Follow
Zengpeng Li
Title
Cited by
Cited by
Year
Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification
X Ge, J Yu, H Zhang, C Hu, Z Li, Z Qin, R Hao
IEEE Transactions on Dependable and Secure computing 18 (1), 490-504, 2019
812019
Preserving data privacy via federated learning: Challenges and solutions
Z Li, V Sharma, SP Mohanty
IEEE Consumer Electronics Magazine 9 (3), 8-16, 2020
762020
Quantum-safe round-optimal password authentication for mobile devices
Z Li, D Wang, E Morais
IEEE transactions on dependable and secure computing 19 (3), 1885-1899, 2020
492020
Achieving one-round password-based authenticated key exchange over lattices
Z Li, D Wang
IEEE transactions on services computing 15 (1), 308-321, 2019
332019
Towards multi-hop homomorphic identity-based proxy re-encryption via branching program
Z Li, C Ma, D Wang
IEEE Access 5, 16214-16228, 2017
282017
Two-round PAKE protocol over lattices without NIZK
Z Li, D Wang
Information Security and Cryptology: 14th International Conference, Inscrypt …, 2019
222019
Achieving multi-hop PRE via branching program
Z Li, C Ma, D Wang
IEEE Transactions on Cloud Computing 8 (1), 45-58, 2017
182017
Multi-key FHE for multi-bit messages
Z Li, C Ma, H Zhou
Science China Information Sciences 61, 1-3, 2018
172018
Preventing adaptive key recovery attacks on the GSW levelled homomorphic encryption scheme
Z Li, SD Galbraith, C Ma
Provable Security: 10th International Conference, ProvSec 2016, Nanjing …, 2016
162016
PriParkRec: Privacy-preserving decentralized parking recommendation service
Z Li, M Alazab, S Garg, MS Hossain
IEEE Transactions on Vehicular Technology 70 (5), 4037-4050, 2021
152021
Building low-interactivity multifactor authenticated key exchange for industrial internet of things
Z Li, Z Yang, P Szalachowski, J Zhou
IEEE Internet of Things Journal 8 (2), 844-859, 2020
152020
Leakage Resilient Leveled on Multiple Bits Message
Z Li, C Ma, D Wang
IEEE Transactions on Big Data 7 (5), 845-858, 2017
152017
Oblivious transfer via lossy encryption from lattice-based cryptography
Z Li, C Xiang, C Wang
Wireless Communications and Mobile Computing 2018, 2018
142018
Multi-bit Leveled Homomorphic Encryption via-Based
Z Li, C Ma, E Morais, G Du
Information Security and Cryptology: 12th International Conference, Inscrypt …, 2017
142017
Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs
Z Li, V Sharma, C Ma, C Ge, W Susilo
Science China Information Sciences 64, 1-2, 2021
112021
Overview on fully homomorphic encryption
Z LI, C MA, H ZHOU
Journal of Cryptologic Research 4 (6), 561-578, 2017
112017
Revisiting post-quantum hash proof systems over lattices for Internet of Thing authentications
Z Li, J Wang, W Zhang
Journal of Ambient Intelligence and Humanized Computing 11, 3337-3347, 2020
92020
Correlation probability indistinguishable location privacy protection algorithm
L Zhang, C Ma, S Yang, Z Li
Journal on Communications 38 (8), 37-49, 2017
92017
Secdedup: Secure encrypted data deduplication with dynamic ownership updating
S Zhang, H Xian, Z Li, L Wang
IEEE Access 8, 186323-186334, 2020
82020
LaKSA: A probabilistic proof-of-stake protocol
D Reijsbergen, P Szalachowski, J Ke, Z Li, J Zhou
arXiv preprint arXiv:2006.01427, 2020
82020
The system can't perform the operation now. Try again later.
Articles 1–20