Xiaolei Dong, Jiachen Shen:
LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search. Inf. Sci. 648: 119554 (2023) - [j187]Liwang Sun, Zhenfu Cao, Xiaolei Dong, Jiachen Shen, Miao Wang, Jiasheng Chen:
dMCLAEKS: Pairing-free designated-tester multi-recipient certificateless authenticated encryption with keyword search for concealing search patterns. J. Syst. Archit. 144: 103007 (2023) - [j186]Miao Wang, Zhenfu Cao, Xiaolei Dong:
Criteria for entanglement and separability of discrete quantum states. Quantum Inf. Comput. 23(7&8): 541-561 (2023) - [j185]Jun Zhou, Nan Wu, Yisong Wang, Shouzhen Gu, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo:
A Differentially Private Federated Learning Model Against Poisoning Attacks in Edge Computing. IEEE Trans. Dependable Secur. Comput. 20(3): 1941-1958 (2023) - [j184]Jun Zhou, Guobin Gao, Zhenfu Cao, Kim-Kwang Raymond Choo, Xiaolei Dong:
Lightweight Privacy-Preserving Distributed Recommender System Using Tag-Based Multikey Fully Homomorphic Data Encapsulation. IEEE Trans. Dependable Secur. Comput. 20(6): 5230-5246 (2023) - [j183]Zhongyun Lin, Jun Zhou, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo:
Generalized Autonomous Path Proxy Re-Encryption Scheme to Support Branch Functionality. IEEE Trans. Inf. Forensics Secur. 18: 5387-5400 (2023) - [j182]Jun Zhou, Shiying Chen, Kim-Kwang Raymond Choo, Zhenfu Cao, Xiaolei Dong:
EPNS: Efficient Privacy-Preserving Intelligent Traffic Navigation From Multiparty Delegated Computation in Cloud-Assisted VANETs. IEEE Trans. Mob. Comput. 22(3): 1491-1506 (2023) - [c153]Zhen Xia, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, Jun Zhou, Liming Fang, Zhe Liu, Chunpeng Ge, Chunhua Su:
Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning. ISPEC 2023: 579-594 - [c152]Panyu Wu, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, Yihao Yang, Jun Zhou, Liming Fang, Zhe Liu, Chunpeng Ge, Chunhua Su:
MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage. PST 2023: 1-11 - [c151]Yihao Yang, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, Yunbo Yang, Jun Zhou, Liming Fang, Zhe Liu, Chunpeng Ge, Chunhua Su, Zongyang Hou:
MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI Cardinality. PST 2023: 1-7 - [c150]Jinyang Li, Zhenfu Cao, Jiachen Shen, Xiaolei Dong:
MCVDSSE: Secure Multi-client Verifiable Dynamic Symmetric Searchable Encryption. SciSec 2023: 85-96 - [c149]Kaifeng Luo, Zhenfu Cao, Jiachen Shen, Xiaolei Dong:
SVFL: Secure Vertical Federated Learning on Linear Models. SciSec 2023: 332-344 - [c148]Liqing Yu, Yusai Wu, Yu Yu, Zhenfu Cao, Xiaolei Dong:
Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations. TCC (1) 2023: 238-267 - [i52]Liqing Yu, Yusai Wu, Yu Yu, Zhenfu Cao, Xiaolei Dong:
Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations. IACR Cryptol. ePrint Arch. 2023: 1355 (2023) - [i51]Zhengjun Cao, Zhenfu Cao:
The Planck Constant and Quantum Fourier Transformation. IACR Cryptol. ePrint Arch. 2023: 1971 (2023) - 2022
- [j181]Huidan Hu, Zhenfu Cao, Xiaolei Dong:
Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds. IEEE Access 10: 87322-87332 (2022) - [j180]Siqi Lu, Jianhua Zheng, Zhenfu Cao, Yongjuan Wang, Chunxiang Gu:
A survey on cryptographic techniques for protecting big data security: present and forthcoming. Sci. China Inf. Sci. 65(10) (2022) - [j179]Zhusen Liu, Zhenfu Cao, Xiaolei Dong, Xiaopeng Zhao, Haiyong Bao, Jiachen Shen:
A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid. Frontiers Comput. Sci. 16(3): 161810 (2022) - [j178]Jiawei Qian, Zhenfu Cao, Mengjie Lu, Xin Chen, Jiachen Shen, Jiangnan Liu:
The Secure Lattice-Based Data Aggregation Scheme in Residential Networks for Smart Grid. IEEE Internet Things J. 9(3): 2153-2164 (2022) - [j177]Zhusen Liu, Zhenfu Cao, Xiaolei Dong, Xiaopeng Zhao, Tian Liu, Haiyong Bao, Jiachen Shen:
EPMDA-FED: Efficient and Privacy-Preserving Multidimensional Data Aggregation Scheme With Fast Error Detection in Smart Grid. IEEE Internet Things J. 9(9): 6922-6933 (2022) - [j176]Ying Guo, Zhen-Fu Cao, Xiaolei Dong:
Generalized Goldwasser and Micali's Type Cryptosystem. J. Comput. Sci. Technol. 37(2): 459-467 (2022) - [j175]Jun Zhou, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo:
Efficient Privacy-Preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain. IEEE Trans. Cloud Comput. 10(1): 366-382 (2022) - [j174]Ying Chen, Tianhui Zhou, Jun Zhou, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo:
SAVE: Efficient Privacy-Preserving Location-Based Service Bundle Authentication in Self-Organizing Vehicular Social Networks. IEEE Trans. Intell. Transp. Syst. 23(8): 11752-11766 (2022) - [c147]Xingkai Wang, Zhenfu Cao, Zhen Liu, Kaitai Liang:
Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption. ESORICS (2) 2022: 105-125 - [c146]Caiqi Sun, Penghao Lu, Lei Cheng, Zhenfu Cao, Xiaolei Dong, Yili Tang, Jun Zhou, Linjian Mo:
Multi-interest Sequence Modeling for Recommendation with Causal Embedding. SDM 2022: 406-414 - 2021
- [j173]Gaoli Wang, Zhenfu Cao, Xiaolei Dong:
Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory. Comput. J. 64(8): 1264-1276 (2021) - [j172]Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao:
Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity. Des. Codes Cryptogr. 89(2): 241-253 (2021) - [j171]Ying Guo, Fei Meng, Leixiao Cheng, Xiaolei Dong, Zhenfu Cao:
Designated server-aided revocable identity-based keyword search on lattice. EURASIP J. Wirel. Commun. Netw. 2021(1): 174 (2021) - [j170]Nanyuan Cao, Zhenfu Cao, Xiaolei Dong, Haijiang Wang:
Improved RSA lossy trapdoor function and applications. Int. J. Inf. Comput. Secur. 14(3/4): 229-241 (2021) - [j169]Linghui Chen, Jun Zhou, Ying Chen, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo:
PADP: Efficient Privacy-Preserving Data Aggregation and Dynamic Pricing for Vehicle-to-Grid Networks. IEEE Internet Things J. 8(10): 7863-7873 (2021) - [j168]Menghui Lou, Xiaolei Dong, Zhenfu Cao, Jiachen Shen:
SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts. Secur. Commun. Networks 2021: 8884478:1-8884478:18 (2021) - [j167]Jun Zhou, Kim-Kwang Raymond Choo, Zhenfu Cao, Xiaolei Dong:
PVOPM: Verifiable Privacy-Preserving Pattern Matching with Efficient Outsourcing in the Malicious Setting. IEEE Trans. Dependable Secur. Comput. 18(5): 2253-2270 (2021) - [j166]Jianting Ning, Zhenfu Cao, Xiaolei Dong, Kaitai Liang, Lifei Wei, Kim-Kwang Raymond Choo:
CryptCloud$^+$+: Secure and Expressive Data Access Control for Cloud Storage. IEEE Trans. Serv. Comput. 14(1): 111-124 (2021) - [j165]Peng Jiang, Jianting Ning, Kaitai Liang, Changyu Dong, Jiageng Chen, Zhenfu Cao:
Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format. IEEE Trans. Serv. Comput. 14(5): 1357-1369 (2021) - [j164]Jiawei Qian, Zhenfu Cao, Xiaolei Dong, Jiachen Shen, Zhusen Liu, Yunxiu Ye:
Two Secure and Efficient Lightweight Data Aggregation Schemes for Smart Grid. IEEE Trans. Smart Grid 12(3): 2625-2637 (2021) - [c145]Xiao Tang, Zhenfu Cao, Xiaolei Dong, Jiachen Shen:
PKMark: A Robust Zero-distortion Blind Reversible Scheme for Watermarking Relational Databases. BigDataSE 2021: 72-79 - [c144]Qi Tang, Jiachen Shen, Zhenfu Cao, Xiaolei Dong:
PSSBP: A Privacy-preserving Scope-query Searchable Encryption Scheme Based on Blockchain for Parking Lots Sharing in Vehicular Networks. EUC 2021: 1-8 - [c143]Weijia Feng, Zhenfu Cao, Jiachen Shen, Xiaolei Dong:
RTPoW: A Proof-of-Work Consensus Scheme with Real-Time Difficulty Adjustment Algorithm. ICPADS 2021: 233-240 - [c142]Xiangyu Li, Zhenfu Cao, Jiachen Shen, Xiaolei Dong:
DPFDT: Decentralized Privacy-preserving Fair Data Trading System. MSN 2021: 183-190 - 2020
- [j163]Jun Zhou, Meng Zheng, Zhenfu Cao, Xiaolei Dong:
PVIDM: Privacy-preserving verifiable shape context based image denoising and matching with efficient outsourcing in the malicious setting. Comput. Secur. 88 (2020) - [j162]Jialu Chen, Jun Zhou, Zhenfu Cao, Athanasios V. Vasilakos, Xiaolei Dong, Kim-Kwang Raymond Choo:
Lightweight Privacy-Preserving Training and Evaluation for Discretized Neural Networks. IEEE Internet Things J. 7(4): 2663-2678 (2020) - [j161]Huajie Shen, Jun Zhou, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo:
Blockchain-Based Lightweight Certificate Authority for Efficient Privacy-Preserving Location-Based Service in Vehicular Social Networks. IEEE Internet Things J. 7(7): 6610-6622 (2020) - [j160]Jun Zhou, Zhenfu Cao, Zhan Qin, Xiaolei Dong, Kui Ren:
LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs. IEEE Trans. Inf. Forensics Secur. 15: 420-434 (2020) - [j159]Haijiang Wang, Xiaolei Dong, Zhenfu Cao:
Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search. IEEE Trans. Serv. Comput. 13(6): 1142-1151 (2020) - [c141]Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao, Licheng Wang, Zhusen Liu:
New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol. ACISP 2020: 408-424 - [c140]Yusai Wu, Liqing Yu, Zhenfu Cao, Xiaolei Dong:
Tight Security Analysis of 3-Round Key-Alternating Cipher with a Single Permutation. ASIACRYPT (1) 2020: 662-693 - [c139]Wenqi Yan, Jiachen Shen, Zhenfu Cao, Xiaolei Dong:
Blockchain Based Digital Evidence Chain of Custody. ICBCT 2020: 19-23 - [c138]Xin Chen, Jiachen Shen, Zhenfu Cao, Xiaolei Dong:
A Blockchain-Based Privacy-Preserving Scheme for Smart Grids. ICBCT 2020: 120-124 - [c137]Jing Chen, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, Xingkai Wang:
Forward Secure Dynamic Searchable Symmetric Encryption with Lighter Storage. ICCSP 2020: 24-30 - [c136]Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jinwen Zheng:
Anonymous IBE from Quadratic Residuosity with Fast Encryption. ISC 2020: 3-19 - [c135]Chan Fan, Xiaolei Dong, Zhenfu Cao, Jiachen Shen:
VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage. TrustCom 2020: 285-292 - [c134]Zhihao Zheng, Zhenfu Cao, Jiachen Shen:
Practical and Secure Circular Range Search on Private Spatial Data. TrustCom 2020: 639-645 - [c133]Yunxiu Ye, Zhenfu Cao, Jiachen Shen:
Unbounded Key-Policy Attribute-based Encryption with Black-Box Traceability. TrustCom 2020: 1655-1663 - [i50]Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao, Licheng Wang, Zhusen Liu:
New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol. IACR Cryptol. ePrint Arch. 2020: 245 (2020) - [i49]Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jinwen Zheng:
Anonymous IBE From Quadratic Residue With Fast Encryption. IACR Cryptol. ePrint Arch. 2020: 712 (2020) - [i48]Ying Guo, Zhenfu Cao, Xiaolei Dong:
A Generalization of Paillier's Public-Key System With Fast Decryption. IACR Cryptol. ePrint Arch. 2020: 796 (2020) - [i47]Yusai Wu, Liqing Yu, Zhenfu Cao, Xiaolei Dong:
Tight Security Analysis of 3-Round Key-Alternating Cipher with A Single Permutation. IACR Cryptol. ePrint Arch. 2020: 1073 (2020) - [i46]Chan Fan, Xiaolei Dong, Zhenfu Cao, Jiachen Shen:
VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage. IACR Cryptol. ePrint Arch. 2020: 1372 (2020) - [i45]Zhihao Zheng, Jiachen Shen, Zhenfu Cao:
Practical and Secure Circular Range Search on Private Spatial Data. IACR Cryptol. ePrint Arch. 2020: 1394 (2020)
2010 – 2019
- 2019
- [j158]Haijiang Wang, Xiaolei Dong, Zhenfu Cao, Dongmei Li, Nanyuan Cao:
Secure key-aggregation authorized searchable encryption. Sci. China Inf. Sci. 62(3): 39111:1-39111:3 (2019) - [j157]Gaoli Wang, Zhenfu Cao, Xiaolei Dong:
Improved Fault-Tolerant Aggregate Signatures. Comput. J. 62(4): 481-489 (2019) - [j156]Nanyuan Cao, Zhenfu Cao, Zhen Liu, Xiaolei Dong, Xiaopeng Zhao:
All-But-Many Lossy Trapdoor Functions under Decisional RSA Subgroup Assumption and Application. Comput. J. 62(8): 1148-1157 (2019) - [j155]Jun Zhou, Zhenfu Cao, Xiaolei Dong, Thanos Vasilakos:
GTSIM-POP: Game theory based secure incentive mechanism and patient-optimized privacy-preserving packet forwarding scheme in m-healthcare social networks. Future Gener. Comput. Syst. 101: 70-82 (2019) - [j154]Gang Yu, Yongjuan Wang, Zhenfu Cao, Jian Lin, Xiangyu Wang:
Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service. Int. J. Distributed Sens. Networks 15(4) (2019) - [j153]Erdong Deng, Huajun Zhang, Peilin Wu, Fei Guo, Zhen Liu, Haojin Zhu, Zhenfu Cao:
Pri-RTB: Privacy-preserving real-time bidding for securing mobile advertisement in ubiquitous computing. Inf. Sci. 504: 354-371 (2019) - [j152]Dongmei Li, Xiaolei Dong, Zhenfu Cao, Haijiang Wang:
Privacy-preserving outsourced image feature extraction. J. Inf. Secur. Appl. 47: 59-64 (2019) - [j151]Haijiang Wang, Xiaolei Dong, Zhenfu Cao:
Secure and efficient encrypted keyword search for multi-user setting in cloud computing. Peer-to-Peer Netw. Appl. 12(1): 32-42 (2019) - [j150]Huajun Zhang, Erdong Deng, Haojin Zhu, Zhenfu Cao:
Smart contract for secure billing in ride-hailing service via blockchain. Peer-to-Peer Netw. Appl. 12(5): 1346-1357 (2019) - [j149]Zhenfu Cao, Hongbing Wang, Yunlei Zhao:
AP-PRE: Autonomous Path Proxy Re-Encryption and Its Applications. IEEE Trans. Dependable Secur. Comput. 16(5): 833-842 (2019) - [j148]Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao:
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160. IACR Trans. Symmetric Cryptol. 2019(3): 169-192 (2019) - [j147]Fei Guo, Zichang Wang, Suguo Du, Huaxin Li, Haojin Zhu, Qingqi Pei, Zhenfu Cao, Jianhong Zhao:
Detecting Vehicle Anomaly in the Edge via Sensor Consistency and Frequency Characteristic. IEEE Trans. Veh. Technol. 68(6): 5618-5628 (2019) - [c132]Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao:
Efficient Collision Attack Frameworks for RIPEMD-160. CRYPTO (2) 2019: 117-149 - [c131]Jun Zhou, Yifang Zhang, Zhenfu Cao, Xiaolei Dong:
PPSAS: Lightweight Privacy-preserving Spectrum Aggregation and Auction in Cognitive Radio Networks. ICDCS 2019: 1127-1137 - [c130]Kangle Wang, Xiaolei Dong, Jiachen Shen, Zhenfu Cao:
An Effective Verifiable Symmetric Searchable Encryption Scheme in Cloud Computing. ICIT 2019: 98-102 - [c129]Fanghan Ye, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, Wenhua Zhao:
A Verifiable Dynamic Multi-user Searchable Encryption Scheme without Trusted Third Parties. ICPADS 2019: 896-900 - [c128]Hongyuan Chen, Zhenfu Cao, Xiaolei Dong, Jiachen Shen:
SDKSE-KGA: A Secure Dynamic Keyword Searchable Encryption Scheme Against Keyword Guessing Attacks. IFIPTM 2019: 162-177 - [c127]Fukang Liu, Zhenfu Cao, Gaoli Wang:
Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm. IWSEC 2019: 287-305 - [c126]Jiming Liu, Zhenfu Cao, Xiaolei Dong, Jiachen Shen:
DMU-ABSE: Dynamic Multi-user Attribute-Based Searchable Encryption with File Deletion and User Revocation. SocialSec 2019: 17-31 - [i44]Xiaopeng Zhao, Jinwen Zheng, Nanyuan Cao, Zhenfu Cao, Xiaolei Dong:
Identity-Based Encryption from e-th Power Residue Symbols. IACR Cryptol. ePrint Arch. 2019: 557 (2019) - [i43]Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao:
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160. IACR Cryptol. ePrint Arch. 2019: 668 (2019) - 2018
- [j146]Dongmei Li, Xiaolei Dong, Zhenfu Cao, Haijiang Wang:
Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation. Sci. China Inf. Sci. 61(3): 032112:1-032112:9 (2018) - [j145]Haijiang Wang, Xiaolei Dong, Zhenfu Cao, Dongmei Li:
Secure and Efficient Attribute-Based Encryption with Keyword Search. Comput. J. 61(8): 1133-1142 (2018) - [j144]Licheng Wang, Zonghua Zhang, Mianxiong Dong, Lihua Wang, Zhenfu Cao, Yixian Yang:
Securing Named Data Networking: Attribute-Based Encryption and Beyond. IEEE Commun. Mag. 56(11): 76-81 (2018) - [j143]Huajun Zhang, Zhenfu Cao, Xiaolei Dong, Jiachen Shen:
Proof of Multicopy via Proof of File Position in Cloud. Fundam. Informaticae 157(1-2): 141-151 (2018) - [j142]Fatos Xhafa, Zhenfu Cao:
Preface. Fundam. Informaticae 157(1-2): v-viii (2018) - [j141]Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei:
White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively. IEEE Trans. Dependable Secur. Comput. 15(5): 883-897 (2018) - [j140]Jianting Ning, Zhenfu Cao, Xiaolei Dong, Kaitai Liang, Hui Ma, Lifei Wei:
Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 13(1): 94-105 (2018) - [c125]Zichang Wang, Fei Guo, Yan Meng, Huaxin Li, Haojin Zhu, Zhenfu Cao:
Detecting Vehicle Anomaly by Sensor Consistency: An Edge Computing Based Mechanism. GLOBECOM 2018: 1-7 - [c124]Meng Zheng, Jun Zhou, Zhenfu Cao, Xiaolei Dong:
PPOIM: Privacy-Preserving Shape Context Based Image Denoising and Matching with Efficient Outsourcing. ICICS 2018: 215-231 - [c123]Yunong Liang, Zhenfu Cao, Xiaolei Dong, Jiachen Shen:
Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product Functional Encryption. ICICS 2018: 377-392 - [c122]Hongyuan Chen, Zhenfu Cao, Xiaolei Dong, Jiachen Shen:
SDKSE: A Secure Dynamic Keyword Searchable Encryption Scheme for Email Systems. SSIC 2018: 1-6 - [c121]Liang Hui, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, Hongyuan Chen, Yunong Liang:
VEPP: A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix Multiplication. SSIC 2018: 1-8 - 2017
- [j139]Jun Zhou, Zhenfu Cao, Xiaolei Dong, Athanasios V. Vasilakos:
Security and Privacy for Cloud-Based IoT: Challenges. IEEE Commun. Mag. 55(1): 26-33 (2017) - [j138]Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Guang Zeng, Wenbao Han:
Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud. Int. J. Found. Comput. Sci. 28(6): 705-724 (2017) - [j137]Gang Yu, Zhenfu Cao:
Attribute-based signcryption with hybrid access policy. Peer-to-Peer Netw. Appl. 10(1): 253-261 (2017) - [j136]Rong Ma, Zhenfu Cao:
Serial number based encryption and its application for mobile social networks. Peer-to-Peer Netw. Appl. 10(2): 332-339 (2017) - [j135]Rong Ma, Zhenfu Cao, Xingkai Wang:
Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking. Secur. Commun. Networks 2017: 9248654:1-9248654:9 (2017) - [j134]Xiaomei Zhang, Xiaolei Dong, Jie Wu, Zhenfu Cao, Chen Lyu:
Fault Activity Aware Service Delivery in Wireless Sensor Networks for Smart Cities. Wirel. Commun. Mob. Comput. 2017 (2017) - [c120]Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Weihua Zhu, Junjie Zeng:
Accountable Multi-authority Ciphertext-Policy Attribute-Based Encryption Without Key Escrow and Key Abuse. CSS 2017: 337-351 - [c119]Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Weihua Zhu, Guang Zeng:
Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation. ICICS 2017: 172-179 - [i42]Wanfen Guo, Xiaolei Dong, Zhenfu Cao, Jiachen Shen:
Efficient Attribute-Based Secure Keyword Search on the Cloud Storage. IACR Cryptol. ePrint Arch. 2017: 782 (2017) - 2016
- [j133]Zhenfu Cao:
New trends of information security - how to change people's life style? Sci. China Inf. Sci. 59(5): 050106:1-050106:3 (2016) - [j132]Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei:
Traceable and revocable CP-ABE with shorter ciphertexts. Sci. China Inf. Sci. 59(11): 119102:1-119102:3 (2016) - [j131]Junqing Gong, Xiaolei Dong, Zhenfu Cao, Jie Chen:
Almost-Tight Identity Based Encryption Against Selective Opening Attack. Comput. J. 59(11): 1669-1688 (2016) - [j130]Xiaolei Dong, Jun Zhou, Zhenfu Cao:
Efficient privacy-preserving temporal and spacial data aggregation for smart grid communications. Concurr. Comput. Pract. Exp. 28(4): 1145-1160 (2016) - [j129]Junqing Gong, Zhenfu Cao, Shaohua Tang, Jie Chen:
Extended dual system group and shorter unbounded hierarchical identity based encryption. Des. Codes Cryptogr. 80(3): 525-559 (2016) - [j128]Jun Zhou, Zhenfu Cao, Xiaolei Dong:
Secure and efficient fine-grained multiple file sharing in cloud-assisted crowd sensing networks. Peer-to-Peer Netw. Appl. 9(4): 774-794 (2016) - [j127]Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
Generalized (identity-based) hash proof system and its applications. Secur. Commun. Networks 9(12): 1698-1716 (2016) - [j126]Weiwei Jia, Haojin Zhu, Suguo Du, Xiaolei Dong, Zhenfu Cao:
Cloud-based privacy-preserving aggregation architecture in multi-domain wireless networks. Secur. Commun. Networks 9(13): 1905-1915 (2016) - [j125]Dongmei Li, Xiaolei Dong, Zhenfu Cao:
Secure and privacy-preserving pattern matching in outsourced computing. Secur. Commun. Networks 9(16): 3444-3451 (2016) - [j124]Qingshui Xue, Fengying Li, Huafeng Chen, Huajun Zhang, Zhenfu Cao:
Multi-proxy multi-signature binding positioning protocol. Secur. Commun. Networks 9(16): 3868-3879 (2016) - [c118]Junqing Gong, Xiaolei Dong, Jie Chen, Zhenfu Cao:
Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting. ASIACRYPT (2) 2016: 624-654 - [c117]Kai Zhang, Junqing Gong, Shaohua Tang, Jie Chen, Xiangxue Li, Haifeng Qian, Zhenfu Cao:
Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation. AsiaCCS 2016: 269-279 - [c116]Jun Zhou, Zhenfu Cao, Xiaolei Dong:
PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching. ESORICS (1) 2016: 135-153 - [c115]Jianting Ning, Zhenfu Cao, Xiaolei Dong, Junqing Gong, Jie Chen:
Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently. ESORICS (2) 2016: 551-569 - [c114]Junqing Gong, Jie Chen, Xiaolei Dong, Zhenfu Cao, Shaohua Tang:
Extended Nested Dual System Groups, Revisited. Public Key Cryptography (1) 2016: 133-163 - [c113]Gang Yu, Zhenfu Cao, Guang Zeng, Wenbao Han:
Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation. ProvSec 2016: 3-18 - [c112]Rong Ma, Zhenfu Cao:
Efficient Asymmetric Index Encapsulation Scheme for Named Data. ProvSec 2016: 191-203 - [i41]Junqing Gong, Xiaolei Dong, Jie Chen, Zhenfu Cao:
Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting. IACR Cryptol. ePrint Arch. 2016: 860 (2016) - 2015
- [j123]Jun Zhou, Zhenfu Cao, Xiaolei Dong, Naixue Xiong, Athanasios V. Vasilakos:
4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inf. Sci. 314: 255-276 (2015) - [j122]Jun Zhou, Zhenfu Cao, Xiaolei Dong, Xiaodong Lin:
PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems. IEEE J. Sel. Top. Signal Process. 9(7): 1332-1344 (2015) - [j121]Le Chen, Rongxing Lu, Zhenfu Cao, Khalid Nawaf Alharbi, Xiaodong Lin:
MuDA: Multifunctional data aggregation in privacy-preserving smart grid communications. Peer-to-Peer Netw. Appl. 8(5): 777-792 (2015) - [j120]Le Chen, Rongxing Lu, Zhenfu Cao:
PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications. Peer-to-Peer Netw. Appl. 8(6): 1122-1132 (2015) - [j119]Shengbao Wang, Zhenfu Cao, Qi Xie, Wenhao Liu:
Practical identity-based encryption in multiple private key generator (PKG) environments. Secur. Commun. Networks 8(1): 43-50 (2015) - [j118]Le Chen, Rongxing Lu, Khalid Nawaf Alharbi, Xiaodong Lin, Zhenfu Cao:
ReDD: recommendation-based data dissemination in privacy-preserving mobile social networks. Secur. Commun. Networks 8(7): 1291-1305 (2015) - [j117]Zongyang Zhang, Sherman S. M. Chow, Zhenfu Cao:
Post-challenge leakage in public-key encryption. Theor. Comput. Sci. 572: 25-49 (2015) - [j116]Zhen Liu, Zhenfu Cao, Duncan S. Wong:
Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild. IEEE Trans. Inf. Forensics Secur. 10(1): 55-68 (2015) - [j115]Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei, Xiaodong Lin:
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes. IEEE Trans. Inf. Forensics Secur. 10(6): 1274-1288 (2015) - [j114]Jun Zhou, Xiaolei Dong, Zhenfu Cao, Athanasios V. Vasilakos:
Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Trans. Inf. Forensics Secur. 10(6): 1299-1314 (2015) - [j113]Jun Zhou, Xiaodong Lin, Xiaolei Dong, Zhenfu Cao:
PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributedm-Healthcare Cloud Computing System. IEEE Trans. Parallel Distributed Syst. 26(6): 1693-1703 (2015) - [j112]Jun Zhou, Zhenfu Cao, Xiaolei Dong, Xiaodong Lin:
Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions. IEEE Wirel. Commun. 22(2): 136-144 (2015) - [c111]Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei:
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud. ESORICS (2) 2015: 270-289 - [c110]Jun Zhou, Zhenfu Cao, Xiaolei Dong, Xiaodong Lin:
EVOC: More efficient verifiable outsourced computation from any one-way trapdoor function. ICC 2015: 7444-7449 - [c109]Qingshui Xue, Fengying Li, Guojian Ge, Jiachen Shen, Zhenfu Cao:
Position-based proxy signcryption. ICCC 2015: 1-6 - [c108]Jun Zhou, Zhenfu Cao, Xiaolei Dong, Xiaodong Lin:
TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems. INFOCOM 2015: 2398-2406 - [c107]Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao:
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model. ProvSec 2015: 435-454 - [c106]Huafeng Chen, Qingshui Xue, Fengying Li, Huajun Zhang, Zhenfu Cao, Jianwen Hou:
Multi-proxy Multi-signature Binding Positioning Protocol. WASA 2015: 9-18 - [c105]Rong Ma, Zhenfu Cao:
Serial Number Based Encryption and Its Application for Mobile Networks. WASA 2015: 396-406 - [i40]Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei:
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud. IACR Cryptol. ePrint Arch. 2015: 613 (2015) - [i39]Junqing Gong, Jie Chen, Xiaolei Dong, Zhenfu Cao, Shaohua Tang:
Extended Nested Dual System Groups, Revisited. IACR Cryptol. ePrint Arch. 2015: 820 (2015) - [i38]Junqing Gong, Xiaolei Dong, Zhenfu Cao, Jie Chen:
Almost-tight Identity Based Encryption against Selective Opening Attack. IACR Cryptol. ePrint Arch. 2015: 904 (2015) - [i37]Zhengjun Cao, Zhenfu Cao, Lihua Liu:
Comment on Demonstrations of Shor's Algorithm in the Past Decades. IACR Cryptol. ePrint Arch. 2015: 1207 (2015) - [i36]Zhengjun Cao, Zhenfu Cao:
Comment on Quantum Cryptography - Which is More Important, Signal Security, Information Security or Communication Reliability. IACR Cryptol. ePrint Arch. 2015: 1251 (2015) - 2014
- [j111]Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof System. Comput. J. 57(10): 1537-1556 (2014) - [j110]Lifei Wei, Haojin Zhu, Zhenfu Cao, Xiaolei Dong, Weiwei Jia, Yunlu Chen, Athanasios V. Vasilakos:
Security and privacy for storage and computation in cloud computing. Inf. Sci. 258: 371-386 (2014) - [j109]Zongyang Zhang, Zhenfu Cao, Haojin Zhu:
Constant-round adaptive zero-knowledge proofs for NP. Inf. Sci. 261: 219-236 (2014) - [j108]Hongbing Wang, Zhenfu Cao, Lifei Wei:
A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption. Secur. Commun. Networks 7(1): 14-32 (2014) - [j107]Weiwei Jia, Haojin Zhu, Zhenfu Cao, Xiaolei Dong, Chengxin Xiao:
Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid. IEEE Syst. J. 8(2): 598-607 (2014) - [j106]Haojin Zhu, Suguo Du, Zhaoyu Gao, Mianxiong Dong, Zhenfu Cao:
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks. IEEE Trans. Parallel Distributed Syst. 25(1): 22-32 (2014) - [j105]Zhenfu Cao, Keqiu Li, Xu Li, Patrick D. McDaniel, Radha Poovendran, Guojun Wang, Yang Xiang:
Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems. IEEE Trans. Parallel Distributed Syst. 25(2): 279-282 (2014) - [c104]Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao:
All-but-One Dual Projective Hashing and Its Applications. ACNS 2014: 181-198 - [c103]Zhen Liu, Zhenfu Cao, Duncan S. Wong:
Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts. Inscrypt 2014: 403-423 - [c102]Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, Xiaodong Lin:
Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability. ESORICS (2) 2014: 55-72 - [c101]Yabin Ping, Zhenfu Cao, Haojin Zhu:
Sybil-aware least cost rumor blocking in social networks. GLOBECOM 2014: 692-697 - [c100]Xiaolei Dong, Jun Zhou, Khalid Nawaf Alharbi, Xiaodong Lin, Zhenfu Cao:
An ElGamal-based efficient and privacy-preserving data aggregation scheme for smart grid. GLOBECOM 2014: 4720-4725 - [c99]Qingshui Xue, Fengying Li, Zhenfu Cao:
Proxy multi-signature binding positioning protocol. ICCC 2014: 166-170 - [c98]Danyang He, Zhenfu Cao, Xiaolei Dong, Jiachen Shen:
User self-controllable profile matching for privacy-preserving mobile social networks. ICCS 2014: 248-252 - [c97]Hong Zhang, Xiaolei Dong, Zhenfu Cao, Jiachen Shen:
4P_VES: A Collusion-Resistant Accountable Virtual Economy System. ICICS 2014: 61-73 - [c96]Qingshui Xue, Fengying Li, Zhenfu Cao:
Positioning-Protocol-Based Digital Signature. WICON 2014: 167-172 - [e1]Zhenfu Cao, Fangguo Zhang:
Pairing-Based Cryptography - Pairing 2013 - 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8365, Springer 2014, ISBN 978-3-319-04872-7 [contents] - [i35]Zhengjun Cao, Zhenfu Cao:
On Shor's Factoring Algorithm with More Registers and the Problem to Certify Quantum Computers. CoRR abs/1409.7352 (2014) - [i34]Zhen Liu, Zhenfu Cao, Duncan S. Wong:
Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts. IACR Cryptol. ePrint Arch. 2014: 676 (2014) - [i33]Zhengjun Cao, Zhenfu Cao:
On Shor's Factoring Algorithm with More Registers and the Problem to Certify Quantum Computers. IACR Cryptol. ePrint Arch. 2014: 721 (2014) - [i32]Zhengjun Cao, Zhenfu Cao, Lihua Liu:
Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm. IACR Cryptol. ePrint Arch. 2014: 828 (2014) - 2013
- [j104]Lifei Wei, Haojin Zhu, Zhenfu Cao, Xuemin (Sherman) Shen:
SUCCESS: A Secure User-centric and Social-aware Reputation Based Incentive Scheme for DTNs. Ad Hoc Sens. Wirel. Networks 19(1-2): 95-118 (2013) - [j103]Da-Zhi Sun, Zhen-Fu Cao:
On the Privacy of Khan et al.'s Dynamic ID-Based Remote Authentication Scheme with User Anonymity. Cryptologia 37(4): 345-355 (2013) - [j102]Da-Zhi Sun, Jin-Peng Huai, Zhen-Fu Cao:
A comment on "An efficient common-multiplicand-multiplication method to the Montgomery algorithm for speeding up exponentiation". Inf. Sci. 223: 331-334 (2013) - [j101]Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura, Licheng Wang:
Certificate-based proxy decryption systems with revocability in the standard model. Inf. Sci. 247: 188-201 (2013) - [j100]Haiyong Bao, Zhenfu Cao:
Group-Proxy Signature Scheme: A Novel Solution to Electronic Cash. J. Intell. Syst. 22(2): 95-110 (2013) - [j99]Da-Zhi Sun, Jian-Xin Li, Zhiyong Feng, Zhen-Fu Cao, Guangquan Xu:
On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Pers. Ubiquitous Comput. 17(5): 895-905 (2013) - [j98]Hongbing Wang, Zhenfu Cao:
More efficient CCA-secure unidirectional proxy re-encryption schemes without random oracles. Secur. Commun. Networks 6(2): 173-181 (2013) - [j97]Lifei Wei, Zhenfu Cao, Xiaolei Dong:
Secure identity-based multisignature schemes under quadratic residue assumptions. Secur. Commun. Networks 6(6): 689-701 (2013) - [j96]Lize Gu, Licheng Wang, Kaoru Ota, Mianxiong Dong, Zhenfu Cao, Yixian Yang:
New public key cryptosystems based on non-Abelian factorization problems. Secur. Commun. Networks 6(7): 912-922 (2013) - [j95]Zhen Liu, Zhenfu Cao, Duncan S. Wong:
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures. IEEE Trans. Inf. Forensics Secur. 8(1): 76-88 (2013) - [j94]Jun Zhou, Zhenfu Cao, Xiaolei Dong, Xiaodong Lin, Athanasios V. Vasilakos:
Securing m-healthcare social networks: challenges, countermeasures and future directions. IEEE Wirel. Commun. 20(4) (2013) - [c95]Jun Zhou, Zhenfu Cao, Xiaolei Dong:
BDK: Secure and Efficient Biometric based Deterministic Key Agreement in Wireless Body Area Networks. BODYNETS 2013: 488-494 - [c94]Zhen Liu, Zhenfu Cao, Duncan S. Wong:
Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay. CCS 2013: 475-486 - [c93]Zhaoyu Gao, Haojin Zhu, Yao Liu, Muyuan Li, Zhenfu Cao:
Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures. INFOCOM 2013: 2751-2759 - [i31]Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
Generalized (Identity-Based) Hash Proof System and Its Applications. IACR Cryptol. ePrint Arch. 2013: 2 (2013) - [i30]Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof Systems. IACR Cryptol. ePrint Arch. 2013: 33 (2013) - [i29]Zhenfu Cao, Xiaolei Dong, Licheng Wang, Jun Shao:
More Efficient Cryptosystems From k-th Power Residues. IACR Cryptol. ePrint Arch. 2013: 569 (2013) - [i28]Jun Shao, Licheng Wang, Xiaolei Dong, Zhenfu Cao:
New Efficient Identity-Based Encryption From Factorization. IACR Cryptol. ePrint Arch. 2013: 570 (2013) - 2012
- [j93]Zongyang Zhang, Zhenfu Cao:
Concurrent non-malleable statistically hiding commitment. Inf. Process. Lett. 112(11): 443-448 (2012) - [j92]Jun Shao, Zhenfu Cao:
Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption. Inf. Sci. 206: 83-95 (2012) - [j91]Zongyang Zhang, Zhenfu Cao, Haifeng Qian:
Chosen-ciphertext attack secure public key encryption with auxiliary inputs. Secur. Commun. Networks 5(12): 1404-1411 (2012) - [c92]Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
Identity-Based Extractable Hash Proofs and Their Applications. ACNS 2012: 153-170 - [c91]Zhaoyu Gao, Haojin Zhu, Yao Liu, Muyuan Li, Zhenfu Cao:
Location privacy leaking from spectrum utilization information in database-driven cognitive radio network. CCS 2012: 1025-1027 - [c90]Jun Zhou, Zhenfu Cao:
TIS: A threshold incentive scheme for secure and reliable data forwarding in vehicular Delay Tolerant Networks. GLOBECOM 2012: 985-990 - [c89]Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
Anonymous Identity-Based Hash Proof System and Its Applications. ProvSec 2012: 143-160 - [c88]Chengxin Xiao, Weiwei Jia, Haojin Zhu, Suguo Du, Zhenfu Cao:
Leveraging Cloud Computing for Privacy Preserving Aggregation in Multi-domain Wireless Networks. WASA 2012: 733-744 - [i27]Jun Zhou, Zhenfu Cao:
PSCPA: Patient Self-controllable Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Systems. IACR Cryptol. ePrint Arch. 2012: 44 (2012) - [i26]Zhen Liu, Zhenfu Cao, Duncan S. Wong:
Expressive Black-box Traceable Ciphertext-Policy Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2012: 669 (2012) - 2011
- [j90]Peng Zeng, Zhenfu Cao, Kim-Kwang Raymond Choo:
An ID-based digital watermarking protocol for copyright protection. Comput. Electr. Eng. 37(4): 526-531 (2011) - [j89]Piyi Yang, Zhenfu Cao, Xiaolei Dong:
Fuzzy identity based signature with applications to biometric authentication. Comput. Electr. Eng. 37(4): 532-540 (2011) - [j88]Hai Huang, Zhenfu Cao:
Blake-Wilson, Johnson & Menezes protocol revisited. Sci. China Inf. Sci. 54(7): 1365-1374 (2011) - [j87]Dongsheng Xing, Zhenfu Cao, Xiaolei Dong:
Identity based signature scheme based on cubic residues. Sci. China Inf. Sci. 54(10): 2001-2012 (2011) - [j86]Piyi Yang, Zhenfu Cao, Xiaolei Dong, Tanveer A. Zia:
An Efficient Privacy Preserving Data Aggregation Scheme with Constant Communication Overheads for Wireless Sensor Networks. IEEE Commun. Lett. 15(11): 1205-1207 (2011) - [j85]Zhenfu Cao, Ivan Visconti, Zongyang Zhang:
On constant-round concurrent non-malleable proof systems. Inf. Process. Lett. 111(18): 883-890 (2011) - [j84]Piyi Yang, Zhenfu Cao, Xiaolei Dong:
Threshold proxy re-signature. J. Syst. Sci. Complex. 24(4): 816-824 (2011) - [j83]Jun Shao, Zhenfu Cao, Peng Liu:
SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption. Secur. Commun. Networks 4(2): 122-135 (2011) - [j82]Hai Huang, Zhenfu Cao:
Authenticated key exchange protocol with enhanced freshness properties. Secur. Commun. Networks 4(10): 1130-1136 (2011) - [j81]Hai Huang, Zhenfu Cao:
IDOAKE: strongly secure ID-based one-pass authenticated key exchange protocol. Secur. Commun. Networks 4(10): 1153-1161 (2011) - [j80]Xiaolei Dong, Lifei Wei, Haojin Zhu, Zhenfu Cao, Licheng Wang:
: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 60(2): 580-591 (2011) - [c87]Lifei Wei, Haojin Zhu, Zhenfu Cao, Xuemin (Sherman) Shen:
MobiID: A User-Centric and Social-Aware Reputation Based Incentive Scheme for Delay/Disruption Tolerant Networks. ADHOC-NOW 2011: 177-190 - [c86]Huang Lin, Zhenfu Cao, Yuguang Fang, Muxin Zhou, Haojin Zhu:
How to design space efficient revocable IBE from non-monotonic ABE. AsiaCCS 2011: 381-385 - [c85]Zhen Liu, Zhenfu Cao, Qiong Huang, Duncan S. Wong, Tsz Hon Yuen:
Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles. ESORICS 2011: 278-297 - [c84]Haiyong Bao, Guiyi Wei, Jun Shao, Zhenfu Cao:
Efficient and secure electronic resume using smart cards. FSKD 2011: 2271-2274 - [c83]Haiyong Bao, Guiyi Wei, Jun Shao, Zhenfu Cao:
Novel conic-based group signature scheme with revocation. FSKD 2011: 2623-2627 - [c82]Le Chen, Zhenfu Cao, Rongxing Lu, Xiaohui Liang, Xuemin Shen:
EPF: An Event-Aided Packet Forwarding Protocol for Privacy-Preserving Mobile Healthcare Social Networks. GLOBECOM 2011: 1-5 - [c81]Lifei Wei, Zhenfu Cao, Haojin Zhu:
MobiGame: A User-Centric Reputation Based Incentive Protocol for Delay/Disruption Tolerant Networks. GLOBECOM 2011: 1-5 - [c80]Jun Shao, Peng Liu, Zhenfu Cao, Guiyi Wei:
Multi-Use Unidirectional Proxy Re-Encryption. ICC 2011: 1-5 - [c79]Huang Lin, Xiaoyan Zhu, Yuguang Fang, Chi Zhang, Zhenfu Cao:
Efficient trust based information sharing schemes over distributed collaborative networks. MILCOM 2011: 1399-1403 - [i25]Zhenfu Cao, Zongyang Zhang, Yunlei Zhao:
Adaptive Security of Concurrent Non-Malleable Zero-Knowledge. IACR Cryptol. ePrint Arch. 2011: 621 (2011) - [i24]Huajun Zhang, Zongyang Zhang, Zhenfu Cao:
Position-Verification in Multi-Channel Models. IACR Cryptol. ePrint Arch. 2011: 714 (2011) - 2010
- [j79]Renwang Su, Zhenfu Cao:
An efficient anonymous authentication mechanism for delay tolerant networks. Comput. Electr. Eng. 36(3): 435-441 (2010) - [j78]Licheng Wang, Lihua Wang, Zhenfu Cao, Yixian Yang, Xinxin Niu:
Conjugate adjoining problem in braid groups and new design of braid-based signatures. Sci. China Inf. Sci. 53(3): 524-536 (2010) - [j77]Huang Lin, Zhenfu Cao:
On the security of metering scheme. Comput. Math. Appl. 60(2): 272-275 (2010) - [j76]Jun Shao, Zhenfu Cao, Xiaohui Liang, Huang Lin:
Proxy re-encryption with keyword search. Inf. Sci. 180(13): 2576-2587 (2010) - [j75]Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao:
Secure threshold multi authority attribute based encryption without a central authority. Inf. Sci. 180(13): 2618-2632 (2010) - [j74]Hongbing Wang, Zhenfu Cao, Licheng Wang:
Multi-use and unidirectional identity-based proxy re-encryption schemes. Inf. Sci. 180(20): 4042-4059 (2010) - [j73]Piyi Yang, Zhenfu Cao, Xiaolei Dong:
Efficient certificateless threshold signatures without random oracles. J. Syst. Sci. Complex. 23(6): 1167-1182 (2010) - [c78]Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao, Peng Liu:
The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key. ACISP 2010: 216-232 - [c77]Huang Lin, Zhenfu Cao, Xiaohui Liang, Muxin Zhou, Haojin Zhu, Dongsheng Xing:
How to Construct Interval Encryption from Binary Tree Encryption. ACNS 2010: 19-34 - [c76]Lihua Wang, Licheng Wang, Zhenfu Cao, Eiji Okamoto, Jun Shao:
New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems. Inscrypt 2010: 1-17 - [c75]Fengying Li, Qingshui Xue, Zhenfu Cao:
Some basic principles for proxy signature schemes based on ECDLP. CollaborateCom 2010: 1-5 - [c74]Feng Cao, Zhenfu Cao:
An Identity Based Proxy Signature Scheme Secure in the Standard Model. GrC 2010: 67-72 - [c73]Lifei Wei, Haojin Zhu, Zhenfu Cao, Weiwei Jia, Athanasios V. Vasilakos:
SecCloud: Bridging Secure Storage and Computation in Cloud. ICDCS Workshops 2010: 52-61 - [c72]Haojin Zhu, Xiaodong Lin, Rongxing Lu, Xuemin Shen, Dongsheng Xing, Zhenfu Cao:
An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs. INFOCOM 2010: 605-613 - [c71]Zhenfu Cao, Ivan Visconti, Zongyang Zhang:
Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments. Public Key Cryptography 2010: 193-208 - [i23]Jun Shao, Zhenfu Cao, Peng Liu:
CCA-Secure PRE Scheme without Random Oracles. IACR Cryptol. ePrint Arch. 2010: 112 (2010) - [i22]Zhen Liu, Zhenfu Cao:
On Efficiently Transferring the Linear Secret-Sharing Scheme Matrix in Ciphertext-Policy Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2010: 374 (2010)
2000 – 2009
- 2009
- [j72]Feng Cao, Zhenfu Cao:
A secure identity-based multi-proxy signature scheme. Comput. Electr. Eng. 35(1): 86-95 (2009) - [j71]Shengbao Wang, Zhenfu Cao, ZhaoHui Cheng, Kim-Kwang Raymond Choo:
Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode. Sci. China Ser. F Inf. Sci. 52(8): 1358-1370 (2009) - [j70]Peng Zeng, Zhenfu Cao, Kim-Kwang Raymond Choo, Shengbao Wang:
On the anonymity of some authentication schemes for wireless communications. IEEE Commun. Lett. 13(3): 170-171 (2009) - [j69]Hai Huang, Zhenfu Cao:
A novel and efficient unlinkable secret handshakes scheme. IEEE Commun. Lett. 13(5): 363-365 (2009) - [j68]Peng Zeng, Zhenfu Cao, Kim-Kwang Raymond Choo, Shengbao Wang:
Security weakness in a dynamic program update protocol for wireless sensor networks. IEEE Commun. Lett. 13(6): 426-428 (2009) - [j67]Zhenfu Cao:
Universal Encrypted Deniable Authentication Protocol. Int. J. Netw. Secur. 8(2): 151-158 (2009) - [j66]Feng Cao, Zhenfu Cao:
A secure identity-based proxy multi-signature scheme. Inf. Sci. 179(3): 292-302 (2009) - [j65]Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo, Lihua Wang:
An improved identity-based key agreement protocol and its security proof. Inf. Sci. 179(3): 307-318 (2009) - [j64]Feng Cao, Zhenfu Cao:
An identity based universal designated verifier signature scheme secure in the standard model. J. Syst. Softw. 82(4): 643-649 (2009) - [j63]Xiaolei Dong, Haifeng Qian, Zhenfu Cao:
Provably secure RSA-type signature based on conic curve. Wirel. Commun. Mob. Comput. 9(2): 217-225 (2009) - [c70]Zongyang Zhang, Zhenfu Cao, Ning Ding, Rong Ma:
Non-malleable Statistically Hiding Commitment from Any One-Way Function. ASIACRYPT 2009: 303-318 - [c69]Xiaohui Liang, Zhenfu Cao, Huang Lin, Jun Shao:
Attribute based proxy re-encryption with delegating capabilities. AsiaCCS 2009: 276-286 - [c68]Hai Huang, Zhenfu Cao:
An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem. AsiaCCS 2009: 333-342 - [c67]Xiaohui Liang, Zhenfu Cao, Huang Lin, Dongsheng Xing:
Provably secure and efficient bounded ciphertext policy attribute based encryption. AsiaCCS 2009: 343-352 - [c66]Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian:
Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme. Security and Management 2009: 323-327 - [c65]Hai Huang, Zhenfu Cao:
An Insider-Resistant Group Key Exchange Protocol without Signatures. ICC 2009: 1-5 - [c64]Yinan Shan, Zhenfu Cao:
Extended Attribute Based Encryption for Private Information Retrieval. MASS 2009: 702-707 - [c63]Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian:
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System. MobiSec 2009: 58-70 - [c62]Piyi Yang, Zhenfu Cao, Xiaolei Dong:
Certificateless Threshold Signature for Data Report Authentication in Mobile Ad Hoc Network. NSS 2009: 143-150 - [c61]Jun Shao, Zhenfu Cao:
CCA-Secure Proxy Re-encryption without Pairings. Public Key Cryptography 2009: 357-376 - [c60]Muxin Zhou, Zhenfu Cao:
Spatial Encryption under Simpler Assumption. ProvSec 2009: 19-31 - [c59]Zongyang Zhang, Zhenfu Cao, Rong Ma:
An Observation on Non-Malleable Witness-Indistinguishability and Non-Malleable Zero-Knowledge. TAMC 2009: 470-479 - [i21]Jun Shao, Zhenfu Cao:
CCA-Secure Proxy Re-Encryption without Pairings. IACR Cryptol. ePrint Arch. 2009: 164 (2009) - [i20]Hai Huang, Zhenfu Cao:
Authenticated Key Exchange Protocols with Enhanced Freshness Properties. IACR Cryptol. ePrint Arch. 2009: 505 (2009) - [i19]Hai Huang, Zhenfu Cao:
Blake-Wilson, Johnson and Menezes Protocol Revisited. IACR Cryptol. ePrint Arch. 2009: 515 (2009) - [i18]Licheng Wang, Lihua Wang, Zhenfu Cao, Eiji Okamoto, Jun Shao:
New Cryptosystems From CSP-Based Self-Distributive Systems. IACR Cryptol. ePrint Arch. 2009: 566 (2009) - 2008
- [j62]Rongxing Lu, Xiaolei Dong, Zhenfu Cao:
Designing efficient proxy signature schemes for mobile communication. Sci. China Ser. F Inf. Sci. 51(2): 183-195 (2008) - [j61]Xiaolei Dong, Zhenfu Cao, Licheng Wang:
New designing of cryptosystems based on quadratic fields. Sci. China Ser. F Inf. Sci. 51(8): 1106-1116 (2008) - [j60]Xiaohui Liang, Zhenfu Cao, Rongxing Lu, Liuquan Qin:
Efficient and secure protocol in fair document exchange. Comput. Stand. Interfaces 30(3): 167-176 (2008) - [j59]Shengbao Wang, Zhenfu Cao, Maurizio Adriano Strangio, Lihua Wang:
Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol. IEEE Commun. Lett. 12(2): 149-151 (2008) - [j58]Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Liuquan Qin, Xiaohui Liang:
A simple deniable authentication protocol based on the Diffie-Hellman algorithm. Int. J. Comput. Math. 85(9): 1315-1323 (2008) - [j57]Da-Zhi Sun, Zhen-Fu Cao:
New Cryptanalysis Paradigm on a Nonce-based Mutual Authentication Scheme. Int. J. Netw. Secur. 6(1): 116-120 (2008) - [j56]Shengbao Wang, Zhenfu Cao, Feng Cao:
Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy. Int. J. Netw. Secur. 7(2): 181-186 (2008) - [j55]Rongxing Lu, Zhenfu Cao, Zhenchuan Chai, Xiaohui Liang:
A Simple User Authentication Scheme for Grid Computing. Int. J. Netw. Secur. 7(2): 202-206 (2008) - [j54]Shengbao Wang, Zhenfu Cao, Haiyong Bao:
Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing. Int. J. Netw. Secur. 7(3): 342-347 (2008) - [j53]Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, Xiaohui Liang:
New (t, n) threshold directed signature scheme with provable security. Inf. Sci. 178(3): 756-765 (2008) - [j52]Licheng Wang, Zhenfu Cao, Feng Cao, Haifeng Qian, Haiyong Bao:
Biased Bit Commitment and Applications. J. Inf. Sci. Eng. 24(2): 441-452 (2008) - [j51]Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao:
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks. IEEE Trans. Wirel. Commun. 7(4): 1389-1399 (2008) - [c58]Piyi Yang, Zhenfu Cao, Xiaolei Dong:
Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model. Inscrypt 2008: 201-216 - [c57]Fengying Li, Qingshui Xue, Jiping Zhang, Zhenfu Cao:
A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme. CollaborateCom 2008: 416-424 - [c56]Congkai Sun, Bin Gao, Zhenfu Cao, Hang Li:
HTM: A Topic Model for Hypertexts. EMNLP 2008: 514-522 - [c55]Liuquan Qin, Zhenfu Cao, Xiaolei Dong:
Multi-Receiver Identity-Based Encryption in Multiple PKG Environment. GLOBECOM 2008: 1862-1866 - [c54]Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao:
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority. INDOCRYPT 2008: 426-436 - [c53]Piyi Yang, Zhenfu Cao, Xiaolei Dong:
Threshold Proxy Re-Signature. IPCCC 2008: 450-455 - [c52]Rongxing Lu, Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao:
A New Dynamic Group Key Management Scheme with Low Rekeying Cost. WCNC 2008: 3243-3248 - [i17]Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo, Lihua Wang:
Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol. IACR Cryptol. ePrint Arch. 2008: 1 (2008) - [i16]Piyi Yang, Zhenfu Cao, Xiaolei Dong:
Fuzzy Identity Based Signature. IACR Cryptol. ePrint Arch. 2008: 2 (2008) - [i15]Hai Huang, Zhenfu Cao:
An ID-based Authenticated Key Exchange Protocol Based on Bilinear Diffie-Hellman Problem. IACR Cryptol. ePrint Arch. 2008: 224 (2008) - [i14]Hai Huang, Zhenfu Cao:
Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem. IACR Cryptol. ePrint Arch. 2008: 500 (2008) - 2007
- [j50]Zhenchuan Chai, Zhenfu Cao, Rongxing Lu:
Threshold password authentication against guessing attacks in Ad hoc networks. Ad Hoc Networks 5(7): 1046-1054 (2007) - [j49]Changxiang Shen, Huanguo Zhang, Dengguo Feng, Zhenfu Cao, Jiwu Huang:
Survey of information security. Sci. China Ser. F Inf. Sci. 50(3): 273-298 (2007) - [j48]Zhenchuan Chai, Zhenfu Cao, Xiaolei Dong:
Identity-based signature scheme based on quadratic residues. Sci. China Ser. F Inf. Sci. 50(3): 373-380 (2007) - [j47]Rongxing Lu, Zhenfu Cao:
Simple three-party key exchange protocol. Comput. Secur. 26(1): 94-97 (2007) - [j46]Rongxing Lu, Zhenfu Cao:
Erratum to "Non-interactive deniable authentication protocol based on factoring"[Computer Standards & Interfaces 27 (2005) 401-405]. Comput. Stand. Interfaces 29(2): 275 (2007) - [j45]Rongxing Lu, Zhenfu Cao, Licheng Wang, Congkai Sun:
A secure anonymous routing protocol with authenticated key exchange for ad hoc networks. Comput. Stand. Interfaces 29(5): 521-527 (2007) - [j44]Rongxing Lu, Zhenfu Cao, Haojin Zhu:
An enhanced authenticated key agreement protocol for wireless mobile communication. Comput. Stand. Interfaces 29(6): 647-652 (2007) - [j43]Rongxing Lu, Zhenfu Cao, Xiaolei Dong:
A New Practical Limited Identity-Based Encryption Scheme. Fundam. Informaticae 80(4): 461-474 (2007) - [j42]Zhenchuan Chai, Zhenfu Cao, Xiaolei Dong:
Efficient ID-Based Multi-Receiver Threshold Decryption. Int. J. Found. Comput. Sci. 18(5): 987-1004 (2007) - [j41]Rongxing Lu, Zhenfu Cao, Jun Shao:
On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification. Int. J. Netw. Secur. 4(3): 248-253 (2007) - [j40]Rongxing Lu, Zhenfu Cao:
Group Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings. Int. J. Netw. Secur. 5(3): 283-287 (2007) - [j39]Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Bao:
A New ID-Based Deniable Authentication Protocol. Informatica 18(1): 67-78 (2007) - [j38]Licheng Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian:
Simulatability and security of certificateless threshold signatures. Inf. Sci. 177(6): 1382-1394 (2007) - [j37]Yuan Zhou, Binxing Fang, Zhenfu Cao, Xiao-chun Yun, Xiaoming Cheng:
How to construct secure proxy cryptosystem. Inf. Sci. 177(19): 4095-4108 (2007) - [j36]Zhenchuan Chai, Zhenfu Cao, Yuan Zhou:
Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts. J. Comput. Sci. Technol. 22(1): 103-108 (2007) - [j35]Jun Shao, Zhenfu Cao, Rongxing Lu:
Improvement of Yang et al.'s threshold proxy signature scheme. J. Syst. Softw. 80(2): 172-177 (2007) - [j34]Qin Wang, Zhenfu Cao:
Identity based proxy multi-signature. J. Syst. Softw. 80(7): 1023-1029 (2007) - [j33]Da-Zhi Sun, Jin-Peng Huai, Jizhou Sun, Zhen-Fu Cao:
An Efficient Modular Exponentiation Algorithm against Simple Power Analysis Attacks. IEEE Trans. Consumer Electron. 53(4): 1718-1723 (2007) - [c51]Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu:
Efficient Password-Based Authenticated Key Exchange Without Public Information. ESORICS 2007: 299-310 - [c50]Xiaodong Lin, Rongxing Lu, Haojin Zhu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao:
ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks. ICC 2007: 1247-1253 - [c49]Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin:
Short Group Signature Without Random Oracles. ICICS 2007: 69-82 - [c48]Licheng Wang, Zhenfu Cao, Shihui Zheng, Xiaofang Huang, Yixian Yang:
Transitive Signatures from Braid Groups. INDOCRYPT 2007: 183-196 - [c47]Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang:
Proxy Re-signature Schemes Without Random Oracles. INDOCRYPT 2007: 197-209 - [c46]Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura:
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. INDOCRYPT 2007: 297-311 - [c45]Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao:
An Efficient Certified Email Protocol. ISC 2007: 145-157 - [c44]Fengying Li, Qingshui Xue, Zhenfu Cao:
Crypanalysis of Kuo and Chen's Threshold Proxy Signature Scheme Based on the RSA. ITNG 2007: 815-818 - [c43]Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao:
A Novel Compromise-Resilient Authentication System for Wireless Mesh Networks. WCNC 2007: 3541-3546 - [i13]Zhenfu Cao, Xiaolei Dong, Licheng Wang:
New Public Key Cryptosystems Using Polynomials over Non-commutative Rings. IACR Cryptol. ePrint Arch. 2007: 9 (2007) - [i12]Shengbao Wang, Zhenfu Cao, Maurizio Adriano Strangio, Lihua Wang:
Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol. IACR Cryptol. ePrint Arch. 2007: 26 (2007) - [i11]Shengbao Wang, Zhenfu Cao:
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications. IACR Cryptol. ePrint Arch. 2007: 100 (2007) - [i10]Shengbao Wang, Zhenfu Cao, ZhaoHui Cheng, Kim-Kwang Raymond Choo:
Perfect Forward Secure Identity-Based Authenticated Key Agreement Protocol in the Escrow Mode. IACR Cryptol. ePrint Arch. 2007: 313 (2007) - [i9]Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu:
Efficient Password-based Authenticated Key Exchange without Public Information. IACR Cryptol. ePrint Arch. 2007: 326 (2007) - [i8]Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang:
Proxy Re-Signature Schemes without Random Oracles. IACR Cryptol. ePrint Arch. 2007: 396 (2007) - [i7]Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin:
Short Group Signature without Random Oracles. IACR Cryptol. ePrint Arch. 2007: 450 (2007) - 2006
- [j32]Da-Zhi Sun, Zhen-Fu Cao, Yu Sun:
How to compute modular exponentiation with large operators based on the right-to-left binary algorithm. Appl. Math. Comput. 176(1): 280-292 (2006) - [j31]Zhenfu Cao, Haojin Zhu, Rongxing Lu:
Provably secure robust threshold partial blind signature. Sci. China Ser. F Inf. Sci. 49(5): 604-615 (2006) - [j30]Jun Shao, Zhenfu Cao:
A traceable threshold signature scheme with multiple signing policies. Comput. Secur. 25(3): 201-206 (2006) - [j29]Zhenfu Cao, Gennian Ge, Ying Miao:
Combinatorial characterizations of one-coincidence frequency-hopping sequences. Des. Codes Cryptogr. 41(2): 177-184 (2006) - [j28]Lihua Wang, Zhenfu Cao, Takeshi Okamoto, Ying Miao, Eiji Okamoto:
Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 106-114 (2006) - [j27]Rongxing Lu, Zhenfu Cao:
A Directed Signature Scheme Based on RSA Assumption. Int. J. Netw. Secur. 2(3): 182-186 (2006) - [j26]Rongxing Lu, Zhenfu Cao:
Off-line Password Guessing Attack on an Efficient Key Agreement Protocol for Secure Authentication. Int. J. Netw. Secur. 3(1): 35-38 (2006) - [j25]Jun Shao, Zhenfu Cao, Rongxing Lu:
An improved deniable authentication protocol. Networks 48(4): 179-181 (2006) - [j24]Xuemin Shen, Chuang Lin, Yan Lindsay Sun, Jianping Pan, Peter Langendörfer, Zhenfu Cao:
Wireless network security. Wirel. Commun. Mob. Comput. 6: 269-271 (2006) - [j23]Rongxing Lu, Zhenfu Cao, Xiaolei Dong:
Authenticated encryption protocol with perfect forward secrecy for mobile communication. Wirel. Commun. Mob. Comput. 6: 273-280 (2006) - [c42]Shanshan Duan, Zhenfu Cao:
Efficient and Provably Secure Multi-receiver Identity-Based Signcryption. ACISP 2006: 195-206 - [c41]Zhenchuan Chai, Zhenfu Cao, Rongxing Lu:
Remote Authentication with Forward Security. ATC 2006: 418-427 - [c40]Feng Cao, Zhenfu Cao:
Security Model of Proxy-Multi Signature Schemes. CANS 2006: 144-152 - [c39]Rongxing Lu, Zhenfu Cao, Xiaolei Dong:
Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque. CANS 2006: 153-167 - [c38]Licheng Wang, Zhenfu Cao, Feng Cao, Haifeng Qian:
Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol. IMSCCS (2) 2006: 8-12 - [c37]Feng Cao, Zhenfu Cao, Licheng Wang:
An Improvement of an Identity-Based Key Issuing Protocol. IMSCCS (2) 2006: 13-18 - [c36]Rongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su:
Designated Verifier Proxy Signature Scheme from Bilinear Pairings. IMSCCS (2) 2006: 40-47 - [c35]Feng Cao, Zhenfu Cao:
A Proxy-Protected Signature Scheme Based on Finite Automaton. IMSCCS (2) 2006: 48-55 - [c34]Sheng Guo, Zhenfu Cao, Rongxing Lu:
An Efficient ID-Based Multi-proxy Multi-Signature Scheme. IMSCCS (2) 2006: 81-88 - [c33]Rongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su:
Group Oriented Deniable Authentication Protocol. IMSCCS (2) 2006: 89-92 - [c32]Shengbao Wang, Zhenfu Cao, Haiyong Bao:
Two-Pass ID-Based Authenticated Key Agreement Protocol with Key Confirmation Using Pairings. IMSCCS (2) 2006: 109-112 - [c31]Haifeng Qian, Zhenfu Cao, Licheng Wang, Sheng Guo:
Cryptanalysis of Chang-Lin-Lam's ID-based Multisignature Scheme. IMSCCS (2) 2006: 113-116 - [c30]Feng Cao, Zhenfu Cao:
Cryptanalysis on a Proxy Multi-Signature Scheme. IMSCCS (2) 2006: 117-120 - [c29]Zhenchuan Chai, Zhenfu Cao, Yuan Zhou:
Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network. IMSCCS (2) 2006: 148-154 - [c28]Yuan Zhou, Zhenfu Cao, Zhenchuan Chai:
Identity Based Key Insulated Signature. ISPEC 2006: 226-234 - [c27]Haiyong Bao, Zhenfu Cao, Shengbao Wang:
Identity-Based Threshold Proxy Signature Scheme with Known Signers. TAMC 2006: 538-546 - [c26]Zhenchuan Chai, Zhenfu Cao, Rongxing Lu:
Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy. WASA 2006: 467-477 - [i6]Xiaolei Dong, Licheng Wang, Zhenfu Cao:
New Public Key Authentication Frameworks with Lite Certification Authority. IACR Cryptol. ePrint Arch. 2006: 154 (2006) - [i5]Jun Shao, Zhenfu Cao, Licheng Wang:
Efficient ID-based Threshold Signature Schemes without Pairings. IACR Cryptol. ePrint Arch. 2006: 308 (2006) - [i4]Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo:
New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles). IACR Cryptol. ePrint Arch. 2006: 446 (2006) - 2005
- [j22]Rongxing Lu, Zhenfu Cao, Yuan Zhou:
Threshold undeniable signature scheme based on conic. Appl. Math. Comput. 162(1): 165-177 (2005) - [j21]Yuan Zhou, Zhenfu Cao, Rongxing Lu:
Provably secure proxy-protected signature schemes based on factoring. Appl. Math. Comput. 164(1): 83-98 (2005) - [j20]Rongxing Lu, Zhenfu Cao, Yuan Zhou:
Proxy blind multi-signature scheme without a secure channel. Appl. Math. Comput. 164(1): 179-187 (2005) - [j19]Da-Zhi Sun, Zhen-Fu Cao, Yu Sun:
Comment: cryptanalysis of Lee-Hwang-Li's key authentication scheme. Appl. Math. Comput. 164(3): 675-678 (2005) - [j18]Rongxing Lu, Zhenfu Cao, Haojin Zhu:
A robust (k, n) + 1 threshold proxy signature scheme based on factoring. Appl. Math. Comput. 166(1): 35-45 (2005) - [j17]Haifeng Qian, Zhenfu Cao, Haiyong Bao:
Cryptanalysis of Li-Tzeng-Hwang's improved signature schemes based on factoring and discrete logarithms. Appl. Math. Comput. 166(3): 501-505 (2005) - [j16]Da-Zhi Sun, Zhen-Fu Cao, Yu Sun:
Remarks on a new key authentication scheme based on discrete logarithms. Appl. Math. Comput. 167(1): 572-575 (2005) - [j15]Jun Shao, Zhenfu Cao:
A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme. Appl. Math. Comput. 168(1): 135-140 (2005) - [j14]Da-Zhi Sun, Zhen-Fu Cao:
Improved public key authentication scheme for non-repudiation. Appl. Math. Comput. 168(2): 927-932 (2005) - [j13]Rongxing Lu, Zhenfu Cao:
A new deniable authentication protocol from bilinear pairings. Appl. Math. Comput. 168(2): 954-961 (2005) - [j12]Rongxing Lu, Zhenfu Cao:
Designated verifier proxy signature scheme with message recovery. Appl. Math. Comput. 169(2): 1237-1246 (2005) - [j11]Haiyong Bao, Zhenfu Cao, Rongxing Lu:
Proxy signature scheme using self-certified public keys. Appl. Math. Comput. 169(2): 1380-1389 (2005) - [j10]Haiyong Bao, Zhenfu Cao, Shengbao Wang:
Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Appl. Math. Comput. 169(2): 1419-1430 (2005) - [j9]Haifeng Qian, Zhenfu Cao, Haiyong Bao:
Security of Pon-Lu-Jeng's Meta-He digital signature schemes. Appl. Math. Comput. 170(1): 724-730 (2005) - [j8]Yu Long, Zhenfu Cao, Kefei Chen:
A dynamic threshold commercial key escrow scheme based on conic. Appl. Math. Comput. 171(2): 972-982 (2005) - [j7]Rongxing Lu, Zhenfu Cao:
Efficient remote user authentication scheme using smart card. Comput. Networks 49(4): 535-540 (2005) - [j6]Rongxing Lu, Zhenfu Cao:
Non-interactive deniable authentication protocol based on factoring. Comput. Stand. Interfaces 27(4): 401-405 (2005) - [j5]Haifeng Qian, Zhenfu Cao, Qingshui Xue:
Efficient Pairing-Based Threshold Proxy Signature Scheme with Known Signers. Informatica 16(2): 261-274 (2005) - [j4]Haiyong Bao, Zhenfu Cao, Shengbao Wang:
Remarks on Wu-Hsu's threshold signature scheme using self-certified public keys. J. Syst. Softw. 78(1): 56-59 (2005) - [c25]Qin Wang, Zhenfu Cao, Shengbao Wang:
Formalized Security Model of Multi-Proxy Signature Schemes. CIT 2005: 668-672 - [c24]Haifeng Qian, Zhenfu Cao, Lichen Wang, Qingshui Xue:
Efficient Non-interactive Deniable Authentication Protocols. CIT 2005: 673-679 - [c23]Haiyong Bao, Zhenfu Cao, Haifeng Qian:
On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme. CANS 2005: 26-34 - [c22]Qin Wang, Zhenfu Cao:
Two Proxy Signcryption Schemes from Bilinear Pairings. CANS 2005: 161-171 - [c21]Yuan Zhou, Zhenfu Cao, Rongxing Lu:
Constructing Secure Warrant-Based Proxy Signcryption Schemes. CANS 2005: 172-185 - [c20]Lichen Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian:
Certificateless Threshold Signature Schemes. CIS (2) 2005: 104-109 - [c19]Qin Wang, Zhenfu Cao:
Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings. CIS (2) 2005: 167-172 - [c18]Shanshan Duan, Zhenfu Cao, Yuan Zhou:
Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme. CIS (2) 2005: 445-450 - [c17]Yuan Zhou, Zhenfu Cao, Zhenchuan Chai:
Constructing Secure Proxy Cryptosystem. CISC 2005: 150-161 - [c16]Da-Zhi Sun, Zhen-Fu Cao:
Improvement of Lee-Kim-Yoo's Remote User Authentication Scheme Using Smart Cards. FSKD (2) 2005: 596-599 - [c15]Haifeng Qian, Zhenfu Cao:
A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme. ISPA Workshops 2005: 323-331 - [c14]Yuan Zhou, Zhenfu Cao, Zhenchuan Chai:
An Efficient Proxy-Protected Signature Scheme Based on Factoring. ISPA Workshops 2005: 332-341 - [c13]Shengbao Wang, Zhenfu Cao, Haiyong Bao:
Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. ISPA Workshops 2005: 342-349 - [c12]Zhenchuan Chai, Zhenfu Cao, Yuan Zhou:
Encryption Based on Reversible Second-Order Cellular Automata. ISPA Workshops 2005: 350-358 - [i3]Rongxing Lu, Zhenfu Cao, Renwang Su, Jun Shao:
Pairing-Based Two-Party Authenticated Key Agreement Protocol. IACR Cryptol. ePrint Arch. 2005: 354 (2005) - [i2]Rongxing Lu, Zhenfu Cao:
ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks. IACR Cryptol. ePrint Arch. 2005: 355 (2005) - 2004
- [j3]Haifeng Qian, Zhenfu Cao, Qingshui Xue:
A new threshold proxy signature scheme from bilinear pairings. Sci. China Ser. F Inf. Sci. 47(5): 612-622 (2004) - [j2]Kejun Chen, Zhenfu Cao, Dianhua Wu:
Existence of APAV(q, k) with q a prime power =5(mod 8) and k=1(mod 4). Discret. Math. 279(1-3): 153-161 (2004) - [c11]Qingshui Xue, Zhenfu Cao:
Improvement of Multi-Proxy Signature Scheme. CIT 2004: 450-455 - [c10]Zhenchuan Chai, Zhenfu Cao:
Factoring-Based Proxy Signature Schemes with Forward-Security. CIS 2004: 1034-1040 - [c9]Rongxing Lu, Zhenfu Cao:
A proxy-protected signature scheme based on conic. InfoSecu 2004: 22-26 - [c8]Shanshan Duan, Zhenfu Cao, Rongxing Lu:
Robust ID-based threshold signcryption scheme from pairings. InfoSecu 2004: 33-37 - [c7]Yuan Zhou, Zhenfu Cao, Rongxing Lu:
An efficient digital signature using self-certified public keys. InfoSecu 2004: 44-47 - [c6]Lihua Wang, Zhenfu Cao, Eiji Okamoto, Ying Miao, Takeshi Okamoto:
Transformation-free proxy cryptosystems and their applications to electronic commerce. InfoSecu 2004: 92-98 - [c5]Haiyong Bao, Zhenfu Cao, Haifeng Qian:
Cryptanalysis of group signature scheme from ID-based signature scheme. InfoSecu 2004: 115-118 - [c4]Zhenchuan Chai, Zhenfu Cao, Rongxing Lu:
ID-based threshold decryption without random oracles and its application in key escrow. InfoSecu 2004: 119-124 - [c3]Qingshui Xue, Zhenfu Cao:
A Threshold Proxy Signature Scheme Using Self-Certified Public Keys. ISPA 2004: 715-724 - [c2]Qingshui Xue, Zhenfu Cao, Haifeng Qian:
A Generalized Proxy Signature Scheme Based on the RSA Cryptosystem. PDCAT 2004: 662-665 - [c1]Qingshui Xue, Zhenfu Cao, Feilong Tang:
An Improved Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. PDPTA 2004: 901-907 - [i1]Qin Wang, Zhenfu Cao:
Security Arguments for Partial Delegation with Warrant Proxy Signature Schemes. IACR Cryptol. ePrint Arch. 2004: 315 (2004) - 2003
- [j1]Jiguo Li, Zhenfu Cao, Yichen Zhang:
Nonrepudiable Proxy Multi-Signature Scheme. J. Comput. Sci. Technol. 18(3): 399-402 (2003)
Coauthor Index
aka: Thanos Vasilakos
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 22:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint