Follow
cong zhang
cong zhang
Verified email at zju.edu.cn
Title
Cited by
Cited by
Year
Reducing the leakage in practical order-revealing encryption
D Cash, FH Liu, A O'Neill, C Zhang
Cryptology ePrint Archive, 2016
422016
Parameter-hiding order revealing encryption
D Cash, FH Liu, A O’Neill, M Zhandry, C Zhang
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
352018
Leakage-resilient certificateless public key encryption
H Xiong, TH Yuen, C Zhang, SM Yiu, YJ He
Proceedings of the first ACM workshop on Asia public-key cryptography, 13-22, 2013
292013
An analysis of the algebraic group model
C Zhang, HS Zhou, J Katz
International Conference on the Theory and Application of Cryptology and …, 2022
282022
Poster: LBMS: Load balancing based on multilateral security in cloud
P Sun, Q Shen, Y Chen, Z Wu, C Zhang, A Ruan, L Gu
Proceedings of the 18th ACM conference on Computer and communications …, 2011
152011
The relationship between idealized models under computationally bounded adversaries
M Zhandry, C Zhang
Cryptology ePrint Archive, 2021
142021
Combiners for chosen-ciphertext security
C Zhang, D Cash, X Wang, X Yu, SSM Chow
International Computing and Combinatorics Conference, 257-268, 2016
122016
Exponent-inversion signatures and IBE under static assumptions
TH Yuen, SSM Chow, C Zhang, SM Yiu
Cryptology ePrint Archive, 2014
112014
Indifferentiability for public key cryptosystems
M Zhandry, C Zhang
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
102020
Related randomness attacks for public key cryptosystems
TH Yuen, C Zhang, SSM Chow, SM Yiu
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
102015
Continual leakage-resilient dynamic secret sharing in the split-state model
H Xiong, C Zhang, TH Yuen, EP Zhang, SM Yiu, S Qing
Information and Communications Security: 14th International Conference …, 2012
92012
Impossibility of order-revealing encryption in idealized models
M Zhandry, C Zhang
Theory of Cryptography: 16th International Conference, TCC 2018, Panaji …, 2018
72018
Towards anonymous ciphertext indistinguishability with identity leakage
TH Yuen, C Zhang, SSM Chow, JK Liu
International Conference on Provable Security, 139-153, 2013
72013
Multi-key leakage-resilient threshold cryptography
C Zhang, TH Yuen, H Xiong, SSM Chow, SM Yiu, YJ He
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
72013
A covert channel using core alternation
Y Li, Q Shen, C Zhang, P Sun, Y Chen, S Qing
2012 26th International Conference on Advanced Information Networking and …, 2012
72012
A ciphertext-size lower bound for order-preserving encryption with limited leakage
D Cash, C Zhang
Theory of Cryptography Conference, 159-176, 2018
42018
Attribute specified identity-based encryption
H Xiong, TH Yuen, C Zhang, YJ He, SM Yiu
Information Security Practice and Experience: 9th International Conference …, 2013
32013
The Relationship Between Idealized Models Under Computationally Bounded Adversaries
C Zhang, M Zhandry
International Conference on the Theory and Application of Cryptology and …, 2023
22023
Don’t Tamper with Dual System Encryption: Beyond Polynomial Related-Key Security of IBE
TH Yuen, C Zhang, SSM Chow
International Conference on Applied Cryptography and Network Security, 419-439, 2022
12022
On the Complexity of Cryptographic Groups and Generic Group Models
C Zhang, K Ji, T Wang, B Zhang, HS Zhou, X Wang, K Ren
Cryptology ePrint Archive, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20