Rui Zhang 0002
张锐
Person information
- unicode name: 张锐
- not to be confused with: Rui Zhang 0016
- affiliation (since 2011): Chinese Academy of Sciences (CAS), State Key Laboratory of Information Security, China
- affiliation: National Institute of Advanced Industrial Science and Technology
- affiliation (until 2006): University of Tokyo, Japan
Other persons with the same name
- Rui Zhang
- Rui Zhang 0001 — University of Freiburg, Department of Microsystems Engineering (IMTEK), Germany
- Rui Zhang 0003
— The University of Melbourne, Australia
- Rui Zhang 0004 — University of Arizona (and 1 more)
- Rui Zhang 0005 — Xi'an Jiaotong University
- Rui Zhang 0006
— National University of Singapore, ECE Department, Singapore (and 1 more)
- Rui Zhang 0007
— University of Delaware, Newark, DE, USA (and 2 more)
- Rui Zhang 0008 — Alumni ETH Zürich
- Rui Zhang 0009 — The City University of New York
- Rui Zhang 0010 — Ryerson University, Ryerson Multimedia Research Laboratory, Toronto, Canada
- Rui Zhang 0011 — Queen's University
- Rui Zhang 0012 — University of Bradford (and 1 more)
- Rui Zhang 0013 — Shanghai University
- Rui Zhang 0014 — College of Optics, University of Arizona
- Rui Zhang 0015 — University of South Florida
- Rui Zhang 0016 — Chinese Academy of Sciences (CAS), State Key Laboratory of Information Security
- Rui Zhang 0017
— Northwestern Polytechnical University, Center for OPTical IMagery Analysis and Learning (OPTIMAL), Xi'an, China
- Rui Zhang 0018
— University of Electronic Science and Technology of China, Key Laboratory for Neuroinformation of Ministry of Education, Chengdu, China
- Rui Zhang 0019
— Chinese Academy of Sciences, Key Laboratory of Health Informatics, Shenzhen, China (and 1 more)
- Rui Zhang 0020
— New York University, Department of Electrical and Computer Engineering, NY, USA
- Rui Zhang 0021
— Northwestern Polytechnical University, School of Automation, Xi'an, China
- Rui Zhang 0022
— Southeast University, National Mobile Communications Research Laboratory, Nanjing, China
- Rui Zhang 0023
— Queen Mary University of London, School of Electronic Engineering and Computer Science, UK
- Rui Zhang 0024
— Zhejiang University, College of Electronic Engineering and Information Science, Hangzhou, China (and 1 more)
- Rui Zhang 0025
— University of Colorado Boulder, Leeds School of Business, CO, USA (and 1 more)
- Rui Zhang 0026
— Xidian University, State Key Laboratory of Integrated Services Networks, Xi'an, China (and 1 more)
- Rui Zhang 0027
— University of Passau, ACTLab, Passau, Germany
- Rui Zhang 0028 — University of Minnesota, Institute for Health Informatics / Department of Surgery, Minneapolis, MN, USA
- Rui Zhang 0029
— Zhejiang University, School of Mathematical Sciences, Hangzhou, China
- Rui Zhang 0030
— Chongqing University, College of Computer Science, China
- Rui Zhang 0031 — City University of Hong Kong, Department of Computer Science, Hong Kong
- Rui Zhang 0032 — Tianjin University, School of Environmental Science and Engineering, China
- Rui Zhang 0033 — China Research Institute of Radiowave Propagation, National Key Laboratory of Electromagnetic Environment, Qingdao, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [c40]Liqiang Peng, Yao Lu, Noboru Kunihiro, Rui Zhang, Lei Hu:
A Deterministic Algorithm for Computing Divisors in an Interval. ACISP 2018: 3-12 - [c39]Hui Ma, Rui Zhang, Guomin Yang, Zishuai Song, Shuzhou Sun, Yuting Xiao:
Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls - Secure and Efficient Fine-Grained Access Control on Corrupted Machines. ESORICS (2) 2018: 507-526 - [c38]Rui Zhang, Yang Tao:
Key Dependent Message Security for Revocable Identity-Based Encryption and Identity-Based Encryption. ICICS 2018: 426-441 - [c37]Yao Lu, Noboru Kunihiro, Rui Zhang, Liqiang Peng, Hui Ma:
Certifying Variant of RSA with Generalized Moduli. ICICS 2018: 598-608 - 2017
- [j18]Fei Tang, Rui Zhang, Hongda Li:
Attribute-based non-interactive key exchange. SCIENCE CHINA Information Sciences 60(1): 19101:1-19101:3 (2017) - [j17]Rui Zhang, Hui Ma, Yao Lu, Yang Li:
Provably secure cloud storage for mobile networks with less computation and smaller overhead. SCIENCE CHINA Information Sciences 60(12): 122104:1-122104:13 (2017) - [j16]Rui Zhang, Hui Ma, Yao Lu:
Fine-grained access control system based on fully outsourced attribute-based encryption. Journal of Systems and Software 125: 344-353 (2017) - [j15]Hui Ma, Rui Zhang, Zhiguo Wan, Yao Lu, Suqing Lin:
Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing. IEEE Trans. Dependable Sec. Comput. 14(6): 679-692 (2017) - [j14]Rui Zhang, Shuang Qiu, Yongbin Zhou:
Further Improving Efficiency of Higher Order Masking Schemes by Decreasing Randomness Complexity. IEEE Trans. Information Forensics and Security 12(11): 2590-2598 (2017) - [c36]Gaosheng Tan, Rui Zhang, Hui Ma, Yang Tao:
Access Control Encryption Based on LWE. APKC@AsiaCCS 2017: 43-50 - [c35]Shuang Qiu, Rui Zhang, Yongbin Zhou, Hailong Zhang:
Reducing Randomness Complexity of Mask Refreshing Algorithm. ICICS 2017: 88-101 - [c34]
- [e2]Joonsang Baek, Rui Zhang:
Proceedings of the 4th ACM International Workshop on ASIA Public-Key Cryptography, APKC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017. ACM 2017, ISBN 978-1-4503-4973-4 [contents] - [i9]Shuang Qiu, Rui Zhang, Yongbin Zhou, Wei Cheng:
Corrections to "Further Improving Efficiency of Higher-Order Masking Schemes by Decreasing Randomness Complexity". IACR Cryptology ePrint Archive 2017: 1244 (2017) - 2016
- [j13]Ruoxin Zhao, Rui Zhang, Yongqiang Li, Baofeng Wu:
Construction of MDS block diffusion matrices for block ciphers and hash functions. SCIENCE CHINA Information Sciences 59(9): 99101 (2016) - [j12]Suqing Lin, Rui Zhang, Mingsheng Wang:
Verifiable attribute-based proxy re-encryption for secure public cloud data sharing. Security and Communication Networks 9(12): 1748-1758 (2016) - [j11]Shuang Qiu, Rui Zhang, Yuchen Cao, Wei Yang, Yongbin Zhou, Tian Ding:
A statistical model for DPA when algorithmic noise is dependent on target. Security and Communication Networks 9(18): 4882-4896 (2016) - [j10]Hui Ma, Rui Zhang, Wei Yuan:
Comments on "Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption". IEEE Trans. Information Forensics and Security 11(4): 866-867 (2016) - [e1]Keita Emura, Goichiro Hanaoka, Rui Zhang:
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, AsiaPKC@AsiaCCS, Xi'an, China, May 30 - June 03, 2016. ACM 2016, ISBN 978-1-4503-4286-5 [contents] - [i8]Ruoxin Zhao, Baofeng Wu, Rui Zhang, Qian Zhang:
Designing Optimal Implementations of Linear Layers (Full Version). IACR Cryptology ePrint Archive 2016: 1118 (2016) - 2015
- [j9]Suqing Lin, Rui Zhang, Hui Ma, Suqing Wang:
Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption. IEEE Trans. Information Forensics and Security 10(10): 2119-2130 (2015) - [c33]Yao Lu, Rui Zhang, Liqiang Peng, Dongdai Lin:
Solving Linear Equations Modulo Unknown Divisors: Revisited. ASIACRYPT (1) 2015: 189-213 - [c32]Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Rui Zhang, Chengyu Hu, Zuoxia Yu:
Updatable Hash Proof System and Its Applications. ESORICS (1) 2015: 266-285 - [c31]
- [c30]Yao Lu, Liqiang Peng, Rui Zhang, Lei Hu, Dongdai Lin:
Towards Optimal Bounds for Implicit Factorization Problem. SAC 2015: 462-476 - [i7]Ruoxin Zhao, Rui Zhang, Yongqiang Li, Baofeng Wu:
On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions. IACR Cryptology ePrint Archive 2015: 449 (2015) - 2014
- [c29]Yao Lu, Rui Zhang, Dongdai Lin:
New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents. ACNS 2014: 151-162 - [i6]Yao Lu, Rui Zhang, Dongdai Lin:
New Results on Solving Linear Equations Modulo Unknown Divisors and its Applications. IACR Cryptology ePrint Archive 2014: 343 (2014) - 2013
- [j8]Yao Lu, Rui Zhang, Dongdai Lin:
Improved bounds for the implicit factorization problem. Adv. in Math. of Comm. 7(3): 243-251 (2013) - [j7]Aijun Ge, Xin-Yi Huang, Cheng Chen, Chuangui Ma, Rui Zhang:
Forgeability of Wang-Zhu-Feng-Yau's Attribute-Based Signature with Policy-and-Endorsement Mechanism. J. Comput. Sci. Technol. 28(4): 743-748 (2013) - [j6]Zhiguo Wan, Jun-e Liu, Rui Zhang, Robert H. Deng:
A Collusion-Resistant Conditional Access System for Flexible-Pay-Per-Channel Pay-TV Broadcasting. IEEE Trans. Multimedia 15(6): 1353-1364 (2013) - [j5]Aijun Ge, Jiang Zhang, Rui Zhang, Chuangui Ma, Zhenfeng Zhang:
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme. IEEE Trans. Parallel Distrib. Syst. 24(11): 2319-2321 (2013) - [c28]Yao Lu, Rui Zhang, Dongdai Lin:
Factoring Multi-power RSA Modulus N = p r q with Partial Known Bits. ACISP 2013: 57-71 - [c27]Yao Lu, Rui Zhang, Dongdai Lin:
Factoring RSA Modulus with Known Bits from Both p and q: A Lattice Method. NSS 2013: 393-404 - 2012
- [c26]Aijun Ge, Rui Zhang, Cheng Chen, Chuangui Ma, Zhenfeng Zhang:
Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts. ACISP 2012: 336-349 - [c25]
- [c24]Goichiro Hanaoka, Yutaka Kawai, Noboru Kunihiro, Takahiro Matsuda, Jian Weng, Rui Zhang, Yunlei Zhao:
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption. CT-RSA 2012: 349-364 - [c23]Cheng Chen, Yanfei Guo, Rui Zhang:
Group Key Exchange Resilient to Leakage of Ephemeral Secret Keys with Strong Contributiveness. EuroPKI 2012: 17-36 - [c22]Yao Lu, Rui Zhang, Dongdai Lin:
Stronger Security Model for Public-Key Encryption with Equality Test. Pairing 2012: 65-82 - [c21]
- [i5]Xiang Xie, Rui Xue, Rui Zhang:
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting. IACR Cryptology ePrint Archive 2012: 463 (2012) - 2011
- [c20]Jiang Zhang, Xiang Xie, Rui Zhang, Zhenfeng Zhang:
A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening. Inscrypt 2011: 195-209 - [c19]Xiang Xie, Rui Xue, Rui Zhang:
Efficient Threshold Encryption from Lossy Trapdoor Functions. PQCrypto 2011: 163-178 - 2010
- [c18]
2000 – 2009
- 2009
- [j4]Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions. IEICE Transactions 92-A(1): 53-66 (2009) - [j3]Rui Zhang, Hideki Imai:
Combining Public Key Encryption with Keyword Search and Public Key Encryption. IEICE Transactions 92-D(5): 888-896 (2009) - [j2]
- [c17]Rui Zhang, Goichiro Hanaoka, Hideki Imai:
A generic construction of useful client puzzles. AsiaCCS 2009: 70-79 - [c16]Rui Zhang, Hideki Imai:
Constructing Better KEMs with Partial Message Recovery. Inscrypt 2009: 303-312 - [c15]Peng Yang, Rui Zhang, Kanta Matsuura, Hideki Imai:
Generic Construction of Stateful Identity Based Encryption. ISC 2009: 338-346 - 2008
- [c14]
- 2007
- [j1]Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Efficient Identity-Based Encryption with Tight Security Reduction. IEICE Transactions 90-A(9): 1803-1813 (2007) - [c13]
- [c12]Rui Zhang, Hideki Imai:
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption. CANS 2007: 159-174 - [c11]Rui Zhang, Goichiro Hanaoka, Hideki Imai:
Orthogonality between Key Privacy and Data Privacy, Revisited. Inscrypt 2007: 313-327 - [c10]Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Formal Security Treatments for Signatures from Identity-Based Encryption. ProvSec 2007: 218-227 - [i4]Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions. IACR Cryptology ePrint Archive 2007: 30 (2007) - 2006
- [c9]Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Kanta Matsuura, Hideki Imai:
Applying Fujisaki-Okamoto to Identity-Based Encryption. AAECC 2006: 183-192 - [c8]Takashi Kitagawa, Peng Yang, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai:
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. ACISP 2006: 348-359 - [c7]Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Efficient Identity-Based Encryption with Tight Security Reduction. CANS 2006: 19-36 - [c6]Nuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang:
Relations Among Notions of Security for Identity Based Encryption Schemes. LATIN 2006: 130-141 - 2005
- [c5]Rui Zhang, Jun Furukawa, Hideki Imai:
Short Signature and Universal Designated Verifier Signature Without Random Oracles. ACNS 2005: 483-498 - [c4]Rui Zhang, Hideki Imai:
Improvements on Security Proofs of Some Identity Based Encryption Schemes. CISC 2005: 28-41 - [i3]Nuttapong Attrapadung, Yang Cui, Goichiro Hanaoka, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang:
Relations Among Notions of Security for Identity Based Encryption Schemes. IACR Cryptology ePrint Archive 2005: 258 (2005) - [i2]Nuttapong Attrapadung, Benoît Chevallier-Mames, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Efficient Identity-Based Encryption with Tight Security Reduction. IACR Cryptology ePrint Archive 2005: 320 (2005) - 2004
- [c3]Rui Zhang, Goichiro Hanaoka, Hideki Imai:
On the Security of Cryptosystems with All-or-Nothing Transform. ACNS 2004: 76-90 - [c2]Rui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Public Key Cryptography 2004: 360-374 - 2003
- [c1]Rui Zhang, Hideki Imai:
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem. ACNS 2003: 96-110 - [i1]Rui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? IACR Cryptology ePrint Archive 2003: 181 (2003)
Coauthor Index
last updated on 2019-02-20 22:31 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint