Futai Zhang

Orcid: 0000-0001-8984-1030

According to our database1, Futai Zhang authored at least 78 papers between 2000 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Practical two-party SM2 signing using multiplicative-to-additive functionality.
Comput. Stand. Interfaces, 2025

2024
An Efficient Aggregate Signature Scheme With Designated Verifier Based on the Schnorr Signature in Healthcare Wireless Sensor Networks.
IEEE Internet Things J., October, 2024

Efficient Identity-Based Dynamic Cloud Storage Data Integrity Auditing with Incremental Updates for Handheld Mobile Devices.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024

2022
Secure Data Delivery With Identity-Based Linearly Homomorphic Network Coding Signature Scheme in IoT.
IEEE Trans. Serv. Comput., 2022

Data Access Control in Cloud Computing: Flexible and Receiver Extendable.
IEEE Trans. Serv. Comput., 2022

VILS: A Verifiable Image Licensing System.
IEEE Trans. Inf. Forensics Secur., 2022

Identity-Based Key Agreement for Blockchain-Powered Intelligent Edge.
IEEE Internet Things J., 2022

An Efficient Certificate-Based Data Integrity Auditing Protocol for Cloud-Assisted WBANs.
IEEE Internet Things J., 2022

eCK-Secure Authenticated Key Exchange against Auxiliary Input Leakage.
Comput. J., 2022

Structure-Preserving Linearly Homomorphic Signature with Designated Combiner for Subspace.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
Leakage-Resilient Authenticated Key Exchange for Edge Artificial Intelligence.
IEEE Trans. Dependable Secur. Comput., 2021

Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system.
IET Inf. Secur., 2021

2020
Revocable identity-based encryption with server-aided ciphertext evolution.
Theor. Comput. Sci., 2020

Certificateless aggregate signature scheme secure against fully chosen-key attacks.
Inf. Sci., 2020

CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution.
Int. J. Found. Comput. Sci., 2020

On the General Construction of Tightly Secure Identity-Based Signature Schemes.
Comput. J., 2020

2019
Privacy-Preserving Certificateless Cloud Auditing with Multiple Users.
Wirel. Pers. Commun., 2019

Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions.
J. Comput. Sci. Technol., 2019

Threshold privacy-preserving cloud auditing with multiple uploaders.
Int. J. Inf. Sec., 2019

2018
Provably secure certificate-based encryption with leakage resilience.
Theor. Comput. Sci., 2018

CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud.
IEEE Access, 2018

Revocable Certificateless Encryption with Ciphertext Evolution.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Continuous Leakage Resilient Lossy Trapdoor Functions.
Inf., 2017

An efficient revocable ID-based encryption scheme in the standard model.
Int. J. Embed. Syst., 2017

New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
Attacks to some verifiable multi-secret sharing schemes and two improved schemes.
Inf. Sci., 2016

Continuous leakage-resilient certificate-based encryption.
Inf. Sci., 2016

Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage.
Proceedings of the Provable Security, 2016

2015
Efficient revocable certificateless encryption against decryption key exposure.
IET Inf. Secur., 2015

Information-theoretical secure verifiable secret sharing with vector space access structures over bilinear groups and its applications.
Future Gener. Comput. Syst., 2015

2014
Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles.
Secur. Commun. Networks, 2014

A Revocable Certificateless Signature Scheme.
J. Comput., 2014

Notes on the security of certificateless aggregate signature schemes.
Inf. Sci., 2014

Cryptanalysis and improvement on a certificateless encryption scheme in the standard model.
Int. J. Inf. Comput. Secur., 2014

Efficient Revocable Certificateless Encryption Secure in the Standard Model.
Comput. J., 2014

Information-Theoretical Secure Verifiable Secret Sharing with Vector Space Access Structures over Bilinear Groups.
Proceedings of the Information Security Practice and Experience, 2014

A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience.
Proceedings of the Information Security Practice and Experience, 2014

2013
On security of a certificateless signcryption scheme.
Inf. Sci., 2013

Linear threshold verifiable secret sharing in bilinear groups.
Int. J. Grid Util. Comput., 2013

Leakage-resilient identity-based encryption scheme.
Int. J. Grid Util. Comput., 2013

A revocable certificateless signature scheme.
IACR Cryptol. ePrint Arch., 2013

Corrigendum: "Provably-secure electronic cash based on certicateless partially-blind signatures".
Electron. Commer. Res. Appl., 2013

Efficient leakage-resilient public key encryption from DDH assumption.
Clust. Comput., 2013

Secure Distributed Key Generation on Vector Space Access Structures in Bilinear Groups.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Revocable Identity-Based Signature without Pairing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
Delegation of signing rights using certificateless proxy signatures.
Inf. Sci., 2012

Practical Certificateless Public Key Encryption in the Standard Model.
Proceedings of the Network and System Security - 6th International Conference, 2012

Cryptanalysis of a Certificateless Encryption Scheme in the Standard Model.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A New Variant of the Cramer-Shoup Leakage-Resilient Public Key Encryption.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
Provably-secure electronic cash based on certificateless partially-blind signatures.
Electron. Commer. Res. Appl., 2011

2010
Simulatable certificateless two-party authenticated key agreement protocol.
Inf. Sci., 2010

Certificateless threshold signature scheme from bilinear maps.
Inf. Sci., 2010

Cryptanalysis on Two Certificateless Signature Schemes.
Int. J. Comput. Commun. Control, 2010

Efficient many-to-one authentication with certificateless aggregate signatures.
Comput. Networks, 2010

2009
Cryptanalysis of a Generalized Ring Signature Scheme.
IEEE Trans. Dependable Secur. Comput., 2009

A new certificateless aggregate signature scheme.
Comput. Commun., 2009

Batch Verification for Certificateless Signature Schemes.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Provably Secure Certificateless Two-Party Authenticated Key Agreement Protocol without Pairing.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Novel Efficient Certificateless Aggregate Signatures.
Proceedings of the Applied Algebra, 2009

2008
Short Designated Verifier Signature Scheme and Its Identity-based Variant.
Int. J. Netw. Secur., 2008

Secure Certificateless Public Key Encryption without Redundancy.
IACR Cryptol. ePrint Arch., 2008

A New Provably Secure Certificateless Signature Scheme.
Proceedings of IEEE International Conference on Communications, 2008

Efficient ID.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Security Model for Certificateless Aggregate Signature Schemes.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Cryptanalysis and Improvement of Shacham-Waters Ring Signature Scheme.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004.
J. Comput. Sci. Technol., 2007

A Provably Secure Ring Signature Scheme in Certificateless Cryptography.
Proceedings of the Provable Security, 2007

New Efficient Certificateless Signature Scheme.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Strongly Secure Certificateless Public Key Encryption Without Pairing.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

2006
Restricted Universal Designated Verifier Signature.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Short (Identity-Based) Strong Designated Verifier Signature Schemes.
Proceedings of the Information Security Practice and Experience, 2006

Certificateless Designated Verifier Signature Schemes.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Short Designated Verifier Proxy Signature from Pairings.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

On the Security of Certificateless Signature Schemes from Asiacrypt 2003.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2002
Selection of Secure Hyperelliptic Curves of g_2 Based on a Subfield.
J. Comput. Sci. Technol., 2002

2001
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
Fair Electronic Cash Systems with Multiple Banks.
Proceedings of the Information Security for Global Information Infrastructures, 2000


  Loading...