Preserving data privacy via federated learning: Challenges and solutions Z Li, V Sharma, SP Mohanty IEEE Consumer Electronics Magazine 9 (3), 8-16, 2020 | 146 | 2020 |
Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification X Ge, J Yu, H Zhang, C Hu, Z Li, Z Qin, R Hao IEEE Transactions on Dependable and Secure computing 18 (1), 490-504, 2019 | 109 | 2019 |
Quantum-safe round-optimal password authentication for mobile devices Z Li, D Wang, E Morais IEEE transactions on dependable and secure computing 19 (3), 1885-1899, 2020 | 84 | 2020 |
Achieving one-round password-based authenticated key exchange over lattices Z Li, D Wang IEEE transactions on services computing 15 (1), 308-321, 2019 | 49 | 2019 |
Towards multi-hop homomorphic identity-based proxy re-encryption via branching program Z Li, C Ma, D Wang IEEE Access 5, 16214-16228, 2017 | 31 | 2017 |
PriParkRec: Privacy-preserving decentralized parking recommendation service Z Li, M Alazab, S Garg, MS Hossain IEEE Transactions on Vehicular Technology 70 (5), 4037-4050, 2021 | 28 | 2021 |
Two-round PAKE protocol over lattices without NIZK Z Li, D Wang International Conference on Information Security and Cryptology, 138-159, 2018 | 26 | 2018 |
Achieving multi-hop PRE via branching program Z Li, C Ma, D Wang IEEE Transactions on Cloud Computing 8 (1), 45-58, 2017 | 20 | 2017 |
Building low-interactivity multifactor authenticated key exchange for industrial internet of things Z Li, Z Yang, P Szalachowski, J Zhou IEEE Internet of Things Journal 8 (2), 844-859, 2020 | 19 | 2020 |
Multi-key FHE for multi-bit messages Z Li, C Ma, H Zhou Science China. Information Sciences 61 (2), 029101, 2018 | 19 | 2018 |
Leakage Resilient Leveled on Multiple Bits Message Z Li, C Ma, D Wang IEEE Transactions on Big Data 7 (5), 845-858, 2017 | 18 | 2017 |
Preventing adaptive key recovery attacks on the GSW levelled homomorphic encryption scheme Z Li, SD Galbraith, C Ma Provable Security: 10th International Conference, ProvSec 2016, Nanjing …, 2016 | 18 | 2016 |
Biometrics-authenticated key exchange for secure messaging M Wang, K He, J Chen, Z Li, W Zhao, R Du Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 17 | 2021 |
Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs Z Li, V Sharma, C Ma, C Ge, W Susilo Science China. Information Sciences 64 (6), 169301, 2021 | 16 | 2021 |
Oblivious Transfer via Lossy Encryption from Lattice‐Based Cryptography Z Li, C Xiang, C Wang Wireless Communications and Mobile Computing 2018 (1), 5973285, 2018 | 16 | 2018 |
Multi-bit Leveled Homomorphic Encryption via-Based Z Li, C Ma, E Morais, G Du International conference on information security and cryptology, 221-242, 2016 | 15 | 2016 |
Secdedup: Secure encrypted data deduplication with dynamic ownership updating S Zhang, H Xian, Z Li, L Wang IEEE Access 8, 186323-186334, 2020 | 12 | 2020 |
Laksa: A probabilistic proof-of-stake protocol D Reijsbergen, P Szalachowski, J Ke, Z Li, J Zhou arXiv preprint arXiv:2006.01427, 2020 | 12 | 2020 |
Decentralized identity authentication with auditability and privacy B Alangot, P Szalachowski, TTA Dinh, S Meftah, JI Gana, KMM Aung, Z Li Algorithms 16 (1), 4, 2022 | 11 | 2022 |
PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices M Wang, K He, J Chen, R Du, B Zhang, Z Li Future Generation Computer Systems 131, 28-42, 2022 | 11 | 2022 |