Follow
Zhaohui Cheng
Zhaohui Cheng
Lecturer of Computer Science, Middlesex University
Verified email at olymtech.net
Title
Cited by
Cited by
Year
Identity-based key agreement protocols from pairings
L Chen, Z Cheng, NP Smart
International Journal of Information Security 6 (4), 213-241, 2007
6032007
Security proof of Sakai-Kasahara’s identity-based encryption scheme
L Chen, Z Cheng
Cryptography and Coding, 442-459, 2005
1792005
On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases.
Z Cheng, M Nistazakis, R Comley, L Vasiu
IACR Cryptology ePrint Archive 2005, 129, 2005
992005
Efficient Certificateless Public Key Encryption.
Z Cheng, R Comley
IACR Cryptology ePrint Archive 2005, 12, 2005
952005
Efficient certificateless public key encryption
Z Cheng, R Comley
Cryptology ePrint Archive, Report 2005/012, 2005
95*2005
Efficient ID-KEM based on the Sakai–Kasahara key construction
L Chen, Z Cheng, J Malone-Lee, MP Smart
IEE Proceedings-Information Security 153 (1), 19-26, 2006
752006
On security proof of McCullaghBarreto's key agreement protocol and its variants
Z Cheng, L Chen
International Journal of Security and Networks 2 (3), 251-259, 2007
472007
Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
S Wang, Z Cao, Z Cheng, KKR Choo
Science in China Series F: Information Sciences 52 (8), 1358-1370, 2009
372009
Pairing-Based One-Round Tripartite Key Agreement Protocols.
Z Cheng, L Vasiu, R Comley
IACR Cryptology ePrint Archive 2004, 79, 2004
372004
General and efficient certificateless public key encryption constructions
Z Cheng, L Chen, L Ling, R Comley
Pairing-Based Cryptography–Pairing 2007, 83-107, 2007
362007
Remove key escrow from the identity-based encryption system.
RA Comley, L Vasiu, Z Cheng
IFIP Eighteenth World Computer Congress, Information Technology, TC1 3rd …, 2004
36*2004
Remove key escrow from the identity-based encryption system
Z Cheng, R Comley, L Vasiu
Exploring New Frontiers of Theoretical Informatics, 37-50, 2004
362004
Identity-based key agreement with unilateral identity privacy using pairings
Z Cheng, L Chen, R Comley, Q Tang
Information Security Practice and Experience, 202-213, 2006
322006
Attacks On An ISO/IEC 11770-2 Key Establishment Protocol.
Z Cheng, R Comley
IACR Cryptology ePrint Archive 2004, 249, 2004
182004
SK− KEM: An Identity− based Kem
M Barbosa, L Chen, Z Cheng, M Chimley, A Dent, P Farshim, K Harrison, ...
IEEE P1363. 3: Identity-Based Public Key Cryptography, 2006
152006
Implementing pairing-based cryptosystems
Z Cheng, M Nistazakis
Proceedings of IWWST, 2005
142005
Security Analysis of LWAPP
Z Cheng, M Nistazakis, R Comely
IWWST’04, 60, 2004
62004
Pairing-based cryptosystems and key agreement protocols
Z Cheng
Thesis, Middlesex University, 2007
4*2007
Simple SK-ID-KEM1
Z Cheng
12005
Computing migration through context awareness and context transmission.
Z Cheng, K Chin, Y Luo
ICWI, 386-394, 2003
12003
The system can't perform the operation now. Try again later.
Articles 1–20