Lunzhi Deng

Orcid: 0000-0002-9688-1062

According to our database1, Lunzhi Deng authored at least 51 papers between 2013 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Revocable certificate-based broadcast signcryption scheme for edge-enabled IIoT.
Inf. Sci., 2025

2024
Cryptanalysis of a key exchange protocol based on a modified tropical structure.
Des. Codes Cryptogr., November, 2024

The blockchain-based privacy-preserving searchable attribute-based encryption scheme for federated learning model in IoMT.
Concurr. Comput. Pract. Exp., November, 2024

Certificateless Aggregate Signature Scheme With Security Proofs in the Standard Model Suitable for Internet of Vehicles.
IEEE Internet Things J., September, 2024

Secure and Distributed IoV Data Sharing Scheme Based on a Hybrid PoS Blockchain Protocol.
IEEE Trans. Veh. Technol., August, 2024

An Efficient Certificateless Anonymous Signcryption Scheme for WBAN.
Sensors, August, 2024

Reduction of the semigroup-action problem on a module to the hidden-subgroup problem.
Quantum Inf. Process., August, 2024

Certificateless Broadcast Encryption with Authorization Suitable for Storing Personal Health Records.
Comput. J., February, 2024

Conditional privacy-preserving and efficient distributed IoV data sharing scheme based on a hierarchical and zonal blockchain.
Veh. Commun., 2024

Identity-Based Data Auditing Scheme With Provable Security in the Standard Model Suitable for Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2024

Certificateless integrity auditing scheme for sensitive information protection in cloud storage.
J. Syst. Archit., 2024

2023
Certificateless Provable Data Possession Scheme Suitable for Smart Grid Management Systems.
IEEE Syst. J., September, 2023

Certificateless Anonymous Signcryption Scheme With Provable Security in the Standard Model Suitable for Healthcare Wireless Sensor Networks.
IEEE Internet Things J., September, 2023

Secure and Efficient Certificateless Searchable Authenticated Encryption Scheme Without Random Oracle for Industrial Internet of Things.
IEEE Syst. J., March, 2023

Certificateless Provable Data Possession Scheme With Provable Security in the Standard Model Suitable for Cloud Storage.
IEEE Trans. Serv. Comput., 2023

Secure Identity-Based Designated Verifier Anonymous Aggregate Signature Scheme Suitable for Smart Grids.
IEEE Internet Things J., 2023

An efficient revocable identity-based encryption with ciphertext evolution in the cloud-assisted system.
Concurr. Comput. Pract. Exp., 2023

2022
Certificateless encryption scheme with provable security in the standard model suitable for mobile devices.
Inf. Sci., 2022

2021
Secure Identity-Based Blind Signature Scheme for Online Transactions.
Wirel. Pers. Commun., 2021

A robust smart card and remote user password-based authentication protocol using extended chaotic maps under smart cities environment.
Soft Comput., 2021

Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks.
Peer-to-Peer Netw. Appl., 2021

Certificateless two-party authenticated key agreement scheme for smart grid.
Inf. Sci., 2021

Certificateless Designated Verifier Anonymous Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.
IEEE Internet Things J., 2021

Identity-Based Partially Blind Signature Scheme: Cryptanalysis and Construction.
IEEE Access, 2021

2020
Anonymous certificateless multi-receiver encryption scheme for smart community management systems.
Soft Comput., 2020

A Lightweight Certificateless Aggregation Signature Scheme With Provably Security in the Standard Model.
IEEE Syst. J., 2020

Anonymous Aggregate Encryption Scheme for Industrial Internet of Things.
IEEE Syst. J., 2020

Provably secure certificateless encryption scheme in the standard model.
KSII Trans. Internet Inf. Syst., 2020

An Identity Based Proxy Signcryption Scheme without Pairings.
Int. J. Netw. Secur., 2020

Certificateless Ring Signcryption Scheme from Pairings.
Int. J. Netw. Secur., 2020

Zero-knowledge identification scheme with companion matrices of primitive polynomials.
Int. J. Embed. Syst., 2020

An improved certificateless two-party authenticated key agreement protocol for wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2020

A Lightweight Identity-Based Remote Data Auditing Scheme for Cloud Storage.
IEEE Access, 2020

Certificateless Linkable Ring Signature Scheme.
IEEE Access, 2020

2019
An efficient certificateless multi-receiver threshold decryption scheme.
RAIRO Theor. Informatics Appl., 2019

Certificateless Short Aggregate Signature Scheme for Mobile Devices.
IEEE Access, 2019

Identity-Based Linkable Ring Signature Scheme.
IEEE Access, 2019

2018
Multi-proxy Multi-signature without Pairing from Certificateless Cryptography.
Int. J. Netw. Secur., 2018

Certificateless short signature scheme from pairing in the standard model.
Int. J. Commun. Syst., 2018

Insecurity of a provably secure and lightweight certificateless signature scheme for IIoT environments.
IACR Cryptol. ePrint Arch., 2018

2017
Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group.
KSII Trans. Internet Inf. Syst., 2017

Identity Based Proxy Signature from RSA without Pairings.
Int. J. Netw. Secur., 2017

Zero-Knowledge Identification Scheme Based on Symmetry Ergodic Matrices Exponentiation Problem.
Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, 2017

2016
Efficient Certificateless Proxy Signature Scheme.
Int. J. Found. Comput. Sci., 2016

An efficient certificateless multi-proxy signature scheme without pairing.
Int. J. Electron. Secur. Digit. Forensics, 2016

2015
Certificateless ring signature based on RSA problem and DL problem.
RAIRO Theor. Informatics Appl., 2015

A Zero-Knowledge Identification Scheme Based on Matrix Power Problem.
Proceedings of the 10th International Conference on P2P, 2015

2014
Two new identity-based threshold ring signature schemes.
Theor. Comput. Sci., 2014

A new identity-based ring signcryption scheme.
Int. J. Electron. Secur. Digit. Forensics, 2014

Identity-based threshold ring signcryption from pairing.
Int. J. Electron. Secur. Digit. Forensics, 2014

2013
An Improved Identity-Based Ring Signcryption Scheme.
Inf. Secur. J. A Glob. Perspect., 2013


  Loading...