Bingsheng Zhang

Orcid: 0000-0002-2320-9582

According to our database1, Bingsheng Zhang authored at least 87 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Maliciously Secure MPC From Semi-Honest 2PC in the Server-Aided Model.
IEEE Trans. Dependable Secur. Comput., 2024

PrivData Network: A Privacy-Preserving On-Chain Data Factory and Trading Market.
IEEE Trans. Dependable Secur. Comput., 2024

Single-Input Functionality against a Dishonest Majority: Practical and Round-Optimal.
IACR Cryptol. ePrint Arch., 2024

On the Complexity of Cryptographic Groups and Generic Group Models.
IACR Cryptol. ePrint Arch., 2024

A New PPML Paradigm for Quantized Models.
IACR Cryptol. ePrint Arch., 2024

Efficient 2PC for Constant Round Secure Equality Testing and Comparison.
IACR Cryptol. ePrint Arch., 2024

Scalable Collaborative zk-SNARK: Fully Distributed Proof Generation and Malicious Security.
IACR Cryptol. ePrint Arch., 2024

Scalable Collaborative zk-SNARK and Its Application to Efficient Proof Outsourcing.
IACR Cryptol. ePrint Arch., 2024

Distributed Point Function with Constraints, Revisited.
IACR Cryptol. ePrint Arch., 2024

On the Relationship between Public Key Primitives via Indifferentiability.
IACR Cryptol. ePrint Arch., 2024

Votexx: Extreme Coercion Resistance.
IACR Cryptol. ePrint Arch., 2024

2023
A meta-analysis of the efficacy of self-regulated learning interventions on academic achievement in online and blended environments in K-12 and higher education.
Behav. Inf. Technol., December, 2023

Low Communication Secure Computation From Semi-Trusted Hardware.
IEEE Trans. Inf. Forensics Secur., 2023

iPrivJoin: An ID-Private Data Join Framework for Privacy-Preserving Machine Learning.
IEEE Trans. Inf. Forensics Secur., 2023

Multi-Party Private Function Evaluation for RAM.
IEEE Trans. Inf. Forensics Secur., 2023

Privacy-Preserving Decision-Making Over Blockchain.
IEEE Trans. Dependable Secur. Comput., 2023

UC Secure Private Branching Program and Decision Tree Evaluation.
IEEE Trans. Dependable Secur. Comput., 2023

Practical Constructions for Single Input Functionality against a Dishonest Majority.
IACR Cryptol. ePrint Arch., 2023

A Scalable Coercion-resistant Blockchain Decision-making Scheme.
IACR Cryptol. ePrint Arch., 2023

Load-Balanced Server-Aided MPC in Heterogeneous Computing.
IACR Cryptol. ePrint Arch., 2023

Aegis: A Lightning Fast Privacy-preserving Machine Learning Platform against Malicious Adversaries.
IACR Cryptol. ePrint Arch., 2023

Fine-grained Policy Constraints for Distributed Point Function.
IACR Cryptol. ePrint Arch., 2023

2022
Bool Network: An Open, Distributed, Secure Cross-Chain Notary Platform.
IEEE Trans. Inf. Forensics Secur., 2022

An Efficient E2E Crowd Verifiable E-Voting System.
IEEE Trans. Dependable Secur. Comput., 2022

Scriptable and composable SNARKs in the trusted hardware model.
J. Comput. Secur., 2022

Improvements on Non-Interactive Zero-Knowledge Proof Systems Related to Quadratic Residuosity Languages.
Inf. Sci., 2022

Endemic Oblivious Transfer via Random Oracles, Revisited.
IACR Cryptol. ePrint Arch., 2022

GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility.
IACR Cryptol. ePrint Arch., 2022

MPC as a service using Ethereum Registry Smart Contracts - dCommon CIP.
IACR Cryptol. ePrint Arch., 2022

VoteXX: A Solution to Improper Influence in Voter-Verifiable Elections.
IACR Cryptol. ePrint Arch., 2022

PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices.
Future Gener. Comput. Syst., 2022

2021
Publicly auditable conditional blind signatures.
J. Comput. Secur., 2021

ZK Contingent Payments for Trained Neural Networks.
IACR Cryptol. ePrint Arch., 2021

Secure Computation for G-Module and its Applications.
IACR Cryptol. ePrint Arch., 2021

UC Modelling and Security Analysis of the Estonian IVXV Internet Voting System.
CoRR, 2021

Zero Knowledge Contingent Payments for Trained Neural Networks.
Proceedings of the Computer Security - ESORICS 2021, 2021

Succinct Scriptable NIZK via Trusted Hardware.
Proceedings of the Computer Security - ESORICS 2021, 2021

Correlated Randomness Teleportation via Semi-trusted Hardware - Enabling Silent Multi-party Computation.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Silent Two-party Computation Assisted by Semi-trusted Hardware.
IACR Cryptol. ePrint Arch., 2020

A Framework of Private Set Intersection Protocols.
IACR Cryptol. ePrint Arch., 2020

Crowd Verifiable Zero-Knowledge and End-to-end Verifiable Multiparty Computation.
IACR Cryptol. ePrint Arch., 2020

Uncontrolled Randomness in Blockchains: Covert Bulletin Board for Illicit Activity.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

2019
Distributed, end-to-end verifiable, and privacy-preserving internet voting systems.
Comput. Secur., 2019

Statement Voting.
Proceedings of the Financial Cryptography and Data Security, 2019

Recessive Social Networking: Preventing Privacy Leakage against Reverse Image Search.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

SoK: A Systematic Study of Anonymity in Cryptocurrencies.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Utilizing Public Blockchains for Censorship-Circumvention and IoT Communication.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Defending Adversarial Attacks on Cloud-aided Automatic Speech Recognition Systems.
Proceedings of the 7th International Workshop on Security in Cloud Computing, 2019

2018
A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence.
IACR Cryptol. ePrint Arch., 2018

Towards everlasting privacy and efficient coercion resistance in remote electronic voting.
IACR Cryptol. ePrint Arch., 2018

Uncontrolled Randomness in Blockchains: Covert Bulletin Board for Illicit Activities.
IACR Cryptol. ePrint Arch., 2018

On the Sustainability of Blockchain Funding.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

2017
Auditing for privacy in threshold PKE e-voting.
Inf. Comput. Secur., 2017

An Efficient E2E Verifiable E-voting System without Setup Assumptions.
IEEE Secur. Priv., 2017

Digital Liquid Democracy: How to Vote Your Delegation Statement.
IACR Cryptol. ePrint Arch., 2017

Brief Announcement: Statement Voting and Liquid Democracy.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2017

2016
SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones.
IEEE Trans. Mob. Comput., 2016

D-DEMOS: A Distributed, End-to-End Verifiable, Internet Voting System.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

2015
End-to-End Verifiable Elections in the Standard Model∗.
IACR Cryptol. ePrint Arch., 2015

Ceremonies for End-to-End Verifiable Elections.
IACR Cryptol. ePrint Arch., 2015

Indistinguishable Proofs of Work or Knowledge.
IACR Cryptol. ePrint Arch., 2015

A distributed, end-to-end verifiable, internet voting system.
CoRR, 2015

On the Necessity of Auditing for Election Privacy in e-Voting Systems.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

A multiple server scheme for fingerprint fuzzy vaults.
Proceedings of the 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2015

DEMOS-2: Scalable E2E Verifiable Elections without Random Oracles.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Proof-Carrying Cloud Computation: The Case of Convex Optimization.
IEEE Trans. Inf. Forensics Secur., 2014

PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones.
IEEE Internet Things J., 2014

Efficient Non-Interactive Zero Knowledge Arguments for Set Operations.
IACR Cryptol. ePrint Arch., 2014

A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

AcousAuth: An acoustic-based mobile application for user authentication.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Pressing the button for European elections: verifiable e-voting and public attitudes toward internet voting in Greece.
Proceedings of the 6th International Conference on Electronic Voting: Verifying the Vote, 2014

2013
Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud.
IEEE Trans. Emerg. Top. Comput., 2013

A more efficient computationally sound non-interactive zero-knowledge shuffle argument.
J. Comput. Secur., 2013

PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones.
IACR Cryptol. ePrint Arch., 2013

Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols.
IACR Cryptol. ePrint Arch., 2013

Practical Fully Simulatable Oblivious Transfer with Sublinear Communication.
Proceedings of the Financial Cryptography and Data Security, 2013

Electronic Voting Systems - From Theory to Implementation.
Proceedings of the E-Democracy, Security, Privacy and Trust in a Digital World, 2013

Efficient Modular NIZK Arguments from Shift and Product.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013

2012
New Non-Interactive Zero-Knowledge Subset Sum, Decision Knapsack And Range Arguments.
IACR Cryptol. ePrint Arch., 2012

A Non-interactive Range Proof with Constant Communication.
Proceedings of the Financial Cryptography and Data Security, 2012

2011
Round-efficient Oblivious Database Manipulation.
IACR Cryptol. ePrint Arch., 2011

Generic Constant-Round Oblivious Sorting Algorithm for MPC.
Proceedings of the Provable Security - 5th International Conference, 2011

Simulatable Adaptive Oblivious Transfer with Statistical Receiver's Privacy.
Proceedings of the Provable Security - 5th International Conference, 2011

2010
Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

Two New Efficient PIR-Writing Protocols.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009


  Loading...