dblp.uni-trier.dewww.uni-trier.de

Zhenfu Cao Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
105EEXiaohui Liang, Zhenfu Cao, Huang Lin, Jun Shao: Attribute based proxy re-encryption with delegating capabilities. ASIACCS 2009: 276-286
104EEHai Huang, Zhenfu Cao: An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem. ASIACCS 2009: 333-342
103EEXiaohui Liang, Zhenfu Cao, Huang Lin, Dongsheng Xing: Provably secure and efficient bounded ciphertext policy attribute based encryption. ASIACCS 2009: 343-352
102EEQingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian: An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System. MobiSec 2009: 58-70
101EEJun Shao, Zhenfu Cao: CCA-Secure Proxy Re-encryption without Pairings. Public Key Cryptography 2009: 357-376
100EEZongyang Zhang, Zhenfu Cao, Rong Ma: An Observation on Non-Malleable Witness-Indistinguishability and Non-Malleable Zero-Knowledge. TAMC 2009: 470-479
99EEFeng Cao, Zhenfu Cao: A secure identity-based proxy multi-signature scheme. Inf. Sci. 179(3): 292-302 (2009)
98EEShengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo, Lihua Wang: An improved identity-based key agreement protocol and its security proof. Inf. Sci. 179(3): 307-318 (2009)
97EEFeng Cao, Zhenfu Cao: An identity based universal designated verifier signature scheme secure in the standard model. Journal of Systems and Software 82(4): 643-649 (2009)
96EEShengbao Wang, Zhenfu Cao, ZhaoHui Cheng, Kim-Kwang Raymond Choo: Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode. Science in China Series F: Information Sciences 52(8): 1358-1370 (2009)
95EEXiaolei Dong, Haifeng Qian, Zhenfu Cao: Provably secure RSA-type signature based on conic curve. Wireless Communications and Mobile Computing 9(2): 217-225 (2009)
2008
94EEFengying Li, Qingshui Xue, Jiping Zhang, Zhenfu Cao: A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme. CollaborateCom 2008: 416-424
93EECongkai Sun, Bin Gao, Zhenfu Cao, Hang Li: HTM: A Topic Model for Hypertexts. EMNLP 2008: 514-522
92EELiuquan Qin, Zhenfu Cao, Xiaolei Dong: Multi-Receiver Identity-Based Encryption in Multiple PKG Environment. GLOBECOM 2008: 1862-1866
91EEHuang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao: Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority. INDOCRYPT 2008: 426-436
90EEPiyi Yang, Zhenfu Cao, Xiaolei Dong: Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model. Inscrypt 2008: 201-216
89EERongxing Lu, Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao: A New Dynamic Group Key Management Scheme with Low Rekeying Cost. WCNC 2008: 3243-3248
88EEXiaohui Liang, Zhenfu Cao, Rongxing Lu, Liuquan Qin: Efficient and secure protocol in fair document exchange. Computer Standards & Interfaces 30(3): 167-176 (2008)
87EEXiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao: TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks. IEEE Transactions on Wireless Communications 7(4): 1389-1399 (2008)
86EERongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, Xiaohui Liang: New (t, n) threshold directed signature scheme with provable security. Inf. Sci. 178(3): 756-765 (2008)
85EERongxing Lu, Xiaodong Lin, Zhenfu Cao, Liuquan Qin, Xiaohui Liang: A simple deniable authentication protocol based on the Diffie-Hellman algorithm. Int. J. Comput. Math. 85(9): 1315-1323 (2008)
84EELicheng Wang, Zhenfu Cao, Feng Cao, Haifeng Qian, Haiyong Bao: Biased Bit Commitment and Applications. J. Inf. Sci. Eng. 24(2): 441-452 (2008)
83EERongxing Lu, Xiaolei Dong, Zhenfu Cao: Designing efficient proxy signature schemes for mobile communication. Science in China Series F: Information Sciences 51(2): 183-195 (2008)
82EEXiaolei Dong, Zhenfu Cao, Licheng Wang: New designing of cryptosystems based on quadratic fields. Science in China Series F: Information Sciences 51(8): 1106-1116 (2008)
2007
81EEJun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu: Efficient Password-Based Authenticated Key Exchange Without Public Information. ESORICS 2007: 299-310
80EEXiaodong Lin, Rongxing Lu, Haojin Zhu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao: ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks. ICC 2007: 1247-1253
79EEXiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin: Short Group Signature Without Random Oracles. ICICS 2007: 69-82
78EELicheng Wang, Zhenfu Cao, Shihui Zheng, Xiaofang Huang, Yixian Yang: Transitive Signatures from Braid Groups. INDOCRYPT 2007: 183-196
77EEJun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang: Proxy Re-signature Schemes Without Random Oracles. INDOCRYPT 2007: 197-209
76EELihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura: A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. INDOCRYPT 2007: 297-311
75EEJun Shao, Min Feng, Bin Zhu, Zhenfu Cao: An Efficient Certified Email Protocol. ISC 2007: 145-157
74EEFengying Li, Qingshui Xue, Zhenfu Cao: Crypanalysis of Kuo and Chen's Threshold Proxy Signature Scheme Based on the RSA. ITNG 2007: 815-818
73EEZhenchuan Chai, Zhenfu Cao, Rongxing Lu: Threshold password authentication against guessing attacks in Ad hoc networks. Ad Hoc Networks 5(7): 1046-1054 (2007)
72EERongxing Lu, Zhenfu Cao: Erratum to "Non-interactive deniable authentication protocol based on factoring"[Computer Standards & Interfaces 27 (2005) 401-405]. Computer Standards & Interfaces 29(2): 275 (2007)
71EERongxing Lu, Zhenfu Cao, Licheng Wang, Congkai Sun: A secure anonymous routing protocol with authenticated key exchange for ad hoc networks. Computer Standards & Interfaces 29(5): 521-527 (2007)
70EERongxing Lu, Zhenfu Cao, Haojin Zhu: An enhanced authenticated key agreement protocol for wireless mobile communication. Computer Standards & Interfaces 29(6): 647-652 (2007)
69EERongxing Lu, Zhenfu Cao: Simple three-party key exchange protocol. Computers & Security 26(1): 94-97 (2007)
68EERongxing Lu, Zhenfu Cao, Xiaolei Dong: A New Practical Limited Identity-Based Encryption Scheme. Fundam. Inform. 80(4): 461-474 (2007)
67EEYuan Zhou, Binxing Fang, Zhenfu Cao, Xiao-chun Yun, Xiaoming Cheng: How to construct secure proxy cryptosystem. Inf. Sci. 177(19): 4095-4108 (2007)
66EELicheng Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian: Simulatability and security of certificateless threshold signatures. Inf. Sci. 177(6): 1382-1394 (2007)
65EERongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Bao: A New ID-Based Deniable Authentication Protocol. Informatica, Lith. Acad. Sci. 18(1): 67-78 (2007)
64EEZhenchuan Chai, Zhenfu Cao, Xiaolei Dong: Efficient ID-Based Multi-Receiver Threshold Decryption. Int. J. Found. Comput. Sci. 18(5): 987-1004 (2007)
63EEZhenchuan Chai, Zhenfu Cao, Yuan Zhou: Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts. J. Comput. Sci. Technol. 22(1): 103-108 (2007)
62EEJun Shao, Zhenfu Cao, Rongxing Lu: Improvement of Yang et al.'s threshold proxy signature scheme. Journal of Systems and Software 80(2): 172-177 (2007)
61EEQin Wang, Zhenfu Cao: Identity based proxy multi-signature. Journal of Systems and Software 80(7): 1023-1029 (2007)
60EEZhenchuan Chai, Zhenfu Cao, Xiaolei Dong: Identity-based signature scheme based on quadratic residues. Science in China Series F: Information Sciences 50(3): 373-380 (2007)
2006
59EEShanshan Duan, Zhenfu Cao: Efficient and Provably Secure Multi-receiver Identity-Based Signcryption. ACISP 2006: 195-206
58EEZhenchuan Chai, Zhenfu Cao, Rongxing Lu: Remote Authentication with Forward Security. ATC 2006: 418-427
57EEFeng Cao, Zhenfu Cao: Security Model of Proxy-Multi Signature Schemes. CANS 2006: 144-152
56EERongxing Lu, Zhenfu Cao, Xiaolei Dong: Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque. CANS 2006: 153-167
55EEShengbao Wang, Zhenfu Cao, Haiyong Bao: Two-Pass ID-Based Authenticated Key Agreement Protocol with Key Confirmation Using Pairings. IMSCCS (2) 2006: 109-112
54EEHaifeng Qian, Zhenfu Cao, Licheng Wang, Sheng Guo: Cryptanalysis of Chang-Lin-Lam's ID-based Multisignature Scheme. IMSCCS (2) 2006: 113-116
53EEFeng Cao, Zhenfu Cao: Cryptanalysis on a Proxy Multi-Signature Scheme. IMSCCS (2) 2006: 117-120
52EEFeng Cao, Zhenfu Cao, Licheng Wang: An Improvement of an Identity-Based Key Issuing Protocol. IMSCCS (2) 2006: 13-18
51EEZhenchuan Chai, Zhenfu Cao, Yuan Zhou: Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network. IMSCCS (2) 2006: 148-154
50EERongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su: Designated Verifier Proxy Signature Scheme from Bilinear Pairings. IMSCCS (2) 2006: 40-47
49EEFeng Cao, Zhenfu Cao: A Proxy-Protected Signature Scheme Based on Finite Automaton. IMSCCS (2) 2006: 48-55
48EELicheng Wang, Zhenfu Cao, Feng Cao, Haifeng Qian: Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol. IMSCCS (2) 2006: 8-12
47EESheng Guo, Zhenfu Cao, Rongxing Lu: An Efficient ID-Based Multi-proxy Multi-Signature Scheme. IMSCCS (2) 2006: 81-88
46EERongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su: Group Oriented Deniable Authentication Protocol. IMSCCS (2) 2006: 89-92
45EEYuan Zhou, Zhenfu Cao, Zhenchuan Chai: Identity Based Key Insulated Signature. ISPEC 2006: 226-234
44EEHaiyong Bao, Zhenfu Cao, Shengbao Wang: Identity-Based Threshold Proxy Signature Scheme with Known Signers. TAMC 2006: 538-546
43EEZhenchuan Chai, Zhenfu Cao, Rongxing Lu: Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy. WASA 2006: 467-477
42EEJun Shao, Zhenfu Cao: A traceable threshold signature scheme with multiple signing policies. Computers & Security 25(3): 201-206 (2006)
41EEZhenfu Cao, Gennian Ge, Ying Miao: Combinatorial characterizations of one-coincidence frequency-hopping sequences. Des. Codes Cryptography 41(2): 177-184 (2006)
40EELihua Wang, Zhenfu Cao, Takeshi Okamoto, Ying Miao, Eiji Okamoto: Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses. IEICE Transactions 89-A(1): 106-114 (2006)
39EEJun Shao, Zhenfu Cao, Rongxing Lu: An improved deniable authentication protocol. Networks 48(4): 179-181 (2006)
38EEZhenfu Cao, Haojin Zhu, Rongxing Lu: Provably secure robust threshold partial blind signature. Science in China Series F: Information Sciences 49(5): 604-615 (2006)
37EEXuemin Shen, Chuang Lin, Yan Lindsay Sun, Jianping Pan, Peter Langendörfer, Zhenfu Cao: Wireless network security. Wireless Communications and Mobile Computing 6: 269-271 (2006)
36EERongxing Lu, Zhenfu Cao, Xiaolei Dong: Authenticated encryption protocol with perfect forward secrecy for mobile communication. Wireless Communications and Mobile Computing 6: 273-280 (2006)
2005
35EEQin Wang, Zhenfu Cao: Two Proxy Signcryption Schemes from Bilinear Pairings. CANS 2005: 161-171
34EEYuan Zhou, Zhenfu Cao, Rongxing Lu: Constructing Secure Warrant-Based Proxy Signcryption Schemes. CANS 2005: 172-185
33EEHaiyong Bao, Zhenfu Cao, Haifeng Qian: On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme. CANS 2005: 26-34
32EELichen Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian: Certificateless Threshold Signature Schemes. CIS (2) 2005: 104-109
31EEQin Wang, Zhenfu Cao: Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings. CIS (2) 2005: 167-172
30EEShanshan Duan, Zhenfu Cao, Yuan Zhou: Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme. CIS (2) 2005: 445-450
29EEYuan Zhou, Zhenfu Cao, Zhenchuan Chai: Constructing Secure Proxy Cryptosystem. CISC 2005: 150-161
28EEQin Wang, Zhenfu Cao, Shengbao Wang: Formalized Security Model of Multi-Proxy Signature Schemes. CIT 2005: 668-672
27EEHaifeng Qian, Zhenfu Cao, Lichen Wang, Qingshui Xue: Efficient Non-interactive Deniable Authentication Protocols. CIT 2005: 673-679
26EEHaifeng Qian, Zhenfu Cao: A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme. ISPA Workshops 2005: 323-331
25EEYuan Zhou, Zhenfu Cao, Zhenchuan Chai: An Efficient Proxy-Protected Signature Scheme Based on Factoring. ISPA Workshops 2005: 332-341
24EEShengbao Wang, Zhenfu Cao, Haiyong Bao: Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. ISPA Workshops 2005: 342-349
23EEZhenchuan Chai, Zhenfu Cao, Yuan Zhou: Encryption Based on Reversible Second-Order Cellular Automata. ISPA Workshops 2005: 350-358
22EERongxing Lu, Zhenfu Cao, Yuan Zhou: Threshold undeniable signature scheme based on conic. Applied Mathematics and Computation 162(1): 165-177 (2005)
21EERongxing Lu, Zhenfu Cao, Yuan Zhou: Proxy blind multi-signature scheme without a secure channel. Applied Mathematics and Computation 164(1): 179-187 (2005)
20EEYuan Zhou, Zhenfu Cao, Rongxing Lu: Provably secure proxy-protected signature schemes based on factoring. Applied Mathematics and Computation 164(1): 83-98 (2005)
19EEHaifeng Qian, Zhenfu Cao, Haiyong Bao: Cryptanalysis of Li-Tzeng-Hwang's improved signature schemes based on factoring and discrete logarithms. Applied Mathematics and Computation 166(3): 501-505 (2005)
18EEJun Shao, Zhenfu Cao: A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme. Applied Mathematics and Computation 168(1): 135-140 (2005)
17EERongxing Lu, Zhenfu Cao: A new deniable authentication protocol from bilinear pairings. Applied Mathematics and Computation 168(2): 954-961 (2005)
16EERongxing Lu, Zhenfu Cao: Designated verifier proxy signature scheme with message recovery. Applied Mathematics and Computation 169(2): 1237-1246 (2005)
15EEHaiyong Bao, Zhenfu Cao, Rongxing Lu: Proxy signature scheme using self-certified public keys. Applied Mathematics and Computation 169(2): 1380-1389 (2005)
14EEHaiyong Bao, Zhenfu Cao, Shengbao Wang: Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Applied Mathematics and Computation 169(2): 1419-1430 (2005)
13EEHaifeng Qian, Zhenfu Cao, Haiyong Bao: Security of Pon-Lu-Jeng's Meta-He digital signature schemes. Applied Mathematics and Computation 170(1): 724-730 (2005)
12EEYu Long, Zhenfu Cao, Kefei Chen: A dynamic threshold commercial key escrow scheme based on conic. Applied Mathematics and Computation 171(2): 972-982 (2005)
11EERongxing Lu, Zhenfu Cao: Efficient remote user authentication scheme using smart card. Computer Networks 49(4): 535-540 (2005)
10EERongxing Lu, Zhenfu Cao: Non-interactive deniable authentication protocol based on factoring. Computer Standards & Interfaces 27(4): 401-405 (2005)
9EEHaifeng Qian, Zhenfu Cao, Qingshui Xue: Efficient Pairing-Based Threshold Proxy Signature Scheme with Known Signers. Informatica, Lith. Acad. Sci. 16(2): 261-274 (2005)
8EEHaiyong Bao, Zhenfu Cao, Shengbao Wang: Remarks on Wu-Hsu's threshold signature scheme using self-certified public keys. Journal of Systems and Software 78(1): 56-59 (2005)
2004
7EEZhenchuan Chai, Zhenfu Cao: Factoring-Based Proxy Signature Schemes with Forward-Security. CIS 2004: 1034-1040
6EEQingshui Xue, Zhenfu Cao: Improvement of Multi-Proxy Signature Scheme. CIT 2004: 450-455
5EEQingshui Xue, Zhenfu Cao: A Threshold Proxy Signature Scheme Using Self-Certified Public Keys. ISPA 2004: 715-724
4EEQingshui Xue, Zhenfu Cao, Haifeng Qian: A Generalized Proxy Signature Scheme Based on the RSA Cryptosystem. PDCAT 2004: 662-665
3 Qingshui Xue, Zhenfu Cao, Feilong Tang: An Improved Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. PDPTA 2004: 901-907
2EEKejun Chen, Zhenfu Cao, Dianhua Wu: Existence of APAV(q, k) with q a prime power =5(mod 8) and k=1(mod 4). Discrete Mathematics 279(1-3): 153-161 (2004)
2003
1EEJiguo Li, Zhenfu Cao, Yichen Zhang: Nonrepudiable Proxy Multi-Signature Scheme. J. Comput. Sci. Technol. 18(3): 399-402 (2003)

Coauthor Index

1Haiyong Bao [8] [13] [14] [15] [19] [24] [33] [44] [55] [65] [84]
2Feng Cao [48] [49] [52] [53] [57] [84] [97] [99]
3Zhenchuan Chai [7] [23] [25] [29] [43] [45] [51] [58] [60] [63] [64] [73]
4Kefei Chen [12]
5Kejun Chen [2]
6Xiaoming Cheng [67]
7ZhaoHui Cheng [96]
8Kim-Kwang Raymond Choo [96] [98]
9Xiaolei Dong [36] [46] [50] [56] [60] [64] [68] [82] [83] [90] [92] [95]
10Shanshan Duan [30] [59]
11Binxing Fang [67]
12Min Feng [75]
13Bin Gao [93]
14Gennian Ge [41]
15Sheng Guo [47] [54]
16Pin-Han Ho [80] [87] [89]
17Hai Huang [104]
18Xiaofang Huang [78]
19Peter Langendörfer (Peter Langendoerfer) [37]
20Fengying Li [74] [94] [102]
21Hang Li [93]
22Jiguo Li [1]
23Xiangxue Li [32] [66]
24Xiaohui Liang [77] [79] [85] [86] [88] [91] [103] [105]
25Chuang Lin [37]
26Huang Lin [79] [91] [103] [105]
27Xiaodong Lin [80] [85] [86] [87] [89]
28Yu Long [12]
29Rongxing Lu [10] [11] [15] [16] [17] [20] [21] [22] [34] [36] [38] [39] [43] [46] [47] [50] [56] [58] [62] [65] [68] [69] [70] [71] [72] [73] [80] [81] [83] [85] [86] [87] [88] [89]
30Rong Ma [100]
31Masahiro Mambo [76]
32Ying Miao [40] [41]
33Eiji Okamoto [40]
34Takeshi Okamoto [40]
35Jianping Pan [37]
36Haifeng Qian [4] [9] [13] [19] [26] [27] [32] [33] [48] [54] [66] [84] [95] [102]
37Liuquan Qin [85] [88] [92]
38Jun Shao [18] [39] [42] [62] [75] [76] [77] [79] [81] [86] [91] [101] [105]
39Xuemin Shen (Sherman X. Shen) [37] [80] [87] [89]
40Renwang Su [46] [50]
41Congkai Sun [71] [93]
42Yan Lindsay Sun (Yan Sun) [37]
43Feilong Tang [3]
44Lichen Wang [27] [32]
45Licheng Wang [48] [52] [54] [66] [71] [77] [78] [81] [82] [84]
46Lihua Wang [40] [76] [98]
47Qin Wang [28] [31] [35] [61]
48Shengbao Wang [8] [14] [24] [28] [44] [55] [65] [96] [98]
49Dianhua Wu [2]
50Dongsheng Xing [103]
51Qingshui Xue [3] [4] [5] [6] [9] [27] [74] [94] [102]
52Akihiro Yamamura [76]
53Piyi Yang [90]
54Yixian Yang [78]
55Xiao-chun Yun [67]
56Jiping Zhang [94] [102]
57Yichen Zhang [1]
58Zongyang Zhang [100]
59Shihui Zheng [78]
60Yuan Zhou [20] [21] [22] [23] [25] [29] [30] [34] [45] [51] [63] [67] [102]
61Bin Zhu [75]
62Haojin Zhu [38] [70] [80] [89]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)