default search action
Huafei Zhu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c72]Huafei Zhu, Wee Keong Ng:
Beaver Triple Generator from Multiplicatively Homomorphic Key Management Protocol. AINA (3) 2022: 492-503 - [c71]Huafei Zhu, Wee Keong Ng:
Highly Scalable Beaver Triple Generator from Additively Homomorphic Encryption. AINA (3) 2022: 504-514 - [i10]Huafei Zhu:
Highly Scalable Beaver Triple Generator from Additive-only Homomorphic Encryption. CoRR abs/2202.06326 (2022) - 2021
- [i9]Huafei Zhu:
A Lightweight, Anonymous and Confidential Genomic Computing for Industrial Scale Deployment. CoRR abs/2110.01390 (2021) - 2020
- [j3]Huafei Zhu, Rick Siow Mong Goh, Wee Keong Ng:
Privacy-Preserving Weighted Federated Learning Within the Secret Sharing Framework. IEEE Access 8: 198275-198284 (2020) - [i8]Huafei Zhu, Zengxiang Li, Merivyn Cheah, Rick Siow Mong Goh:
Privacy-preserving Weighted Federated Learning within Oracle-Aided MPC Framework. CoRR abs/2003.07630 (2020) - [i7]Huafei Zhu:
On the relationship between (secure) multi-party computation and (secure) federated learning. CoRR abs/2008.02609 (2020)
2010 – 2019
- 2019
- [c70]Huafei Zhu, Wee Keong Ng:
Transitive Pseudonyms Mediated EHRs Sharing for Very Important Patients. ICWS 2019: 80-94 - 2018
- [c69]Huafei Zhu, Wee Keong Ng:
Sustainable Data Management Strategies and Systems in Untrust Cloud Environments. ICIT 2018: 163-167 - 2017
- [j2]Huafei Zhu:
An efficient protocol for secure multicast key distribution in the presence of adaptive adversaries. Sci. China Inf. Sci. 60(5): 52109 (2017) - [c68]Shuai Yuan, Lei Li, Chunxiao Chigan, Huafei Zhu:
Stochastic Game Approach for Long-Term Fairness-Aware Radio Resource Allocation. GLOBECOM 2017: 1-6 - 2015
- [c67]Huafei Zhu:
Distributed Multi-user, Multi-key Searchable Encryptions Resilient Fault Tolerance. INTRUST 2015: 17-31 - [c66]Huafei Zhu:
Universally Composable Oblivious Database in the Presence of Malicious Adversaries. INTRUST 2015: 49-61 - [c65]Huafei Zhu, Shuoping Wang, Peipei Tang:
Verifiably anonymous data collection on web. ITNAC 2015: 38-43 - 2013
- [c64]Huafei Zhu, Wee Siong Ng, See-Kiong Ng:
Sustainable Pseudo-random Number Generator. SEC 2013: 139-147 - 2012
- [c63]Huafei Zhu, Hong Xiao:
Optimal Trust Mining and Computing on Keyed MapReduce. ESSoS 2012: 143-150 - [c62]Nguyen Thanh Hung, Do Hoang Giang, Wee Keong Ng, Huafei Zhu:
Cloud-enabled data sharing model. ISI 2012: 1-6 - [c61]Wee Keong Ng, Yonggang Wen, Huafei Zhu:
Private data deduplication protocols in cloud storage. SAC 2012: 441-446 - 2011
- [c60]Huafei Zhu:
Public-Key Encryptions Tolerating Adaptive and Composable Adversaries. ISPEC 2011: 1-13 - [c59]Huafei Zhu:
Non-black-Box Computation of Linear Regression Protocols with Malicious Adversaries. ISPEC 2011: 372-385 - 2010
- [c58]Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai:
Adaptive and Composable Non-committing Encryptions. ACISP 2010: 135-144 - [c57]Huafei Zhu, Feng Bao:
Error-free, Multi-bit Non-committing Encryption with Constant Round Complexity. Inscrypt 2010: 52-61 - [c56]Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai:
Adaptive and Composable Non-interactive String-Commitment Protocols. ICETE (Selected Papers) 2010: 233-242 - [c55]Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai:
Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries. ICETE (Selected Papers) 2010: 274-288 - [c54]Huafei Zhu:
Towards a Theory of Cloud Computing in the Protocol-Composition Framework. IITSI 2010: 758-762 - [c53]Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai:
Adaptive and Composable Non-interactive String-commitment Protocols. SECRYPT 2010: 354-361 - [c52]Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai:
Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries. SECRYPT 2010: 389-398 - [c51]Huafei Zhu, Feng Bao:
Private Searching on MapReduce. TrustBus 2010: 93-101
2000 – 2009
- 2009
- [c50]Huafei Zhu, Feng Bao:
Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions. AFRICACRYPT 2009: 323-333 - [c49]Ying Qiu, Huafei Zhu:
Somewhat Secure Mobile Electronic-Voting Systems Based on the Cut-and-Choose Mechanism. CIS (1) 2009: 446-450 - [c48]Huafei Zhu, Ying Qiu:
Mixed Commitments Mediated Transcoders: A Simple Implementation of Mercurial Mediated Transcoders. CIS (1) 2009: 574-577 - [c47]Huafei Zhu:
Towards a Theory of Universally Composable Cloud Computing. CloudCom 2009: 638-643 - [c46]Huafei Zhu, Feng Bao:
Adaptive and Composable Oblivious Transfer Protocols (Short Paper). ICICS 2009: 483-492 - [c45]Huafei Zhu, Feng Bao:
Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems. INDOCRYPT 2009: 418-429 - [c44]Huafei Zhu:
New Constructions for Reusable, Non-erasure and Universally Composable Commitments. ISPEC 2009: 102-111 - 2008
- [c43]Huafei Zhu:
Fully-Simulatable Oblivious Set Transfer. ACISP 2008: 141-154 - [c42]Huafei Zhu:
Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols. CANS 2008: 214-225 - [c41]Huafei Zhu, Feng Bao, Robert H. Deng:
Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks. ICC 2008: 1635-1641 - [c40]Huafei Zhu:
Round Optimal Universally Composable Oblivious Transfer Protocols. ProvSec 2008: 328-334 - 2007
- [c39]Marc Mouffron, Frederic Rousseau, Huafei Zhu:
Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries. Inscrypt 2007: 138-152 - [c38]Huafei Zhu, Feng Bao:
Oblivious Keyword Search Protocols in the Public Database Model. ICC 2007: 1336-1341 - [c37]Huafei Zhu, Feng Bao:
Light-Weight Fair-Dealing Infrastructures (FADIS) for M-Commerce. ICC 2007: 1503-1508 - [c36]Huafei Zhu, Feng Bao, A. Lakshminarayanan:
Price Negotiation Systems for M-commerce. ICC 2007: 1521-1526 - [c35]Huafei Zhu, Feng Bao:
Computing of Trust in Complex Environments. PIMRC 2007: 1-5 - [c34]Huafei Zhu, Ying Qiu, Feng Bao:
Securing Mobile Auctions in the Presence of Malicious Adversaries. PIMRC 2007: 1-5 - [c33]Huafei Zhu, Ying Qiu, Feng Bao:
Or-protocols for Anonymous Membership Proofs in Ad-hoc Networks. PIMRC 2007: 1-5 - [c32]Huafei Zhu, Willy Susilo, Yi Mu:
Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. Public Key Cryptography 2007: 134-149 - [c31]Yi Mu, Willy Susilo, Huafei Zhu:
Compact sequential aggregate signatures. SAC 2007: 249-253 - [c30]Huafei Zhu, Feng Bao:
Securing RFID Tags: Authentication Protocols with Completeness, Soundness, and Non-Traceability. WCNC 2007: 2698-2702 - [c29]Huafei Zhu, Feng Bao:
Quantifying Trust Metrics of Recommendation Systems in Ad-Hoc Networks. WCNC 2007: 2904-2908 - 2006
- [j1]Huafei Zhu:
Setup-driving Verifiably Committed Signatures Within Standard Complexity Mode. Int. J. Netw. Secur. 2(3): 171-181 (2006) - [c28]Huafei Zhu, Feng Bao:
More on Stand-Alone and Setup-Free Verifiably Committed Signatures. ACISP 2006: 148-158 - [c27]Huafei Zhu, Feng Bao:
Oblivious Scalar-Product Protocols. ACISP 2006: 313-323 - [c26]Huafei Zhu, Feng Bao, Jianwei Liu:
Computing of Trust in Ad-Hoc Networks. Communications and Multimedia Security 2006: 1-11 - [c25]Huafei Zhu, Feng Bao:
Stand-Alone and Setup-Free Verifiably Committed Signatures. CT-RSA 2006: 159-173 - [c24]Huafei Zhu, Jianying Zhou:
Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper). ICICS 2006: 72-81 - [c23]Huafei Zhu, Feng Bao, Tieyan Li, Ying Qiu:
More on Shared-Scalar-Product Protocols. ISPEC 2006: 142-152 - [c22]Huafei Zhu, Tieyan Li, Feng Bao:
Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications. SEC 2006: 340-350 - [c21]Tieyan Li, Yongdong Wu, Huafei Zhu:
An Efficient Scheme for Encrypted Data Aggregation on Sensor Networks. VTC Spring 2006: 831-835 - [c20]Huafei Zhu, Feng Bao, Chunxiao Chigan:
Compact routing discovery protocol with lower communication complexity. WCNC 2006: 307-310 - [c19]Huafei Zhu, Chunxiao Chigan, Feng Bao:
Turing assessor: a new tool for cyber security quantification. WCNC 2006: 629-633 - 2005
- [c18]Xiangguo Cheng, Huafei Zhu, Ying Qiu, Xinmei Wang:
Efficient Group Signatures from Bilinear Pairing. CISC 2005: 128-139 - [c17]Huafei Zhu, Feng Bao, Tieyan Li:
Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks. Communications and Multimedia Security 2005: 200-209 - [c16]Huafei Zhu, Feng Bao:
Augmented Oblivious Polynomial Evaluation Protocol and Its Applications. ESORICS 2005: 222-230 - [c15]Huafei Zhu, Feng Bao, Robert H. Deng:
Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. ICICS 2005: 207-219 - [c14]Tieyan Li, Huafei Zhu, Yongdong Wu:
Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream. ICICS 2005: 389-401 - [c13]Huafei Zhu, Feng Bao:
Provably secure public key management protocols for self-organized ad hoc networks. PIMRC 2005: 2691-2695 - [c12]Huafei Zhu, Tieyan Li:
Provably secure anonymous identification protocols for ad-hoc access structures. PIMRC 2005: 2696-2700 - [c11]Huafei Zhu, Feng Bao:
A Novel Construction of Two-Party Private Bidding Protocols from Yao's Millionaires Problem. TrustBus 2005: 266-273 - [c10]Huafei Zhu, Feng Bao, Tieyan Li, Yongdong Wu:
Sequential aggregate signatures for wireless routing protocols. WCNC 2005: 2436-2439 - [c9]Anantharaman Lakshminarayanan, Huafei Zhu:
Practical device association protocols for wireless enabled personal devices. WCNC 2005: 2484-2489 - 2004
- [c8]Feng Bao, Guilin Wang, Jianying Zhou, Huafei Zhu:
Analysis and Improvement of Micali's Fair Contract Signing Protocol. ACISP 2004: 176-187 - [c7]Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng:
Trust Establishment in Large Scale Grid Settings. GCC 2004: 317-324 - [c6]Tieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng:
Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. ICICS 2004: 79-91 - [c5]Huafei Zhu:
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model. Public Key Cryptography 2004: 101-114 - [i6]Huafei Zhu:
Universal Undeniable Signatures. IACR Cryptol. ePrint Arch. 2004: 5 (2004) - 2003
- [c4]Tieyan Li, Huafei Zhu, Kwok-Yan Lam:
A Novel Two-Level Trust Model for Grid. ICICS 2003: 214-225 - [c3]Feng Bao, Robert H. Deng, Huafei Zhu:
Variations of Diffie-Hellman Problem. ICICS 2003: 301-312 - [i5]Huafei Zhu, Feng Bao, Robert H. Deng:
Computing of Trust in Distributed Networks. IACR Cryptol. ePrint Arch. 2003: 56 (2003) - [i4]Huafei Zhu:
A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack. IACR Cryptol. ePrint Arch. 2003: 87 (2003) - [i3]Huafei Zhu:
A Formal Proof of Zhu's Signature Scheme. IACR Cryptol. ePrint Arch. 2003: 155 (2003) - [i2]Huafei Zhu:
Constructing Optimistic Fair Exchange Protocols from Committed Signatures. IACR Cryptol. ePrint Arch. 2003: 178 (2003) - [i1]Huafei Zhu:
Verifiably Committed Signatures Provably Secure in The Standard Complexity Model. IACR Cryptol. ePrint Arch. 2003: 228 (2003) - 2002
- [c2]Chan H. Lee, Xiaotie Deng, Huafei Zhu:
Design and Security Analysis of Anonymous Group Identification Protocols. Public Key Cryptography 2002: 188-198 - 2001
- [c1]Chan H. Lee, Xiaotie Deng, Huafei Zhu:
An Identification Scheme Provably Secure against Reset Attack. ICICS 2001: 271-279
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint