Rui Zhang
Orcid: 0000-0002-4221-1311Affiliations:
- Chinese Academy of Sciences (CAS), State Key Laboratory of Information Security, China (since 2011)
- National Institute of Advanced Industrial Science and Technology
- University of Tokyo, Japan (until 2006)
According to our database1,
Rui Zhang
authored at least 104 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
0
5
10
7
4
6
4
5
3
6
5
2
1
4
1
3
1
1
1
1
2
1
2
5
5
3
4
2
2
5
2
1
3
1
4
3
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Cybersecur., December, 2024
Cybersecur., December, 2024
Honey password vaults tolerating leakage of both personally identifiable information and passwords.
Cybersecur., December, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
2023
Cybersecur., December, 2023
Flexible and Controllable Access Policy Update for Encrypted Data Sharing in the Cloud.
Comput. J., June, 2023
IEEE Trans. Inf. Forensics Secur., 2023
Wolverine: A Scalable and Transaction-Consistent Redactable Permissionless Blockchain.
IEEE Trans. Inf. Forensics Secur., 2023
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Proceedings of the Applied Cryptography and Network Security, 2023
2022
Server-Aided Fine-Grained Access Control Mechanism with Robust Revocation in Cloud Computing.
IEEE Trans. Serv. Comput., 2022
Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
An Adaptively Attention-Driven Cascade Part-Based Graph Embedding Framework for UAV Object Re-Identification.
Remote. Sens., 2022
Sci. China Inf. Sci., 2022
Proceedings of the Information and Communications Security - 24th International Conference, 2022
2021
On the Security of Lattice-Based Fiat-Shamir Signatures in the Presence of Randomness Leakage.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
IEEE Trans. Parallel Distributed Syst., 2020
Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices.
IEEE Trans. Dependable Secur. Comput., 2020
Cybersecur., 2020
Sci. China Inf. Sci., 2020
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
On Security of Fiat-Shamir Signatures over Lattice in the Presence of Randomness Leakage.
IACR Cryptol. ePrint Arch., 2019
2018
Key Dependent Message Security for Revocable Identity-Based Encryption and Identity-Based Encryption.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the 36th IEEE International Conference on Computer Design, 2018
Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls - Secure and Efficient Fine-Grained Access Control on Corrupted Machines.
Proceedings of the Computer Security, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Further Improving Efficiency of Higher Order Masking Schemes by Decreasing Randomness Complexity.
IEEE Trans. Inf. Forensics Secur., 2017
Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2017
Fine-grained access control system based on fully outsourced attribute-based encryption.
J. Syst. Softw., 2017
Corrections to "Further Improving Efficiency of Higher-Order Masking Schemes by Decreasing Randomness Complexity".
IACR Cryptol. ePrint Arch., 2017
Provably secure cloud storage for mobile networks with less computation and smaller overhead.
Sci. China Inf. Sci., 2017
Proceedings of the Advances in Information and Computer Security, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the 4th ACM International Workshop on ASIA Public-Key Cryptography, 2017
2016
Comments on "Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption".
IEEE Trans. Inf. Forensics Secur., 2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
IACR Cryptol. ePrint Arch., 2016
Sci. China Inf. Sci., 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015
Secure Cloud Storage for Dynamic Group: How to Achieve Identity Privacy-Preserving and Privilege Control.
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
New Results on Solving Linear Equations Modulo Unknown Divisors and its Applications.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
IEEE Trans. Parallel Distributed Syst., 2013
A Collusion-Resistant Conditional Access System for Flexible-Pay-Per-Channel Pay-TV Broadcasting.
IEEE Trans. Multim., 2013
Forgeability of Wang-Zhu-Feng-Yau's Attribute-Based Signature with Policy-and-Endorsement Mechanism.
J. Comput. Sci. Technol., 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012
Group Key Exchange Resilient to Leakage of Ephemeral Secret Keys with Strong Contributiveness.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011
A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Inf. Syst., 2009
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Proceedings of the Provable Security, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
Inf. Media Technol., 2006
Proceedings of the LATIN 2006: Theoretical Informatics, 2006
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
Proceedings of the Applied Algebra, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
2004
Proceedings of the Applied Cryptography and Network Security, 2004
2003
IACR Cryptol. ePrint Arch., 2003
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem.
Proceedings of the Applied Cryptography and Network Security, 2003