Fangguo Zhang
Orcid: 0000-0002-0486-6413Affiliations:
- Sun Yat-sen University, School of Computer Science and Engineering, Guangzhou, China
According to our database1,
Fangguo Zhang
authored at least 253 papers
between 2000 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
Comput. Stand. Interfaces, 2025
Comput. Stand. Interfaces, 2025
2024
Lattice based distributed threshold additive homomorphic encryption with application in federated learning.
Comput. Stand. Interfaces, January, 2024
Proceedings of the Information and Communications Security - 26th International Conference, 2024
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
Cybersecur., December, 2023
Finite Fields Their Appl., October, 2023
J. Inf. Secur. Appl., August, 2023
Quantum circuits for hyperelliptic curve discrete logarithms over the Mersenne prime fields.
Quantum Inf. Process., July, 2023
Theor. Comput. Sci., 2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
Post-quantum Dropout-Resilient Aggregation for Federated Learning via Lattice-Based PRF.
Proceedings of the Artificial Intelligence Security and Privacy, 2023
2022
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., December, 2022
Optimizing the evaluation of <i>ℓ</i>-isogenous curve for isogeny-based cryptography.
Inf. Process. Lett., 2022
Int. J. Intell. Syst., 2022
Software Implementation of Optimal Pairings on Elliptic Curves with Odd Prime Embedding Degrees.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022
Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Conjunctive multi-key searchable encryption with attribute-based access control for EHR systems.
Comput. Stand. Interfaces, 2022
Comput. Stand. Interfaces, 2022
Sci. China Inf. Sci., 2022
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022
Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization.
Proceedings of the Information Security - 25th International Conference, 2022
Proceedings of the IEEE International Symposium on Information Theory, 2022
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022
A Distributed Threshold Additive Homomorphic Encryption for Federated Learning with Dropout Resiliency Based on Lattice.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022
2021
Wirel. Pers. Commun., 2021
IEEE Trans. Inf. Theory, 2021
ASBKS: Towards Attribute Set Based Keyword Search Over Encrypted Personal Health Records.
IEEE Trans. Dependable Secur. Comput., 2021
Theor. Comput. Sci., 2021
IACR Cryptol. ePrint Arch., 2021
Secure Linear Aggregation Using Decentralized Threshold Additive Homomorphic Encryption For Federated Learning.
CoRR, 2021
Proceedings of the Provable and Practical Security, 2021
Proceedings of the Parallel and Distributed Computing, Applications and Technologies, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
IEEE Trans. Ind. Informatics, 2020
Authorized Keyword Searches on Public Key Encrypted Data With Time Controlled Keyword Privacy.
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Computers, 2020
Quantum Inf. Process., 2020
Inf. Sci., 2020
A new secret handshake scheme with multi-symptom intersection for mobile healthcare social networks.
Inf. Sci., 2020
IET Inf. Secur., 2020
Comput. Commun., 2020
Intersection-policy private mutual authentication from authorized private set intersection.
Sci. China Inf. Sci., 2020
Proceedings of the International Symposium on Information Theory and Its Applications, 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
Soft Comput., 2019
KSII Trans. Internet Inf. Syst., 2019
IEEE Access, 2019
Proceedings of the 2019 IEEE Information Theory Workshop, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
2018
Privacy preserving multi-party computation delegation for deep learning in cloud computing.
Inf. Sci., 2018
Int. J. Embed. Syst., 2018
Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control.
Future Gener. Comput. Syst., 2018
AFCoin: A Framework for Digital Fiat Currency of Central Banks Based on Account Model.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE.
KSII Trans. Internet Inf. Syst., 2017
Int. J. High Perform. Comput. Netw., 2017
Computing elliptic curve discrete logarithms with improved baby-step giant-step algorithm.
Adv. Math. Commun., 2017
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
2016
J. Comput. Syst. Sci., 2016
Future Gener. Comput. Syst., 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
IEEE Trans. Smart Grid, 2015
Int. J. Netw. Secur., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Concurr. Comput. Pract. Exp., 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Inf. Sci., 2014
Inf. Sci., 2014
Concurr. Comput. Pract. Exp., 2014
Public-key encryption scheme with selective opening chosen-ciphertext security based on the Decisional Diffie-Hellman assumption.
Concurr. Comput. Pract. Exp., 2014
Sci. China Inf. Sci., 2014
Comput. Electr. Eng., 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Information and Communication Technology, 2014
2013
A non-delegatable strong designated verifier signature in ID-based setting for mobile environment.
Math. Comput. Model., 2013
Cryptoanalysis and improvement of smart prepayment meter protocol in standard Q/GDW 365.
Int. J. Grid Util. Comput., 2013
Des. Codes Cryptogr., 2013
Clust. Comput., 2013
Selectively unforgeable but existentially forgeable signature schemes and applications.
Sci. China Inf. Sci., 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Improving the Parallelized Pollard Rho Method for Computing Elliptic Curve Discrete Logarithms.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
2012
Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority.
J. Syst. Softw., 2012
J. Medical Syst., 2012
Improved Pollard rho method for computing discrete logarithms over finite extension fields.
J. Comput. Appl. Math., 2012
An Efficient Collision Detection Method for Computing Discrete Logarithms with Pollard's Rho.
J. Appl. Math., 2012
Times Limited Accountable Anonymous Online Submission Control System from Single-Verifier <i>k</i>-times Group Signature.
Informatica (Slovenia), 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
A Class of 1-Resilient Functions in Odd Variables with High Nonlinearity and Suboptimal Algebraic Immunity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IACR Cryptol. ePrint Arch., 2012
On the Existence of Boolean Functions with Optimal Resistance against Fast Algebraic Attacks.
IACR Cryptol. ePrint Arch., 2012
Comput. Secur., 2012
Comput. Electr. Eng., 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Theor. Comput. Sci., 2011
J. Netw. Comput. Appl., 2011
Int. J. Netw. Secur., 2011
Int. J. Netw. Secur., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Des. Codes Cryptogr., 2011
Comput. Electr. Eng., 2011
Proceedings of the Provable Security - 5th International Conference, 2011
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
Two Applications of an Incomplete Additive Character Sum to Estimating Nonlinearity of Boolean Functions.
Proceedings of the Information and Communications Security - 13th International Conference, 2011
On Relationship of Computational Diffie-Hellman Problem and Computational Square-Root Exponent Problem.
Proceedings of the Coding and Cryptology - Third International Workshop, 2011
Finding More Boolean Functions with Maximum Algebraic Immunity Based on Univariate Polynomial Representation.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
Sci. China Inf. Sci., 2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the Public Key Infrastructures, Services and Applications, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05.
Inf. Process. Lett., 2009
Int. J. Netw. Secur., 2009
Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems.
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Comments and Improvements on Chameleon Hashing Without Key Exposure Based on Factoring.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the Advances in Information Security and Assurance, 2009
2008
Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme.
J. Comput. Sci. Technol., 2008
Inf. Sci., 2008
Int. J. Netw. Secur., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IACR Cryptol. ePrint Arch., 2008
Sci. China Ser. F Inf. Sci., 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
J. Syst. Softw., 2007
On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature.
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Provable Security, 2007
Proceedings of the IEEE International Symposium on Information Theory, 2007
Proceedings of the Third International Conference on Natural Computation, 2007
Proceedings of the Computational Science and Its Applications, 2007
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Progressin Cryptology, 2006
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the Information Security Practice and Experience, 2006
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings.
Proceedings of the Financial Cryptography and Data Security, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006
2005
IEEE Commun. Lett., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Appl. Math. Comput., 2005
New identity-based society oriented signature schemes from pairings on elliptic curves.
Appl. Math. Comput., 2005
Proceedings of the Information Security and Cryptology, 2005
Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures).
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
2004
J. Comput. Sci. Technol., 2004
Inf. Process. Lett., 2004
Proceedings of the Public Key Cryptography, 2004
Proceedings of the Progress in Cryptology, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the Advances in Computer Science, 2004
Proceedings of the Applied Cryptography and Network Security, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
J. Comput. Sci. Technol., 2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing.
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings.
Proceedings of the Progress in Cryptology, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
J. Comput. Sci. Technol., 2002
An Anonymous Mobile Agents Scheme for Secure Web Transaction over the Internet.
Informatica (Slovenia), 2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
SAWT: A New System for Secure and Anonymous Web Transactions over the Internet.
J. Res. Pract. Inf. Technol., 2002
Proceedings of the Advances in Cryptology, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
2000
Fair Electronic Cash Systems with Multiple Banks.
Proceedings of the Information Security for Global Information Infrastructures, 2000