Dong Zheng

Orcid: 0000-0002-3860-2037

Affiliations:
  • Xi'an University of Posts and Telecommunications, National Engineering Laboratory for Wireless Security, China
  • Shanghai Jiao Tong University, School of Information Security Engineering, China (former)
  • Xidian University, Xi'an, China (PhD 1999)


According to our database1, Dong Zheng authored at least 154 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Covert Communication in a Multirelay-Assisted Wireless Network With an Active Warden.
IEEE Internet Things J., May, 2024

Privacy-Preserving Medical Data Sharing Scheme Based on Two-Party Cloud-Assisted PSI.
IEEE Internet Things J., May, 2024

DRCLAS: An efficient certificateless aggregate signature scheme with dynamic revocation in vehicular ad-hoc networks.
Veh. Commun., 2024

Further construction of even-variable balanced rotation symmetric Boolean functions with optimal algebraic immunity.
Theor. Comput. Sci., 2024

Cooperative Jamming and Relay Selection for Covert Communications in Wireless Relay Systems.
IEEE Trans. Commun., 2024

Pairing-free Proxy Re-Encryption scheme with Equality Test for data security of IoT.
J. King Saud Univ. Comput. Inf. Sci., 2024

Covert Communication for Untrusted UAV-Assisted Wireless Systems.
CoRR, 2024

Covert Communication for UAV-Assisted Wireless Systems with Probabilistic Jamming.
Proceedings of the International Conference on Networking and Network Applications, 2024

GAN Augmentation-Based Continuous Authentication for Vehicular Digital Twin.
Proceedings of the IEEE International Conference on Communications, 2024

2023
A lattice-based designated-server public-key authenticated encryption with keyword search.
J. Syst. Archit., December, 2023

pdRide: Privacy-Preserving Distributed Online Ride-Hailing Matching Scheme.
IEEE Trans. Intell. Transp. Syst., November, 2023

A unified construction of weightwise perfectly balanced Boolean functions.
Discret. Appl. Math., October, 2023

A Novel Authentication Scheme Supporting Multiple User Access for 5G and Beyond.
IEEE Trans. Dependable Secur. Comput., 2023

Searchable Encryption With Autonomous Path Delegation Function and Its Application in Healthcare Cloud.
IEEE Trans. Cloud Comput., 2023

Secure and Efficient Smart Healthcare System Based on Federated Learning.
Int. J. Intell. Syst., 2023

Cooperative Jamming and Relay Selection for Covert Communications.
CoRR, 2023

Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search.
IEEE Access, 2023

A Group-oriented Authentication Scheme for IoT Devices in 5G Networks.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023

Blockchain-based Multi-Factor Group Authentication in Metaverse.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

Efficient Group Authentication and Key Agreement Scheme for Vehicular Digital Twin.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy Protection.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
SecCDV: A Security Reference Architecture for Cybertwin-Driven 6G V2X.
IEEE Trans. Veh. Technol., 2022

Secure medical data sharing scheme based on traceable ring signature and blockchain.
Peer-to-Peer Netw. Appl., 2022

Blockchain-Enabled decentralized Attribute-Based access control with policy hiding for smart healthcare.
J. King Saud Univ. Comput. Inf. Sci., 2022

A novel privacy protection scheme for internet of things based on blockchain and privacy set intersection technique.
J. Cloud Comput., 2022

Blockchain-based verifiable privacy-preserving data classification protocol for medical data.
Comput. Stand. Interfaces, 2022

SPDT: Secure and Privacy-Preserving Scheme for Digital Twin-based Traffic Control.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2022

A Collaborative Access Control Scheme Based on Incentive Mechanisms.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

2021
Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing.
IEEE Trans. Serv. Comput., 2021

Robust and Universal Seamless Handover Authentication in 5G HetNets.
IEEE Trans. Dependable Secur. Comput., 2021

Publicly Verifiable Outsourcing Computation for QR Decomposition Based on Blockchain.
Secur. Commun. Networks, 2021

A trust-based privacy-preserving friend matching scheme in social Internet of Vehicles.
Peer-to-Peer Netw. Appl., 2021

SRSP: A Secure and Reliable Smart Parking Scheme With Dual Privacy Preservation.
IEEE Internet Things J., 2021

O<sup>3</sup>-R-CP-ABE: An Efficient and Revocable Attribute-Based Encryption Scheme in the Cloud-Assisted IoMT System.
IEEE Internet Things J., 2021

SPSC: A secure and privacy-preserving autonomous platoon setup and communication scheme.
Trans. Emerg. Telecommun. Technol., 2021

Attribute-based Encryption for Cloud Computing Access Control: A Survey.
ACM Comput. Surv., 2021

Flexible and anonymous network slicing selection for C-RAN enabled 5G service authentication.
Comput. Commun., 2021

Improved Security Model for Public-Key Authenticated Encryption with Keyword Search.
Proceedings of the Provable and Practical Security, 2021

Forward-Secure Revocable Identity-Based Encryption.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
An Efficient Searchable Public-Key Authenticated Encryption for Cloud-Assisted Medical Internet of Things.
Wirel. Commun. Mob. Comput., 2020

Cloud-Assisted Attribute-Based Data Sharing with Efficient User Revocation in the Internet of Things.
IEEE Wirel. Commun., 2020

An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud.
J. Supercomput., 2020

Toward Assured Data Deletion in Cloud Storage.
IEEE Netw., 2020

Security and Privacy Challenges in 5G-Enabled Vehicular Networks.
IEEE Netw., 2020

Public-key authenticated encryption with keyword search revisited: Security model and constructions.
Inf. Sci., 2020

SPIR: A Secure and Privacy-Preserving Incentive Scheme for Reliable Real-Time Map Updates.
IEEE Internet Things J., 2020

An Efficient Mobile Location-based Service Framework for Resource-constrained Devices.
Int. J. Netw. Secur., 2020

A Novel Blockchain-based Anonymous Handover Authentication Scheme in Mobile Networks.
Int. J. Netw. Secur., 2020

A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing.
Int. J. Distributed Sens. Networks, 2020

Revocable and certificateless public auditing for cloud storage.
Sci. China Inf. Sci., 2020

Space efficient revocable IBE for mobile devices in cloud computing.
Sci. China Inf. Sci., 2020

Cloud-Assisted Privacy Protection for Data Retrieval Against Keyword Guessing Attacks.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Dual Privacy-Preserving Health Data Aggregation Scheme Assisted by Medical Edge Computing.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020

2019
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT.
IEEE Trans. Ind. Informatics, 2019

A QR Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things.
Secur. Commun. Networks, 2019

一种基于QC-LDPC码的数字签名算法 (Digital Signature Algorithm Based on QC-LDPC Code).
计算机科学, 2019

A QC-LDPC Code Based Digital Signature Algorithm.
J. Inf. Sci. Eng., 2019

Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage.
KSII Trans. Internet Inf. Syst., 2019

(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance.
Inf. Sci., 2019

Comments on "A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing".
IEEE Internet Things J., 2019

Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity.
Int. J. Found. Comput. Sci., 2019

Constructions of 2-Rotation Symmetric Semi-Bent Functions with Degree Bigger than 2.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Construction of Resilient Boolean and Vectorial Boolean Functions with High Nonlinearity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things.
Ann. des Télécommunications, 2019

Efficient and privacy-preserving traceable attribute-based encryption in blockchain.
Ann. des Télécommunications, 2019

A Traceable Blockchain-Based Access Authentication System With Privacy Preservation in VANETs.
IEEE Access, 2019

Certificateless Multi-Party Authenticated Encryption for NB-IoT Terminals in 5G Networks.
IEEE Access, 2019

Shared Dynamic Data Audit Supporting Anonymous User Revocation in Cloud Storage.
IEEE Access, 2019

Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing.
IEEE Access, 2019

Flexible and Efficient Blockchain-Based ABE Scheme With Multi-Authority for Medical on Demand in Telemedicine System.
IEEE Access, 2019

An Anti-Quantum E-Voting Protocol in Blockchain With Audit Function.
IEEE Access, 2019

A Trust-based Real-time Map Updating Scheme.
Proceedings of the 2019 IEEE/CIC International Conference on Communications in China, 2019

2018
SEGM: A secure group management framework in integrated VANET-cellular networks.
Veh. Commun., 2018

Efficient and secure big data storage system with leakage resilience in cloud computing.
Soft Comput., 2018

Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing.
Sensors, 2018

Hidden Policy Attribute-Based Data Sharing with Direct Revocation and Keyword Search in Cloud Computing.
Sensors, 2018

Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing.
Secur. Commun. Networks, 2018

A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience.
Secur. Commun. Networks, 2018

SEIP: Secure and seamless IP communications for group-oriented machine to machine communications.
Peer-to-Peer Netw. Appl., 2018

灵活访问且模糊可搜索的EHR云服务系统 (Flexibly Accessed and Vaguely Searchable EHR Cloud Service System).
计算机科学, 2018

Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice.
J. Netw. Comput. Appl., 2018

Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things.
J. Netw. Comput. Appl., 2018

Efficient and privacy-aware attribute-based data sharing in mobile cloud computing.
J. Ambient Intell. Humaniz. Comput., 2018

Blockchain based efficient and robust fair payment for outsourcing services in cloud computing.
Inf. Sci., 2018

Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control.
IEEE Internet Things J., 2018

Constructions of rotation symmetric bent functions with high algebraic degree.
Discret. Appl. Math., 2018

Bounded Revocable and Outsourceable ABE for Secure Data Sharing.
Comput. J., 2018

Chameleon all-but-one extractable hash proof and its applications.
Sci. China Inf. Sci., 2018

Fine-Grained Access Control Systems Suitable for Resource-Constrained Users in Cloud Computing.
Comput. Informatics, 2018

Efficient and Privacy-Preserving Medical Data Sharing in Internet of Things With Limited Computing Power.
IEEE Access, 2018

TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain.
IEEE Access, 2018

Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems.
IEEE Access, 2018

Privacy-Aware Data Collection and Aggregation in IoT Enabled Fog Computing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Smart Grid Power Trading Based on Consortium Blockchain in Internet of Things.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
1-Resilient Boolean Functions on Even Variables with Almost Perfect Algebraic Immunity.
Secur. Commun. Networks, 2017

Towards privacy protection and malicious behavior traceability in smart health.
Pers. Ubiquitous Comput., 2017

Efficient and Privacy-Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks.
Mob. Inf. Syst., 2017

改进的具有轻量级结构的Veron身份认证及数字签名方案 (Improved Veron's Identification with Lightweight Structure and Digital Signature Scheme).
计算机科学, 2017

An Efficient Code Based Digital Signature Algorithm.
Int. J. Netw. Secur., 2017

Characterizing Linear Structures of Boolean Functions from Arithmetic Walsh Transform.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Two classes of rotation symmetric semi-bent functions.
Sci. China Inf. Sci., 2017

Achieving Secure and Seamless IP Communications for Group-Oriented Software Defined Vehicular Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

PADA: Privacy-Aware Data Aggregation with Efficient Communication for Power Injection in 5G Smart Grid Slice.
Proceedings of the International Conference on Networking and Network Applications, 2017

Privacy-Preserving Medical Information Systems Using Multi-authority Content-Based Encryption in Cloud.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Attribute-Based Encryption with Multi-keyword Search.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Anonymous Attribute-Based Encryption with Large Universe and Threshold Access Structures.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

An Efficient and Secure Deduplication Scheme Based on Rabin Fingerprinting in Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
Secure machine-type communications in LTE networks.
Wirel. Commun. Mob. Comput., 2016

Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing.
Secur. Commun. Networks, 2016

SPGS: a secure and privacy-preserving group setup framework for platoon-based vehicular cyber-physical systems.
Secur. Commun. Networks, 2016

Efficient attribute-based data sharing in mobile clouds.
Pervasive Mob. Comput., 2016

GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications.
Comput. Networks, 2016

Efficient and Expressive Anonymous Attribute-Based Encryption for Mobile Cloud Computing.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Construction of Boolean Functions with Optimal Algebraic Immunity.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
深空网络的高效安全通信机制 (Efficient and Secure Communication Scheme for Deep Space Networks).
计算机科学, 2015

Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions.
IEEE Commun. Mag., 2015

SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

2014
PWG: Progressive Weight-Growth Algorithm for LDPC Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts.
Proceedings of the Provable Security - 8th International Conference, 2014

An application of newton formula on the computation of finite field trace.
Proceedings of the IEEE International Conference on Information and Automation, 2014

2012
On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes.
IACR Cryptol. ePrint Arch., 2012

Optimal Multiple Assignments with (m, m)-Scheme for General Access Structures.
IACR Cryptol. ePrint Arch., 2012

2011
YI Cloud: Improving user privacy with secret key recovery in cloud storage.
Proceedings of the IEEE 6th International Symposium on Service Oriented System Engineering, 2011

On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs.
Proceedings of the Information Security Practice and Experience, 2011

2010
Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards.
IEEE Trans. Ind. Electron., 2010

Regular Quasi-cyclic LDPC Codes with Girth 6 from Prime Fields.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2009
Receipt-Freeness for Groth e-Voting Schemes.
J. Inf. Sci. Eng., 2009

Toward optimizing cauchy matrix for cauchy reed-solomon code.
IEEE Commun. Lett., 2009

Democratic group signatures with collective traceability.
Comput. Electr. Eng., 2009

AE-BP: Adaptive Erasure Belief Propagation Decoding Algorithm of LDPC Codes.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Extended PEG Algorithm for High Rate LDPC Codes.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

2008
A Generic Construction for Instrusion-Resilient Signatures from Linear Feedback Shift Register.
J. Inf. Sci. Eng., 2008

Democratic Group Signatures with Threshold Traceability.
IACR Cryptol. ePrint Arch., 2008

A Tamper-Evident Voting Machine Resistant to Covert Channels.
Proceedings of the Provable Security, Second International Conference, 2008

Identity-Based Threshold Key-Insulated Encryption without Random Oracles.
Proceedings of the Topics in Cryptology, 2008

2007
Code-based Ring Signature Scheme.
Int. J. Netw. Secur., 2007

LFSR-based Signatures with Message Recovery.
Int. J. Netw. Secur., 2007

Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions.
IACR Cryptol. ePrint Arch., 2007

Filling the Gap between Voters and Cryptography in e-Voting.
IACR Cryptol. ePrint Arch., 2007

A Receipt-Free Punch-Hole Ballot Electronic Voting Scheme.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007

Linkable Ring Signatures from Linear Feedback Shift Register.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Efficient Blind Signatures from Linear Feedback Shift Register.
Proceedings of the Cooperative Design, 2007

2006
Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i.
IACR Cryptol. ePrint Arch., 2006

2005
Transitive Signatures Based on Bilinear Maps.
Proceedings of the Security in Information Systems, 2005

Efficient and Proactive Threshold Signcryption.
Proceedings of the Information Security, 8th International Conference, 2005

A Security Solution of WLAN Based on Public Key Cryptosystem.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

A Tabu Clustering Method with DHB Operation and Mergence and Partition Operation.
Proceedings of the Discovery Science, 8th International Conference, 2005

A Novel Clustering Technique Based on Improved Noising Method.
Proceedings of the Progress in Pattern Recognition, 2005

2004
Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1.
IACR Cryptol. ePrint Arch., 2004

ID-Based Proxy Blind Signature.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2002
Multiparty Authentication Services and Key Agreement Protocols with Semi-Trusted Third Party.
J. Comput. Sci. Technol., 2002


  Loading...