Fangguo Zhang
Fangguo Zhang
Verified email at - Homepage
Cited by
Cited by
ID-based blind signature and ring signature from pairings
F Zhang, K Kim
Advances in cryptology—ASIACRYPT 2002, 533-547, 2002
An efficient signature scheme from bilinear pairings and its applications
F Zhang, R Safavi-Naini, W Susilo
Public Key Cryptography–PKC 2004: 7th International Workshop on Theory and …, 2004
Efficient ID-based blind signature and proxy signature from bilinear pairings
F Zhang, K Kim
ACISP 2003, 218-219, 2003
An efficient public key encryption with conjunctive-subset keywords search
B Zhang, F Zhang
Journal of Network and Computer Applications 34 (1), 262-267, 2011
New ID-based group signature from pairings
X Chen, F Zhang, K Kim
Journal of Electronics (China) 23 (6), 892-900, 2006
Identity-based strong designated verifier signature schemes
W Susilo, F Zhang, Y Mu
ACISP 2004, 313-324, 2004
Efficient verifiably encrypted signature and partially blind signature from bilinear pairings
F Zhang, R Safavi-Naini, W Susilo
Progress in Cryptology-INDOCRYPT 2003: 4th International Conference on …, 2003
New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairing
F Zhang, R Safavi-Naini, CY Lin
Cryptology ePrint Archive, 2003
Chameleon hashing without key exposure
X Chen, F Zhang, K Kim
International Conference on Information Security, 87-98, 2004
ID-based one round authenticated tripartite key agreement protocol with pairings
F Zhang, S Liu, K Kim
Cryptology ePrint Archive, 2002
Efficient generic on-line/off-line signatures without key exposure
X Chen, F Zhang, W Susilo, Y Mu
Applied Cryptography and Network Security: 5th International Conference …, 2007
Privacy preserving multi-party computation delegation for deep learning in cloud computing
X Ma, F Zhang, X Chen, J Shen
Information Sciences 459, 103-116, 2018
Perfect concurrent signature schemes
W Susilo, Y Mu, F Zhang
International Conference on Information and Communications Security, 14-26, 2004
A note on the Ate pairing
CA Zhao, F Zhang, J Huang
International Journal of Information Security 7 (6), 379-382, 2008
Blockchain-based searchable symmetric encryption scheme
H Li, H Tian, F Zhang, J He
Computers & Electrical Engineering 73, 32-45, 2019
ID-based restrictive partially blind signatures and applications
X Chen, F Zhang, S Liu
Journal of Systems and Software 80 (2), 164-171, 2007
Symmetric-key based proofs of retrievability supporting public verification
C Guan, K Ren, F Zhang, F Kerschbaum, J Yu
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
ID-based chameleon hashes from bilinear pairings
F Zhang, R Safavi-Naini, W Susilo
Cryptology ePrint Archive, 2003
Identity-based partial message recovery signatures (or how to shorten ID-based signatures)
F Zhang, W Susilo, Y Mu
Financial Cryptography and Data Security: 9th International Conference, FC …, 2005
Verifiable searchable symmetric encryption from indistinguishability obfuscation
R Cheng, J Yan, C Guan, F Zhang, K Ren
Proceedings of the 10th ACM symposium on information, computer and …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20