Dai, Shuguang; Wei, Jinfeng; Zhang, Fangguo Memory leakage-resilient secret sharing schemes. (English) Zbl 1497.94082 Sci. China, Inf. Sci. 58, No. 11, Article ID 112109, 9 p. (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Dai} et al., Sci. China, Inf. Sci. 58, No. 11, Article ID 112109, 9 p. (2015; Zbl 1497.94082) Full Text: DOI
Guan, Chaowen; Ren, Kui; Zhang, Fangguo; Kerschbaum, Florian; Yu, Jia Symmetric-key based proofs of retrievability supporting public verification. (English) Zbl 1499.68092 Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 203-223 (2015). MSC: 68P20 68M11 68P25 94A60 PDFBibTeX XMLCite \textit{C. Guan} et al., Lect. Notes Comput. Sci. 9326, 203--223 (2015; Zbl 1499.68092) Full Text: DOI OA License
Zhang, Bo; Zhang, FangGuo Secure linear system computation in the presence of malicious adversaries. (English) Zbl 1426.15002 Sci. China, Inf. Sci. 57, No. 9, Article ID 092112, 10 p. (2014). MSC: 15A06 94A60 PDFBibTeX XMLCite \textit{B. Zhang} and \textit{F. Zhang}, Sci. China, Inf. Sci. 57, No. 9, Article ID 092112, 10 p. (2014; Zbl 1426.15002) Full Text: DOI Link
Zhang, Fangguo; Ma, Xu; Liu, Shengli Efficient computation outsourcing for inverting a class of homomorphic functions. (English) Zbl 1355.68079 Inf. Sci. 286, 19-28 (2014). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{F. Zhang} et al., Inf. Sci. 286, 19--28 (2014; Zbl 1355.68079) Full Text: DOI
Chen, Xiaofeng; Zhang, Fangguo; Susilo, Willy; Tian, Haibo; Li, Jin; Kim, Kwangjo Identity-based chameleon hashing and signatures without key exposure. (English) Zbl 1328.94063 Inf. Sci. 265, 198-210 (2014). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{X. Chen} et al., Inf. Sci. 265, 198--210 (2014; Zbl 1328.94063) Full Text: DOI Link
Liu, Shengli; Sakurai, Kouichi; Weng, Jian; Zhang, Fangguo; Zhao, Yunlei Security model and analysis of FHMQV, revisited. (English) Zbl 1347.94048 Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 255-269 (2014). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{S. Liu} et al., Lect. Notes Comput. Sci. 8567, 255--269 (2014; Zbl 1347.94048) Full Text: DOI
Cao, Zhenfu (ed.); Zhang, Fangguo (ed.) Pairing-based cryptography – Pairing 2013. 6th international conference, Beijing, China, November 22–24, 2013. Revised selected papers. (English) Zbl 1280.94006 Lecture Notes in Computer Science 8365. Berlin: Springer (ISBN 978-3-319-04872-7/pbk). x, 251 p. (2014). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{Z. Cao} (ed.) and \textit{F. Zhang} (ed.), Pairing-based cryptography -- Pairing 2013. 6th international conference, Beijing, China, November 22--24, 2013. Revised selected papers. Berlin: Springer (2014; Zbl 1280.94006) Full Text: DOI
Zhang, Fangguo Elliptic curves in cryptography: past, present and future. (Chinese. English summary) Zbl 1290.14018 J. Shandong Univ., Nat. Sci. 48, No. 5, 1-13 (2013). MSC: 14G50 14H52 94A60 PDFBibTeX XMLCite \textit{F. Zhang}, J. Shandong Univ., Nat. Sci. 48, No. 5, 1--13 (2013; Zbl 1290.14018)
Zhang, Fangguo; Wang, Ping Speeding up elliptic curve discrete logarithm computations with point halving. (English) Zbl 1305.11114 Des. Codes Cryptography 67, No. 2, 197-208 (2013). MSC: 11Y16 11T71 11G20 14Q20 68Q25 PDFBibTeX XMLCite \textit{F. Zhang} and \textit{P. Wang}, Des. Codes Cryptography 67, No. 2, 197--208 (2013; Zbl 1305.11114) Full Text: DOI
Zhao, Chang-An; Zhang, Fangguo; Xie, Dongqing Faster computation of self-pairings. (English) Zbl 1365.94472 IEEE Trans. Inf. Theory 58, No. 5, 3266-3272 (2012). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{C.-A. Zhao} et al., IEEE Trans. Inf. Theory 58, No. 5, 3266--3272 (2012; Zbl 1365.94472) Full Text: DOI
Zhao, Xingwen; Zhang, Fangguo Times limited accountable anonymous online submission control system from single-verifier \(k\)-times group signature. (English) Zbl 1260.94073 Informatica, Ljubl. 36, No. 1, 75-82 (2012). MSC: 94A62 PDFBibTeX XMLCite \textit{X. Zhao} and \textit{F. Zhang}, Informatica, Ljubl. 36, No. 1, 75--82 (2012; Zbl 1260.94073)
Du, Yusong; Zhang, Fangguo; Liu, Meicheng On the resistance of Boolean functions against fast algebraic attacks. (English) Zbl 1369.94530 Kim, Howon (ed.), Information security and cryptology – ICISC 2011. 14th international conference, Seoul, Korea, November 30–December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 261-274 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Du} et al., Lect. Notes Comput. Sci. 7259, 261--274 (2012; Zbl 1369.94530) Full Text: DOI
Wen, Yamin; Zhang, Fangguo; Xu, Lingling Secret handshakes from ID-based message recovery signatures: a new generic approach. (English) Zbl 1250.94061 Comput. Electr. Eng. 38, No. 1, 96-104 (2012). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{Y. Wen} et al., Comput. Electr. Eng. 38, No. 1, 96--104 (2012; Zbl 1250.94061) Full Text: DOI
Li, Jin; Zhang, Fangguo; Chen, Xiaofeng; Kim, Kwangjo; Wong, Duncan S. Generic security-amplifying methods of ordinary digital signatures. (English) Zbl 1248.94107 Inf. Sci. 201, 128-139 (2012). MSC: 94A62 PDFBibTeX XMLCite \textit{J. Li} et al., Inf. Sci. 201, 128--139 (2012; Zbl 1248.94107) Full Text: DOI
Wang, Ping; Zhang, Fangguo Computing elliptic curve discrete logarithms with the negation map. (English) Zbl 1276.94019 Inf. Sci. 195, 277-286 (2012). MSC: 94A60 11Y16 11T71 PDFBibTeX XMLCite \textit{P. Wang} and \textit{F. Zhang}, Inf. Sci. 195, 277--286 (2012; Zbl 1276.94019) Full Text: DOI
Wang, Ping; Zhang, Fangguo Improved Pollard rho method for computing discrete logarithms over finite extension fields. (English) Zbl 1277.94042 J. Comput. Appl. Math. 236, No. 17, 4336-4343 (2012). MSC: 94A60 11T71 11Y16 PDFBibTeX XMLCite \textit{P. Wang} and \textit{F. Zhang}, J. Comput. Appl. Math. 236, No. 17, 4336--4343 (2012; Zbl 1277.94042) Full Text: DOI
Lin, Qiping; Zhang, Fangguo Efficient precomputation schemes of \(kP+lQ\). (English) Zbl 1243.94028 Inf. Process. Lett. 112, No. 11, 462-466 (2012). MSC: 94A60 68W30 PDFBibTeX XMLCite \textit{Q. Lin} and \textit{F. Zhang}, Inf. Process. Lett. 112, No. 11, 462--466 (2012; Zbl 1243.94028) Full Text: DOI
Chen, Xiaofeng; Zhang, Fangguo; Tian, Haibo; Wei, Baodian; Kim, Kwangjo Discrete logarithm based chameleon hashing and signatures without key exposure. (English) Zbl 1322.94098 Comput. Electr. Eng. 37, No. 4, 614-623 (2011). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{X. Chen} et al., Comput. Electr. Eng. 37, No. 4, 614--623 (2011; Zbl 1322.94098) Full Text: DOI
Xu, Lingling; Zhang, Fangguo Oblivious transfer with complex attribute-based access control. (English) Zbl 1297.94112 Rhee, Kyung-Hyune (ed.) et al., Information security and cryptology – ICISC 2010. 13th international conference, Seoul, Korea, December 1–3, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-24208-3/pbk). Lecture Notes in Computer Science 6829, 370-395 (2011). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{L. Xu} and \textit{F. Zhang}, Lect. Notes Comput. Sci. 6829, 370--395 (2011; Zbl 1297.94112) Full Text: DOI
Chen, Xiaofeng; Susilo, Willy; Zhang, Fangguo; Tian, Haibo; Li, Jin Identity-based trapdoor mercurial commitments and applications. (English) Zbl 1236.94072 Theor. Comput. Sci. 412, No. 39, 5498-5512 (2011). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{X. Chen} et al., Theor. Comput. Sci. 412, No. 39, 5498--5512 (2011; Zbl 1236.94072) Full Text: DOI
Cheng, Rong; Zhang, Bo; Zhang, Fangguo Secure obfuscation of encrypted verifiable encrypted signatures. (English) Zbl 1298.94084 Boyen, Xavier (ed.) et al., Provable security. 5th international conference, ProvSec 2011, Xi’an, China, October 16–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-24315-8/pbk). Lecture Notes in Computer Science 6980, 188-203 (2011). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{R. Cheng} et al., Lect. Notes Comput. Sci. 6980, 188--203 (2011; Zbl 1298.94084) Full Text: DOI
Chen, Xiaofeng; Tian, Haibo; Zhang, Fangguo; Ding, Yong Comments and improvements on key-exposure free chameleon hashing based on factoring. (English) Zbl 1295.94037 Lai, Xuejia (ed.) et al., Information security and cryptology. 6th international conference, Inscrypt 2010, Shanghai, China, October 20–24, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21517-9/pbk). Lecture Notes in Computer Science 6584, 415-426 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{X. Chen} et al., Lect. Notes Comput. Sci. 6584, 415--426 (2011; Zbl 1295.94037) Full Text: DOI
Du, Yusong; Zhang, Fangguo Finding more Boolean functions with maximum algebraic immunity based on univariate polynomial representation. (English) Zbl 1279.94070 Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 47-60 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Du} and \textit{F. Zhang}, Lect. Notes Comput. Sci. 6812, 47--60 (2011; Zbl 1279.94070) Full Text: DOI
Chen, Xiaofeng; Wu, Qianhong; Zhang, Fangguo; Tian, Haibo; Wei, Baodian; Lee, Byoungcheon; Lee, Hyunrok; Kim, Kwangjo New receipt-free voting scheme using double-trapdoor commitment. (English) Zbl 1251.94025 Inf. Sci. 181, No. 8, 1493-1502 (2011). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{X. Chen} et al., Inf. Sci. 181, No. 8, 1493--1502 (2011; Zbl 1251.94025) Full Text: DOI
Zhang, Fangguo; Wang, Ping On relationship of computational Diffie-Hellman problem and computational square-root exponent problem. (English) Zbl 1272.94069 Chee, Yeow Meng (ed.) et al., Coding and cryptology. Third international workshop, IWCC 2011, Qingdao, China, May 30 – June 3, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20900-0/pbk). Lecture Notes in Computer Science 6639, 283-293 (2011). MSC: 94A60 11T71 68Q15 68Q25 PDFBibTeX XMLCite \textit{F. Zhang} and \textit{P. Wang}, Lect. Notes Comput. Sci. 6639, 283--293 (2011; Zbl 1272.94069) Full Text: DOI
Zhao, Xingwen; Zhang, Fangguo Traitor tracing against public collaboration. (English) Zbl 1292.94175 Bao, Feng (ed.) et al., Information security practice and experience. 7th international conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21030-3/pbk). Lecture Notes in Computer Science 6672, 302-316 (2011). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{X. Zhao} and \textit{F. Zhang}, Lect. Notes Comput. Sci. 6672, 302--316 (2011; Zbl 1292.94175) Full Text: DOI
Zhao, Chang-An; Xie, Dongqing; Zhang, Fangguo; Zhang, Jingwei; Chen, Bing-Long Computing bilinear pairings on elliptic curves with automorphisms. (English) Zbl 1210.14033 Des. Codes Cryptography 58, No. 1, 35-44 (2011). Reviewer: Juan Tena Ayuso (Valladolid) MSC: 14H52 14Q05 11G20 94A60 PDFBibTeX XMLCite \textit{C.-A. Zhao} et al., Des. Codes Cryptography 58, No. 1, 35--44 (2011; Zbl 1210.14033) Full Text: DOI
Zhang, Fangguo Twisted ate pairing on hyperelliptic curves and applications. (English) Zbl 1497.14120 Sci. China, Inf. Sci. 53, No. 8, 1528-1538 (2010). MSC: 14Q05 11T71 14G15 14G50 94A60 PDFBibTeX XMLCite \textit{F. Zhang}, Sci. China, Inf. Sci. 53, No. 8, 1528--1538 (2010; Zbl 1497.14120) Full Text: DOI
Zhang, Fangguo; Chen, Xiaofeng Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05. (English) Zbl 1215.94073 Inf. Process. Lett. 109, No. 15, 846-849 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{F. Zhang} and \textit{X. Chen}, Inf. Process. Lett. 109, No. 15, 846--849 (2009; Zbl 1215.94073) Full Text: DOI
Pieprzyk, Josef (ed.); Zhang, Fangguo (ed.) Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11–13, 2009. Proceedings. (English) Zbl 1177.94016 Lecture Notes in Computer Science 5848. Berlin: Springer (ISBN 978-3-642-04641-4/pbk). xii, 275 p. (2009). MSC: 94-06 94A60 94A62 00B25 PDFBibTeX XMLCite \textit{J. Pieprzyk} (ed.) and \textit{F. Zhang} (ed.), Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11--13, 2009. Proceedings. Berlin: Springer (2009; Zbl 1177.94016) Full Text: DOI
Chen, Xiaofeng; Zhang, Fangguo; Tian, Haibo; Wei, Baodian; Susilo, Willy; Mu, Yi; Lee, Hyunrok; Kim, Kwangjo Efficient generic on-line/off-line (threshold) signatures without key exposure. (English) Zbl 1148.94008 Inf. Sci. 178, No. 21, 4192-4203 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{X. Chen} et al., Inf. Sci. 178, No. 21, 4192--4203 (2008; Zbl 1148.94008) Full Text: DOI
Zhao, Changan; Zhang, Fangguo; Huang, Jiwu Efficient Tate pairing computation using double-base chains. (English) Zbl 1210.94098 Sci. China, Ser. F 51, No. 8, 1096-1105 (2008). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{C. Zhao} et al., Sci. China, Ser. F 51, No. 8, 1096--1105 (2008; Zbl 1210.94098) Full Text: DOI
Li, Jin; Kim, Kwangjo; Zhang, Fangguo; Wong, Duncan S. Generic security-amplifying methods of ordinary digital signatures. (English) Zbl 1319.94092 Bellovin, Steven M. (ed.) et al., Applied cryptography and network security. 6th international conference, ACNS 2008, New York, NY, USA, June 3–6, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68913-3/pbk). Lecture Notes in Computer Science 5037, 224-241 (2008). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{J. Li} et al., Lect. Notes Comput. Sci. 5037, 224--241 (2008; Zbl 1319.94092) Full Text: DOI
Chen, Xiaofeng; Zhang, Fangguo; Susilo, Willy; Mu, Yi Efficient generic on-line/off-line signatures without key exposure. (English) Zbl 1214.94061 Katz, Jonathan (ed.) et al., Applied cryptography and network security. 5th international conference, ACNS 2007, Zhuhai, China, June 5–8, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72737-8/pbk). Lecture Notes in Computer Science 4521, 18-30 (2007). MSC: 94A62 PDFBibTeX XMLCite \textit{X. Chen} et al., Lect. Notes Comput. Sci. 4521, 18--30 (2007; Zbl 1214.94061) Full Text: DOI
Li, Jin; Kim, Kwangjo; Zhang, Fangguo; Chen, Xiaofeng Aggregate proxy signature and verifiably encrypted proxy signature. (English) Zbl 1138.94382 Susilo, Willy (ed.) et al., Provable security. First international conference, ProvSec 2007, Wollongong, Australia, November 1–2, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-75669-9/pbk). Lecture Notes in Computer Science 4784, 208-217 (2007). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{J. Li} et al., Lect. Notes Comput. Sci. 4784, 208--217 (2007; Zbl 1138.94382) Full Text: DOI
Zhang, Fangguo; Chen, Xiaofeng; Susilo, Willy; Mu, Yi A new signature scheme without random oracles from bilinear pairings. (English) Zbl 1295.94192 Nguyen, Phong Q. (ed.), Progress in cryptology – VIETCRYPT 2006. First international conference on cryptology in Vietnam, Hanoi, Vietnam, September 25–28, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-68799-3/pbk). Lecture Notes in Computer Science 4341, 67-80 (2006). MSC: 94A62 PDFBibTeX XMLCite \textit{F. Zhang} et al., Lect. Notes Comput. Sci. 4341, 67--80 (2006; Zbl 1295.94192) Full Text: DOI Link
Wu, Qianhong; Susilo, Willy; Mu, Yi; Zhang, Fanguo Efficient partially blind signatures with provable security. (English) Zbl 1171.94366 Gavrilova, Marina (ed.) et al., Computational science and its applications – ICCSA 2006. International conference, Glasgow, UK, May 8–11, 2006. Proceedings, Part III. Berlin: Springer (ISBN 3-540-34075-0/pbk). Lecture Notes in Computer Science 3982, 345-354 (2006). MSC: 94A62 PDFBibTeX XMLCite \textit{Q. Wu} et al., Lect. Notes Comput. Sci. 3982, 345--354 (2006; Zbl 1171.94366) Full Text: DOI
Chen, Xiaofeng; Zhang, Fangguo; Mu, Yi; Susilo, Willy Efficient provably secure restrictive partially blind signatures from bilinear pairings. (English) Zbl 1152.94409 Di Crescenzo, Giovanni (ed.) et al., Financial cryptography and data security. 10th international conference, FC 2006, Anguilla, British West Indies, February 27–March 2, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-46255-2/pbk). Lecture Notes in Computer Science 4107, 251-265 (2006). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{X. Chen} et al., Lect. Notes Comput. Sci. 4107, 251--265 (2006; Zbl 1152.94409) Full Text: DOI
Wu, Qianhong; Zhang, Fanguo; Susilo, Willy; Mu, Yi An efficient static blind ring signature scheme. (English) Zbl 1185.94084 Won, Dongho (ed.) et al., Information security and cryptology – ICISC 2005. 8th international conference, Seoul, Korea, December 1–2, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-33354-1/pbk). Lecture Notes in Computer Science 3935, 410-423 (2006). MSC: 94A62 PDFBibTeX XMLCite \textit{Q. Wu} et al., Lect. Notes Comput. Sci. 3935, 410--423 (2006; Zbl 1185.94084) Full Text: DOI
Wei, Victor K.; Yuen, Tsz Hon; Zhang, Fangguo Group signature where group manager, members and open authority are identity-based. (English) Zbl 1127.94376 Boyd, Colin (ed.) et al., Information security and privacy. 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4–6, 2005. Proceedings. Berlin: Springer (ISBN 3-540-26547-3/pbk). Lecture Notes in Computer Science 3574, 468-480 (2005). MSC: 94A62 PDFBibTeX XMLCite \textit{V. K. Wei} et al., Lect. Notes Comput. Sci. 3574, 468--480 (2005; Zbl 1127.94376) Full Text: DOI
Zhang, Fangguo; Susilo, Willy; Mu, Yi Identity-based partial message recovery signatures (or how to shorten ID-based signatures). (English) Zbl 1120.94334 Patrick, Andrew S. (ed.) et al., Financial cryptography and data security. 9th international conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 – March 3, 2005. Revised papers. Berlin: Springer (ISBN 3-540-26656-9/pbk). Lecture Notes in Computer Science 3570, 45-56 (2005). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{F. Zhang} et al., Lect. Notes Comput. Sci. 3570, 45--56 (2005; Zbl 1120.94334) Full Text: DOI
Zhang, Fangguo; Safavi-Naini, Reihaneh; Susilo, Willy Attack on Han et al.’s ID-based confirmer (undeniable) signature at ACM-EC’03. (English) Zbl 1083.94019 Appl. Math. Comput. 170, No. 2, 1166-1169 (2005). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{F. Zhang} et al., Appl. Math. Comput. 170, No. 2, 1166--1169 (2005; Zbl 1083.94019) Full Text: DOI
Lin, Chih-Yin; Wu, Tzong-Chen; Zhang, Fangguo; Hwang, Jing-Jang New identity-based society oriented signature schemes from pairings on elliptic curves. (English) Zbl 1070.94018 Appl. Math. Comput. 160, No. 1, 245-260 (2005). MSC: 94A62 94A60 14G50 PDFBibTeX XMLCite \textit{C.-Y. Lin} et al., Appl. Math. Comput. 160, No. 1, 245--260 (2005; Zbl 1070.94018) Full Text: DOI
Zhang, Fangguo; Kim, Kwangjo Cryptanalysis of Lee-Hwang-Li’s key authentication scheme. (English) Zbl 1060.94040 Appl. Math. Comput. 161, No. 1, 101-107 (2005). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{F. Zhang} and \textit{K. Kim}, Appl. Math. Comput. 161, No. 1, 101--107 (2005; Zbl 1060.94040) Full Text: DOI
Zhang, Fangguo; Chen, Xiaofeng Attack on an ID-based authenticated group key agreement scheme from PKC 2004. (English) Zbl 1177.68088 Inf. Process. Lett. 91, No. 4, 191-193 (2004). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{F. Zhang} and \textit{X. Chen}, Inf. Process. Lett. 91, No. 4, 191--193 (2004; Zbl 1177.68088) Full Text: DOI
Zhang, Fangguo; Safavi-Naini, Reihaneh; Susilo, Willy An efficient signature scheme from bilinear pairings and its applications. (English) Zbl 1198.94169 Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 277-290 (2004). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{F. Zhang} et al., Lect. Notes Comput. Sci. 2947, 277--290 (2004; Zbl 1198.94169) Full Text: DOI
Chen, Xiaofeng; Zhang, Fangguo; Kim, Kwangjo Chameleon hashing without key exposure. (English) Zbl 1109.68445 Zhang, Kan (ed.) et al., Information security. 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27–29, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23208-7/pbk). Lecture Notes in Computer Science 3225, 87-98 (2004). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{X. Chen} et al., Lect. Notes Comput. Sci. 3225, 87--98 (2004; Zbl 1109.68445) Full Text: DOI
Chen, Xiaofeng; Zhang, Fangguo; Konidala, Divyan M.; Kim, Kwangjo New ID-based threshold signature scheme from bilinear pairings. (English) Zbl 1113.94308 Canteaut, Anne (ed.) et al., Progress in cryptology – INDOCRYPT 2004. 5th international conference on cryptology in India, Chennai, India, December 20-22, 2004. Berlin: Springer (ISBN 3-540-24130-2/pbk). Lecture Notes in Computer Science 3348, 371-383 (2004). MSC: 94A60 PDFBibTeX XMLCite \textit{X. Chen} et al., Lect. Notes Comput. Sci. 3348, 371--383 (2004; Zbl 1113.94308) Full Text: DOI
Zhang, Fangguo; Safavi-Naini, Reihaneh; Lin, Chih-Yin Some new proxy signature schemes from pairings. (English) Zbl 1084.94521 Chen, Kefei (ed.), Progress on cryptography. 25 years of cryptography in China. Papers of an international workshop on progress on cryptography celebrating Guozhen Xiao’s 70th birthday. With a foreword by Xuejia Lai. Boston, MA: Kluwer Academic Publishers (ISBN 1-4020-7986-9/hbk). The Kluwer International Series in Engineering and Computer Science 769, 59-66 (2004). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{F. Zhang} et al., Kluwer Int. Ser. Eng. Comput. Sci. 769, 59--66 (2004; Zbl 1084.94521)
Susilo, Willy; Zhang, Fangguo; Mu, Yi Identity-based strong designated verifier signature schemes. (English) Zbl 1098.94630 Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 313-324 (2004). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{W. Susilo} et al., Lect. Notes Comput. Sci. 3108, 313--324 (2004; Zbl 1098.94630) Full Text: DOI
Susilo, Willy; Mu, Yi; Zhang, Fangguo Perfect concurrent signature schemes. (English) Zbl 1109.68487 Lopez, Javier (ed.) et al., Information and communications security. 6th international conference, ICICS 2004, Malaga, Spain, October 27–29, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23563-9/pbk). Lecture Notes in Computer Science 3269, 14-26 (2004). MSC: 68P25 94A62 PDFBibTeX XMLCite \textit{W. Susilo} et al., Lect. Notes Comput. Sci. 3269, 14--26 (2004; Zbl 1109.68487) Full Text: DOI
Mu, Yi; Zhang, Fangguo; Susilo, Willy Deniable partial proxy signatures. (English) Zbl 1115.94307 Maher, Michael J. (ed.), Advances in computer science – ASIAN 2004. Higher-level decision making. 9th Asian computing science conference. Dedicated to Jean-Louis Lassez on the occasion of his 5th cycle birthday, Chiang Mai, Thailand, December 8–10, 2004. Proceedings. Berlin: Springer (ISBN 3-540-24087-X/pbk). Lecture Notes in Computer Science 3321, 182-194 (2004). MSC: 94A62 PDFBibTeX XMLCite \textit{Y. Mu} et al., Lect. Notes Comput. Sci. 3321, 182--194 (2004; Zbl 1115.94307) Full Text: DOI
Chen, Xiaofeng; Zhang, Fangguo; Kim, Kwangjo Limited verifier signature from bilinear pairings. (English) Zbl 1103.68510 Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 135-148 (2004). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{X. Chen} et al., Lect. Notes Comput. Sci. 3089, 135--148 (2004; Zbl 1103.68510) Full Text: DOI
Zhang, Fangguo; Safavi-Naini, Reihaneh; Susilo, Willy Efficient verifiably encrypted signature and partially blind signature from bilinear pairings. (English) Zbl 1123.94369 Johansson, Thomas (ed.) et al., Progress in cryptology – INDOCRYPT 2003. 4th international conference on cryptology in India, New Delhi, India, December 8–10, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20609-4/pbk). Lect. Notes Comput. Sci. 2904, 191-204 (2003). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{F. Zhang} et al., Lect. Notes Comput. Sci. 2904, 191--204 (2003; Zbl 1123.94369) Full Text: DOI
Zhang, Fangguo; Kim, Kwangjo Efficient ID-based blind signature and proxy signature from bilinear pairings. (English) Zbl 1044.94548 Safavi-Naini, Rei (ed.) et al., Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9–11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40515-1/pbk). Lect. Notes Comput. Sci. 2727, 312-323 (2003). MSC: 94A62 15A63 PDFBibTeX XMLCite \textit{F. Zhang} and \textit{K. Kim}, Lect. Notes Comput. Sci. 2727, 312--323 (2003; Zbl 1044.94548) Full Text: Link
Zhang, Fangguo; Zhang, Futai; Wang, Yumin Selection of secure hyperelliptic curves of g=2 based on a subfield. (English) Zbl 1094.94524 J. Comput. Sci. Technol. 17, No. 6, 836-842 (2002). MSC: 94A60 PDFBibTeX XMLCite \textit{F. Zhang} et al., J. Comput. Sci. Technol. 17, No. 6, 836--842 (2002; Zbl 1094.94524) Full Text: DOI
Zhang, Fangguo; Liu, Shengli; Kim, Kwangjo Compact representation of domain parameters of hyperelliptic curve cryptosystems. (English) Zbl 1022.94510 Batten, Lynn (ed.) et al., Information security and privacy. 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2384, 203-213 (2002). MSC: 94A60 11G05 11T71 14G50 PDFBibTeX XMLCite \textit{F. Zhang} et al., Lect. Notes Comput. Sci. 2384, 203--213 (2002; Zbl 1022.94510) Full Text: Link
Zhang, Fangguo; Kim, Kwangjo ID-based blind signature and ring signature from pairings. (English) Zbl 1065.94566 Zheng, Yuliang (ed.), Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1–5, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00171-9). Lect. Notes Comput. Sci. 2501, 533-547 (2002). MSC: 94A62 14G50 PDFBibTeX XMLCite \textit{F. Zhang} and \textit{K. Kim}, Lect. Notes Comput. Sci. 2501, 533--547 (2002; Zbl 1065.94566) Full Text: DOI
Zhang, Fangguo; Zhang, Futai; Wang, Yumin Fast scalar multiplication on the Jacobian of a family of hyperelliptic curves. (English) Zbl 1050.94541 Qing, Sihan (ed.) et al., Information and communications security. 3rd international conference, ICICS 2001, Xian, China, November 13–16, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42880-1). Lect. Notes Comput. Sci. 2229, 74-83 (2001). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{F. Zhang} et al., Lect. Notes Comput. Sci. 2229, 74--83 (2001; Zbl 1050.94541) Full Text: Link