General

Zhenfeng Zhang, 

Research Professor, 

Institute of Software, Chinese Academy of Sciences


Email: zhenfeng@iscas.ac.cn

Address: 4# South Fourth Street, Zhong Guan Cun, Beijing

Postcode: 100190

Education

-- PhD 2001, Academy of Mathematics and Systems Science,  Chinese Academy of Sciences

Experience

   
Work Experience

2003-2004, Assistant Professor, Institute of Software, Chinese Academy of Sciences

2004-2009, Associate Professor, Institute of Software, Chinese Academy of Sciences

2009-now,  Research Professor, Institute of Software, Chinese Academy of Sciences

Publications


Papers

1. Zhenfeng Zhang, Kang Yang, Xuexian Hu, Yuchen Wang: Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication. ACM Conference on Computer and Communications Security 2016: 1179-1191

2. Jiang Zhang, Yu Chen, Zhenfeng Zhang: Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes. Advances in Cryptology - CRYPTO 2016: 303-332

3. Jiang Zhang, Zhenfeng Zhang, Jintai Ding, Michael Snook, Özgür Dagdelen: Authenticated Key Exchange from Ideal Lattices. Advances in Cryptology - EUROCRYPT 2015: 719-751

4. Xinyu Li, Jing Xu, Zhenfeng Zhang, Dengguo Feng, Honggang Hu: Multiple Handshakes Security of TLS 1.3 Candidates. IEEE Symposium on Security and Privacy 2016: 486-505

5. Jiang Zhang, Zhenfeng Zhang, Yu Chen, Yanfei Guo, Zongyang Zhang: Black-Box Separations for One-More (Static) CDH and Its Generalization. Advances in Cryptology - ASIACRYPT 2014: 366-385

6. Phong Q. Nguyen, Jiang Zhang, Zhenfeng Zhang: Simpler Efficient Group Signatures from Lattices. Public Key Cryptography 2015: 401-426

7. Jiang Zhang,Zhenfeng Zhang,Hui Guo,Towards Secure Data Distribution Systems in Mobile Cloud Computing,IEEE Transactions on Mobile Computing,   27 March 2017

8. Xiao Lan,Jing Xu,Zhenfeng Zhang,Wentao Zhu,Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3 ,IEEE Transactions on Dependable and Secure Computing, 21 March 2017

9. Lin Zhang, Zhenfeng Zhang: Security Analysis of an ID-Based Two-Server Password-Authenticated Key Exchange. IEEE Communications Letters 21(1): 302-305 (2017)

10. Xuexian Hu, Jiang Zhang, Zhenfeng Zhang, Fengmei Liu: Anonymous Password Authenticated Key Exchange Protocol in the Standard Model. Wireless Personal Communications 96(1): 1451-1474 (2017)

11. Xuexian Hu, Jiang Zhang, Zhenfeng Zhang, Jing Xu: Universally composable anonymous password authenticated key exchange. SCIENCE CHINA Information Sciences 60(5): 52107 (2017)

12. Jialin Chi, Cheng Hong, Min Zhang, Zhenfeng Zhang: Fast Multi-dimensional Range Queries on Encrypted Cloud Databases. DASFAA (1) 2017: 559-575

13. Minqian Wang, Zhenfeng Zhang, Cheng Chen: Security analysis of a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme. Concurrency and Computation: Practice and Experience 28(4): 1237-1245 (2016)

14. Yu Chen, Jiang Zhang, Dongdai Lin, Zhenfeng Zhang: Generic constructions of integrated PKE and PEKS. Des. Codes Cryptography 78(2): 493-526 (2016)

15. Yanfei Guo, Zhenfeng Zhang: Authenticated key exchange with entities from different settings and varied groups. Security and Communication Networks 9(12): 1843-1863 (2016)

16. Lin Zhang, Zhenfeng Zhang, Xuexian Hu: UC-secure Two-Server Password-Based Authentication Protocol and Its Applications. ASIACCS 2016: 153-164

17. Xiao Lan, Jing Xu, Hui Guo, Zhenfeng Zhang: One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model. Inscrypt 2016: 386-400

18. Minqian Wang, Zhenfeng Zhang: Expanded Framework for Dual System Encryption and Its Application. ICISC 2016: 145-160

19. Lin Zhang, Zhenfeng Zhang: UC-secure and Contributory Password-Authenticated Group Key Exchange. INDOCRYPT 2016: 119-134

20. Bo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin, Dengguo Feng: AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash. ISC 2016: 130-146

21. Jiang Zhang, Zhenfeng Zhang: Secure and efficient data-sharing in clouds. Concurrency and Computation: Practice and Experience 27(8): 2125-2143 (2015)

22. Xuexian Hu, Zhenfeng Zhang, Qihui Zhang: Universally composable three-party password-authenticated key exchange with contributiveness. Int. J. Communication Systems 28(6): 1100-1111 (2015)

23. Jing Xu, Xuexian Hu, Zhenfeng Zhang: Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model. ACNS 2015: 42-61

24. Zhenfeng Zhang, Kang Yang, Jiang Zhang, Cheng Chen: Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks. SSR 2015: 140-153

25. Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng: DAA-TZ: An Efficient DAA Scheme for Mobile Devices Using ARM TrustZone. TRUST 2015: 209-227

26. Jialin Chi, Cheng Hong, Min Zhang, Zhenfeng Zhang: Privacy-Enhancing Range Query Processing over Encrypted Cloud Databases. WISE (2) 2015: 63-77

27. Jiang Zhang, Zhenfeng Zhang, Yu Chen: PRE: Stronger security notions and efficient construction with non-interactive opening. Theor. Comput. Sci. 542: 1-16 (2014)

28. Hui Guo, Zhenfeng Zhang, Jiang Zhang: Proxy Re-encryption with Unforgeable Re-encryption Keys. CANS 2014: 20-33

29. Yanfei Guo, Zhenfeng Zhang, Jiang Zhang, Xuexian Hu: Security Analysis of EMV Channel Establishment Protocol in An Enhanced Security Model. ICICS 2014: 305-320

30. Li Xi, Kang Yang, Zhenfeng Zhang, Dengguo Feng: DAA-Related APIs in TPM 2.0 Revisited. TRUST 2014: 1-18

31. Fushan Wei, Zhenfeng Zhang, Chuangui Ma: Analysis and Enhancement of an Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol. IEICE Transactions 96-A(9): 1864-1871 (2013)

32. Aijun Ge, Jiang Zhang, Rui Zhang, Chuangui Ma, Zhenfeng Zhang: Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme. IEEE Trans. Parallel Distrib. Syst. 24(11): 2319-2321 (2013)

33. Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng, San Ling, Huaxiong Wang: Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures. CT-RSA 2013: 50-67

34. Kang Yang, Jing Xu, Zhenfeng Zhang: Certificateless Proxy Re-Encryption Without Pairings. ICISC 2013: 67-88

35. Hui Guo, Zhenfeng Zhang, Jiang Zhang, Cheng Chen: Towards a Secure Certificateless Proxy Re-Encryption Scheme. ProvSec 2013: 330-346

36. Fushan Wei, Zhenfeng Zhang, Chuangui Ma: Gateway-oriented password-authenticated key exchange protocol in the standard model. Journal of Systems and Software 85(3): 760-768 (2012)

37. Aijun Ge, Rui Zhang, Cheng Chen, Chuangui Ma, Zhenfeng Zhang: Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts. ACISP 2012: 336-349

38. Jiang Zhang, Zhenfeng Zhang, Aijun Ge: Ciphertext policy attribute-based encryption from lattices. ASIACCS 2012: 16-17

39. Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng: Combined Public-Key Schemes: The Case of ABE and ABS. ProvSec 2012: 53-69

40. Cheng Chen, Zhenfeng Zhang, Dengguo Feng: Fully Secure Doubly-Spatial Encryption under Simple Assumptions. ProvSec 2012: 253-263

41. Jiang Zhang, Xiang Xie, Rui Zhang, Zhenfeng Zhang: A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening. Inscrypt 2011: 195-209

42. Jiang Zhang, Zhenfeng Zhang: A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings. Inscrypt 2011: 324-340

43. Cheng Chen, Zhenfeng Zhang, Dengguo Feng: Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost. ProvSec 2011: 84-101

44. Fushan Wei, Chuangui Ma, Zhenfeng Zhang: Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security. ProvSec 2011: 366-379

45. Jing Zhao, Dengguo Feng, Zhenfeng Zhang: Attribute-Based Conditional Proxy Re-Encryption with Chosen-Ciphertext Security. GLOBECOM 2010: 1-6

46. Kehua Bao, Zhenfeng Zhang: Collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor Networks. WISA 2010: 221-233

47. Shuang Chang, Duncan S. Wong, Yi Mu, Zhenfeng Zhang: Certificateless Threshold Ring Signature. Inf. Sci. 179(20): 3685-3696 (2009)

48. Jing Yang, Zhenfeng Zhang: A New Anonymous Password-Based Authenticated Key Exchange Protocol. INDOCRYPT 2008: 200-212

49. Bessie C. Hu, Duncan S. Wong, Zhenfeng Zhang, Xiaotie Deng: Certificateless signature: a new security model and an improved generic construction. Des. Codes Cryptography 42(2): 109-126 (2007)

50. Bessie C. Hu, Duncan S. Wong, Zhenfeng Zhang, Xiaotie Deng: Key Replacement Attack Against a Generic Construction of Certificateless Signature. ACISP 2006: 235-246

51. Zhenfeng Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng: Certificateless Public-Key Signature: Security Model and Efficient Construction. ACNS 2006: 293-308

52. Yongbin Zhou, Zhenfeng Zhang, Dengguo Feng: Cryptanalysis of the end-to-end security for mobile communications with end-user identification/authentication. IEEE Communications Letters 9(4): 372-374 (2005)

53. Jing Xu, Zhenfeng Zhang, Dengguo Feng: ID-Based Aggregate Signatures from Bilinear Pairings. CANS 2005: 110-119

54. Zhenfeng Zhang, Jing Xu, Dengguo Feng: Efficient Identity-Based Protocol for Fair Certified E-mail Delivery. CANS 2005: 200-210

55. Zhenfeng Zhang, Dengguo Feng, Jing Xu, Yongbin Zhou: Efficient ID-Based Optimistic Fair Exchange with Provable Security. ICICS 2005: 14-26

56. Jing Xu, Zhenfeng Zhang, Dengguo Feng: ID-Based Proxy Signature Using Bilinear Pairings. ISPA Workshops 2005: 359-367

57. Zhenfeng Zhang, Dengguo Feng: Efficient Fair Certified E-Mail Delivery Based on RSA. ISPA Workshops 2005: 368-377

58. Zhenfeng Zhang, Dengguo Feng, Zongduo Dai: Cryptanalysis on AW digital signature scheme based on error-correcting codes. Science in China Series F: Information Sciences 45(5): 397-400 (2002)