default search action
Jiang Zhang 0001
Person information
- affiliation: State Key Laboratory of Cryptology, Beijing, China
Other persons with the same name
- Jiang Zhang — disambiguation page
- Jiang Zhang 0002 — Peking University, Beijing, China
- Jiang Zhang 0003 — University of Southern California, CA, USA (and 1 more)
- Jiang Zhang 0004 — National University of Defense Technology, Jiangsu, China (and 1 more)
- Jiang Zhang 0005 — Technical University of Denmark, Lyngby, Denmark
- Jiang Zhang 0006 — Beijing Normal University, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Yongcheng Song, Jiang Zhang, Xinyi Huang, Wei Wu, Haixia Chen:
Analysis and Construction of Zero-Knowledge Proofs for the MinRank Problem. Comput. J. 67(3): 1060-1075 (2024) - 2023
- [j13]Yongcheng Song, Jiang Zhang, Xinyi Huang, Wei Wu, Haining Yang:
Statistical zero-knowledge and analysis of rank-metric zero-knowledge proofs of knowledge. Theor. Comput. Sci. 952: 113731 (2023) - [c29]Jiang Zhang, Dengguo Feng, Di Yan:
NEV: Faster and Smaller NTRU Encryption Using Vector Decoding. ASIACRYPT (7) 2023: 157-189 - [c28]Yongcheng Song, Jiang Zhang, Xinyi Huang, Wei Wu:
Blockwise Rank Decoding Problem and LRPC Codes: Cryptosystems with Smaller Sizes. ASIACRYPT (7) 2023: 284-316 - [c27]Binwu Xiang, Jiang Zhang, Yi Deng, Yiran Dai, Dengguo Feng:
Fast Blind Rotation for Bootstrapping FHEs. CRYPTO (4) 2023: 3-36 - [c26]Xiaojie Guo, Kang Yang, Xiao Wang, Wenhao Zhang, Xiang Xie, Jiang Zhang, Zheli Liu:
Half-Tree: Halving the Cost of Tree Expansion in COT and DPF. EUROCRYPT (1) 2023: 330-362 - [i24]Jiang Zhang, Dengguo Feng, Di Yan:
NEV: Faster and Smaller NTRU Encryption using Vector Decoding. IACR Cryptol. ePrint Arch. 2023: 1298 (2023) - [i23]Yongcheng Song, Jiang Zhang, Xinyi Huang, Wei Wu:
Blockwise Rank Decoding Problem and LRPC Codes: Cryptosystems with Smaller Sizes. IACR Cryptol. ePrint Arch. 2023: 1387 (2023) - [i22]Binwu Xiang, Jiang Zhang, Yi Deng, Yiran Dai, Dengguo Feng:
Fast Blind Rotation for Bootstrapping FHEs. IACR Cryptol. ePrint Arch. 2023: 1564 (2023) - 2022
- [j12]Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow:
Non-Malleable Functions and their Applications. J. Cryptol. 35(2): 11 (2022) - [i21]Xiaojie Guo, Kang Yang, Xiao Wang, Wenhao Zhang, Xiang Xie, Jiang Zhang, Zheli Liu:
Half-Tree: Halving the Cost of Tree Expansion in COT and DPF. IACR Cryptol. ePrint Arch. 2022: 1431 (2022) - 2021
- [j11]Di Yan, Yu Yu, Hanlin Liu, Shuoyao Zhao, Jiang Zhang:
An improved algorithm for learning sparse parities in the presence of noise. Theor. Comput. Sci. 873: 76-86 (2021) - [j10]Shunli Ma, Yi Deng, Debiao He, Jiang Zhang, Xiang Xie:
An Efficient NIZK Scheme for Privacy-Preserving Transactions Over Account-Model Blockchain. IEEE Trans. Dependable Secur. Comput. 18(2): 641-651 (2021) - [c25]Hanlin Liu, Yu Yu, Shuoyao Zhao, Jiang Zhang, Wenling Liu, Zhenkai Hu:
Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact. CRYPTO (2) 2021: 365-394 - [c24]Yu Yu, Jiang Zhang:
Smoothing Out Binary Linear Codes and Worst-Case Sub-exponential Hardness for LPN. CRYPTO (3) 2021: 473-501 - 2020
- [b1]Jiang Zhang, Zhenfeng Zhang:
Lattice-Based Cryptosystems - A Design Perspective. Springer 2020, ISBN 978-981-15-8426-8, pp. 1-174 - [j9]Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang:
Improved lattice-based CCA2-secure PKE in the standard model. Sci. China Inf. Sci. 63(8): 1-22 (2020) - [c23]Kang Yang, Chenkai Weng, Xiao Lan, Jiang Zhang, Xiao Wang:
Ferret: Fast Extension for Correlated OT with Small Communication. CCS 2020: 1607-1626 - [c22]Kang Yang, Xiao Wang, Jiang Zhang:
More Efficient MPC from Improved Triple Generation and Authenticated Garbling. CCS 2020: 1627-1646 - [c21]Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang, Kang Yang:
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes. Public Key Cryptography (2) 2020: 37-65 - [c20]Shunli Ma, Yi Deng, Mengqiu Bai, Debiao He, Jiang Zhang, Xiang Xie:
A Practical NIZK Argument for Confidential Transactions over Account-Model Blockchain. ProvSec 2020: 234-253 - [i20]Hanlin Liu, Yu Yu, Shuoyao Zhao, Jiang Zhang, Wenling Liu:
Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact. IACR Cryptol. ePrint Arch. 2020: 161 (2020) - [i19]Yu Yu, Jiang Zhang:
Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN. IACR Cryptol. ePrint Arch. 2020: 870 (2020) - [i18]Kang Yang, Chenkai Weng, Xiao Lan, Jiang Zhang, Xiao Wang:
Ferret: Fast Extension for coRRElated oT with small communication. IACR Cryptol. ePrint Arch. 2020: 924 (2020) - [i17]Jiang Zhang, Yu Yu, Dengguo Feng, Shuqin Fan, Zhenfeng Zhang, Kang Yang:
Interactive Proofs for Quantum Black-Box Computations. IACR Cryptol. ePrint Arch. 2020: 1391 (2020)
2010 – 2019
- 2019
- [j8]Yu Chen, Jiang Zhang, Yi Deng, Jinyong Chang:
KDM security for identity-based encryption: Constructions and separations. Inf. Sci. 486: 450-473 (2019) - [c19]Yu Yu, Jiang Zhang, Jian Weng, Chun Guo, Xiangxue Li:
Collision Resistant Hashing from Sub-exponential Learning Parity with Noise. ASIACRYPT (2) 2019: 3-24 - [c18]Shuoyao Zhao, Yu Yu, Jiang Zhang, Hanlin Liu:
Valiant's Universal Circuits Revisited: An Overall Improvement and a Lower Bound. ASIACRYPT (1) 2019: 401-425 - [c17]Jie Li, Mimi Ma, Jiang Zhang, Shuqin Fan, Shuaigang Li:
Attribute-Based Keyword Search from Lattices. Inscrypt 2019: 66-85 - [i16]Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang:
Improved Lattice-based CCA2-Secure PKE in the Standard Model. IACR Cryptol. ePrint Arch. 2019: 149 (2019) - [i15]Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang, Kang Yang:
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes. IACR Cryptol. ePrint Arch. 2019: 510 (2019) - [i14]Jiang Zhang, Yu Yu, Dengguo Feng, Shuqin Fan, Zhenfeng Zhang:
On the (Quantum) Random Oracle Methodology: New Separations and More. IACR Cryptol. ePrint Arch. 2019: 1101 (2019) - [i13]Kang Yang, Xiao Wang, Jiang Zhang:
More Efficient MPC from Improved Triple Generation and Authenticated Garbling. IACR Cryptol. ePrint Arch. 2019: 1104 (2019) - 2018
- [c16]Shuoyao Zhao, Yu Yu, Jiang Zhang:
On the Hardness of Learning Parity with Noise over Rings. ProvSec 2018: 94-108 - [i12]Shuoyao Zhao, Yu Yu, Jiang Zhang, Hanlin Liu:
Valiant's Universal Circuits Revisited: an Overall Improvement and a Lower Bound. IACR Cryptol. ePrint Arch. 2018: 943 (2018) - 2017
- [j7]Xuexian Hu, Jiang Zhang, Zhenfeng Zhang, Jing Xu:
Universally composable anonymous password authenticated key exchange. Sci. China Inf. Sci. 60(5): 52107 (2017) - [j6]Jiang Zhang, Zhenfeng Zhang, Hui Guo:
Towards Secure Data Distribution Systems in Mobile Cloud Computing. IEEE Trans. Mob. Comput. 16(11): 3222-3235 (2017) - [j5]Xuexian Hu, Jiang Zhang, Zhenfeng Zhang, Fengmei Liu:
Anonymous Password Authenticated Key Exchange Protocol in the Standard Model. Wirel. Pers. Commun. 96(1): 1451-1474 (2017) - [c15]Jiang Zhang, Yu Yu:
Two-Round PAKE from Approximate SPH and Instantiations from Lattices. ASIACRYPT (3) 2017: 37-67 - [i11]Jiang Zhang, Yu Yu:
Two-Round PAKE from Approximate SPH and Instantiations from Lattices. IACR Cryptol. ePrint Arch. 2017: 838 (2017) - [i10]Shunli Ma, Yi Deng, Debiao He, Jiang Zhang, Xiang Xie:
An Efficient NIZK Scheme for Privacy-Preserving Transactions over Account-Model Blockchain. IACR Cryptol. ePrint Arch. 2017: 1239 (2017) - [i9]Yu Yu, Jiang Zhang, Jian Weng, Chun Guo, Xiangxue Li:
Collision Resistant Hashing from Learning Parity with Noise. IACR Cryptol. ePrint Arch. 2017: 1260 (2017) - 2016
- [j4]Yu Chen, Jiang Zhang, Dongdai Lin, Zhenfeng Zhang:
Generic constructions of integrated PKE and PEKS. Des. Codes Cryptogr. 78(2): 493-526 (2016) - [c14]Yu Yu, Jiang Zhang:
Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN. CRYPTO (1) 2016: 214-243 - [c13]Jiang Zhang, Yu Chen, Zhenfeng Zhang:
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes. CRYPTO (3) 2016: 303-332 - [c12]Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow:
Non-Malleable Functions and Their Applications. Public Key Cryptography (2) 2016: 386-416 - [i8]Yu Yu, Jiang Zhang:
Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN. IACR Cryptol. ePrint Arch. 2016: 514 (2016) - [i7]Jiang Zhang, Yu Chen, Zhenfeng Zhang:
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes. IACR Cryptol. ePrint Arch. 2016: 523 (2016) - [i6]Yu Chen, Jiang Zhang, Yi Deng, Jinyong Chang:
KDM Security for Identity-Based Encryption: Constructions and Separations. IACR Cryptol. ePrint Arch. 2016: 1020 (2016) - 2015
- [j3]Jiang Zhang, Zhenfeng Zhang:
Secure and efficient data-sharing in clouds. Concurr. Comput. Pract. Exp. 27(8): 2125-2143 (2015) - [c11]Jiang Zhang, Zhenfeng Zhang, Jintai Ding, Michael Snook, Özgür Dagdelen:
Authenticated Key Exchange from Ideal Lattices. EUROCRYPT (2) 2015: 719-751 - [c10]Phong Q. Nguyen, Jiang Zhang, Zhenfeng Zhang:
Simpler Efficient Group Signatures from Lattices. Public Key Cryptography 2015: 401-426 - [c9]Zhenfeng Zhang, Kang Yang, Jiang Zhang, Cheng Chen:
Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks. SSR 2015: 140-153 - [i5]Phong Q. Nguyen, Jiang Zhang, Zhenfeng Zhang:
Simpler Efficient Group Signatures from Lattices. IACR Cryptol. ePrint Arch. 2015: 20 (2015) - [i4]Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow:
Non-Malleable Functions and Their Applications. IACR Cryptol. ePrint Arch. 2015: 1253 (2015) - 2014
- [j2]Jiang Zhang, Zhenfeng Zhang, Yu Chen:
PRE: Stronger security notions and efficient construction with non-interactive opening. Theor. Comput. Sci. 542: 1-16 (2014) - [c8]Jiang Zhang, Zhenfeng Zhang, Yu Chen, Yanfei Guo, Zongyang Zhang:
Black-Box Separations for One-More (Static) CDH and Its Generalization. ASIACRYPT (2) 2014: 366-385 - [c7]Hui Guo, Zhenfeng Zhang, Jiang Zhang:
Proxy Re-encryption with Unforgeable Re-encryption Keys. CANS 2014: 20-33 - [c6]Yanfei Guo, Zhenfeng Zhang, Jiang Zhang, Xuexian Hu:
Security Analysis of EMV Channel Establishment Protocol in An Enhanced Security Model. ICICS 2014: 305-320 - [i3]Jiang Zhang, Zhenfeng Zhang, Jintai Ding, Michael Snook:
Authenticated Key Exchange from Ideal Lattices. IACR Cryptol. ePrint Arch. 2014: 589 (2014) - 2013
- [j1]Aijun Ge, Jiang Zhang, Rui Zhang, Chuangui Ma, Zhenfeng Zhang:
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme. IEEE Trans. Parallel Distributed Syst. 24(11): 2319-2321 (2013) - [c5]Jiang Zhang, Zhenfeng Zhang:
Secure and Efficient Data-Sharing in Clouds. EIDWT 2013: 443-450 - [c4]Hui Guo, Zhenfeng Zhang, Jiang Zhang, Cheng Chen:
Towards a Secure Certificateless Proxy Re-Encryption Scheme. ProvSec 2013: 330-346 - 2012
- [c3]Jiang Zhang, Zhenfeng Zhang, Aijun Ge:
Ciphertext policy attribute-based encryption from lattices. AsiaCCS 2012: 16-17 - [i2]Jiang Zhang, Zhenfeng Zhang, Yu Chen:
PRE - Stronger Security Notion and Efficient Construction with New Property. IACR Cryptol. ePrint Arch. 2012: 664 (2012) - [i1]Yu Chen, Jiang Zhang, Zhenfeng Zhang, Dongdai Lin:
Integrated PKE and PEKS - Stronger Security Notions and New Constructions. IACR Cryptol. ePrint Arch. 2012: 692 (2012) - 2011
- [c2]Jiang Zhang, Xiang Xie, Rui Zhang, Zhenfeng Zhang:
A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening. Inscrypt 2011: 195-209 - [c1]Jiang Zhang, Zhenfeng Zhang:
A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings. Inscrypt 2011: 324-340
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint