Edit Profile (opens in new tab) Cao, Zhenfu Co-Author Distance Author ID: cao.zhenfu Published as: Cao, Zhenfu; Cao, Zhen-Fu; Cao, Zhen Fu; Cao, Zhen-fu; Cao, ZhenFu more...less Homepage: http://tdt.sjtu.edu.cn/~zfcao/ External Links: dblp Documents Indexed: 210 Publications since 1983, including 2 Books 2 Contributions as Editor Reviewing Activity: 36 Reviews Co-Authors: 113 Co-Authors with 158 Joint Publications 3,622 Co-Co-Authors all top 5 Co-Authors 50 single-authored 40 Dong, Xiaolei 22 Lu, Rongxing 15 Shao, Jun 12 Zhang, Zongyang 11 Wang, Licheng 8 Liang, Xiaohui 8 Qian, Haifeng 7 Bao, Haiyong 7 Zhou, Yuan 6 Chai, Zhenchuan 6 Wang, Shengbao 5 Cao, Feng 5 Lin, Huang 5 Su, Renwang 5 Sun, Dazhi 5 Wang, Lihua 5 Xue, Qingshui 4 Chen, Kejun 4 Chen, Yu 4 Yang, Piyi 4 Zhao, Xiaopeng 3 Chen, Jie 3 Chow, Sherman S. M. 3 Gong, Junqing 3 Grytczuk, Aleksander 3 Lin, Xiaodong 3 Liu, Rui 3 Liu, Zhen 3 Ma, Rong 3 Shen, Jiachen 3 Sun, Qi 3 Sun, Yu 3 Wei, Ruizhong 3 Zhu, Haojin 2 Cao, Yushu 2 Choo, Kim-Kwang Raymond 2 Chu, Chuan I. 2 Duan, Shanshan 2 Hanaoka, Goichiro 2 Li, Fengying 2 Li, Jiguo 2 Lin, Dongdai 2 Mambo, Masahiro 2 Shiu, Wai Chee 2 Tang, Shaohua 2 Visconti, Ivan 2 Wang, Qin 2 Wong, Duncan S. 2 Xing, Dongsheng 2 Yamamura, Akihiro 2 Yang, Yixian 2 Zhang, Jiping 2 Zhang, Yichen 2 Zhao, Yunlei 2 Zhou, Muxin 1 Bugeaud, Yann 1 Cao, Chuanshu 1 Chen, Kefei 1 Cheng, Xiaoming 1 Cheng, Zhaohui 1 Ding, Ning 1 Dobraunig, Christoph 1 Fang, Binxing 1 Feng, Dengguo 1 Ge, Gennian 1 Huai, Jinpeng 1 Huang, Hai 1 Huang, Qiong 1 Huang, Xiaofang 1 Isobe, Takanori 1 Jia, Fengyu 1 Jing, Chengming 1 Johnson, Neil F. 1 Kurniawan, Edi 1 Li, Jianzhong 1 Li, Xiangxue 1 Li, Xiaohang 1 Li, Zhong 1 Liang, Kaitai 1 Liang, Yunong 1 Liu, Fukang 1 Liu, Jiming 1 Liu, Zhusen 1 Long, Yu 1 Lou, Shengming 1 Mendel, Florian 1 Miao, Ying 1 Mignotte, Maurice 1 Mitrevska, M. 1 Mu, Shanzhi 1 Ning, Jianting 1 Niu, Xinxin 1 Okamoto, Eiji 1 Pan, Jiayu 1 Qin, Liuquan 1 Shen, Changxiang 1 Song, Chao 1 Sun, Congkai 1 Tian, Xiuxia 1 Vorobyeva, Y. ...and 25 more Co-Authors all top 5 Serials 17 Journal of Harbin Institute of Technology 16 Applied Mathematics and Computation 13 Journal of Natural Science of Heilongjiang University 12 Information Sciences 6 Science in China. Series F 6 Journal of Shanghai Jiaotong University (Science) 5 Chinese Annals of Mathematics. Series A 5 Journal of Shanghai Jiaotong University (Chinese Edition) 4 Acta Arithmetica 4 Journal of Mathematics. Wuhan University 4 Northeastern Mathematical Journal 4 Wuhan University Journal of Natural Sciences (WUJNS) 3 Computers and Electrical Engineering 3 Journal of Statistical Planning and Inference 3 Proceedings of the Japan Academy. Series A 3 Comptes Rendus Mathématiques de l’Académie des Sciences 3 Designs, Codes and Cryptography 3 Fundamenta Informaticae 3 Science China. Information Sciences 2 Information Processing Letters 2 Acta Mathematica Sinica 2 Journal of Number Theory 2 Proceedings of the American Mathematical Society 2 Journal of Southwest Teachers University. Series B: Natural Science 2 Chinese Science Bulletin 2 Informatica (Vilnius) 2 Discussiones Mathematicae. General Algebra and Applications 2 Journal of Systems Science and Complexity 2 Journal of Harbin Institute of Technology. New Series 2 Journal of Software 1 Discrete Mathematics 1 Journal of Algebra 1 Journal of Computational and Applied Mathematics 1 Networks 1 Publicationes Mathematicae Debrecen 1 Theoretical Computer Science 1 Tsukuba Journal of Mathematics 1 Journal of Sichuan University. Natural Science Edition 1 Journal of Mathematical Research & Exposition 1 Journal of Systems Science and Mathematical Sciences 1 Journal of Computer Science and Technology 1 JCMCC. The Journal of Combinatorial Mathematics and Combinatorial Computing 1 International Journal of Foundations of Computer Science 1 International Journal of Computer Mathematics 1 Kexue Tongbao 1 International Journal of Robust and Nonlinear Control 1 Applied Mathematics 1 Bulletin of the Institute of Combinatorics and its Applications 1 Pure and Applied Mathematics 1 Complexity 1 Science in China. Series E 1 Journal of Shanghai Jiaotong University (English Edition) 1 Taiwanese Journal of Mathematics 1 Acta Academiae Paedagogicae Agriensis. Nova Series. Sectio Matematicae 1 Journal of Ningxia University. Natural Science Edition 1 Journal of Sichuan University. Engineering Science Edition 1 Computer Networks 1 International Journal of Number Theory 1 Lecture Notes in Computer Science all top 5 Fields 125 Information and communication theory, circuits (94-XX) 85 Number theory (11-XX) 42 Computer science (68-XX) 10 Combinatorics (05-XX) 5 Group theory and generalizations (20-XX) 4 Algebraic geometry (14-XX) 2 General and overarching topics; collections (00-XX) 2 Numerical analysis (65-XX) 2 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 2 Systems theory; control (93-XX) 1 Mathematical logic and foundations (03-XX) 1 Linear and multilinear algebra; matrix theory (15-XX) 1 Statistics (62-XX) 1 Quantum theory (81-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 105 Publications have been cited 493 times in 402 Documents Cited by ▼ Year ▼ On simple \(K_4\)-groups. Zbl 0989.20017 Bugeaud, Yann; Cao, Zhenfu; Mignotte, Maurice 29 2001 Super-simple balanced incomplete block designs with block size 4 and index 6. Zbl 1063.05019 Chen, Kejun; Cao, Zhenfu; Wei, Ruizhong 26 2005 A note on the diophantine equation \(a^x+b^y=c^z\). Zbl 0946.11009 Cao, Zhenfu 25 1999 Simulatability and security of certificateless threshold signatures. Zbl 1125.94039 Wang, Licheng; Cao, Zhenfu; Li, Xiangxue; Qian, Haifeng 22 2007 CCA-secure proxy re-encryption without pairings. Zbl 1227.94065 Shao, Jun; Cao, Zhenfu 19 2009 Efficient IBE with tight reduction to standard assumption in the multi-challenge setting. Zbl 1407.94111 Gong, Junqing; Dong, Xiaolei; Chen, Jie; Cao, Zhenfu 18 2016 A secure identity-based proxy multi-signature scheme. Zbl 1156.94337 Cao, Feng; Cao, Zhenfu 17 2009 Another generalization of Menon’s identity. Zbl 1392.11004 Zhao, Xiao-Peng; Cao, Zhen-Fu 17 2017 A new efficient \((t,n)\) verifiable multi-secret sharing (VMSS) based on YCH scheme. Zbl 1076.94011 Shao, Jun; Cao, Zhenfu 14 2005 Extended nested dual system groups, revisited. Zbl 1388.94057 Gong, Junqing; Chen, Jie; Dong, Xiaolei; Cao, Zhenfu; Tang, Shaohua 13 2016 Proxy re-encryption with keyword search. Zbl 1191.94100 Shao, Jun; Cao, Zhenfu; Liang, Xiaohui; Lin, Huang 11 2010 Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption. Zbl 1278.94059 Shao, Jun; Cao, Zhenfu 11 2012 An application of a lower bound for linear forms in two logarithms to the Terai-Jeśmanowicz conjecture. Zbl 1031.11020 Cao, Zhenfu; Dong, Xiaolei 10 2003 Multi-use and unidirectional identity-based proxy re-encryption schemes. Zbl 1194.94194 Wang, Hongbing; Cao, Zhenfu; Wang, Licheng 10 2010 Secure threshold multi authority attribute based encryption without a central authority. Zbl 1203.94112 Lin, Huang; Cao, Zhenfu; Liang, Xiaohui; Shao, Jun 9 2008 Efficient and provably secure multi-receiver identity-based signcryption. Zbl 1176.94037 Duan, Shanshan; Cao, Zhenfu 8 2006 On Terai’s conjecture. Zbl 0924.11024 Cao, Zhenfu; Dong, Xiaolei 8 1998 An improved identity-based key agreement protocol and its security proof. Zbl 1156.94388 Wang, Shengbao; Cao, Zhenfu; Choo, Kim-Kwang Raymond; Wang, Lihua 8 2009 Extended dual system group and shorter unbounded hierarchical identity based encryption. Zbl 1348.94050 Gong, Junqing; Cao, Zhenfu; Tang, Shaohua; Chen, Jie 7 2016 Secure threshold multi authority attribute based encryption without a central authority. Zbl 1191.94095 Lin, Huang; Cao, Zhenfu; Liang, Xiaohui; Shao, Jun 7 2010 Anonymous identity-based hash proof system and its applications. Zbl 1303.94074 Chen, Yu; Zhang, Zongyang; Lin, Dongdai; Cao, Zhenfu 7 2012 Proxy re-signature schemes without random oracles. Zbl 1153.94460 Shao, Jun; Cao, Zhenfu; Wang, Licheng; Liang, Xiaohui 6 2007 New constructions of public-key encryption schemes from conjugacy search problems. Zbl 1295.94148 Wang, Lihua; Wang, Licheng; Cao, Zhenfu; Okamoto, Eiji; Shao, Jun 6 2011 Spatial encryption under simpler assumption. Zbl 1267.94111 Zhou, Muxin; Cao, Zhenfu 6 2009 How to construct secure proxy cryptosystem. Zbl 1142.94364 Zhou, Yuan; Fang, Binxing; Cao, Zhenfu; Yun, Xiaochun; Cheng, Xiaoming 5 2007 Constant-round concurrent non-malleable statistically binding commitments and decommitments. Zbl 1279.94059 Cao, Zhenfu; Visconti, Ivan; Zhang, Zongyang 5 2010 Large universe ciphertext-policy attribute-based encryption with white-box traceability. Zbl 1443.94076 Ning, Jianting; Cao, Zhenfu; Dong, Xiaolei; Wei, Lifei; Lin, Xiaodong 5 2014 Designing efficient proxy signature schemes for mobile communication. Zbl 1137.94010 Lu, Rongxing; Dong, Xiaolei; Cao, Zhenfu 4 2008 The diophantine equations \(x^4-y^4=z^p\) and \(x^4-1=dy^q\). Zbl 0928.11018 Cao, Zhenfu 4 1999 Nonrepudiable proxy multi-signature scheme. Zbl 1046.68050 Li, JiGuo; Cao, ZhenFu; Zhang, YiChen 4 2003 Designated verifier proxy signature scheme with message recovery. Zbl 1076.94032 Lu, Rongxing; Cao, Zhenfu 4 2005 Constructing secure proxy cryptosystem. Zbl 1151.94593 Zhou, Yuan; Cao, Zhenfu; Chai, Zhenchuan 4 2005 Combinatorial characterizations of one-coincidence frequency-hopping sequences. Zbl 1205.94018 Cao, Zhenfu; Ge, Gennian; Miao, Ying 4 2006 A secure identity-based multi-proxy signature scheme. Zbl 1162.68426 Cao, Feng; Cao, Zhenfu 4 2009 Provably secure proxy-protected signature schemes based on factoring. Zbl 1072.94013 Zhou, Yuan; Cao, Zhenfu; Lu, Rongxing 4 2005 Cryptanalysis of Li-Tzeng-Hwang’s improved signature schemes based on factoring and discrete logarithms. Zbl 1075.94015 Qian, Haifeng; Cao, Zhenfu; Bao, Haiyong 4 2005 A new type of integral trees of diameter 5 and diameter 6. Zbl 0731.05012 Cao, Zhenfu 4 1991 Introduction to diophantine equations. Zbl 0849.11029 Cao, Zhenfu 4 1989 On the Terai-Jeśmanowicz conjecture. Zbl 1012.11025 Cao, Zhenfu; Dong, Xiaolei 4 2002 A new conjecture concerning the Diophantine equation \(x^2+b^y=c^z\). Zbl 1093.11022 Cao, Zhenfu; Dong, Xiaolei; Li, Zhong 4 2002 Fuzzy identity based signature with applications to biometric authentication. Zbl 1264.94111 Yang, Piyi; Cao, Zhenfu; Dong, Xiaolei 4 2011 Tight security analysis of 3-round key-alternating cipher with a single permutation. Zbl 1511.94160 Wu, Yusai; Yu, Liqing; Cao, Zhenfu; Dong, Xiaolei 4 2020 Efficient certificateless authenticated key agreement protocol from pairings. Zbl 1111.94332 Wang, Shengbao; Cao, Zhenfu; Wang, Licheng 3 2006 Identity-based signature scheme based on quadratic residues. Zbl 1142.94009 Chai, Zhenchuan; Cao, Zhenfu; Dong, Xiaolei 3 2007 A certificate-based proxy cryptosystem with revocable proxy decryption power. Zbl 1153.94436 Wang, Lihua; Shao, Jun; Cao, Zhenfu; Mambo, Masahiro; Yamamura, Akihiro 3 2007 On the Diophantine equation \(x^{p}+2^{2m}=py^{2}\). Zbl 1050.11037 Cao, Zhenfu 3 2000 Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles. Zbl 1477.68061 Liu, Zhen; Cao, Zhenfu; Huang, Qiong; Wong, Duncan S.; Yuen, Tsz Hon 3 2011 New directions of modern cryptography. Zbl 1264.94002 Cao, Zhenfu 3 2012 Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode. Zbl 1181.94115 Wang, Shengbao; Cao, Zhenfu; Cheng, Zhaohui; Choo, Kim-Kwang Raymond 3 2009 The Terai-Jeśmanowicz conjecture on the equation \(a^x+b^y=c^z\). Zbl 0987.11021 Dong, Xiaolei; Cao, Zhenfu 3 2000 Diophantine equations and class numbers of real quadratic fields. Zbl 1014.11069 Dong, Xiaolei; Cao, Zhenfu 3 2001 A generalization of the Schinzel-Sierpiński system of equations. Zbl 0971.11503 Cao, Zhenfu 3 1991 Integral trees of diameter \(R\) \((3\leq R\leq 6)\). Zbl 0979.11502 Cao, Zhenfu 3 1988 A new deniable authentication protocol from bilinear pairings. Zbl 1076.94031 Lu, Rongxing; Cao, Zhenfu 3 2005 Threshold undeniable signature scheme based on conic. Zbl 1074.94009 Lu, Rong Xing; Cao, Zhen Fu; Zhou, Yuan 3 2005 A robust \((k,n)+1\) threshold proxy signature scheme based on factoring. Zbl 1075.94010 Lu, Rongxing; Cao, Zhenfu; Zhu, Haojin 3 2005 Discrete terminal sliding mode repetitive control for a linear actuator with nonlinear friction and uncertainties. Zbl 1426.93044 Mitrevska, M.; Cao, Z.; Zheng, J.; Kurniawan, E.; Man, Z. 3 2019 Efficient collision attack frameworks for RIPEMD-160. Zbl 1509.94112 Liu, Fukang; Dobraunig, Christoph; Mendel, Florian; Isobe, Takanori; Wang, Gaoli; Cao, Zhenfu 3 2019 Survey of information security. Zbl 1142.94013 Shen, Changxiang; Zhang, Huangguo; Feng, Dengguo; Cao, Zhenfu; Huang, Jiwu 2 2007 Short group signature without random oracles. Zbl 1285.94107 Liang, Xiaohui; Cao, Zhenfu; Shao, Jun; Lin, Huang 2 2008 Transitive signatures from braid groups. Zbl 1153.94466 Wang, Licheng; Cao, Zhenfu; Zheng, Shihui; Huang, Xiaofang; Yang, Yixian 2 2007 The Diophantine equation \(x^2+b^y=c^z\). Zbl 0987.11020 Cao, Zhenfu; Dong, Xiaolei 2 2001 A conic analogue of RSA cryptosystems and some improved RSA cryptosystems. Zbl 1076.94524 Cao, Zhenfu 2 1999 Robust ID-based threshold signcryption scheme from pairings. Zbl 1091.94505 Duan, Shanshan; Cao, Zhenfu; Lu, Rongxing 2 2005 How to compute modular exponentiation with large operators based on the right-to-left binary algorithm. Zbl 1092.68118 Sun, Da-Zhi; Cao, Zhen-Fu; Sun, Yu 2 2006 The exponential Diophantine equation \(AX^2+BY^2=\lambda k^Z\) and its applications. Zbl 1162.11019 Cao, Zhenfu; Chu, Chuan I.; Shiu, Wai Chee 2 2008 On the diophantine equation \(x^{2n}-Dy^ 2=1\). Zbl 0596.10016 Cao, Zhenfu 2 1986 Proxy blind multi-signature scheme without a secure channel. Zbl 1072.94011 Lu, Rongxing; Cao, Zhenfu; Zhou, Yuan 2 2005 New \((t, n)\) threshold directed signature scheme with provable security. Zbl 1134.94375 Lu, Rongxing; Lin, Xiaodong; Cao, Zhenfu; Shao, Jun; Liang, Xiaohui 2 2008 All-but-one dual projective hashing and its applications. Zbl 1353.94079 Zhang, Zongyang; Chen, Yu; Chow, Sherman S. M.; Hanaoka, Goichiro; Cao, Zhenfu; Zhao, Yunlei 2 2014 Identity based signature scheme based on cubic residues. Zbl 1267.94134 Xing, Dongsheng; Cao, Zhenfu; Dong, Xiaolei 2 2011 Conjugate adjoining problem in braid groups and new design of braid-based signatures. Zbl 1497.81046 Wang, Licheng; Wang, Lihua; Cao, Zhenfu; Yang, Yixian; Niu, Xinxin 2 2010 On constant-round concurrent non-malleable proof systems. Zbl 1260.94038 Cao, Zhenfu; Visconti, Ivan; Zhang, Zongyang 2 2011 On the Diophantine equation \(a^x+b^y=c^z\). I. Zbl 0634.10018 Cao, Zhenfu 1 1987 On the diophantine equation \(x^ p-y^ p=Dz^ 2\). Zbl 0669.10034 Cao, Zhenfu 1 1986 Identity-based threshold proxy signature scheme with known signers. Zbl 1178.94208 Bao, Haiyong; Cao, Zhenfu; Wang, Shengbao 1 2006 Identity-based extractable hash proofs and their applications. Zbl 1319.94056 Chen, Yu; Zhang, Zongyang; Lin, Dongdai; Cao, Zhenfu 1 2012 A new proof of a conjecture of Antoniadis. Zbl 0958.11025 Cao, Zhenfu; Mu, Shanzhi; Dong, Xiaolei 1 2000 Efficient remote user authentication scheme using smart card. Zbl 1088.68597 Lu, Rongxing; Cao, Zhenfu 1 2005 Efficient certificateless threshold signatures without random oracles. Zbl 1217.94130 Yang, Piyi; Cao, Zhenfu; Dong, Xiaolei 1 2010 Identity-based proxy re-encryption with threshold multi-proxy. Zbl 1240.94080 Lou, Shengming; Cao, Zhenfu 1 2010 Non-malleable statistically hiding commitment from any one-way function. Zbl 1267.94110 Zhang, Zongyang; Cao, Zhenfu; Ding, Ning; Ma, Rong 1 2009 An improved deniable authentication protocol. Zbl 1129.94036 Shao, Jun; Cao, Zhenfu; Lu, Rongxing 1 2006 The simultaneous Pell equations \(y^2-Dz^2=1\) and \(x^2-2Dz^2=1\). Zbl 1112.11014 Dong, Xiaolei; Shiu, W. C.; Chu, C. I.; Cao, Zhenfu 1 2007 Finite set theory and its application to cryptology. Zbl 0852.94014 Cao, Zhenfu 1 1996 An ECDLP-based threshold proxy signature scheme using self-certified public key system. Zbl 1184.94262 Xue, Qingshui; Li, Fengying; Zhou, Yuan; Zhang, Jiping; Cao, Zhenfu; Qian, Haifeng 1 2009 Fermat’s type equations in the set of \(2\times 2\) integral matrices. Zbl 0940.11016 Cao, Zhenfu; Grytczuk, Aleksander 1 1998 Two classes of robust threshold key escrow schemes. Zbl 1104.68468 Cao, Zhenfu 1 2003 Existence of APAV\((q,k)\) with \(q\) a prime power \(\equiv 5 \pmod 8\) and \(k\equiv 1 \pmod 4\). Zbl 1047.94013 Chen, Kejun; Cao, Zhenfu; Wu, Dianhua 1 2004 The divisibility of the class number of imaginary quadratic fields. Zbl 1062.11069 Cao, Zhenfu 1 2004 Factoring based proxy signature schemes. Zbl 1096.94033 Xue, Qingshui; Cao, Zhenfu 1 2006 A kind of signature scheme based on class groups of quadratic fields. Zbl 1098.94036 Dong, Xiaolei; Cao, Zhenfu 1 2004 Existence of \(V(9,t)\) vectors. Zbl 1100.05010 Chen, Kejun; Cao, Zhenfu; Wei, Ruizhong 1 2005 Security model of proxy-multi signature schemes. Zbl 1307.94045 Cao, Feng; Cao, Zhenfu 1 2006 On the equation \(\sum ^{s}_{j=1}(1/x_ j)+(1/(x_ 1\,\dots \,x_ s))=1\) and Znám’s problem. Zbl 0621.10013 Cao, Zhenfu; Liu, Rui; Zhang, Liangrui 1 1987 On the diophantine equation \({(ax^ m-1) \over{} (abx-1)} = by^ 2\). Zbl 0741.11019 Cao, Zhenfu 1 1991 On the divisibility of the class number of imaginary quadratic fields. Zbl 0791.11057 Cao, Zhenfu 1 1994 Concurrent non-malleable statistically hiding commitment. Zbl 1244.94041 Zhang, Zongyang; Cao, Zhenfu 1 2012 Fully collusion-resistant traceable key-policy attribute-based encryption with sub-linear size ciphertexts. Zbl 1403.94070 Liu, Zhen; Cao, Zhenfu; Wong, Duncan S. 1 2015 Black-box separations of hash-and-sign signatures in the non-programmable random oracle model. Zbl 1338.94096 Zhang, Zongyang; Chen, Yu; Chow, Sherman S. M.; Hanaoka, Goichiro; Cao, Zhenfu; Zhao, Yunlei 1 2015 Tight security analysis of 3-round key-alternating cipher with a single permutation. Zbl 1511.94160 Wu, Yusai; Yu, Liqing; Cao, Zhenfu; Dong, Xiaolei 4 2020 Discrete terminal sliding mode repetitive control for a linear actuator with nonlinear friction and uncertainties. Zbl 1426.93044 Mitrevska, M.; Cao, Z.; Zheng, J.; Kurniawan, E.; Man, Z. 3 2019 Efficient collision attack frameworks for RIPEMD-160. Zbl 1509.94112 Liu, Fukang; Dobraunig, Christoph; Mendel, Florian; Isobe, Takanori; Wang, Gaoli; Cao, Zhenfu 3 2019 Another generalization of Menon’s identity. Zbl 1392.11004 Zhao, Xiao-Peng; Cao, Zhen-Fu 17 2017 Efficient IBE with tight reduction to standard assumption in the multi-challenge setting. Zbl 1407.94111 Gong, Junqing; Dong, Xiaolei; Chen, Jie; Cao, Zhenfu 18 2016 Extended nested dual system groups, revisited. Zbl 1388.94057 Gong, Junqing; Chen, Jie; Dong, Xiaolei; Cao, Zhenfu; Tang, Shaohua 13 2016 Extended dual system group and shorter unbounded hierarchical identity based encryption. Zbl 1348.94050 Gong, Junqing; Cao, Zhenfu; Tang, Shaohua; Chen, Jie 7 2016 Fully collusion-resistant traceable key-policy attribute-based encryption with sub-linear size ciphertexts. Zbl 1403.94070 Liu, Zhen; Cao, Zhenfu; Wong, Duncan S. 1 2015 Black-box separations of hash-and-sign signatures in the non-programmable random oracle model. Zbl 1338.94096 Zhang, Zongyang; Chen, Yu; Chow, Sherman S. M.; Hanaoka, Goichiro; Cao, Zhenfu; Zhao, Yunlei 1 2015 Post-challenge leakage in public-key encryption. Zbl 1335.94086 Zhang, Zongyang; Chow, Sherman S. M.; Cao, Zhenfu 1 2015 Large universe ciphertext-policy attribute-based encryption with white-box traceability. Zbl 1443.94076 Ning, Jianting; Cao, Zhenfu; Dong, Xiaolei; Wei, Lifei; Lin, Xiaodong 5 2014 All-but-one dual projective hashing and its applications. Zbl 1353.94079 Zhang, Zongyang; Chen, Yu; Chow, Sherman S. M.; Hanaoka, Goichiro; Cao, Zhenfu; Zhao, Yunlei 2 2014 Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption. Zbl 1278.94059 Shao, Jun; Cao, Zhenfu 11 2012 Anonymous identity-based hash proof system and its applications. Zbl 1303.94074 Chen, Yu; Zhang, Zongyang; Lin, Dongdai; Cao, Zhenfu 7 2012 New directions of modern cryptography. Zbl 1264.94002 Cao, Zhenfu 3 2012 Identity-based extractable hash proofs and their applications. Zbl 1319.94056 Chen, Yu; Zhang, Zongyang; Lin, Dongdai; Cao, Zhenfu 1 2012 Concurrent non-malleable statistically hiding commitment. Zbl 1244.94041 Zhang, Zongyang; Cao, Zhenfu 1 2012 New constructions of public-key encryption schemes from conjugacy search problems. Zbl 1295.94148 Wang, Lihua; Wang, Licheng; Cao, Zhenfu; Okamoto, Eiji; Shao, Jun 6 2011 Fuzzy identity based signature with applications to biometric authentication. Zbl 1264.94111 Yang, Piyi; Cao, Zhenfu; Dong, Xiaolei 4 2011 Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles. Zbl 1477.68061 Liu, Zhen; Cao, Zhenfu; Huang, Qiong; Wong, Duncan S.; Yuen, Tsz Hon 3 2011 Identity based signature scheme based on cubic residues. Zbl 1267.94134 Xing, Dongsheng; Cao, Zhenfu; Dong, Xiaolei 2 2011 On constant-round concurrent non-malleable proof systems. Zbl 1260.94038 Cao, Zhenfu; Visconti, Ivan; Zhang, Zongyang 2 2011 Threshold proxy re-signature. Zbl 1305.94093 Yang, Piyi; Cao, Zhenfu; Dong, Xiaolei 1 2011 Proxy re-encryption with keyword search. Zbl 1191.94100 Shao, Jun; Cao, Zhenfu; Liang, Xiaohui; Lin, Huang 11 2010 Multi-use and unidirectional identity-based proxy re-encryption schemes. Zbl 1194.94194 Wang, Hongbing; Cao, Zhenfu; Wang, Licheng 10 2010 Secure threshold multi authority attribute based encryption without a central authority. Zbl 1191.94095 Lin, Huang; Cao, Zhenfu; Liang, Xiaohui; Shao, Jun 7 2010 Constant-round concurrent non-malleable statistically binding commitments and decommitments. Zbl 1279.94059 Cao, Zhenfu; Visconti, Ivan; Zhang, Zongyang 5 2010 Conjugate adjoining problem in braid groups and new design of braid-based signatures. Zbl 1497.81046 Wang, Licheng; Wang, Lihua; Cao, Zhenfu; Yang, Yixian; Niu, Xinxin 2 2010 Efficient certificateless threshold signatures without random oracles. Zbl 1217.94130 Yang, Piyi; Cao, Zhenfu; Dong, Xiaolei 1 2010 Identity-based proxy re-encryption with threshold multi-proxy. Zbl 1240.94080 Lou, Shengming; Cao, Zhenfu 1 2010 CCA-secure proxy re-encryption without pairings. Zbl 1227.94065 Shao, Jun; Cao, Zhenfu 19 2009 A secure identity-based proxy multi-signature scheme. Zbl 1156.94337 Cao, Feng; Cao, Zhenfu 17 2009 An improved identity-based key agreement protocol and its security proof. Zbl 1156.94388 Wang, Shengbao; Cao, Zhenfu; Choo, Kim-Kwang Raymond; Wang, Lihua 8 2009 Spatial encryption under simpler assumption. Zbl 1267.94111 Zhou, Muxin; Cao, Zhenfu 6 2009 A secure identity-based multi-proxy signature scheme. Zbl 1162.68426 Cao, Feng; Cao, Zhenfu 4 2009 Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode. Zbl 1181.94115 Wang, Shengbao; Cao, Zhenfu; Cheng, Zhaohui; Choo, Kim-Kwang Raymond 3 2009 Non-malleable statistically hiding commitment from any one-way function. Zbl 1267.94110 Zhang, Zongyang; Cao, Zhenfu; Ding, Ning; Ma, Rong 1 2009 An ECDLP-based threshold proxy signature scheme using self-certified public key system. Zbl 1184.94262 Xue, Qingshui; Li, Fengying; Zhou, Yuan; Zhang, Jiping; Cao, Zhenfu; Qian, Haifeng 1 2009 Secure threshold multi authority attribute based encryption without a central authority. Zbl 1203.94112 Lin, Huang; Cao, Zhenfu; Liang, Xiaohui; Shao, Jun 9 2008 Designing efficient proxy signature schemes for mobile communication. Zbl 1137.94010 Lu, Rongxing; Dong, Xiaolei; Cao, Zhenfu 4 2008 Short group signature without random oracles. Zbl 1285.94107 Liang, Xiaohui; Cao, Zhenfu; Shao, Jun; Lin, Huang 2 2008 The exponential Diophantine equation \(AX^2+BY^2=\lambda k^Z\) and its applications. Zbl 1162.11019 Cao, Zhenfu; Chu, Chuan I.; Shiu, Wai Chee 2 2008 New \((t, n)\) threshold directed signature scheme with provable security. Zbl 1134.94375 Lu, Rongxing; Lin, Xiaodong; Cao, Zhenfu; Shao, Jun; Liang, Xiaohui 2 2008 A simple deniable authentication protocol based on the Diffie-Hellman algorithm. Zbl 1158.68008 Lu, Rongxing; Lin, Xiaodong; Cao, Zhenfu; Qin, Liuquan; Liang, Xiaohui 1 2008 Simulatability and security of certificateless threshold signatures. Zbl 1125.94039 Wang, Licheng; Cao, Zhenfu; Li, Xiangxue; Qian, Haifeng 22 2007 Proxy re-signature schemes without random oracles. Zbl 1153.94460 Shao, Jun; Cao, Zhenfu; Wang, Licheng; Liang, Xiaohui 6 2007 How to construct secure proxy cryptosystem. Zbl 1142.94364 Zhou, Yuan; Fang, Binxing; Cao, Zhenfu; Yun, Xiaochun; Cheng, Xiaoming 5 2007 Identity-based signature scheme based on quadratic residues. Zbl 1142.94009 Chai, Zhenchuan; Cao, Zhenfu; Dong, Xiaolei 3 2007 A certificate-based proxy cryptosystem with revocable proxy decryption power. Zbl 1153.94436 Wang, Lihua; Shao, Jun; Cao, Zhenfu; Mambo, Masahiro; Yamamura, Akihiro 3 2007 Survey of information security. Zbl 1142.94013 Shen, Changxiang; Zhang, Huangguo; Feng, Dengguo; Cao, Zhenfu; Huang, Jiwu 2 2007 Transitive signatures from braid groups. Zbl 1153.94466 Wang, Licheng; Cao, Zhenfu; Zheng, Shihui; Huang, Xiaofang; Yang, Yixian 2 2007 The simultaneous Pell equations \(y^2-Dz^2=1\) and \(x^2-2Dz^2=1\). Zbl 1112.11014 Dong, Xiaolei; Shiu, W. C.; Chu, C. I.; Cao, Zhenfu 1 2007 Efficient ID-based multi-receiver threshold decryption. Zbl 1202.94176 Chai, Zhenchuan; Cao, Zhenfu; Dong, Xiaolei 1 2007 Efficient and provably secure multi-receiver identity-based signcryption. Zbl 1176.94037 Duan, Shanshan; Cao, Zhenfu 8 2006 Combinatorial characterizations of one-coincidence frequency-hopping sequences. Zbl 1205.94018 Cao, Zhenfu; Ge, Gennian; Miao, Ying 4 2006 Efficient certificateless authenticated key agreement protocol from pairings. Zbl 1111.94332 Wang, Shengbao; Cao, Zhenfu; Wang, Licheng 3 2006 How to compute modular exponentiation with large operators based on the right-to-left binary algorithm. Zbl 1092.68118 Sun, Da-Zhi; Cao, Zhen-Fu; Sun, Yu 2 2006 Identity-based threshold proxy signature scheme with known signers. Zbl 1178.94208 Bao, Haiyong; Cao, Zhenfu; Wang, Shengbao 1 2006 An improved deniable authentication protocol. Zbl 1129.94036 Shao, Jun; Cao, Zhenfu; Lu, Rongxing 1 2006 Factoring based proxy signature schemes. Zbl 1096.94033 Xue, Qingshui; Cao, Zhenfu 1 2006 Security model of proxy-multi signature schemes. Zbl 1307.94045 Cao, Feng; Cao, Zhenfu 1 2006 Super-simple balanced incomplete block designs with block size 4 and index 6. Zbl 1063.05019 Chen, Kejun; Cao, Zhenfu; Wei, Ruizhong 26 2005 A new efficient \((t,n)\) verifiable multi-secret sharing (VMSS) based on YCH scheme. Zbl 1076.94011 Shao, Jun; Cao, Zhenfu 14 2005 Designated verifier proxy signature scheme with message recovery. Zbl 1076.94032 Lu, Rongxing; Cao, Zhenfu 4 2005 Constructing secure proxy cryptosystem. Zbl 1151.94593 Zhou, Yuan; Cao, Zhenfu; Chai, Zhenchuan 4 2005 Provably secure proxy-protected signature schemes based on factoring. Zbl 1072.94013 Zhou, Yuan; Cao, Zhenfu; Lu, Rongxing 4 2005 Cryptanalysis of Li-Tzeng-Hwang’s improved signature schemes based on factoring and discrete logarithms. Zbl 1075.94015 Qian, Haifeng; Cao, Zhenfu; Bao, Haiyong 4 2005 A new deniable authentication protocol from bilinear pairings. Zbl 1076.94031 Lu, Rongxing; Cao, Zhenfu 3 2005 Threshold undeniable signature scheme based on conic. Zbl 1074.94009 Lu, Rong Xing; Cao, Zhen Fu; Zhou, Yuan 3 2005 A robust \((k,n)+1\) threshold proxy signature scheme based on factoring. Zbl 1075.94010 Lu, Rongxing; Cao, Zhenfu; Zhu, Haojin 3 2005 Robust ID-based threshold signcryption scheme from pairings. Zbl 1091.94505 Duan, Shanshan; Cao, Zhenfu; Lu, Rongxing 2 2005 Proxy blind multi-signature scheme without a secure channel. Zbl 1072.94011 Lu, Rongxing; Cao, Zhenfu; Zhou, Yuan 2 2005 Efficient remote user authentication scheme using smart card. Zbl 1088.68597 Lu, Rongxing; Cao, Zhenfu 1 2005 Existence of \(V(9,t)\) vectors. Zbl 1100.05010 Chen, Kejun; Cao, Zhenfu; Wei, Ruizhong 1 2005 Existence of APAV\((q,k)\) with \(q\) a prime power \(\equiv 5 \pmod 8\) and \(k\equiv 1 \pmod 4\). Zbl 1047.94013 Chen, Kejun; Cao, Zhenfu; Wu, Dianhua 1 2004 The divisibility of the class number of imaginary quadratic fields. Zbl 1062.11069 Cao, Zhenfu 1 2004 A kind of signature scheme based on class groups of quadratic fields. Zbl 1098.94036 Dong, Xiaolei; Cao, Zhenfu 1 2004 A new threshold proxy signature scheme from bilinear pairings. Zbl 1187.94035 Qian, Haifeng; Cao, Zhenfu; Xue, Qingshui 1 2004 An application of a lower bound for linear forms in two logarithms to the Terai-Jeśmanowicz conjecture. Zbl 1031.11020 Cao, Zhenfu; Dong, Xiaolei 10 2003 Nonrepudiable proxy multi-signature scheme. Zbl 1046.68050 Li, JiGuo; Cao, ZhenFu; Zhang, YiChen 4 2003 Two classes of robust threshold key escrow schemes. Zbl 1104.68468 Cao, Zhenfu 1 2003 On the Terai-Jeśmanowicz conjecture. Zbl 1012.11025 Cao, Zhenfu; Dong, Xiaolei 4 2002 A new conjecture concerning the Diophantine equation \(x^2+b^y=c^z\). Zbl 1093.11022 Cao, Zhenfu; Dong, Xiaolei; Li, Zhong 4 2002 On simple \(K_4\)-groups. Zbl 0989.20017 Bugeaud, Yann; Cao, Zhenfu; Mignotte, Maurice 29 2001 Diophantine equations and class numbers of real quadratic fields. Zbl 1014.11069 Dong, Xiaolei; Cao, Zhenfu 3 2001 The Diophantine equation \(x^2+b^y=c^z\). Zbl 0987.11020 Cao, Zhenfu; Dong, Xiaolei 2 2001 On the Diophantine equation \(x^{p}+2^{2m}=py^{2}\). Zbl 1050.11037 Cao, Zhenfu 3 2000 The Terai-Jeśmanowicz conjecture on the equation \(a^x+b^y=c^z\). Zbl 0987.11021 Dong, Xiaolei; Cao, Zhenfu 3 2000 A new proof of a conjecture of Antoniadis. Zbl 0958.11025 Cao, Zhenfu; Mu, Shanzhi; Dong, Xiaolei 1 2000 A note on the diophantine equation \(a^x+b^y=c^z\). Zbl 0946.11009 Cao, Zhenfu 25 1999 The diophantine equations \(x^4-y^4=z^p\) and \(x^4-1=dy^q\). Zbl 0928.11018 Cao, Zhenfu 4 1999 A conic analogue of RSA cryptosystems and some improved RSA cryptosystems. Zbl 1076.94524 Cao, Zhenfu 2 1999 On Terai’s conjecture. Zbl 0924.11024 Cao, Zhenfu; Dong, Xiaolei 8 1998 Fermat’s type equations in the set of \(2\times 2\) integral matrices. Zbl 0940.11016 Cao, Zhenfu; Grytczuk, Aleksander 1 1998 Finite set theory and its application to cryptology. Zbl 0852.94014 Cao, Zhenfu 1 1996 On the divisibility of the class number of imaginary quadratic fields. Zbl 0791.11057 Cao, Zhenfu 1 1994 A new type of integral trees of diameter 5 and diameter 6. Zbl 0731.05012 Cao, Zhenfu 4 1991 A generalization of the Schinzel-Sierpiński system of equations. Zbl 0971.11503 Cao, Zhenfu 3 1991 On the diophantine equation \({(ax^ m-1) \over{} (abx-1)} = by^ 2\). Zbl 0741.11019 Cao, Zhenfu 1 1991 Introduction to diophantine equations. Zbl 0849.11029 Cao, Zhenfu 4 1989 ...and 5 more Documents all cited Publications top 5 cited Publications all top 5 Cited by 707 Authors 38 Cao, Zhenfu 10 Chen, Kejun 10 Dong, Xiaolei 10 Mu, Yi 10 Shao, Jun 10 Weng, Jian 9 Terai, Nobuhiro 8 Miyazaki, Takafumi 8 Susilo, Willy 8 Yang, Bo 7 Abel, R. Julian R. 7 Chen, Jie 7 Gong, Junqing 7 Lu, Rongxing 6 Deng, Robert Huijie 6 Liang, Xiaohui 6 Qian, Haifeng 6 Wang, Licheng 6 Wei, Ruizhong 6 Zhang, Yong 5 Chen, Guangzhou 5 Hu, Yupu 5 Huang, Xinyi 5 Shi, Wujie 5 Waters, Brent 5 Wee, Hoeteck 5 Xie, Shucui 5 Zhang, Jianzhong 5 Zhang, Mingwu 4 Cao, Haitao 4 Chen, Kefei 4 Deng, Lunzhi 4 Hanaoka, Goichiro 4 Kim, Daeyeoul 4 Kondrat’ev, Anatoliĭ Semenovich 4 Li, Yan 4 Long, Yu 4 Pan, Jiaxin 4 Wu, Dianhua 4 Yu, Huangsheng 4 Zhang, Zongyang 4 Zhou, Yanwei 3 Bennett, Frank E. 3 Chen, Jingyuan 3 Chen, Yu 3 Chow, Sherman S. M. 3 Datta, Pratish 3 Emura, Keita 3 Guo, Fuchun 3 Guo, Songtao 3 Ji, Chungang 3 Komargodski, Ilan 3 Lai, Junzuo 3 Lai, Qiqi 3 Langrehr, Roman 3 Le, Maohua 3 Li, Fagen 3 Li, Jiguo 3 Li, Xueliang 3 Liao, Xiaofeng 3 Lin, Han-Yu 3 Lin, Huang 3 Lin, Xiaodong 3 Matsuda, Takahiro 3 Nishimaki, Ryo 3 Qin, Baodong 3 Takagi, Tsuyoshi 3 Tomida, Junichi 3 Tóth, László 3 Wang, Huaxiong 3 Wang, Ligong 3 Watanabe, Yohei 3 Wen, Qiaoyan 3 Wu, Qianhong 3 Wu, Tzong-Sun 3 Xia, Zhe 3 Xu, Chunxiang 3 Xue, Qingshui 3 Zeng, Jiwen 3 Zheng, Dong 3 Zhou, Yuan 2 Al-Hazaimeh, Obaida M. 2 Ashrafi, Ali Reza 2 Au, Man Ho 2 Bao, Feng 2 Boostan, Mahsa 2 Cao, Hai-Jing 2 Chandran, Arya 2 Chen, Guiyun 2 Chu, Cheng-Kang 2 Ciampi, Michele 2 Darafsheh, Mohammad Reza 2 Deng, Hua 2 Deng, Moujie 2 Dutta, Ratna 2 Fang, Liming 2 Fu, Fangwei 2 Fu, Ruiqin 2 Gao, Ronghai 2 Gay, Romain ...and 607 more Authors all top 5 Cited in 110 Serials 62 Information Sciences 17 Theoretical Computer Science 12 Designs, Codes and Cryptography 11 International Journal of Theoretical Physics 9 Discrete Mathematics 6 Bulletin of the Australian Mathematical Society 6 Applied Mathematics and Computation 6 Journal of Statistical Planning and Inference 6 Journal of Cryptology 6 International Journal of Foundations of Computer Science 6 Science in China. Series F 5 Computers & Mathematics with Applications 5 Journal of Number Theory 5 Proceedings of the Japan Academy. Series A 5 Soft Computing 5 Journal of Discrete Mathematical Sciences & Cryptography 4 Discrete Applied Mathematics 4 Information Processing Letters 4 Journal of Computer and System Sciences 4 Acta Mathematica Hungarica 4 Bulletin of the Iranian Mathematical Society 4 Proceedings of the Indian Academy of Sciences. Mathematical Sciences 4 Journal of Combinatorial Designs 4 Mathematical Problems in Engineering 4 Wuhan University Journal of Natural Sciences (WUJNS) 4 Acta Mathematica Sinica. English Series 4 Journal of Applied Mathematics 4 International Journal of Number Theory 4 Advances in Mathematics of Communications 4 Science China. Information Sciences 3 Indian Journal of Pure & Applied Mathematics 3 Czechoslovak Mathematical Journal 3 Functiones et Approximatio. Commentarii Mathematici 3 Journal of Algebra 3 Graphs and Combinatorics 3 International Journal of Computer Mathematics 3 The Ramanujan Journal 3 Proceedings of the Steklov Institute of Mathematics 3 AIMS Mathematics 2 Mathematics of Computation 2 Bulletin of the Korean Mathematical Society 2 Journal of Algebraic Combinatorics 2 Taiwanese Journal of Mathematics 2 Journal of Systems Science and Complexity 2 Journal of Algebra and its Applications 2 Mediterranean Journal of Mathematics 2 Journal of Shanghai Jiaotong University (Science) 2 Frontiers of Mathematics in China 1 Communications in Algebra 1 Electronics Letters 1 Israel Journal of Mathematics 1 Mathematical Notes 1 Periodica Mathematica Hungarica 1 Rocky Mountain Journal of Mathematics 1 Algebra and Logic 1 Archiv der Mathematik 1 Colloquium Mathematicum 1 Computing 1 Gaṇita 1 Glasgow Mathematical Journal 1 Journal of Computational and Applied Mathematics 1 Journal of the Korean Mathematical Society 1 Journal of Pure and Applied Algebra 1 Mathematica Slovaca 1 Opsearch 1 Proceedings of the American Mathematical Society 1 Proceedings of the Edinburgh Mathematical Society. Series II 1 Rendiconti del Seminario Matematico della Università di Padova 1 Ricerche di Matematica 1 Siberian Mathematical Journal 1 Information and Computation 1 Mathematical and Computer Modelling 1 International Journal of Algebra and Computation 1 Expositiones Mathematicae 1 Indagationes Mathematicae. New Series 1 SUT Journal of Mathematics 1 Applied Mathematics. Series B (English Edition) 1 Finite Fields and their Applications 1 The Electronic Journal of Combinatorics 1 Discussiones Mathematicae. Graph Theory 1 Science in China. Series E 1 Theory of Computing Systems 1 Nonlinear Dynamics 1 Honam Mathematical Journal 1 Algebras and Representation Theory 1 Integers 1 Bulletin of the Malaysian Mathematical Sciences Society. Second Series 1 Sādhanā 1 Journal of Applied Mathematics and Computing 1 Quantum Information Processing 1 Algebra and Discrete Mathematics 1 ACM Transactions on Information and System Security (TISSEC) 1 International Journal of Wavelets, Multiresolution and Information Processing 1 International Journal of Quantum Information 1 Parallel Processing Letters 1 Mathematical Biosciences and Engineering 1 Sibirskie Èlektronnye Matematicheskie Izvestiya 1 Journal of Zhejiang University. Science A 1 The Journal of Prime Research in Mathematics 1 Journal of Mathematical Cryptology ...and 10 more Serials all top 5 Cited in 20 Fields 256 Information and communication theory, circuits (94-XX) 87 Number theory (11-XX) 76 Computer science (68-XX) 44 Combinatorics (05-XX) 37 Group theory and generalizations (20-XX) 14 Quantum theory (81-XX) 9 Algebraic geometry (14-XX) 6 Statistics (62-XX) 2 Special functions (33-XX) 2 Dynamical systems and ergodic theory (37-XX) 2 Geometry (51-XX) 2 Operations research, mathematical programming (90-XX) 1 General algebraic systems (08-XX) 1 Linear and multilinear algebra; matrix theory (15-XX) 1 Associative rings and algebras (16-XX) 1 Topological groups, Lie groups (22-XX) 1 Harmonic analysis on Euclidean spaces (42-XX) 1 Manifolds and cell complexes (57-XX) 1 Numerical analysis (65-XX) 1 Game theory, economics, finance, and other social and behavioral sciences (91-XX) Citations by Year