Lei Zhang

Orcid: 0000-0001-8786-4562

Affiliations:
  • East China Normal University, Shanghai Key Laboratory of Trustworthy Computing, China
  • Universitat Rovira i Virgili, Spain (PhD 2010)
  • Nanjing Normal University, China (former)


According to our database1, Lei Zhang authored at least 84 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Dual-Server-Based Lightweight Privacy-Preserving Federated Learning.
IEEE Trans. Netw. Serv. Manag., August, 2024

Privacy-Preserving Serverless Federated Learning Scheme for Internet of Things.
IEEE Internet Things J., June, 2024

Secure Channel Establishment Scheme for Task Delivery in Vehicular Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2024

Provably secure multi-signature scheme based on the standard SM2 signature scheme.
Comput. Stand. Interfaces, 2024

2023
Privacy-Preserving and Reliable Decentralized Federated Learning.
IEEE Trans. Serv. Comput., 2023

Identity-Based Key Management Scheme for Secure Discussion Group Establishment in DOSNs.
IEEE Trans. Inf. Forensics Secur., 2023

Dynamic Authenticated Asymmetric Group Key Agreement With Sender Non-Repudiation and Privacy for Group-Oriented Applications.
IEEE Trans. Dependable Secur. Comput., 2023

Provably Secure Receiver-Unrestricted Group Key Management Scheme for Mobile Ad Hoc Networks.
Sensors, 2023

Practical privacy-preserving mixing protocol for Bitcoin.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
Hybrid and Hierarchical Aggregation-Verification Scheme for VANET.
IEEE Trans. Veh. Technol., 2022

Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities.
IEEE Trans. Serv. Comput., 2022

Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET.
IEEE Trans. Inf. Forensics Secur., 2022

Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing.
IEEE Trans. Cloud Comput., 2022

A Secure and Receiver-Unrestricted Group Key Management Scheme for Mobile Ad-hoc Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

CRFs for Digital Signature and NIZK Proof System in Web Services.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022

2021
Key Management Scheme for Secure Channel Establishment in Fog Computing.
IEEE Trans. Cloud Comput., 2021

Blockchain-Based Key Management Scheme in Fog-Enabled IoT Systems.
IEEE Internet Things J., 2021

Secure, Robust and Flexible Cooperative Downloading Scheme for Highway VANETs.
IEEE Access, 2021

Secure and Reliable Parking Protocol Based on Blockchain for VANETs.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

Privacy-Preserving and Reliable Federated Learning.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

2020
Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud.
IEEE Trans. Dependable Secur. Comput., 2020

Key-Free Authentication Protocol Against Subverted Indoor Smart Devices for Smart Home.
IEEE Internet Things J., 2020

2019
Blockchain based secure data sharing system for Internet of vehicles: A position paper.
Veh. Commun., 2019

Nonce-Based Key Agreement Protocol Against Bad Randomness.
Int. J. Found. Comput. Sci., 2019

Group Signatures with Decentralized Tracing.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
Secure intelligent traffic light control using fog computing.
Future Gener. Comput. Syst., 2018

Secure and privacy-preserving 3D vehicle positioning schemes for vehicular ad hoc network.
EURASIP J. Wirel. Commun. Netw., 2018

Enabling Robust and Privacy-Preserving Resource Allocation in Fog Computing.
IEEE Access, 2018

2017
Distributed Aggregate Privacy-Preserving Authentication in VANETs.
IEEE Trans. Intell. Transp. Syst., 2017

OTIBAAGKA: A New Security Tool for Cryptographic Mix-Zone Establishment in Vehicular Ad Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2017

Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol.
Inf. Sci., 2017

Certificateless and identity-based authenticated asymmetric group key agreement.
Int. J. Inf. Sec., 2017

2016
Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud.
IEEE Trans. Inf. Forensics Secur., 2016

Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response.
IEEE Trans. Computers, 2016

Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts.
IEEE Trans. Computers, 2016

Cloud Cryptography: Theory, Practice and Future Research Directions.
Future Gener. Comput. Syst., 2016

2015
Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications.
IEEE Trans. Inf. Forensics Secur., 2015

Certificateless one-pass and two-party authenticated key agreement protocol and its extensions.
Inf. Sci., 2015

On the Security of MTA-OTIBASs (Multiple-TA One-Time Identity-Based Aggregate Signatures).
CoRR, 2015

On the Security of Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response.
CoRR, 2015

Practical secure and privacy-preserving scheme for value-added applications in VANETs.
Comput. Commun., 2015

Non-interactive Revocable Identity-Based Access Control over e-Healthcare Records.
Proceedings of the Information Security Practice and Experience, 2015

2014
Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security.
Inf. Sci., 2014

Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts.
Inf. Sci., 2014

Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement.
Proceedings of the Information Security Practice and Experience, 2014

Who Is Touching My Cloud.
Proceedings of the Computer Security - ESORICS 2014, 2014

Security Enhanced Anonymous Remote User Authentication and Key Agreement for Cloud Computing.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
IEEE/ACM Trans. Netw., 2013

Identity-based optimistic fair exchange in the standard model.
Secur. Commun. Networks, 2013

Corrigendum: "Provably-secure electronic cash based on certicateless partially-blind signatures".
Electron. Commer. Res. Appl., 2013

On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

A Generic Construction of Proxy Signatures from Certificateless Signatures.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
Delegation of signing rights using certificateless proxy signatures.
Inf. Sci., 2012

Provably secure threshold public-key encryption with adaptive security and short ciphertexts.
Inf. Sci., 2012

Practical Privacy for Value-Added Applications in Vehicular Ad Hoc Networks.
Proceedings of the Internet and Distributed Computing Systems, 2012

Provably Secure Certificateless One-Way and Two-Party Authenticated Key Agreement Protocol.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Cryptanalysis of a Certificateless Multi-Proxy Signature Scheme - (Short Paper).
Proceedings of the Distributed Computing and Networking - 13th International Conference, 2012

2011
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol.
Inf. Sci., 2011

Provably-secure electronic cash based on certificateless partially-blind signatures.
Electron. Commer. Res. Appl., 2011

Asymmetric group key agreement protocol for open networks and its application to broadcast encryption.
Comput. Networks, 2011

Fully Distributed Broadcast Encryption.
Proceedings of the Provable Security - 5th International Conference, 2011

APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks.
Proceedings of the Information Security, 14th International Conference, 2011

Preserving Security and Privacy in Large-Scale VANETs.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Bridging Broadcast Encryption and Group Key Agreement.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Research on security and privacy in vehicular ad hoc networks.
PhD thesis, 2010

A Scalable Robust Authentication Protocol for Secure Vehicular Communications.
IEEE Trans. Veh. Technol., 2010

Simulatable certificateless two-party authenticated key agreement protocol.
Inf. Sci., 2010

Certificateless threshold signature scheme from bilinear maps.
Inf. Sci., 2010

Identity-Based Authenticated Asymmetric Group Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2010

Efficient many-to-one authentication with certificateless aggregate signatures.
Comput. Networks, 2010

Secure compression of privacy-preserving witnesses in vehicular ad hoc networks.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Authenticated Asymmetric Group Key Agreement Protocol and Its Application.
Proceedings of IEEE International Conference on Communications, 2010

Hierarchical Certificateless Signatures.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Ad hoc broadcast encryption.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
A new certificateless aggregate signature scheme.
Comput. Commun., 2009

Identity-Based Verifiably Encrypted Signatures without Random Oracles.
Proceedings of the Provable Security, Third International Conference, 2009

Novel Efficient Certificateless Aggregate Signatures.
Proceedings of the Applied Algebra, 2009

Certificateless One-Way Authenticated Two-Party Key Agreement Protocol.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
A New Provably Secure Certificateless Signature Scheme.
Proceedings of IEEE International Conference on Communications, 2008

Security Model for Certificateless Aggregate Signature Schemes.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
A Provably Secure Ring Signature Scheme in Certificateless Cryptography.
Proceedings of the Provable Security, 2007

New Efficient Certificateless Signature Scheme.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007


  Loading...