Zhenfeng Zhang,
Research Professor,
Institute of Software, Chinese Academy of Sciences
Email: zhenfeng@iscas.ac.cn
Address: 4# South Fourth Street, Zhong Guan Cun, Beijing
Postcode: 100190
Education
-- PhD 2001, Academy of Mathematics and Systems Science, Chinese Academy of Sciences
Experience
Work Experience
2003-2004, Assistant Professor, Institute of Software, Chinese Academy of Sciences
2004-2009, Associate Professor, Institute of Software, Chinese Academy of Sciences
2009-now, Research Professor, Institute of Software, Chinese Academy of Sciences
Publications
Papers
1. Zhenfeng Zhang, Kang Yang, Xuexian Hu, Yuchen Wang: Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication. ACM Conference on Computer and Communications Security 2016: 1179-1191
2. Jiang Zhang, Yu Chen, Zhenfeng Zhang: Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes. Advances in Cryptology - CRYPTO 2016: 303-332
3. Jiang Zhang, Zhenfeng Zhang, Jintai Ding, Michael Snook, Özgür Dagdelen: Authenticated Key Exchange from Ideal Lattices. Advances in Cryptology - EUROCRYPT 2015: 719-751
4. Xinyu Li, Jing Xu, Zhenfeng Zhang, Dengguo Feng, Honggang Hu: Multiple Handshakes Security of TLS 1.3 Candidates. IEEE Symposium on Security and Privacy 2016: 486-505
5. Jiang Zhang, Zhenfeng Zhang, Yu Chen, Yanfei Guo, Zongyang Zhang: Black-Box Separations for One-More (Static) CDH and Its Generalization. Advances in Cryptology - ASIACRYPT 2014: 366-385
6. Phong Q. Nguyen, Jiang Zhang, Zhenfeng Zhang: Simpler Efficient Group Signatures from Lattices. Public Key Cryptography 2015: 401-426
7. Jiang Zhang,Zhenfeng Zhang,Hui Guo,Towards Secure Data Distribution Systems in Mobile Cloud Computing,IEEE Transactions on Mobile Computing, 27 March 2017
8. Xiao Lan,Jing Xu,Zhenfeng Zhang,Wentao Zhu,Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3 ,IEEE Transactions on Dependable and Secure Computing, 21 March 2017
9. Lin Zhang, Zhenfeng Zhang: Security Analysis of an ID-Based Two-Server Password-Authenticated Key Exchange. IEEE Communications Letters 21(1): 302-305 (2017)
10. Xuexian Hu, Jiang Zhang, Zhenfeng Zhang, Fengmei Liu: Anonymous Password Authenticated Key Exchange Protocol in the Standard Model. Wireless Personal Communications 96(1): 1451-1474 (2017)
11. Xuexian Hu, Jiang Zhang, Zhenfeng Zhang, Jing Xu: Universally composable anonymous password authenticated key exchange. SCIENCE CHINA Information Sciences 60(5): 52107 (2017)
12. Jialin Chi, Cheng Hong, Min Zhang, Zhenfeng Zhang: Fast Multi-dimensional Range Queries on Encrypted Cloud Databases. DASFAA (1) 2017: 559-575
13. Minqian Wang, Zhenfeng Zhang, Cheng Chen: Security analysis of a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme. Concurrency and Computation: Practice and Experience 28(4): 1237-1245 (2016)
14. Yu Chen, Jiang Zhang, Dongdai Lin, Zhenfeng Zhang: Generic constructions of integrated PKE and PEKS. Des. Codes Cryptography 78(2): 493-526 (2016)
15. Yanfei Guo, Zhenfeng Zhang: Authenticated key exchange with entities from different settings and varied groups. Security and Communication Networks 9(12): 1843-1863 (2016)
16. Lin Zhang, Zhenfeng Zhang, Xuexian Hu: UC-secure Two-Server Password-Based Authentication Protocol and Its Applications. ASIACCS 2016: 153-164
17. Xiao Lan, Jing Xu, Hui Guo, Zhenfeng Zhang: One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model. Inscrypt 2016: 386-400
18. Minqian Wang, Zhenfeng Zhang: Expanded Framework for Dual System Encryption and Its Application. ICISC 2016: 145-160
19. Lin Zhang, Zhenfeng Zhang: UC-secure and Contributory Password-Authenticated Group Key Exchange. INDOCRYPT 2016: 119-134
20. Bo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin, Dengguo Feng: AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash. ISC 2016: 130-146
21. Jiang Zhang, Zhenfeng Zhang: Secure and efficient data-sharing in clouds. Concurrency and Computation: Practice and Experience 27(8): 2125-2143 (2015)
22. Xuexian Hu, Zhenfeng Zhang, Qihui Zhang: Universally composable three-party password-authenticated key exchange with contributiveness. Int. J. Communication Systems 28(6): 1100-1111 (2015)
23. Jing Xu, Xuexian Hu, Zhenfeng Zhang: Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model. ACNS 2015: 42-61
24. Zhenfeng Zhang, Kang Yang, Jiang Zhang, Cheng Chen: Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks. SSR 2015: 140-153
25. Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng: DAA-TZ: An Efficient DAA Scheme for Mobile Devices Using ARM TrustZone. TRUST 2015: 209-227
26. Jialin Chi, Cheng Hong, Min Zhang, Zhenfeng Zhang: Privacy-Enhancing Range Query Processing over Encrypted Cloud Databases. WISE (2) 2015: 63-77
27. Jiang Zhang, Zhenfeng Zhang, Yu Chen: PRE: Stronger security notions and efficient construction with non-interactive opening. Theor. Comput. Sci. 542: 1-16 (2014)
28. Hui Guo, Zhenfeng Zhang, Jiang Zhang: Proxy Re-encryption with Unforgeable Re-encryption Keys. CANS 2014: 20-33
29. Yanfei Guo, Zhenfeng Zhang, Jiang Zhang, Xuexian Hu: Security Analysis of EMV Channel Establishment Protocol in An Enhanced Security Model. ICICS 2014: 305-320
30. Li Xi, Kang Yang, Zhenfeng Zhang, Dengguo Feng: DAA-Related APIs in TPM 2.0 Revisited. TRUST 2014: 1-18
31. Fushan Wei, Zhenfeng Zhang, Chuangui Ma: Analysis and Enhancement of an Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol. IEICE Transactions 96-A(9): 1864-1871 (2013)
32. Aijun Ge, Jiang Zhang, Rui Zhang, Chuangui Ma, Zhenfeng Zhang: Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme. IEEE Trans. Parallel Distrib. Syst. 24(11): 2319-2321 (2013)
33. Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng, San Ling, Huaxiong Wang: Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures. CT-RSA 2013: 50-67
34. Kang Yang, Jing Xu, Zhenfeng Zhang: Certificateless Proxy Re-Encryption Without Pairings. ICISC 2013: 67-88
35. Hui Guo, Zhenfeng Zhang, Jiang Zhang, Cheng Chen: Towards a Secure Certificateless Proxy Re-Encryption Scheme. ProvSec 2013: 330-346
36. Fushan Wei, Zhenfeng Zhang, Chuangui Ma: Gateway-oriented password-authenticated key exchange protocol in the standard model. Journal of Systems and Software 85(3): 760-768 (2012)
37. Aijun Ge, Rui Zhang, Cheng Chen, Chuangui Ma, Zhenfeng Zhang: Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts. ACISP 2012: 336-349
38. Jiang Zhang, Zhenfeng Zhang, Aijun Ge: Ciphertext policy attribute-based encryption from lattices. ASIACCS 2012: 16-17
39. Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng: Combined Public-Key Schemes: The Case of ABE and ABS. ProvSec 2012: 53-69
40. Cheng Chen, Zhenfeng Zhang, Dengguo Feng: Fully Secure Doubly-Spatial Encryption under Simple Assumptions. ProvSec 2012: 253-263
41. Jiang Zhang, Xiang Xie, Rui Zhang, Zhenfeng Zhang: A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening. Inscrypt 2011: 195-209
42. Jiang Zhang, Zhenfeng Zhang: A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings. Inscrypt 2011: 324-340
43. Cheng Chen, Zhenfeng Zhang, Dengguo Feng: Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost. ProvSec 2011: 84-101
44. Fushan Wei, Chuangui Ma, Zhenfeng Zhang: Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security. ProvSec 2011: 366-379
45. Jing Zhao, Dengguo Feng, Zhenfeng Zhang: Attribute-Based Conditional Proxy Re-Encryption with Chosen-Ciphertext Security. GLOBECOM 2010: 1-6
46. Kehua Bao, Zhenfeng Zhang: Collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor Networks. WISA 2010: 221-233
47. Shuang Chang, Duncan S. Wong, Yi Mu, Zhenfeng Zhang: Certificateless Threshold Ring Signature. Inf. Sci. 179(20): 3685-3696 (2009)
48. Jing Yang, Zhenfeng Zhang: A New Anonymous Password-Based Authenticated Key Exchange Protocol. INDOCRYPT 2008: 200-212
49. Bessie C. Hu, Duncan S. Wong, Zhenfeng Zhang, Xiaotie Deng: Certificateless signature: a new security model and an improved generic construction. Des. Codes Cryptography 42(2): 109-126 (2007)
50. Bessie C. Hu, Duncan S. Wong, Zhenfeng Zhang, Xiaotie Deng: Key Replacement Attack Against a Generic Construction of Certificateless Signature. ACISP 2006: 235-246
51. Zhenfeng Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng: Certificateless Public-Key Signature: Security Model and Efficient Construction. ACNS 2006: 293-308
52. Yongbin Zhou, Zhenfeng Zhang, Dengguo Feng: Cryptanalysis of the end-to-end security for mobile communications with end-user identification/authentication. IEEE Communications Letters 9(4): 372-374 (2005)
53. Jing Xu, Zhenfeng Zhang, Dengguo Feng: ID-Based Aggregate Signatures from Bilinear Pairings. CANS 2005: 110-119
54. Zhenfeng Zhang, Jing Xu, Dengguo Feng: Efficient Identity-Based Protocol for Fair Certified E-mail Delivery. CANS 2005: 200-210
55. Zhenfeng Zhang, Dengguo Feng, Jing Xu, Yongbin Zhou: Efficient ID-Based Optimistic Fair Exchange with Provable Security. ICICS 2005: 14-26
56. Jing Xu, Zhenfeng Zhang, Dengguo Feng: ID-Based Proxy Signature Using Bilinear Pairings. ISPA Workshops 2005: 359-367
57. Zhenfeng Zhang, Dengguo Feng: Efficient Fair Certified E-Mail Delivery Based on RSA. ISPA Workshops 2005: 368-377
58. Zhenfeng Zhang, Dengguo Feng, Zongduo Dai: Cryptanalysis on AW digital signature scheme based on error-correcting codes. Science in China Series F: Information Sciences 45(5): 397-400 (2002)