Zhaohui Cheng
Zhaohui Cheng
Lecturer of Computer Science, Middlesex University
Adresse e-mail validée de olymtech.net
Citée par
Citée par
Identity-based key agreement protocols from pairings
L Chen, Z Cheng, NP Smart
International Journal of Information Security 6 (4), 213-241, 2007
Security proof of Sakai-Kasahara’s identity-based encryption scheme
L Chen, Z Cheng
Cryptography and Coding, 442-459, 2005
Efficient Certificateless Public Key Encryption.
Z Cheng, R Comley
IACR Cryptology ePrint Archive 2005, 12, 2005
Efficient certificateless public key encryption
Z Cheng, R Comley
Cryptology ePrint Archive, Report 2005/012, 2005
On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases.
Z Cheng, M Nistazakis, R Comley, L Vasiu
IACR Cryptology ePrint Archive 2005, 129, 2005
Efficient ID-KEM based on the Sakai–Kasahara key construction
L Chen, Z Cheng, J Malone-Lee, MP Smart
IEE Proceedings-Information Security 153 (1), 19-26, 2006
On security proof of McCullaghBarreto's key agreement protocol and its variants
Z Cheng, L Chen
International Journal of Security and Networks 2 (3), 251-259, 2007
Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
S Wang, Z Cao, Z Cheng, KKR Choo
Science in China Series F: Information Sciences 52 (8), 1358-1370, 2009
Pairing-Based One-Round Tripartite Key Agreement Protocols.
Z Cheng, L Vasiu, R Comley
IACR Cryptology ePrint Archive 2004, 79, 2004
General and efficient certificateless public key encryption constructions
Z Cheng, L Chen, L Ling, R Comley
Pairing-Based Cryptography–Pairing 2007, 83-107, 2007
Identity-based key agreement with unilateral identity privacy using pairings
Z Cheng, L Chen, R Comley, Q Tang
Information Security Practice and Experience, 202-213, 2006
Remove key escrow from the identity-based encryption system.
RA Comley, L Vasiu, Z Cheng
IFIP Eighteenth World Computer Congress, Information Technology, TC1 3rd …, 2004
Remove key escrow from the identity-based encryption system
Z Cheng, R Comley, L Vasiu
Exploring New Frontiers of Theoretical Informatics, 37-50, 2004
Attacks on an ISO/IEC 11770-2 key establishment protocol.
RA Comley, Z Cheng
International Journal of Network Security 3 (3), 290-295, 2005
Attacks On An ISO/IEC 11770-2 Key Establishment Protocol.
Z Cheng, R Comley
IACR Cryptology ePrint Archive 2004, 249, 2004
SK− KEM: An Identity− based Kem
M Barbosa, L Chen, Z Cheng, M Chimley, A Dent, P Farshim, K Harrison, ...
IEEE P1363. 3: Identity-Based Public Key Cryptography, 2006
Implementing pairing-based cryptosystems
Z Cheng, M Nistazakis
Proceedings of IWWST, 2005
Security Analysis of LWAPP
Z Cheng, M Nistazakis, R Comely
IWWST’04, 60, 2004
Pairing-based cryptosystems and key agreement protocols
Z Cheng
Thesis, Middlesex University, 2007
Simple SK-ID-KEM1
Z Cheng
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20