Zengpeng Li
Cited by
Cited by
Preserving data privacy via federated learning: Challenges and solutions
Z Li, V Sharma, SP Mohanty
IEEE Consumer Electronics Magazine 9 (3), 8-16, 2020
Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification
X Ge, J Yu, H Zhang, C Hu, Z Li, Z Qin, R Hao
IEEE Transactions on Dependable and Secure computing 18 (1), 490-504, 2019
Quantum-safe round-optimal password authentication for mobile devices
Z Li, D Wang, E Morais
IEEE transactions on dependable and secure computing 19 (3), 1885-1899, 2020
Achieving one-round password-based authenticated key exchange over lattices
Z Li, D Wang
IEEE transactions on services computing 15 (1), 308-321, 2019
Towards multi-hop homomorphic identity-based proxy re-encryption via branching program
Z Li, C Ma, D Wang
IEEE Access 5, 16214-16228, 2017
PriParkRec: Privacy-preserving decentralized parking recommendation service
Z Li, M Alazab, S Garg, MS Hossain
IEEE Transactions on Vehicular Technology 70 (5), 4037-4050, 2021
Two-round PAKE protocol over lattices without NIZK
Z Li, D Wang
International Conference on Information Security and Cryptology, 138-159, 2018
Achieving multi-hop PRE via branching program
Z Li, C Ma, D Wang
IEEE Transactions on Cloud Computing 8 (1), 45-58, 2017
Building low-interactivity multifactor authenticated key exchange for industrial internet of things
Z Li, Z Yang, P Szalachowski, J Zhou
IEEE Internet of Things Journal 8 (2), 844-859, 2020
Multi-key FHE for multi-bit messages
Z Li, C Ma, H Zhou
Science China. Information Sciences 61 (2), 029101, 2018
Leakage Resilient Leveled on Multiple Bits Message
Z Li, C Ma, D Wang
IEEE Transactions on Big Data 7 (5), 845-858, 2017
Preventing adaptive key recovery attacks on the GSW levelled homomorphic encryption scheme
Z Li, SD Galbraith, C Ma
Provable Security: 10th International Conference, ProvSec 2016, Nanjing†…, 2016
Biometrics-authenticated key exchange for secure messaging
M Wang, K He, J Chen, Z Li, W Zhao, R Du
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications†…, 2021
Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs
Z Li, V Sharma, C Ma, C Ge, W Susilo
Science China. Information Sciences 64 (6), 169301, 2021
Oblivious Transfer via Lossy Encryption from Lattice‐Based Cryptography
Z Li, C Xiang, C Wang
Wireless Communications and Mobile Computing 2018 (1), 5973285, 2018
Multi-bit Leveled Homomorphic Encryption via-Based
Z Li, C Ma, E Morais, G Du
International conference on information security and cryptology, 221-242, 2016
Secdedup: Secure encrypted data deduplication with dynamic ownership updating
S Zhang, H Xian, Z Li, L Wang
IEEE Access 8, 186323-186334, 2020
Laksa: A probabilistic proof-of-stake protocol
D Reijsbergen, P Szalachowski, J Ke, Z Li, J Zhou
arXiv preprint arXiv:2006.01427, 2020
PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices
M Wang, K He, J Chen, R Du, B Zhang, Z Li
Future Generation Computer Systems 131, 28-42, 2022
Revisiting post-quantum hash proof systems over lattices for Internet of Thing authentications
Z Li, J Wang, W Zhang
Journal of Ambient Intelligence and Humanized Computing 11 (8), 3337-3347, 2020
The system can't perform the operation now. Try again later.
Articles 1–20