What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Zongyang Zhang
Google Scholar
ORCID:
0000-0003-1358-4933
20
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Succinct Hash-Based Arbitrary-Range Proofs.
Weihan Li
Zongyang Zhang
Yanpei Guo
Sherman S. M. Chow
Zhiguo Wan
2024
conf/uss
Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing.
Zongyang Zhang
Weihan Li
Yanpei Guo
Kexin Shi
Sherman S. M. Chow
Ximeng Liu
Jin Dong
2024
conf/acisp
Lightweight Instance Batch Schemes Towards Prover-Efficient Decentralized Private Computation.
Ziyu Meng
Zibo Zhou
Zongyang Zhang
Yu Jin
2022
journals/compsec
CLTracer: A Cross-Ledger Tracing framework based on address relationships.
Zongyang Zhang
Jiayuan Yin
Bin Hu
Ting Gao
Weihan Li
Qianhong Wu
Jianwei Liu
2021
conf/acisp
Redactable Transactions in Consortium Blockchain: Controlled by Multi-authority CP-ABE.
Zongyang Zhang
Tong Li
Zhuo Wang
Jianwei Liu
2021
conf/icics
An Optimized Inner Product Argument with More Application Scenarios.
Zongyang Zhang
Zibo Zhou
Weihan Li
Hongyu Tao
2020
journals/compsec
A fair selection protocol for committee-based permissionless blockchains.
Yizhong Liu
Jianwei Liu
Zongyang Zhang
Hui Yu
2019
conf/acisp
A Combined Micro-block Chain Truncation Attack on Bitcoin-NG.
Ziyu Wang
Jianwei Liu
Zongyang Zhang
Yanting Zhang
Jiayuan Yin
Hui Yu
Wenmao Liu
2019
conf/acisp
Security Against Subversion in a Multi-surveillant Setting.
Geng Li
Jianwei Liu
Zongyang Zhang
2018
conf/acisp
Revisiting the Incentive Mechanism of Bitcoin-NG.
Jiayuan Yin
Changren Wang
Zongyang Zhang
Jianwei Liu
2016
conf/asiacrypt
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones.
Yuyu Wang
Zongyang Zhang
Takahiro Matsuda
Goichiro Hanaoka
Keisuke Tanaka
2015
conf/provsec
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model.
Zongyang Zhang
Yu Chen
Sherman S. M. Chow
Goichiro Hanaoka
Zhenfu Cao
Yunlei Zhao
2014
conf/acisp
Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited.
Yu Chen
Qiong Huang
Zongyang Zhang
2014
conf/acns
All-but-One Dual Projective Hashing and Its Applications.
Zongyang Zhang
Yu Chen
Sherman S. M. Chow
Goichiro Hanaoka
Zhenfu Cao
Yunlei Zhao
2014
conf/asiacrypt
Black-Box Separations for One-More (Static) CDH and Its Generalization.
Jiang Zhang
Zhenfeng Zhang
Yu Chen
Yanfei Guo
Zongyang Zhang
2012
conf/acns
Identity-Based Extractable Hash Proofs and Their Applications.
Yu Chen
Zongyang Zhang
Dongdai Lin
Zhenfu Cao
2012
conf/provsec
Anonymous Identity-Based Hash Proof System and Its Applications.
Yu Chen
Zongyang Zhang
Dongdai Lin
Zhenfu Cao
2011
conf/icisc
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model.
Yu Chen
Liqun Chen
Zongyang Zhang
2010
conf/pkc
Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments.
Zhenfu Cao
Ivan Visconti
Zongyang Zhang
2009
conf/asiacrypt
Non-malleable Statistically Hiding Commitment from Any One-Way Function.
Zongyang Zhang
Zhenfu Cao
Ning Ding
Rong Ma
Coauthors
Bin Hu
(1)
Changren Wang
(1)
Dongdai Lin
(2)
Geng Li
(1)
Goichiro Hanaoka
(3)
Hongyu Tao
(1)
Hui Yu
(2)
Ivan Visconti
(1)
Jiang Zhang
(1)
Jianwei Liu
(6)
Jiayuan Yin
(3)
Jin Dong
(1)
Keisuke Tanaka
(1)
Kexin Shi
(1)
Liqun Chen
(1)
Ning Ding
(1)
Qianhong Wu
(1)
Qiong Huang
(1)
Rong Ma
(1)
Sherman S. M. Chow
(4)
Takahiro Matsuda
(1)
Ting Gao
(1)
Tong Li
(1)
Weihan Li
(4)
Wenmao Liu
(1)
Ximeng Liu
(1)
Yanfei Guo
(1)
Yanpei Guo
(2)
Yanting Zhang
(1)
Yizhong Liu
(1)
Yu Chen
(7)
Yu Jin
(1)
Yunlei Zhao
(2)
Yuyu Wang
(1)
Zhenfeng Zhang
(1)
Zhenfu Cao
(6)
Zhiguo Wan
(1)
Zhuo Wang
(1)
Zibo Zhou
(2)
Ziyu Meng
(1)
Ziyu Wang
(1)
Zongyang Zhang
(20)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to