Fangguo Zhang
Fangguo Zhang
Email confirmado em - Página inicial
Citado por
Citado por
ID-based blind signature and ring signature from pairings
F Zhang, K Kim
Advances in cryptology—ASIACRYPT 2002, 533-547, 2002
An efficient signature scheme from bilinear pairings and its applications
F Zhang, R Safavi-Naini, W Susilo
Public Key Cryptography–PKC 2004: 7th International Workshop on Theory and …, 2004
Efficient ID-based blind signature and proxy signature from bilinear pairings
F Zhang, K Kim
ACISP 2003, 218-219, 2003
An efficient public key encryption with conjunctive-subset keywords search
B Zhang, F Zhang
Journal of Network and Computer Applications 34 (1), 262-267, 2011
Identity-based strong designated verifier signature schemes
W Susilo, F Zhang, Y Mu
ACISP 2004, 313-324, 2004
Efficient verifiably encrypted signature and partially blind signature from bilinear pairings
F Zhang, R Safavi-Naini, W Susilo
Progress in Cryptology-INDOCRYPT 2003: 4th International Conference on …, 2003
A new ID-based group signature scheme from bilinear pairings
X Chen, F Zhang, K Kim
Cryptology ePrint Archive, 2003
New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairing
F Zhang, R Safavi-Naini, CY Lin
Cryptology ePrint Archive, 2003
Chameleon hashing without key exposure
X Chen, F Zhang, K Kim
International Conference on Information Security, 87-98, 2004
ID-based one round authenticated tripartite key agreement protocol with pairings
F Zhang, S Liu, K Kim
Cryptology ePrint Archive, 2002
Efficient generic on-line/off-line signatures without key exposure
X Chen, F Zhang, W Susilo, Y Mu
Applied Cryptography and Network Security: 5th International Conference …, 2007
Perfect concurrent signature schemes
W Susilo, Y Mu, F Zhang
International Conference on Information and Communications Security, 14-26, 2004
Privacy preserving multi-party computation delegation for deep learning in cloud computing
X Ma, F Zhang, X Chen, J Shen
Information Sciences 459, 103-116, 2018
A note on the Ate pairing
CA Zhao, F Zhang, J Huang
International Journal of Information Security 7 (6), 379-382, 2008
ID-based restrictive partially blind signatures and applications
X Chen, F Zhang, S Liu
Journal of Systems and Software 80 (2), 164-171, 2007
Symmetric-key based proofs of retrievability supporting public verification
C Guan, K Ren, F Zhang, F Kerschbaum, J Yu
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
Blockchain-based searchable symmetric encryption scheme
H Li, H Tian, F Zhang, J He
Computers & Electrical Engineering 73, 32-45, 2019
Identity-based partial message recovery signatures (or how to shorten ID-based signatures)
F Zhang, W Susilo, Y Mu
Financial Cryptography and Data Security: 9th International Conference, FC …, 2005
ID-based chameleon hashes from bilinear pairings
F Zhang, R Safavi-Naini, W Susilo
Cryptology ePrint Archive, 2003
A short proxy signature scheme: efficient authentication in the ubiquitous world
X Huang, Y Mu, W Susilo, F Zhang, X Chen
International Conference on Embedded and Ubiquitous Computing, 480-489, 2005
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20