default search action
Rui Zhang 0002
Person information
- unicode name: 张锐
- not to be confused with: Rui Zhang 0016
- affiliation (since 2011): Chinese Academy of Sciences (CAS), State Key Laboratory of Information Security, China
- affiliation: National Institute of Advanced Industrial Science and Technology
- affiliation (until 2006): University of Tokyo, Japan
Other persons with the same name
- Rui Zhang — disambiguation page
- Rui Zhang 0001 — University of Freiburg, Department of Microsystems Engineering (IMTEK), Germany
- Rui Zhang 0003 — University of Melbourne, School of Computing and Information Systems, Australia
- Rui Zhang 0004 — University of Arizona, Tuscon, AZ, USA (and 1 more)
- Rui Zhang 0005 — Northwest University, Department of Mathematics, Xi'an, China (and 2 more)
- Rui Zhang 0006 — Chinese University of Hong Kong, Shenzhen, Hong Kong (and 2 more)
- Rui Zhang 0007 — University of Delaware, Newark, DE, USA (and 2 more)
- Rui Zhang 0008 — Alumni ETH Zürich, Switzerland
- Rui Zhang 0009 — The City University of New York, USA
- Rui Zhang 0010 — Ryerson University, Ryerson Multimedia Research Laboratory, Toronto, Canada
- Rui Zhang 0011 — Queen's University, Kingston, ON, CA
- Rui Zhang 0012 — Xi'an Jiaotong-Liverpool University, Department of Mathematical Sciences, Suzhou, China (and 2 more)
- Rui Zhang 0013 — Shanghai University
- Rui Zhang 0014 — University of Arizona, College of Optics, Tucson, AZ, USA
- Rui Zhang 0015 — University of South Florida, Tampa, FL, USA
- Rui Zhang 0016 — Chinese Academy of Sciences (CAS), Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China
- Rui Zhang 0017 — Northwestern Polytechnical University, Center for OPTical IMagery Analysis and Learning (OPTIMAL), Xi'an, China
- Rui Zhang 0018 — University of Electronic Science and Technology of China, Key Laboratory for Neuroinformation of Ministry of Education, Chengdu, China
- Rui Zhang 0019 — Chinese Academy of Sciences, Key Laboratory of Health Informatics, Shenzhen, China (and 1 more)
- Rui Zhang 0020 — New York University, Department of Electrical and Computer Engineering, NY, USA
- Rui Zhang 0021 — Southeast University, School of Automation, Nanjing, China (and 1 more)
- Rui Zhang 0022 — Southeast University, National Mobile Communications Research Laboratory, Nanjing, China
- Rui Zhang 0023 — Queen Mary University of London, School of Electronic Engineering and Computer Science, UK
- Rui Zhang 0024 — Zhejiang University, College of Electronic Engineering and Information Science, Hangzhou, China (and 1 more)
- Rui Zhang 0025 — University of Colorado Boulder, Leeds School of Business, CO, USA (and 1 more)
- Rui Zhang 0026 — Xidian University, State Key Laboratory of Integrated Services Networks, Xi'an, China (and 1 more)
- Rui Zhang 0027 — University of Erlangen-Nuremburg, Chair of Digital Health, Erlangen, Germany (and 1 more)
- Rui Zhang 0028 — University of Minnesota, Institute for Health Informatics / Department of Surgery, Minneapolis, MN, USA
- Rui Zhang 0029 — Zhejiang University, School of Mathematical Sciences, Hangzhou, China
- Rui Zhang 0030 — Chongqing University, College of Computer Science, China
- Rui Zhang 0031 — City University of Hong Kong, Department of Computer Science, Hong Kong
- Rui Zhang 0032 — Tianjin University, School of Environmental Science and Engineering, China
- Rui Zhang 0033 — China Research Institute of Radiowave Propagation, National Key Laboratory of Electromagnetic Environment, Qingdao, China
- Rui Zhang 0034 — Xidian University, School of Mathematics and Statistics, Xi'an, China (and 1 more)
- Rui Zhang 0035 — University of Arizona, Tucson, USA
- Rui Zhang 0036 — University of Oxford, UK
- Rui Zhang 0037 — Penn State University, Computer Science and Engineering Department, University Park, PA, USA (and 2 more)
- Rui Zhang 0038 — Army Engineering University of PLA, Nanjing, China
- Rui Zhang 0039 — Xiamen University of Technology, Department of Industrial Engineering and Management, China (and 2 more)
- Rui Zhang 0040 — Chinese Academy of Sciences, Institute of Computing Technology, Key Laboratory of Intelligent Information Processing, Beijing, China
- Rui Zhang 0041 — Central South University, School of Information Science and Engineering, Changsha, China
- Rui Zhang 0042 — University of Sydney, School of Electrical and Information Engineering, Camperdown, NSW, Australia
- Rui Zhang 0043 — Jilin University, MOE Key Laboratory of Bionic Engineering, Changchun, China
- Rui Zhang 0044 — Beihang University, School of Reliability and Systems Engineering, Beijing, China
- Rui Zhang 0045 — Xidian University, School of Mathematics and Statistics, Xi'an, China (and 1 more)
- Rui Zhang 0046 — South China University of Technology, Department of Software Engineering, Guangzhou, China
- Rui Zhang 0047 — Beihang University, School of Astronautics, Beijing, China
- Rui Zhang 0048 — Cadence Design Systems, Inc., San Jose, CA, USA (and 1 more)
- Rui Zhang 0049 — Nanjing University of Information Science and Technology, School of Automation, Jiangsu Key Laboratory of Big Data Analysis Technology, China
- Rui Zhang 0050 — Ocean University of China, College of Computer Science and Technology, Qingdao, China (and 1 more)
- Rui Zhang 0052 — Southwest Jiaotong University, Department of Surveying and Geo-Informatics, Chengdu, China
- Rui Zhang 0053 — Georgia Institute of Technology, H. Milton Stewart School of School of Industrial and Systems Engineering, Atlanta, Georgia, USA
- Rui Zhang 0054 — Chinese Academy of Sciences, Institute of Optics and Electronics, Chengdu, China (and 1 more)
- Rui Zhang 0055 — University of Southern Denmark, Odense, Denmark
- Rui Zhang 0056 — Meituan, Beijing, China
- Rui Zhang 0057 — University of New South Wales, Sydney, Australia
- Rui Zhang 0058 — Army Engineering University, Shijiazhuang, China
- Rui Zhang 0059 — Southwestern University of Finance and Economics, School of Business Administration, Chengdu, China
- Rui Zhang 0060 — Hebei Vocational College of Rail Transportation, Hebei, China
- Rui Zhang 0061 — Chinese Academy of Sciences, National Time Service Center, Xi'an, China
- Rui Zhang 0062 — North University of China, Key Laboratory of Instrumentation Science and Dynamic Measurement, Taiyuan, China
- Rui Zhang 0063 — Shenyang Jianzhu University, Information and Control Engineering Faculty, Shenyang, China
- Rui Zhang 0064 — Zunyi Normal College, School of Information Engineering, Zunyi, China
- Rui Zhang 0065 — University of Edinburgh, Edinburgh, UK
- Rui Zhang 0066 — Wuhan University of Technology, Hubei Key Laboratory of Transportation Internet of Things, Wuhan, China
- Rui Zhang 0067 — The PLA University of Science and Technology, College of Command Information System, Nanjing, China
- Rui Zhang 0068 — University of North Carolina at Chapel Hill, Chapel Hill, NC, USA
- Rui Zhang 0069 — Beihang University, Beijing Advanced Innovation Center for Biomedical Engineering, Beijing, China (and 1 more)
- Rui Zhang 0070 — University of Electronic Science and Technology of China, Yangtze Delta Region Institute, Huzhou, China
- Rui Zhang 0071 — Shandong University of Science and Technology, College of Electronic and Information Engineering, Qingdao, China
- Rui Zhang 0072 — Shandong University of Finance and Economics, School of Computer Science and Technology, Jinan, China
- Rui Zhang 0073 — The Ninth People's Hospital of Chongqing, Chongqing, China
- Rui Zhang 0074 — Heilongjiang Bayi Agricultural University, Heilongjiang, China
- Rui Zhang 0075 — Xidian University, National Laboratory of Radar Signal Processing, Xi'an, China
- Rui Zhang 0076 — Jiangsu University, School of Automotive and Traffic Engineering, Zhenjiang, China
- Rui Zhang 0077 — National University of Defense Technology, Changsha, China
- Rui Zhang 0078 — Chinese Academy of Sciences, Suzhou Institute of Biomedical Engineering and Technology, China
- Rui Zhang 0079 — Huawei Hong Kong Theory Lab
- Rui Zhang 0080 — Hong Kong Polytechnic University, Department of Computing, China (and 1 more)
- Rui Zhang 0081 — School of Cyber Engineering, Xidian University, Xi'an, China
- Rui Zhang 0082 — Taiyuan University of Science and Technology, College of Computer Science and Technology, China
- Rui Zhang 0083 — Nanjing University of Science and Technology, School of Cyber Science and Engineering, China (and 1 more)
- Rui Zhang 0084 — Jilin University, College of Computer Science and Technology, Jilin, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j46]Zeshuo Zhu, Rui Zhang, Yang Tao:
Atomic cross-chain swap based on private key exchange. Cybersecur. 7(1): 12 (2024) - [j45]Wenhan Xu, Hui Ma, Rui Zhang:
GAPS: GPU-accelerated processing service for SM9. Cybersecur. 7(1): 29 (2024) - [j44]Chao An, Yuting Xiao, HaiHang Liu, Han Wu, Rui Zhang:
Honey password vaults tolerating leakage of both personally identifiable information and passwords. Cybersecur. 7(1): 42 (2024) - [j43]Huizhuo Wang, Yang Tao, Rui Zhang:
Threshold ring signature: generic construction and logarithmic size instantiation. Cybersecur. 7(1): 46 (2024) - [j42]Wenhan Xu, Hui Ma, Zishuai Song, Jianhao Li, Rui Zhang:
Gringotts: An Encrypted Version Control System With Less Trust on Servers. IEEE Trans. Dependable Secur. Comput. 21(2): 668-684 (2024) - [j41]Jianhao Li, Jiabei Wang, Rui Zhang, Yansen Xin, Wenhan Xu:
NEMO: Practical Distributed Boolean Queries With Minimal Leakage. IEEE Trans. Inf. Forensics Secur. 19: 2594-2608 (2024) - 2023
- [j40]Ti Wang, Yongbin Zhou, Hui Ma, Rui Zhang:
Flexible and Controllable Access Policy Update for Encrypted Data Sharing in the Cloud. Comput. J. 66(6): 1507-1524 (2023) - [j39]Zishuai Song, Hui Ma, Shuzhou Sun, Yansen Xin, Rui Zhang:
Rainbow: reliable personally identifiable information retrieval across multi-cloud. Cybersecur. 6(1): 19 (2023) - [j38]Jianhao Li, Hui Ma, Jiabei Wang, Zishuai Song, Wenhan Xu, Rui Zhang:
Wolverine: A Scalable and Transaction-Consistent Redactable Permissionless Blockchain. IEEE Trans. Inf. Forensics Secur. 18: 1653-1666 (2023) - [j37]Zishuai Song, Hui Ma, Rui Zhang, Wenhan Xu, Jianhao Li:
Everything Under Control: Secure Data Sharing Mechanism for Cloud-Edge Computing. IEEE Trans. Inf. Forensics Secur. 18: 2234-2249 (2023) - [c52]Yang Tao, Rui Zhang, Yunfeng Ji:
Forward Security of Fiat-Shamir Lattice Signatures. ACNS (1) 2023: 607-633 - [c51]Huan Zou, Yuting Xiao, Rui Zhang:
Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction. ICICS 2023: 215-234 - 2022
- [j36]Yang Tao, Yunfeng Ji, Rui Zhang:
Generalizing Lyubashevsky-Wichs trapdoor sampler for NTRU lattices. Sci. China Inf. Sci. 65(5): 1-3 (2022) - [j35]Shuo Sun, Yongbin Zhou, Yunfeng Ji, Rui Zhang, Yang Tao:
Generic, efficient and isochronous Gaussian sampling over the integers. Cybersecur. 5(1): 10 (2022) - [j34]Bo Shen, Rui Zhang, Hao Chen:
An Adaptively Attention-Driven Cascade Part-Based Graph Embedding Framework for UAV Object Re-Identification. Remote. Sens. 14(6): 1436 (2022) - [j33]Shuzhou Sun, Hui Ma, Zishuai Song, Rui Zhang:
WebCloud: Web-Based Cloud Storage for Secure Data Sharing Across Platforms. IEEE Trans. Dependable Secur. Comput. 19(3): 1871-1884 (2022) - [j32]Jiabei Wang, Rui Zhang, Jianhao Li, Yuting Xiao, Hui Ma:
SeUpdate: Secure Encrypted Data Update for Multi-User Environments. IEEE Trans. Dependable Secur. Comput. 19(6): 3592-3606 (2022) - [j31]Jiabei Wang, Rui Zhang, Jianhao Li, Yuting Xiao:
Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata. IEEE Trans. Inf. Forensics Secur. 17: 2746-2760 (2022) - [j30]Hui Ma, Rui Zhang, Shuzhou Sun, Zishuai Song, Gaosheng Tan:
Server-Aided Fine-Grained Access Control Mechanism with Robust Revocation in Cloud Computing. IEEE Trans. Serv. Comput. 15(1): 164-173 (2022) - [c50]Shuo Sun, Yongbin Zhou, Rui Zhang, Yang Tao, Zehua Qiao, Jingdian Ming:
Fast Fourier Orthogonalization over NTRU Lattices. ICICS 2022: 109-127 - 2021
- [j29]Shuzhou Sun, Rui Zhang, Hui Ma:
Hashing multiple messages with SM3 on GPU platforms. Sci. China Inf. Sci. 64(9) (2021) - [j28]Ti Wang, Hui Ma, Yongbin Zhou, Rui Zhang, Zishuai Song:
Fully Accountable Data Sharing for Pay-as-You-Go Cloud Scenes. IEEE Trans. Dependable Secur. Comput. 18(4): 2005-2016 (2021) - [j27]Yuejun Liu, Yongbin Zhou, Shuo Sun, Tianyu Wang, Rui Zhang, Jingdian Ming:
On the Security of Lattice-Based Fiat-Shamir Signatures in the Presence of Randomness Leakage. IEEE Trans. Inf. Forensics Secur. 16: 1868-1879 (2021) - [c49]Yuting Xiao, Rui Zhang, Hui Ma:
Modular Design of Role-Symmetric Authenticated Key Exchange Protocols. ASIACRYPT (4) 2021: 742-772 - [c48]Yunfeng Ji, Yang Tao, Rui Zhang:
More Efficient Construction of Anonymous Signatures. ICICS (2) 2021: 394-411 - [i11]Shuo Sun, Yongbin Zhou, Yunfeng Ji, Rui Zhang, Yang Tao:
Generic, Efficient and Isochronous Gaussian Sampling over the Integers. IACR Cryptol. ePrint Arch. 2021: 199 (2021) - 2020
- [j26]Rui Zhang, Jiabei Wang, Zishuai Song, Xi Wang:
An enhanced searchable encryption scheme for secure data outsourcing. Sci. China Inf. Sci. 63(3) (2020) - [j25]Yang Tao, Han Wang, Rui Zhang:
Rényi divergence on learning with errors. Sci. China Inf. Sci. 63(9): 1-13 (2020) - [j24]Shuzhou Sun, Hui Ma, Rui Zhang, Wenhan Xu:
Server-aided immediate and robust user revocation mechanism for SM9. Cybersecur. 3(1): 12 (2020) - [j23]Hui Ma, Rui Zhang, Guomin Yang, Zishuai Song, Kai He, Yuting Xiao:
Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices. IEEE Trans. Dependable Secur. Comput. 17(5): 1026-1038 (2020) - [j22]Shuzhou Sun, Rui Zhang, Hui Ma:
Efficient Parallelism of Post-Quantum Signature Scheme SPHINCS. IEEE Trans. Parallel Distributed Syst. 31(11): 2542-2555 (2020) - [c47]Ti Wang, Yongbin Zhou, Hui Ma, Yuejun Liu, Rui Zhang:
Fully Secure ABE with Outsourced Decryption against Chosen Ciphertext Attack. Inscrypt 2020: 83-103 - [c46]Gaosheng Tan, Rui Zhang, Hui Ma, Yang Tao:
An Efficient CCA-Secure Access Control Encryption for Any Policy. Inscrypt 2020: 104-112 - [c45]Rui Zhang, Huan Zou, Cong Zhang, Yuting Xiao, Yang Tao:
Distributed Key Generation for SM9-Based Systems. Inscrypt 2020: 113-129 - [c44]Yuting Xiao, Rui Zhang, Hui Ma:
Tightly Secure Two-Pass Authenticated Key Exchange Protocol in the CK Model. CT-RSA 2020: 171-198 - [c43]Yang Tao, Xi Wang, Rui Zhang:
Short Zero-Knowledge Proof of Knowledge for Lattice-Based Commitment. PQCrypto 2020: 268-283
2010 – 2019
- 2019
- [j21]Yuejun Liu, Rui Zhang, Yongbin Zhou:
Predicate encryption against master-key tampering attacks. Cybersecur. 2(1): 22 (2019) - [j20]Rui Zhang, Yuting Xiao, Shuzhou Sun, Hui Ma:
Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications. IEEE Trans. Dependable Secur. Comput. 16(4): 625-634 (2019) - [i10]Yuejun Liu, Yongbin Zhou, Shuo Sun, Tianyu Wang, Rui Zhang:
On Security of Fiat-Shamir Signatures over Lattice in the Presence of Randomness Leakage. IACR Cryptol. ePrint Arch. 2019: 715 (2019) - 2018
- [c42]Liqiang Peng, Yao Lu, Noboru Kunihiro, Rui Zhang, Lei Hu:
A Deterministic Algorithm for Computing Divisors in an Interval. ACISP 2018: 3-12 - [c41]Hui Ma, Rui Zhang, Guomin Yang, Zishuai Song, Shuzhou Sun, Yuting Xiao:
Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls - Secure and Efficient Fine-Grained Access Control on Corrupted Machines. ESORICS (2) 2018: 507-526 - [c40]Qian Zhang, Yongbin Zhou, Shuang Qiu, Wei Cheng, Jingdian Ming, Rui Zhang:
A Compact AES Hardware Implementation Secure Against 1st-Order Side-Channel Attacks. ICCD 2018: 545-552 - [c39]Rui Zhang, Yang Tao:
Key Dependent Message Security for Revocable Identity-Based Encryption and Identity-Based Encryption. ICICS 2018: 426-441 - [c38]Yao Lu, Noboru Kunihiro, Rui Zhang, Liqiang Peng, Hui Ma:
Certifying Variant of RSA with Generalized Moduli. ICICS 2018: 598-608 - 2017
- [j19]Fei Tang, Rui Zhang, Hongda Li:
Attribute-based non-interactive key exchange. Sci. China Inf. Sci. 60(1): 19101:1-19101:3 (2017) - [j18]Rui Zhang, Hui Ma, Yao Lu, Yang Li:
Provably secure cloud storage for mobile networks with less computation and smaller overhead. Sci. China Inf. Sci. 60(12): 122104:1-122104:13 (2017) - [j17]Rui Zhang, Hui Ma, Yao Lu:
Fine-grained access control system based on fully outsourced attribute-based encryption. J. Syst. Softw. 125: 344-353 (2017) - [j16]Hui Ma, Rui Zhang, Zhiguo Wan, Yao Lu, Suqing Lin:
Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing. IEEE Trans. Dependable Secur. Comput. 14(6): 679-692 (2017) - [j15]Rui Zhang, Shuang Qiu, Yongbin Zhou:
Further Improving Efficiency of Higher Order Masking Schemes by Decreasing Randomness Complexity. IEEE Trans. Inf. Forensics Secur. 12(11): 2590-2598 (2017) - [c37]Gaosheng Tan, Rui Zhang, Hui Ma, Yang Tao:
Access Control Encryption Based on LWE. APKC@AsiaCCS 2017: 43-50 - [c36]Shuang Qiu, Rui Zhang, Yongbin Zhou, Hailong Zhang:
Reducing Randomness Complexity of Mask Refreshing Algorithm. ICICS 2017: 88-101 - [c35]Rui Zhang, Kai He:
Multipurpose Public-Key Encryption. IWSEC 2017: 69-84 - [e2]Joonsang Baek, Rui Zhang:
Proceedings of the 4th ACM International Workshop on ASIA Public-Key Cryptography, APKC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017. ACM 2017, ISBN 978-1-4503-4973-4 [contents] - [i9]Shuang Qiu, Rui Zhang, Yongbin Zhou, Wei Cheng:
Corrections to "Further Improving Efficiency of Higher-Order Masking Schemes by Decreasing Randomness Complexity". IACR Cryptol. ePrint Arch. 2017: 1244 (2017) - 2016
- [j14]Ruoxin Zhao, Rui Zhang, Yongqiang Li, Baofeng Wu:
Construction of MDS block diffusion matrices for block ciphers and hash functions. Sci. China Inf. Sci. 59(9): 99101 (2016) - [j13]Suqing Lin, Rui Zhang, Mingsheng Wang:
Verifiable attribute-based proxy re-encryption for secure public cloud data sharing. Secur. Commun. Networks 9(12): 1748-1758 (2016) - [j12]Shuang Qiu, Rui Zhang, Yuchen Cao, Wei Yang, Yongbin Zhou, Tian Ding:
A statistical model for DPA when algorithmic noise is dependent on target. Secur. Commun. Networks 9(18): 4882-4896 (2016) - [j11]Hui Ma, Rui Zhang, Wei Yuan:
Comments on "Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption". IEEE Trans. Inf. Forensics Secur. 11(4): 866-867 (2016) - [e1]Keita Emura, Goichiro Hanaoka, Rui Zhang:
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, AsiaPKC@AsiaCCS, Xi'an, China, May 30 - June 03, 2016. ACM 2016, ISBN 978-1-4503-4286-5 [contents] - [i8]Ruoxin Zhao, Baofeng Wu, Rui Zhang, Qian Zhang:
Designing Optimal Implementations of Linear Layers (Full Version). IACR Cryptol. ePrint Arch. 2016: 1118 (2016) - 2015
- [j10]Suqing Lin, Rui Zhang, Hui Ma, Suqing Wang:
Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption. IEEE Trans. Inf. Forensics Secur. 10(10): 2119-2130 (2015) - [c34]Yao Lu, Rui Zhang, Liqiang Peng, Dongdai Lin:
Solving Linear Equations Modulo Unknown Divisors: Revisited. ASIACRYPT (1) 2015: 189-213 - [c33]Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Rui Zhang, Chengyu Hu, Zuoxia Yu:
Updatable Hash Proof System and Its Applications. ESORICS (1) 2015: 266-285 - [c32]Hui Ma, Rui Zhang:
Secure Cloud Storage for Dynamic Group: How to Achieve Identity Privacy-Preserving and Privilege Control. NSS 2015: 254-267 - [c31]Yao Lu, Liqiang Peng, Rui Zhang, Lei Hu, Dongdai Lin:
Towards Optimal Bounds for Implicit Factorization Problem. SAC 2015: 462-476 - [i7]Ruoxin Zhao, Rui Zhang, Yongqiang Li, Baofeng Wu:
On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions. IACR Cryptol. ePrint Arch. 2015: 449 (2015) - 2014
- [c30]Yao Lu, Rui Zhang, Dongdai Lin:
New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents. ACNS 2014: 151-162 - [c29]Bei Liang, Rui Zhang, Hongda Li:
Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions. Inscrypt 2014: 193-206 - [i6]Yao Lu, Rui Zhang, Dongdai Lin:
New Results on Solving Linear Equations Modulo Unknown Divisors and its Applications. IACR Cryptol. ePrint Arch. 2014: 343 (2014) - 2013
- [j9]Yao Lu, Rui Zhang, Dongdai Lin:
Improved bounds for the implicit factorization problem. Adv. Math. Commun. 7(3): 243-251 (2013) - [j8]Ai-Jun Ge, Xinyi Huang, Cheng Chen, Chuangui Ma, Rui Zhang:
Forgeability of Wang-Zhu-Feng-Yau's Attribute-Based Signature with Policy-and-Endorsement Mechanism. J. Comput. Sci. Technol. 28(4): 743-748 (2013) - [j7]Zhiguo Wan, Jun-e Liu, Rui Zhang, Robert H. Deng:
A Collusion-Resistant Conditional Access System for Flexible-Pay-Per-Channel Pay-TV Broadcasting. IEEE Trans. Multim. 15(6): 1353-1364 (2013) - [j6]Aijun Ge, Jiang Zhang, Rui Zhang, Chuangui Ma, Zhenfeng Zhang:
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme. IEEE Trans. Parallel Distributed Syst. 24(11): 2319-2321 (2013) - [c28]Yao Lu, Rui Zhang, Dongdai Lin:
Factoring Multi-power RSA Modulus N = p r q with Partial Known Bits. ACISP 2013: 57-71 - [c27]Yao Lu, Rui Zhang, Dongdai Lin:
Factoring RSA Modulus with Known Bits from Both p and q: A Lattice Method. NSS 2013: 393-404 - 2012
- [c26]Aijun Ge, Rui Zhang, Cheng Chen, Chuangui Ma, Zhenfeng Zhang:
Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts. ACISP 2012: 336-349 - [c25]Xiang Xie, Rui Xue, Rui Zhang:
Inner-Product Lossy Trapdoor Functions and Applications. ACNS 2012: 188-205 - [c24]Goichiro Hanaoka, Yutaka Kawai, Noboru Kunihiro, Takahiro Matsuda, Jian Weng, Rui Zhang, Yunlei Zhao:
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption. CT-RSA 2012: 349-364 - [c23]Cheng Chen, Yanfei Guo, Rui Zhang:
Group Key Exchange Resilient to Leakage of Ephemeral Secret Keys with Strong Contributiveness. EuroPKI 2012: 17-36 - [c22]Yao Lu, Rui Zhang, Dongdai Lin:
Stronger Security Model for Public-Key Encryption with Equality Test. Pairing 2012: 65-82 - [c21]Xiang Xie, Rui Xue, Rui Zhang:
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting. SCN 2012: 1-18 - [i5]Xiang Xie, Rui Xue, Rui Zhang:
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting. IACR Cryptol. ePrint Arch. 2012: 463 (2012) - 2011
- [c20]Jiang Zhang, Xiang Xie, Rui Zhang, Zhenfeng Zhang:
A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening. Inscrypt 2011: 195-209 - [c19]Xiang Xie, Rui Xue, Rui Zhang:
Efficient Threshold Encryption from Lossy Trapdoor Functions. PQCrypto 2011: 163-178 - 2010
- [c18]Rui Zhang:
Acquiring Key Privacy from Data Privacy. Inscrypt 2010: 359-372
2000 – 2009
- 2009
- [j5]Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 53-66 (2009) - [j4]Rui Zhang, Hideki Imai:
Combining Public Key Encryption with Keyword Search and Public Key Encryption. IEICE Trans. Inf. Syst. 92-D(5): 888-896 (2009) - [j3]Rui Zhang, Hideki Imai:
Strong Anonymous Signature. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(10): 2487-2491 (2009) - [c17]Rui Zhang, Goichiro Hanaoka, Hideki Imai:
A generic construction of useful client puzzles. AsiaCCS 2009: 70-79 - [c16]Rui Zhang, Hideki Imai:
Constructing Better KEMs with Partial Message Recovery. Inscrypt 2009: 303-312 - [c15]Peng Yang, Rui Zhang, Kanta Matsuura, Hideki Imai:
Generic Construction of Stateful Identity Based Encryption. ISC 2009: 338-346 - 2008
- [c14]Rui Zhang, Hideki Imai:
Strong Anonymous Signatures. Inscrypt 2008: 60-71 - 2007
- [j2]Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Efficient Identity-Based Encryption with Tight Security Reduction. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(9): 1803-1813 (2007) - [c13]Rui Zhang:
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions. ACNS 2007: 323-339 - [c12]Rui Zhang, Hideki Imai:
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption. CANS 2007: 159-174 - [c11]Rui Zhang, Goichiro Hanaoka, Hideki Imai:
Orthogonality between Key Privacy and Data Privacy, Revisited. Inscrypt 2007: 313-327 - [c10]Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Formal Security Treatments for Signatures from Identity-Based Encryption. ProvSec 2007: 218-227 - [i4]Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions. IACR Cryptol. ePrint Arch. 2007: 30 (2007) - 2006
- [j1]Peng Yang, Goichiro Hanaoka, Yang Cui, Rui Zhang, Nuttapong Attrapadung, Kanta Matsuura, Hideki Imai:
Relations among Notions of Security for Identity Based Encryption Schemes. Inf. Media Technol. 1(2): 929-941 (2006) - [c9]Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Kanta Matsuura, Hideki Imai:
Applying Fujisaki-Okamoto to Identity-Based Encryption. AAECC 2006: 183-192 - [c8]Takashi Kitagawa, Peng Yang, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai:
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. ACISP 2006: 348-359 - [c7]Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Efficient Identity-Based Encryption with Tight Security Reduction. CANS 2006: 19-36 - [c6]Nuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang:
Relations Among Notions of Security for Identity Based Encryption Schemes. LATIN 2006: 130-141 - 2005
- [c5]Rui Zhang, Jun Furukawa, Hideki Imai:
Short Signature and Universal Designated Verifier Signature Without Random Oracles. ACNS 2005: 483-498 - [c4]Rui Zhang, Hideki Imai:
Improvements on Security Proofs of Some Identity Based Encryption Schemes. CISC 2005: 28-41 - [i3]Nuttapong Attrapadung, Yang Cui, Goichiro Hanaoka, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang:
Relations Among Notions of Security for Identity Based Encryption Schemes. IACR Cryptol. ePrint Arch. 2005: 258 (2005) - [i2]Nuttapong Attrapadung, Benoît Chevallier-Mames, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Efficient Identity-Based Encryption with Tight Security Reduction. IACR Cryptol. ePrint Arch. 2005: 320 (2005) - 2004
- [c3]Rui Zhang, Goichiro Hanaoka, Hideki Imai:
On the Security of Cryptosystems with All-or-Nothing Transform. ACNS 2004: 76-90 - [c2]Rui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Public Key Cryptography 2004: 360-374 - 2003
- [c1]Rui Zhang, Hideki Imai:
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem. ACNS 2003: 96-110 - [i1]Rui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? IACR Cryptol. ePrint Arch. 2003: 181 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-18 19:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint