近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
Bin Hu,Yizhong Liu,Jiayuan Yin,Rongxing Lu,Xiaodong Lin.A Comprehensive Survey on Smart Contract Construction and Execution: Paradigms, Tools and Systems.[期刊]:Cell子刊Patterns,2021,2(2)
Yu Chen, Liqun Chen and Zongyang Zhang (通讯作者), CCA Secure IB-KEM from Computational Bilinear Diffie-Hellman in the Standard Model, the 14th Annual International Conference on Information Security and Cryptology (ICISC 2011), Lecture Notes in Computer Science, Vol. 7259, pp.153-170, Springer-Verlag, December, 2011. EI, CCF C.
Hongbing Wang, Yingjiu Li, Zongyang Zhang and Zhenfu Cao, Two-level Path Authentication in EPCglobal Network, 2012 IEEE International Conference on RFID (IEEE RFID 2012), pp. 24-31, April, 2012.
Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao, Identity Based Extractable Hash Proofs and their Applications, Applied Cryptography and Network Security (ACNS 2012), Lecture Notes in Computer Science, Vol. 7341, pp.153-170, Springer-Verlag, June 26-29, 2012. EI, CCF Rank C.
Zongyang Zhang, Zhenfu Cao, Haifeng Qian, Chosen-Ciphertext Attack Secure Public Key Encryption with Auxiliary Inputs, Security and Communication Networks, 2012, Vol.5, Issue 12, pp. 1404-1411, Elsevier, March, 2012. SCI, CCF Rank C.
Zongyang Zhang, Zhenfu Cao, Concurrent Non-Malleable Statistically Hiding Commitment, Information Processing Letters, 12(11), 443-448, Elsevier, March, 2012. SCI. CCF Rank C.
Yu Chen, Zongyang Zhang (通讯作者), Dongdai Lin, Zhenfu Cao, Anonymous Identity-Based Hash Proof System and Its Applications, the Sixth International Conference on Provable Security (PROVSEC 2012), Lecture Notes in Computer Science, Vol.7496, pp. 143-160, Springer-Verlag, September 26-28, 2012. EI.
Yu Chen, Zongyang Zhang (通讯作者), Dongdai Lin, Zhenfu Cao, CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof System, The Computer Journal, Vol. 57, Issue 10, pp. 1537-1556, October, 2014, SCI, CCF Rank C.
Jiang Zhang, Zhenfeng Zhang, Yu Chen, Yanfei Guo, Zongyang Zhang, Black-Box Separations for One-More (Static) CDH and Its Generalization, the 20th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2014), Lecture Notes in Computer Science, Vol.8874, pp. 366-385, Springer-Verlag, December 7-11, 2014. CCF Rank B, 密码学领域三大旗舰会议之一.
Yu Chen, Zongyang Zhang (通讯作者), Publicly Evaluable Pseudorandom Functions and Their Applications, the Ninth Conference on Security and Cryptography for Networks (SCN 2014), Lecture Notes in Computer Science, Vol.8642, pp.115-134, Springer-Verlag, September 3-5, 2014. EI.
Yu Chen, Qiong Huang, Zongyang Zhang (通讯作者), Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited, the 19th Australasian Conference on Information Security and Privacy (ACISP 2014), Lecture Notes in Computer Science, Vol.8544, pp. 274-289, Springer-Verlag, July 7-9, 2014. EI, CCF Rank C.
Zongyang Zhang, Yu Chen, Sherman S.M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao, All-but-One Dual Projective Hashing and Its Applications, the 12th International Conference on Applied Cryptography and Network Security (ACNS 2014), Lecture Notes in Computer Science, Vol. 8479, pp.181-198, Springer-Verlag, June 10-13, 2014. EI, CCF Rank C.
Zongyang Zhang, Yu Chen, Sherman S.M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao, Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model, the Ninth International Conference on Provable Security (ProvSec 2015), Lecture Notes in Computer Science, Vol. 9451, pp.435-454. Springer-Verlag, November 24-26, 2015. EI.
Hongbing Wang, Yingjiu Li, Zongyang Zhang, Yunlei Zhao, Efficient Tag Path Authentication Protocol with Less Tag Memory, the 12th International Conference on Information Security Practice and Experience (ISPEC 2016), Lecture Notes in Computer Science, Vol.10060, pp. 255-270, Springer-Verlag, November 16-18, 2016. EI.
Yu Chen, Zongyang Zhang (通讯作者), Dongdai Lin, Zhenfu Cao, Generalized (Identity-Based) Hash Proof System and Its Applications, Security and Communication Networks, Vol. 9, Issue 12, pp. 1698-1716, Wiley, August 2016. SCI. CCF Rank C.
Yu Chen, Qiong Huang, Zongyang Zhang (通讯作者), Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Revisited and More, International Journal of Information Security, Vol.15, Issue 1, pp. 15-33, Springer-Verlag, February, 2016. SCI.
Hui Yu, Zongyang Zhang (通讯作者) and Jianwei Liu. Research on Scaling Technology of Bitcoin Blockchain, Journal of Computer Research and Development, Vol. 54, Issue 10, pp. 2390-2403, 2017. EI.
Dawei Li, Jianwei Liu, Zongyang Zhang (通讯作者), Qianhong Wu, Wiran Liu, Revocable Hierarchical Identity-Based Broadcast Encryption, Tsinghua Science and Technology, Accept. 2017. SCI.
Xinguang Zhou, Jianwei Liu, Qianhong Wu and Zongyang Zhang (通讯作者), Privacy Preservation for Outsourced Medical Data with Flexible Access Control, IEEE Access, Vol. 6, pp. 14827-14841, 2018. JCR Q1, SCI.
吴进喜, 高莹, 张宗洋, 殷大鹏. 基于区块链的多方隐私保护公平合同签署协议. 信息安全学报. 2018. 已录用.
Jiayuan Yin, Changren Wang, Zongyang Zhang (通讯作者), and Jianwei Liu. Revisiting the Incentive Mechanism of Bitcoin-NG. the 23rd Australasian Conference on Information Security and Privacy (ACISP 2018), 已录用. EI, CCF Rank C.
Zongyang Zhang, Sherman S.M. Chow and Zhenfu Cao. Post-Challenge Leakage in Public-Key Encryption, Theoretical Computer Science, Vol. 572, pp. 25–49, Elsevier, March, 2015. CCF Rank B.
Yu Chen and Zongyang Zhang (通讯作者), Publicly Evaluable Pseudorandom Functions and Their Applications, Journal of Computer Security, Vol. 24, No. 2, pp. 289-320, IOS Express, April 19, 2016. CCF Rank B.
Zongyang Zhang, Zhenfu Cao, Haojin Zhu. Constant-Round Adaptive Zero-Knowledge Proofs for NP, Information Science, Vol. 261, pp. 219-236, Elsevier, March, 2014. [SCI Impact Factor:4.832]. SCI , CCF Rank B, JCR Q1.
Yuyu Wang, Zongyang Zhang (通讯作者), Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka, How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones, the 22nd International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT 2016), Lecture Notes in Computer Science, Vol.10032, pp. 465-495, Springer-Verlag, December 4-8, 2016. EI, CCF Rank B, 密码学领域三大旗舰会议之一.
Xingguang Zhou, Jie Chen, Zongyang Zhang (通讯作者), Jianwei Liu, Qianhong Wu. Secure Role-based Access Control over Outsourced EMRs against Unwanted Leakage, the 9th International Symposium on Cyberspace Safety and Security (CSS 2017), Lecture Notes in Computer Science, Vol. 10581, pp. 411-426, Springer-Verlag, October 23–25, 2017. EI, 最佳学生论文奖.