Fangguo Zhang
Fangguo Zhang
在 mail.sysu.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
ID-based blind signature and ring signature from pairings
F Zhang, K Kim
Advances in cryptology—ASIACRYPT 2002, 533-547, 2002
7102002
An efficient signature scheme from bilinear pairings and its applications
F Zhang, R Safavi-Naini, W Susilo
International Workshop on Public Key Cryptography, 277-290, 2004
6212004
Efficient ID-based blind signature and proxy signature from bilinear pairings
F Zhang, K Kim
ACISP 2003, 218-219, 2003
3932003
An efficient public key encryption with conjunctive-subset keywords search
B Zhang, F Zhang
Journal of Network and Computer Applications 34 (1), 262-267, 2011
2332011
Efficient verifiably encrypted signature and partially blind signature from bilinear pairings
F Zhang, R Safavi-Naini, W Susilo
International Conference on Cryptology in India, 191-204, 2003
1862003
Identity-based strong designated verifier signature schemes
W Susilo, F Zhang, Y Mu
ACISP 2004, 313-324, 2004
1842004
A New ID-based Group Signature Scheme from Bilinear Pairings.
X Chen, F Zhang, K Kim
IACR Cryptol. ePrint Arch. 2003, 116, 2003
1832003
New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing.
F Zhang, R Safavi-Naini, CY Lin
IACR Cryptol. ePrint Arch. 2003, 104, 2003
1472003
ID-based one round authenticated tripartite key agreement protocol with pairings
F Zhang, S Liu, K Kim
Cryptology ePrint archive, report 2002/122, 2002
1242002
Perfect concurrent signature schemes
W Susilo, Y Mu, F Zhang
International Conference on Information and Communications Security, 14-26, 2004
1082004
Chameleon hashing without key exposure
X Chen, F Zhang, K Kim
International Conference on Information Security, 87-98, 2004
1032004
基于椭圆曲线的数字签名和盲签名(Digital Signature and Blind Signature Based on Elliptic Curve)
张方国, 王常杰, 王育民
通信学报 22 (8), 22-28, 2001
101*2001
Efficient generic on-line/off-line signatures without key exposure
X Chen, F Zhang, W Susilo, Y Mu
International Conference on Applied Cryptography and Network Security, 18-30, 2007
972007
ID-based restrictive partially blind signatures and applications
X Chen, F Zhang, S Liu
Journal of Systems and Software 80 (2), 164-171, 2007
872007
A note on the Ate pairing
CA Zhao, F Zhang, J Huang
International Journal of Information Security 7 (6), 379-382, 2008
852008
Identity-based partial message recovery signatures (or how to shorten ID-based signatures)
F Zhang, W Susilo, Y Mu
International Conference on Financial Cryptography and Data Security, 45-56, 2005
802005
A short proxy signature scheme: efficient authentication in the ubiquitous world
X Huang, Y Mu, W Susilo, F Zhang, X Chen
International Conference on Embedded and Ubiquitous Computing, 480-489, 2005
772005
ID-Based Chameleon Hashes from Bilinear Pairings.
F Zhang, R Safavi-Naini, W Susilo
IACR Cryptol. ePrint Arch. 2003, 208, 2003
742003
Symmetric-key based proofs of retrievability supporting public verification
C Guan, K Ren, F Zhang, F Kerschbaum, J Yu
European symposium on research in computer security, 203-223, 2015
682015
New traitor tracing schemes using bilinear map
VD Tô, R Safavi-Naini, F Zhang
Proceedings of the 3rd ACM workshop on Digital rights management, 67-76, 2003
672003
系统目前无法执行此操作,请稍后再试。
文章 1–20