Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Zhenfu Cao
Search web for home page
Publications
year
title
booktitle
pages
1
2010
Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments
pkc
193-208
2
2010
CCA-Secure PRE Scheme without Random Oracles
eprint
online
3
2010
On Efficiently Transferring the Linear Secret-Sharing Scheme Matrix in Ciphertext-Policy Attribute-Based Encryption
eprint
online
4
2010
How to Construct Space Efficient Revocable IBE from Non-monotonic ABE
eprint
online
5
2009
CCA-Secure Proxy Re-encryption without Pairings
pkc
357-376
6
2009
Non-malleable Statistically Hiding Commitment from Any One-Way Function
asiacrypt
303-318
7
2008
Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol
eprint
online
8
2008
Fuzzy Identity Based Signature
eprint
online
9
2008
Identity-Based Proxy Re-encryption Schemes with Multiuse, Unidirection, and CCA Security
eprint
online
10
2008
Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem
eprint
online
11
2008
An ID-based Authenticated Key Exchange Protocol based on Bilinear Diffie-Hellman Problem
eprint
online
12
2007
Perfect Forward Secure Identity-Based Authenticated Key Agreement Protocol in the Escrow Mode
eprint
online
13
2007
Efficient Password-based Authenticated Key Exchange without Public Information
eprint
online
14
2007
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications
eprint
online
15
2007
Proxy Re-Signature Schemes without Random Oracles
eprint
online
16
2007
Short Group Signature without Random Oracles
eprint
online
17
2007
Fully Secure Proxy Re-Encryption without Random Oracles
eprint
online
18
2007
Cryptanalysis of An Oblivious Polynomial Evaluation Protocol Based On Polynomial Reconstruction Problem
eprint
online
19
2007
New Public Key Cryptosystems Using Polynomials over Non-commutative Rings
eprint
online
20
2007
Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol
eprint
online
21
2006
Efficient ID-based Threshold Signature Schemes without Pairings
eprint
online
22
2006
New Public Key Authentication Frameworks with Lite Certification Authority
eprint
online
23
2006
New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles)
eprint
online
24
2005
Pairing-Based Two-Party Authenticated Key Agreement Protocol
eprint
online
25
2005
ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks
eprint
online
26
2004
Security Arguments for Partial Delegation with Warrant Proxy Signature Schemes
eprint
online
Coauthors of Zhenfu Cao
Zhaohui Cheng
Kim-Kwang Raymond Choo
Ning Ding
Xiaolei Dong
Hai huang
Xiaohui Liang
Huang Lin
Peng Liu
Zhen Liu
Rongxing Lu
Rong Ma
Jun Shao
Maurizio Adriano Strangio
Renwang Su
Ivan Visconti
Licheng Wang
Lihua Wang
Shengbao Wang
Qin Wang
Dongsheng Xing
Piyi Yang
Zongyang Zhang
Muxin Zhou
Haojin Zhu