2008 |
52 | EE | Jin Li,
Kwangjo Kim,
Fangguo Zhang,
Duncan S. Wong:
Generic Security-Amplifying Methods of Ordinary Digital Signatures.
ACNS 2008: 224-241 |
51 | EE | Fangguo Zhang,
Xiaofeng Chen,
Baodian Wei:
Efficient designated confirmer signature from bilinear pairings.
ASIACCS 2008: 363-368 |
50 | EE | Xibin Lin,
Changan Zhao,
Fangguo Zhang,
Yanming Wang:
Computing the Ate Pairing on Elliptic Curves with Embedding Degree k = 9.
IEICE Transactions 91-A(9): 2387-2393 (2008) |
49 | EE | Xiaofeng Chen,
Fangguo Zhang,
Haibo Tian,
Baodian Wei,
Willy Susilo,
Yi Mu,
Hyunrok Lee,
Kwangjo Kim:
Efficient generic on-line/off-line (threshold) signatures without key exposure.
Inf. Sci. 178(21): 4192-4203 (2008) |
48 | EE | Changan Zhao,
Fangguo Zhang,
Jiwu Huang:
A note on the Ate pairing.
Int. J. Inf. Sec. 7(6): 379-382 (2008) |
47 | EE | Changan Zhao,
Fangguo Zhang,
Jiwu Huang:
Efficient Tate pairing computation using double-base chains.
Science in China Series F: Information Sciences 51(8): 1096-1105 (2008) |
2007 |
46 | EE | Xiaofeng Chen,
Fangguo Zhang,
Willy Susilo,
Yi Mu:
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure.
ACNS 2007: 18-30 |
45 | EE | Lei Zhang,
Futai Zhang,
Fangguo Zhang:
New Efficient Certificateless Signature Scheme.
EUC Workshops 2007: 692-703 |
44 | EE | Qianhong Wu,
Willy Susilo,
Yi Mu,
Fangguo Zhang:
Efficient Partially Blind Signatures with Provable Security.
ICCSA (3) 2007: 1096-1105 |
43 | EE | Jin Li,
Kwangjo Kim,
Fangguo Zhang,
Xiaofeng Chen:
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature.
ProvSec 2007: 208-217 |
42 | EE | Xiaofeng Chen,
Fangguo Zhang,
Shengli Liu:
ID-based restrictive partially blind signatures and applications.
Journal of Systems and Software 80(2): 164-171 (2007) |
2006 |
41 | EE | Qianhong Wu,
Yi Mu,
Willy Susilo,
Fangguo Zhang:
Efficient Signcryption Without Random Oracles.
ATC 2006: 449-458 |
40 | EE | Jin Li,
Xiaofeng Chen,
Fangguo Zhang,
Yanming Wang:
Generalization of the Selective-ID Security Model for HIBS Protocols.
CIS 2006: 894-902 |
39 | EE | Jin Li,
Fangguo Zhang,
Yanming Wang:
A Strong Identity Based Key-Insulated Cryptosystem.
EUC Workshops 2006: 352-361 |
38 | EE | Jin Li,
Fangguo Zhang,
Yanming Wang:
A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE.
EUC Workshops 2006: 362-371 |
37 | EE | Xiaofeng Chen,
Fangguo Zhang,
Yi Mu,
Willy Susilo:
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings.
Financial Cryptography 2006: 251-265 |
36 | EE | Qianhong Wu,
Willy Susilo,
Yi Mu,
Fangguo Zhang:
Efficient Partially Blind Signatures with Provable Security.
ICCSA (3) 2006: 345-354 |
35 | EE | Qianhong Wu,
Yi Mu,
Willy Susilo,
Fangguo Zhang:
Privately Retrieve Data from Large Databases.
ISPEC 2006: 367-378 |
34 | EE | Qianhong Wu,
Willy Susilo,
Yi Mu,
Fangguo Zhang:
Ad Hoc Group Signatures.
IWSEC 2006: 120-135 |
33 | EE | Fangguo Zhang,
Xiaofeng Chen,
Willy Susilo,
Yi Mu:
A New Signature Scheme Without Random Oracles from Bilinear Pairings.
VIETCRYPT 2006: 67-80 |
2005 |
32 | EE | Victor K. Wei,
Tsz Hon Yuen,
Fangguo Zhang:
Group Signature Where Group Manager, Members and Open Authority Are Identity-Based.
ACISP 2005: 468-480 |
31 | EE | Fangguo Zhang,
Yi Mu,
Willy Susilo:
Reducing Security Overhead for Mobile Networks.
AINA 2005: 398-403 |
30 | EE | Willy Susilo,
Fangguo Zhang,
Yi Mu:
Privacy-Enhanced Internet Storage.
AINA 2005: 603-608 |
29 | EE | Xiaofeng Chen,
Fangguo Zhang,
Shengli Liu:
ID-Based Restrictive Partially Blind Signatures.
CIS (2) 2005: 117-124 |
28 | EE | Xinyi Huang,
Yi Mu,
Willy Susilo,
Fangguo Zhang,
Xiaofeng Chen:
A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World.
EUC Workshops 2005: 480-489 |
27 | EE | Fangguo Zhang,
Willy Susilo,
Yi Mu,
Xiaofeng Chen:
Identity-Based Universal Designated Verifier Signatures.
EUC Workshops 2005: 825-834 |
26 | EE | Fangguo Zhang,
Willy Susilo,
Yi Mu:
Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures).
Financial Cryptography 2005: 45-56 |
25 | EE | Qianhong Wu,
Fangguo Zhang,
Willy Susilo,
Yi Mu:
An Efficient Static Blind Ring Signature Scheme.
ICISC 2005: 410-423 |
24 | EE | Chih-Yin Lin,
Tzong-Chen Wu,
Fangguo Zhang,
Jing-Jang Hwang:
New identity-based society oriented signature schemes from pairings on elliptic curves.
Applied Mathematics and Computation 160(1): 245-260 (2005) |
23 | EE | Fangguo Zhang,
Kwangjo Kim:
Cryptanalysis of Lee-Hwang-Li's key authentication scheme.
Applied Mathematics and Computation 161(1): 101-107 (2005) |
22 | EE | Fangguo Zhang,
Reihaneh Safavi-Naini,
Willy Susilo:
Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03.
Applied Mathematics and Computation 170(2): 1166-1169 (2005) |
21 | EE | Fangguo Zhang,
Xiaofeng Chen:
Cryptanalysis of Huang-Chang partially blind signature scheme.
Journal of Systems and Software 76(3): 323-325 (2005) |
2004 |
20 | EE | Willy Susilo,
Fangguo Zhang,
Yi Mu:
Identity-Based Strong Designated Verifier Signature Schemes.
ACISP 2004: 313-324 |
19 | EE | Xiaofeng Chen,
Fangguo Zhang,
Kwangjo Kim:
Limited Verifier Signature from Bilinear Pairings.
ACNS 2004: 135-148 |
18 | EE | Yi Mu,
Fangguo Zhang,
Willy Susilo:
Deniable Partial Proxy Signatures.
ASIAN 2004: 182-194 |
17 | EE | Willy Susilo,
Yi Mu,
Fangguo Zhang:
Perfect Concurrent Signature Schemes.
ICICS 2004: 14-26 |
16 | EE | Xiaofeng Chen,
Fangguo Zhang,
Divyan M. Konidala,
Kwangjo Kim:
New ID-Based Threshold Signature Scheme from Bilinear Pairings.
INDOCRYPT 2004: 371-383 |
15 | EE | Xiaofeng Chen,
Fangguo Zhang,
Kwangjo Kim:
Chameleon Hashing Without Key Exposure.
ISC 2004: 87-98 |
14 | EE | Fangguo Zhang,
Reihaneh Safavi-Naini,
Willy Susilo:
An Efficient Signature Scheme from Bilinear Pairings and Its Applications.
Public Key Cryptography 2004: 277-290 |
13 | EE | Fangguo Zhang,
Xiaofeng Chen:
Attack on an ID-based authenticated group key agreement scheme from PKC 2004.
Inf. Process. Lett. 91(4): 191-193 (2004) |
2003 |
12 | EE | Fangguo Zhang,
Kwangjo Kim:
Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings.
ACISP 2003: 312-323 |
11 | EE | Vu Dong Tô,
Reihaneh Safavi-Naini,
Fangguo Zhang:
New traitor tracing schemes using bilinear map.
Digital Rights Management Workshop 2003: 67-76 |
10 | EE | Yan Xie,
Fangguo Zhang,
Xiaofeng Chen,
Kwangjo Kim:
ID-Based Distributed "Magic Ink" Signature from Pairings.
ICICS 2003: 249-259 |
9 | EE | Fangguo Zhang,
Reihaneh Safavi-Naini,
Willy Susilo:
Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings.
INDOCRYPT 2003: 191-204 |
8 | EE | Changjie Wang,
Fangguo Zhang,
Yumin Wang:
Secure Web Transaction with Anonymous Mobile Agent over Internet.
J. Comput. Sci. Technol. 18(1): 84-89 (2003) |
2002 |
7 | EE | Fangguo Zhang,
Shengli Liu,
Kwangjo Kim:
Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems.
ACISP 2002: 203-213 |
6 | EE | Fangguo Zhang,
Kwangjo Kim:
ID-Based Blind Signature and Ring Signature from Pairings.
ASIACRYPT 2002: 533-547 |
5 | | Changjie Wang,
Yumin Wang,
Fangguo Zhang:
An Anonymous Mobile Agents Scheme for Secure Web Transaction over the Internet.
Informatica (Slovenia) 26(3): (2002) |
4 | EE | Fangguo Zhang,
Futai Zhang,
Yumin Wang:
Selection of Secure Hyperelliptic Curves of g_2 Based on a Subfield.
J. Comput. Sci. Technol. 17(6): 836-842 (2002) |
3 | | Changjie Wang,
Fangguo Zhang,
Yumin Wang:
SAWT: A New System for Secure and Anonymous Web Transactions over the Internet.
Journal of Research and Practice in Information Technology 34(1): 34-46 (2002) |
2001 |
2 | EE | Fangguo Zhang,
Futai Zhang,
Yumin Wang:
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves.
ICICS 2001: 74-83 |
2000 |
1 | | Fangguo Zhang,
Futai Zhang,
Yumin Wang:
Fair Electronic Cash Systems with Multiple Banks.
SEC 2000: 461-470 |