Liang Feng Zhang
Liang Feng Zhang
ShanghaiTech University
No verified email
Title
Cited by
Cited by
Year
Query-efficient locally decodable codes of subexponential length
YM Chee, T Feng, S Ling, H Wang, LF Zhang
Computational Complexity, 1-31, 2011
402011
Private outsourcing of polynomial evaluation and matrix multiplication using multilinear maps
LF Zhang, R Safavi-Naini
International Conference on Cryptology and Network Security, 329-348, 2013
222013
Verifiable delegation of computations with storage-verification trade-off
LF Zhang, R Safavi-Naini
European symposium on research in computer security, 112-129, 2014
202014
Generalized homomorphic MACs with efficient verification
LF Zhang, R Safavi-Naini
Proceedings of the 2nd ACM workshop on ASIA public-key cryptography, 3-12, 2014
82014
Outsourcing scheme of ABE encryption secure against malicious adversary
G Ohtake, R Safavi-Naini, LF Zhang
Computers & Security 86, 437-452, 2019
72019
Batch verifiable computation of outsourced functions
LF Zhang, R Safavi-Naini
Designs, Codes and Cryptography 77 (2-3), 563-585, 2015
72015
Communication-efficient distributed oblivious transfer
A Beimel, YM Chee, H Wang, LF Zhang
Journal of Computer and System Sciences 78 (4), 1142-1157, 2012
62012
Verifiable local computation on distributed data
LF Zhang, R Safavi-Naini, XW Liu
Proceedings of the 2nd international workshop on Security in cloud computing …, 2014
52014
Batch verifiable computation of polynomials on outsourced data
LF Zhang, R Safavi-Naini
European Symposium on Research in Computer Security, 167-185, 2015
42015
Verifiable multi-server private information retrieval
LF Zhang, R Safavi-Naini
International Conference on Applied Cryptography and Network Security, 62-79, 2014
42014
On the Eigenvalues of Certain Matrices Over
LF Zhang
Discrete Mathematics, Volume 313, Issue 7, 6 April 2013, Pages 886–895, 2013
2*2013
Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption
S Xu, Y He, LF Zhang
International Conference on Information Security and Cryptology, 59-70, 2017
12017
Outsourcing of Verifiable Attribute-Based Keyword Search
G Ohtake, R Safavi-Naini, LF Zhang
Nordic Conference on Secure IT Systems, 18-35, 2017
12017
RAFR: remote assessment of file redundancy
S Sarkar, R Safavi-Naini, LF Zhang
Proceedings of the 2013 international workshop on Security in cloud …, 2013
12013
Upper Bounds on Matching Families in $\BBZ_ {pq}^{n} $
YM Chee, S Ling, H Wang, LF Zhang
IEEE transactions on information theory 59 (8), 5131-5139, 2013
12013
On the Bringer–Chabanne EPIR protocol for polynomial evaluation
YM Chee, H Wang, LF Zhang
Journal of Mathematical Cryptology 5 (3-4), 277-301, 2012
12012
Oblivious transfer and n-variate linear function evaluation
Y Chee, H Wang, LF Zhang
Computing and Combinatorics, 627-637, 2011
12011
Multi-matrix verifiable computation
Y He, LF Zhang
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020
2020
Cheater-identifiable homomorphic secret sharing for outsourcing computations
Y He, LF Zhang
Journal of Ambient Intelligence and Humanized Computing, 1-11, 2020
2020
Towards Efficient Information-Theoretic Function Secret Sharing
WM Li, LF Zhang
IEEE Access 8, 28512-28523, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20