2009 |
95 | EE | Xiaohui Liang,
Zhenfu Cao,
Huang Lin,
Jun Shao:
Attribute based proxy re-encryption with delegating capabilities.
ASIACCS 2009: 276-286 |
94 | EE | Hai Huang,
Zhenfu Cao:
An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem.
ASIACCS 2009: 333-342 |
93 | EE | Xiaohui Liang,
Zhenfu Cao,
Huang Lin,
Dongsheng Xing:
Provably secure and efficient bounded ciphertext policy attribute based encryption.
ASIACCS 2009: 343-352 |
92 | EE | Jun Shao,
Zhenfu Cao:
CCA-Secure Proxy Re-encryption without Pairings.
Public Key Cryptography 2009: 357-376 |
91 | EE | Feng Cao,
Zhenfu Cao:
A secure identity-based proxy multi-signature scheme.
Inf. Sci. 179(3): 292-302 (2009) |
90 | EE | Shengbao Wang,
Zhenfu Cao,
Kim-Kwang Raymond Choo,
Lihua Wang:
An improved identity-based key agreement protocol and its security proof.
Inf. Sci. 179(3): 307-318 (2009) |
89 | EE | Xiaolei Dong,
Haifeng Qian,
Zhenfu Cao:
Provably secure RSA-type signature based on conic curve.
Wireless Communications and Mobile Computing 9(2): 217-225 (2009) |
2008 |
88 | EE | Congkai Sun,
Bin Gao,
Zhenfu Cao,
Hang Li:
HTM: A Topic Model for Hypertexts.
EMNLP 2008: 514-522 |
87 | EE | Liuquan Qin,
Zhenfu Cao,
Xiaolei Dong:
Multi-Receiver Identity-Based Encryption in Multiple PKG Environment.
GLOBECOM 2008: 1862-1866 |
86 | EE | Huang Lin,
Zhenfu Cao,
Xiaohui Liang,
Jun Shao:
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority.
INDOCRYPT 2008: 426-436 |
85 | EE | Piyi Yang,
Zhenfu Cao,
Xiaolei Dong:
Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model.
Inscrypt 2008: 201-216 |
84 | EE | Rongxing Lu,
Xiaodong Lin,
Haojin Zhu,
Pin-Han Ho,
Xuemin Shen,
Zhenfu Cao:
A New Dynamic Group Key Management Scheme with Low Rekeying Cost.
WCNC 2008: 3243-3248 |
83 | EE | Xiaodong Lin,
Rongxing Lu,
Pin-Han Ho,
Xuemin Shen,
Zhenfu Cao:
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks.
IEEE Transactions on Wireless Communications 7(4): 1389-1399 (2008) |
82 | EE | Rongxing Lu,
Xiaodong Lin,
Zhenfu Cao,
Jun Shao,
Xiaohui Liang:
New (t, n) threshold directed signature scheme with provable security.
Inf. Sci. 178(3): 756-765 (2008) |
81 | EE | Rongxing Lu,
Xiaodong Lin,
Zhenfu Cao,
Liuquan Qin,
Xiaohui Liang:
A simple deniable authentication protocol based on the Diffie-Hellman algorithm.
Int. J. Comput. Math. 85(9): 1315-1323 (2008) |
80 | EE | Licheng Wang,
Zhenfu Cao,
Feng Cao,
Haifeng Qian,
Haiyong Bao:
Biased Bit Commitment and Applications.
J. Inf. Sci. Eng. 24(2): 441-452 (2008) |
79 | EE | Rongxing Lu,
Xiaolei Dong,
Zhenfu Cao:
Designing efficient proxy signature schemes for mobile communication.
Science in China Series F: Information Sciences 51(2): 183-195 (2008) |
78 | EE | Xiaolei Dong,
Zhenfu Cao,
Licheng Wang:
New designing of cryptosystems based on quadratic fields.
Science in China Series F: Information Sciences 51(8): 1106-1116 (2008) |
2007 |
77 | EE | Jun Shao,
Zhenfu Cao,
Licheng Wang,
Rongxing Lu:
Efficient Password-Based Authenticated Key Exchange Without Public Information.
ESORICS 2007: 299-310 |
76 | EE | Xiaodong Lin,
Rongxing Lu,
Haojin Zhu,
Pin-Han Ho,
Xuemin Shen,
Zhenfu Cao:
ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks.
ICC 2007: 1247-1253 |
75 | EE | Xiaohui Liang,
Zhenfu Cao,
Jun Shao,
Huang Lin:
Short Group Signature Without Random Oracles.
ICICS 2007: 69-82 |
74 | EE | Licheng Wang,
Zhenfu Cao,
Shihui Zheng,
Xiaofang Huang,
Yixian Yang:
Transitive Signatures from Braid Groups.
INDOCRYPT 2007: 183-196 |
73 | EE | Jun Shao,
Zhenfu Cao,
Licheng Wang,
Xiaohui Liang:
Proxy Re-signature Schemes Without Random Oracles.
INDOCRYPT 2007: 197-209 |
72 | EE | Lihua Wang,
Jun Shao,
Zhenfu Cao,
Masahiro Mambo,
Akihiro Yamamura:
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power.
INDOCRYPT 2007: 297-311 |
71 | EE | Jun Shao,
Min Feng,
Bin Zhu,
Zhenfu Cao:
An Efficient Certified Email Protocol.
ISC 2007: 145-157 |
70 | EE | Fengying Li,
Qingshui Xue,
Zhenfu Cao:
Crypanalysis of Kuo and Chen's Threshold Proxy Signature Scheme Based on the RSA.
ITNG 2007: 815-818 |
69 | EE | Zhenchuan Chai,
Zhenfu Cao,
Rongxing Lu:
Threshold password authentication against guessing attacks in Ad hoc networks.
Ad Hoc Networks 5(7): 1046-1054 (2007) |
68 | EE | Rongxing Lu,
Zhenfu Cao:
Simple three-party key exchange protocol.
Computers & Security 26(1): 94-97 (2007) |
67 | EE | Rongxing Lu,
Zhenfu Cao,
Xiaolei Dong:
A New Practical Limited Identity-Based Encryption Scheme.
Fundam. Inform. 80(4): 461-474 (2007) |
66 | EE | Yuan Zhou,
Binxing Fang,
Zhenfu Cao,
Xiao-chun Yun,
Xiaoming Cheng:
How to construct secure proxy cryptosystem.
Inf. Sci. 177(19): 4095-4108 (2007) |
65 | EE | Licheng Wang,
Zhenfu Cao,
Xiangxue Li,
Haifeng Qian:
Simulatability and security of certificateless threshold signatures.
Inf. Sci. 177(6): 1382-1394 (2007) |
64 | EE | Rongxing Lu,
Zhenfu Cao,
Shengbao Wang,
Haiyong Bao:
A New ID-Based Deniable Authentication Protocol.
Informatica, Lith. Acad. Sci. 18(1): 67-78 (2007) |
63 | EE | Zhenchuan Chai,
Zhenfu Cao,
Xiaolei Dong:
Efficient ID-Based Multi-Receiver Threshold Decryption.
Int. J. Found. Comput. Sci. 18(5): 987-1004 (2007) |
62 | EE | Zhenchuan Chai,
Zhenfu Cao,
Yuan Zhou:
Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts.
J. Comput. Sci. Technol. 22(1): 103-108 (2007) |
61 | EE | Jun Shao,
Zhenfu Cao,
Rongxing Lu:
Improvement of Yang et al.'s threshold proxy signature scheme.
Journal of Systems and Software 80(2): 172-177 (2007) |
60 | EE | Qin Wang,
Zhenfu Cao:
Identity based proxy multi-signature.
Journal of Systems and Software 80(7): 1023-1029 (2007) |
59 | EE | Zhenchuan Chai,
Zhenfu Cao,
Xiaolei Dong:
Identity-based signature scheme based on quadratic residues.
Science in China Series F: Information Sciences 50(3): 373-380 (2007) |
2006 |
58 | EE | Shanshan Duan,
Zhenfu Cao:
Efficient and Provably Secure Multi-receiver Identity-Based Signcryption.
ACISP 2006: 195-206 |
57 | EE | Zhenchuan Chai,
Zhenfu Cao,
Rongxing Lu:
Remote Authentication with Forward Security.
ATC 2006: 418-427 |
56 | EE | Feng Cao,
Zhenfu Cao:
Security Model of Proxy-Multi Signature Schemes.
CANS 2006: 144-152 |
55 | EE | Rongxing Lu,
Zhenfu Cao,
Xiaolei Dong:
Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque.
CANS 2006: 153-167 |
54 | EE | Shengbao Wang,
Zhenfu Cao,
Haiyong Bao:
Two-Pass ID-Based Authenticated Key Agreement Protocol with Key Confirmation Using Pairings.
IMSCCS (2) 2006: 109-112 |
53 | EE | Haifeng Qian,
Zhenfu Cao,
Licheng Wang,
Sheng Guo:
Cryptanalysis of Chang-Lin-Lam's ID-based Multisignature Scheme.
IMSCCS (2) 2006: 113-116 |
52 | EE | Feng Cao,
Zhenfu Cao:
Cryptanalysis on a Proxy Multi-Signature Scheme.
IMSCCS (2) 2006: 117-120 |
51 | EE | Feng Cao,
Zhenfu Cao,
Licheng Wang:
An Improvement of an Identity-Based Key Issuing Protocol.
IMSCCS (2) 2006: 13-18 |
50 | EE | Zhenchuan Chai,
Zhenfu Cao,
Yuan Zhou:
Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network.
IMSCCS (2) 2006: 148-154 |
49 | EE | Rongxing Lu,
Zhenfu Cao,
Xiaolei Dong,
Renwang Su:
Designated Verifier Proxy Signature Scheme from Bilinear Pairings.
IMSCCS (2) 2006: 40-47 |
48 | EE | Feng Cao,
Zhenfu Cao:
A Proxy-Protected Signature Scheme Based on Finite Automaton.
IMSCCS (2) 2006: 48-55 |
47 | EE | Licheng Wang,
Zhenfu Cao,
Feng Cao,
Haifeng Qian:
Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol.
IMSCCS (2) 2006: 8-12 |
46 | EE | Sheng Guo,
Zhenfu Cao,
Rongxing Lu:
An Efficient ID-Based Multi-proxy Multi-Signature Scheme.
IMSCCS (2) 2006: 81-88 |
45 | EE | Rongxing Lu,
Zhenfu Cao,
Xiaolei Dong,
Renwang Su:
Group Oriented Deniable Authentication Protocol.
IMSCCS (2) 2006: 89-92 |
44 | EE | Yuan Zhou,
Zhenfu Cao,
Zhenchuan Chai:
Identity Based Key Insulated Signature.
ISPEC 2006: 226-234 |
43 | EE | Haiyong Bao,
Zhenfu Cao,
Shengbao Wang:
Identity-Based Threshold Proxy Signature Scheme with Known Signers.
TAMC 2006: 538-546 |
42 | EE | Zhenchuan Chai,
Zhenfu Cao,
Rongxing Lu:
Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy.
WASA 2006: 467-477 |
41 | EE | Jun Shao,
Zhenfu Cao:
A traceable threshold signature scheme with multiple signing policies.
Computers & Security 25(3): 201-206 (2006) |
40 | EE | Zhenfu Cao,
Gennian Ge,
Ying Miao:
Combinatorial characterizations of one-coincidence frequency-hopping sequences.
Des. Codes Cryptography 41(2): 177-184 (2006) |
39 | EE | Lihua Wang,
Zhenfu Cao,
Takeshi Okamoto,
Ying Miao,
Eiji Okamoto:
Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses.
IEICE Transactions 89-A(1): 106-114 (2006) |
38 | EE | Jun Shao,
Zhenfu Cao,
Rongxing Lu:
An improved deniable authentication protocol.
Networks 48(4): 179-181 (2006) |
37 | EE | Zhenfu Cao,
Haojin Zhu,
Rongxing Lu:
Provably secure robust threshold partial blind signature.
Science in China Series F: Information Sciences 49(5): 604-615 (2006) |
36 | EE | Xuemin Shen,
Chuang Lin,
Yan Lindsay Sun,
Jianping Pan,
Peter Langendörfer,
Zhenfu Cao:
Wireless network security.
Wireless Communications and Mobile Computing 6: 269-271 (2006) |
35 | EE | Rongxing Lu,
Zhenfu Cao,
Xiaolei Dong:
Authenticated encryption protocol with perfect forward secrecy for mobile communication.
Wireless Communications and Mobile Computing 6: 273-280 (2006) |
2005 |
34 | EE | Qin Wang,
Zhenfu Cao:
Two Proxy Signcryption Schemes from Bilinear Pairings.
CANS 2005: 161-171 |
33 | EE | Yuan Zhou,
Zhenfu Cao,
Rongxing Lu:
Constructing Secure Warrant-Based Proxy Signcryption Schemes.
CANS 2005: 172-185 |
32 | EE | Haiyong Bao,
Zhenfu Cao,
Haifeng Qian:
On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme.
CANS 2005: 26-34 |
31 | EE | Lichen Wang,
Zhenfu Cao,
Xiangxue Li,
Haifeng Qian:
Certificateless Threshold Signature Schemes.
CIS (2) 2005: 104-109 |
30 | EE | Qin Wang,
Zhenfu Cao:
Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings.
CIS (2) 2005: 167-172 |
29 | EE | Shanshan Duan,
Zhenfu Cao,
Yuan Zhou:
Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme.
CIS (2) 2005: 445-450 |
28 | EE | Yuan Zhou,
Zhenfu Cao,
Zhenchuan Chai:
Constructing Secure Proxy Cryptosystem.
CISC 2005: 150-161 |
27 | EE | Qin Wang,
Zhenfu Cao,
Shengbao Wang:
Formalized Security Model of Multi-Proxy Signature Schemes.
CIT 2005: 668-672 |
26 | EE | Haifeng Qian,
Zhenfu Cao,
Lichen Wang,
Qingshui Xue:
Efficient Non-interactive Deniable Authentication Protocols.
CIT 2005: 673-679 |
25 | EE | Haifeng Qian,
Zhenfu Cao:
A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme.
ISPA Workshops 2005: 323-331 |
24 | EE | Yuan Zhou,
Zhenfu Cao,
Zhenchuan Chai:
An Efficient Proxy-Protected Signature Scheme Based on Factoring.
ISPA Workshops 2005: 332-341 |
23 | EE | Shengbao Wang,
Zhenfu Cao,
Haiyong Bao:
Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings.
ISPA Workshops 2005: 342-349 |
22 | EE | Zhenchuan Chai,
Zhenfu Cao,
Yuan Zhou:
Encryption Based on Reversible Second-Order Cellular Automata.
ISPA Workshops 2005: 350-358 |
21 | EE | Rongxing Lu,
Zhenfu Cao,
Yuan Zhou:
Threshold undeniable signature scheme based on conic.
Applied Mathematics and Computation 162(1): 165-177 (2005) |
20 | EE | Rongxing Lu,
Zhenfu Cao,
Yuan Zhou:
Proxy blind multi-signature scheme without a secure channel.
Applied Mathematics and Computation 164(1): 179-187 (2005) |
19 | EE | Yuan Zhou,
Zhenfu Cao,
Rongxing Lu:
Provably secure proxy-protected signature schemes based on factoring.
Applied Mathematics and Computation 164(1): 83-98 (2005) |
18 | EE | Haifeng Qian,
Zhenfu Cao,
Haiyong Bao:
Cryptanalysis of Li-Tzeng-Hwang's improved signature schemes based on factoring and discrete logarithms.
Applied Mathematics and Computation 166(3): 501-505 (2005) |
17 | EE | Jun Shao,
Zhenfu Cao:
A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme.
Applied Mathematics and Computation 168(1): 135-140 (2005) |
16 | EE | Rongxing Lu,
Zhenfu Cao:
A new deniable authentication protocol from bilinear pairings.
Applied Mathematics and Computation 168(2): 954-961 (2005) |
15 | EE | Rongxing Lu,
Zhenfu Cao:
Designated verifier proxy signature scheme with message recovery.
Applied Mathematics and Computation 169(2): 1237-1246 (2005) |
14 | EE | Haiyong Bao,
Zhenfu Cao,
Rongxing Lu:
Proxy signature scheme using self-certified public keys.
Applied Mathematics and Computation 169(2): 1380-1389 (2005) |
13 | EE | Haiyong Bao,
Zhenfu Cao,
Shengbao Wang:
Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification.
Applied Mathematics and Computation 169(2): 1419-1430 (2005) |
12 | EE | Haifeng Qian,
Zhenfu Cao,
Haiyong Bao:
Security of Pon-Lu-Jeng's Meta-He digital signature schemes.
Applied Mathematics and Computation 170(1): 724-730 (2005) |
11 | EE | Yu Long,
Zhenfu Cao,
Kefei Chen:
A dynamic threshold commercial key escrow scheme based on conic.
Applied Mathematics and Computation 171(2): 972-982 (2005) |
10 | EE | Rongxing Lu,
Zhenfu Cao:
Efficient remote user authentication scheme using smart card.
Computer Networks 49(4): 535-540 (2005) |
9 | EE | Haifeng Qian,
Zhenfu Cao,
Qingshui Xue:
Efficient Pairing-Based Threshold Proxy Signature Scheme with Known Signers.
Informatica, Lith. Acad. Sci. 16(2): 261-274 (2005) |
8 | EE | Haiyong Bao,
Zhenfu Cao,
Shengbao Wang:
Remarks on Wu-Hsu's threshold signature scheme using self-certified public keys.
Journal of Systems and Software 78(1): 56-59 (2005) |
2004 |
7 | EE | Zhenchuan Chai,
Zhenfu Cao:
Factoring-Based Proxy Signature Schemes with Forward-Security.
CIS 2004: 1034-1040 |
6 | EE | Qingshui Xue,
Zhenfu Cao:
Improvement of Multi-Proxy Signature Scheme.
CIT 2004: 450-455 |
5 | EE | Qingshui Xue,
Zhenfu Cao:
A Threshold Proxy Signature Scheme Using Self-Certified Public Keys.
ISPA 2004: 715-724 |
4 | EE | Qingshui Xue,
Zhenfu Cao,
Haifeng Qian:
A Generalized Proxy Signature Scheme Based on the RSA Cryptosystem.
PDCAT 2004: 662-665 |
3 | | Qingshui Xue,
Zhenfu Cao,
Feilong Tang:
An Improved Threshold Proxy Signature Scheme Based on the RSA Cryptosystem.
PDPTA 2004: 901-907 |
2 | EE | Kejun Chen,
Zhenfu Cao,
Dianhua Wu:
Existence of APAV(q, k) with q a prime power =5(mod 8) and k=1(mod 4).
Discrete Mathematics 279(1-3): 153-161 (2004) |
2003 |
1 | EE | Jiguo Li,
Zhenfu Cao,
Yichen Zhang:
Nonrepudiable Proxy Multi-Signature Scheme.
J. Comput. Sci. Technol. 18(3): 399-402 (2003) |