Qingfeng Cheng

Orcid: 0000-0001-6149-4807

According to our database1, Qingfeng Cheng authored at least 67 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Provable secure authentication key agreement for wireless body area networks.
Frontiers Comput. Sci., October, 2024

An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain.
Frontiers Comput. Sci., June, 2024

STCLA: An Efficient Certificateless Authenticated Key Agreement Scheme for the Internet of Vehicles.
IEEE Trans. Veh. Technol., April, 2024

A Blockchain-Based Secure Covert Communication Method via Shamir Threshold and STC Mapping.
IEEE Trans. Dependable Secur. Comput., 2024

Implicit Factorization with Shared Any Bits.
IACR Commun. Cryptol., 2024

Optimizing c-sum BKW and Faster Quantum Variant for LWE.
IACR Commun. Cryptol., 2024

2023
An Anonymous and Certificateless Identity Authentication Protocol for Mobile Edge Computing.
IEEE Syst. J., December, 2023

Generalized attack on ECDSA: known bits in arbitrary positions.
Des. Codes Cryptogr., November, 2023

A secure and efficient certificateless authenticated key agreement protocol for smart healthcare.
Comput. Stand. Interfaces, August, 2023

A fine-grained privacy protection data aggregation scheme for outsourcing smart grid.
Frontiers Comput. Sci., February, 2023

2PCLA: Provable Secure and Privacy Preserving Enhanced Certificateless Authentication Scheme for Distributed Learning.
IEEE Trans. Inf. Forensics Secur., 2023

Improved Herrmann-May's Attack with Merging Variables and Lower LLL Bound.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

Quantum Augmented Lattice Attack on NTRU with Side Information.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
A Group Covert Communication Method of Digital Currency Based on Blockchain Technology.
IEEE Trans. Netw. Sci. Eng., 2022

A Novel Covert Communication Method Based on Bitcoin Transaction.
IEEE Trans. Ind. Informatics, 2022

Lightweight and Fine-Grained Privacy-Preserving Data Aggregation Scheme in Edge Computing.
IEEE Syst. J., 2022

A Certificateless Authentication and Key Agreement Scheme for Secure Cloud-assisted Wireless Body Area Network.
Mob. Networks Appl., 2022

A Lightweight and Verifiable Access Control Scheme With Constant Size Ciphertext in Edge-Computing-Assisted IoT.
IEEE Internet Things J., 2022

An efficient and authenticated key establishment scheme based on fog computing for healthcare system.
Frontiers Comput. Sci., 2022

Improvement on a batch authenticated key agreement scheme.
Frontiers Comput. Sci., 2022

An anonymous key agreement protocol with robust authentication for smart grid infrastructure.
Sci. China Inf. Sci., 2022

BS: Blockwise Sieve Algorithm for Finding Short Vectors from Sublattices.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

A Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

EHNP Strikes Back: Analyzing SM2 Implementations.
Proceedings of the Progress in Cryptology, 2022

Handle the Traces: Revisiting the Attack on ECDSA with EHNP.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing.
IEEE Syst. J., 2021

Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network.
Secur. Commun. Networks, 2021

Security Analysis of a Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments.
Secur. Commun. Networks, 2021

Privacy-Preserving Implicit Authentication Protocol Using Cosine Similarity for Internet of Things.
IEEE Internet Things J., 2021

Smart Applications in Edge Computing: Overview on Authentication and Data Security.
IEEE Internet Things J., 2021

Fuzzy vault-based three-factor authentication and key exchange for 5G-integrated wireless sensor networks.
Trans. Emerg. Telecommun. Technol., 2021

A secure spectrum auction scheme without the trusted party based on the smart contract.
Digit. Commun. Networks, 2021

An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobile commerce environment.
Sci. China Inf. Sci., 2021

A Lattice Reduction Algorithm Based on Sublattice BKZ.
Proceedings of the Provable and Practical Security, 2021

2020
An Efficient Anonymous Authentication Scheme for Mobile Pay-TV Systems.
Wirel. Commun. Mob. Comput., 2020

Analysis and improvement of a key exchange and authentication protocol in client-server environment.
J. Ambient Intell. Humaniz. Comput., 2020

Security Analysis of Two Unbalancing Pairing-free Identity-based Authenticated Key Exchange Protocols.
Int. J. Netw. Secur., 2020

Opcode sequence analysis of Android malware by a convolutional neural network.
Concurr. Comput. Pract. Exp., 2020

2019
Comments on Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting.
Int. J. Netw. Secur., 2019

User centric three-factor authentication protocol for cloud-assisted wearable devices.
Int. J. Commun. Syst., 2019

IP Geolocation based on identification routers and local delay distribution similarity.
Concurr. Comput. Pract. Exp., 2019

2018
Hydra-Bite: Static Taint Immunity, Split, and Complot Based Information Capture Method for Android Device.
Wirel. Commun. Mob. Comput., 2018

Geolocating a WeChat user based on the relation between reported and actual distance.
Int. J. Distributed Sens. Networks, 2018

2017
ICASME: An Improved Cloud-Based Authentication Scheme for Medical Environment.
J. Medical Syst., 2017

A Multi-Party Secret Handshake Scheme Based on Chaotic Maps.
Inf. Technol. Control., 2017

Analysis and improvement of the Internet-Draft IKEv3 protocol.
Int. J. Commun. Syst., 2017

A Compact Construction for Non-monotonic Online/Offline CP-ABE Scheme.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

2016
Cryptanalysis and improvement of an efficient authenticated key exchange protocol with tight security reduction.
Int. J. Commun. Syst., 2016

Attacking OpenSSL Implementation of ECDSA with a Few Signatures.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Cryptanalysis of an ID-based Authenticated Dynamic Group Key Agreement with Optimal Round.
Int. J. Netw. Secur., 2015

Security Analysis of a Pairing-free Identity-based Authenticated Group Key Agreement Protocol for Imbalanced Mobile Networks.
Int. J. Netw. Secur., 2015

2014
Cryptanalysis of a New Efficient Authenticated Multiple-Key Exchange Protocol from Bilinear Pairings.
Int. J. Netw. Secur., 2014

2013
Cryptanalysis of a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks.
IACR Cryptol. ePrint Arch., 2013

2012
Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol.
IACR Cryptol. ePrint Arch., 2012

Cryptanalysis of an Identity-Based Multiple Key Agreement Scheme.
IACR Cryptol. ePrint Arch., 2012

2011
Anonymous gateway-oriented password-based authenticated key exchange based on RSA.
EURASIP J. Wirel. Commun. Netw., 2011

Analysis and improvement of an authenticated multiple key exchange protocol.
Comput. Electr. Eng., 2011

Analysis and improvement of a new authenticated group key agreement in a mobile environment.
Ann. des Télécommunications, 2011

2010
A modified eCK model with stronger security for tripartite authenticated key exchange.
IACR Cryptol. ePrint Arch., 2010

Security weakness of two authenticated key exchange protocols from pairings.
IACR Cryptol. ePrint Arch., 2010

Security Weakness of Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys
CoRR, 2010

Three-Party Password-Based Authenticated Key Exchange Protocol Based on Bilinear Pairings.
Proceedings of the Information Computing and Applications - First International Conference, 2010

2009
Ephemeral key compromise attack on the IB-KA protocol.
IACR Cryptol. ePrint Arch., 2009

Security Weakness in Two Authenticated Key Exchange Protocols.
IACR Cryptol. ePrint Arch., 2009

A New Strongly Secure Authenticated Key Exchange Protocol.
Proceedings of the Advances in Information Security and Assurance, 2009

Password Authenticated Key Exchange Based on RSA in the Three-Party Settings.
Proceedings of the Provable Security, Third International Conference, 2009

A New Efficient and Strongly Secure Authenticated Key Exchange Protocol.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...