Follow
Fangguo Zhang
Fangguo Zhang
Verified email at mail.sysu.edu.cn - Homepage
Title
Cited by
Cited by
Year
ID-based blind signature and ring signature from pairings
F Zhang, K Kim
Advances in cryptology—ASIACRYPT 2002, 533-547, 2002
7942002
An efficient signature scheme from bilinear pairings and its applications
F Zhang, R Safavi-Naini, W Susilo
Public Key Cryptography–PKC 2004: 7th International Workshop on Theory and …, 2004
7142004
Efficient ID-based blind signature and proxy signature from bilinear pairings
F Zhang, K Kim
ACISP 2003, 218-219, 2003
4102003
An efficient public key encryption with conjunctive-subset keywords search
B Zhang, F Zhang
Journal of Network and Computer Applications 34 (1), 262-267, 2011
2732011
Efficient verifiably encrypted signature and partially blind signature from bilinear pairings
F Zhang, R Safavi-Naini, W Susilo
Progress in Cryptology-INDOCRYPT 2003: 4th International Conference on …, 2003
1952003
Identity-based strong designated verifier signature schemes
W Susilo, F Zhang, Y Mu
ACISP 2004, 313-324, 2004
1932004
A new ID-based group signature scheme from bilinear pairings
X Chen, F Zhang, K Kim
Cryptology ePrint Archive, 2003
1842003
New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairing
F Zhang, R Safavi-Naini, CY Lin
Cryptology ePrint Archive, 2003
1552003
Chameleon hashing without key exposure
X Chen, F Zhang, K Kim
Information Security: 7th International Conference, ISC 2004, Palo Alto, CA …, 2004
1342004
ID-based one round authenticated tripartite key agreement protocol with pairings
F Zhang, S Liu, K Kim
Cryptology ePrint Archive, 2002
1252002
Efficient generic on-line/off-line signatures without key exposure
X Chen, F Zhang, W Susilo, Y Mu
Applied Cryptography and Network Security: 5th International Conference …, 2007
1142007
Perfect concurrent signature schemes
W Susilo, Y Mu, F Zhang
Information and Communications Security: 6th International Conference, ICICS …, 2004
1112004
A note on the Ate pairing
CA Zhao, F Zhang, J Huang
International Journal of Information Security 7 (6), 379-382, 2008
962008
ID-based restrictive partially blind signatures and applications
X Chen, F Zhang, S Liu
Journal of Systems and Software 80 (2), 164-171, 2007
932007
Privacy preserving multi-party computation delegation for deep learning in cloud computing
X Ma, F Zhang, X Chen, J Shen
Information Sciences 459, 103-116, 2018
912018
Symmetric-key based proofs of retrievability supporting public verification
C Guan, K Ren, F Zhang, F Kerschbaum, J Yu
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
882015
Identity-based partial message recovery signatures (or how to shorten ID-based signatures)
F Zhang, W Susilo, Y Mu
Financial Cryptography and Data Security: 9th International Conference, FC …, 2005
842005
A short proxy signature scheme: efficient authentication in the ubiquitous world
X Huang, Y Mu, W Susilo, F Zhang, X Chen
Embedded and Ubiquitous Computing–EUC 2005 Workshops: EUC 2005 Workshops …, 2005
822005
ID-based chameleon hashes from bilinear pairings
F Zhang, R Safavi-Naini, W Susilo
Cryptology ePrint Archive, 2003
822003
Blockchain-based searchable symmetric encryption scheme
H Li, H Tian, F Zhang, J He
Computers & Electrical Engineering 73, 32-45, 2019
782019
The system can't perform the operation now. Try again later.
Articles 1–20