Suivre
Liang Feng Zhang
Liang Feng Zhang
ShanghaiTech University
Aucune adresse e-mail validée
Titre
Citée par
Citée par
Année
Query-efficient locally decodable codes of subexponential length
YM Chee, T Feng, S Ling, H Wang, LF Zhang
Computational Complexity, 1-31, 2011
492011
Private outsourcing of polynomial evaluation and matrix multiplication using multilinear maps
LF Zhang, R Safavi-Naini
International Conference on Cryptology and Network Security, 329-348, 2013
282013
Verifiable multi-server private information retrieval
LF Zhang, R Safavi-Naini
Applied Cryptography and Network Security: 12th International Conference …, 2014
252014
Verifiable delegation of computations with storage-verification trade-off
LF Zhang, R Safavi-Naini
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
232014
Outsourcing scheme of ABE encryption secure against malicious adversary
G Ohtake, R Safavi-Naini, LF Zhang
Computers & Security 86, 437-452, 2019
222019
Multi-server verifiable computation of low-degree polynomials
LF Zhang, H Wang
2022 IEEE Symposium on Security and Privacy (SP), 596-613, 2022
142022
No need to lift a finger anymore? Assessing the quality of code generation by ChatGPT
Z Liu, Y Tang, X Luo, Y Zhou, LF Zhang
IEEE Transactions on Software Engineering, 2024
132024
Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions
LF Zhang, R Safavi-Naini
Designs, Codes and Cryptography 88 (4), 677-709, 2020
122020
Progress in verifiable computation
R Xue, Y Wu, M Liu, L Zhang, R Zhang
Scientia Sinica Informationis 45 (11), 1370-1388, 2015
122015
Batch verifiable computation of outsourced functions
LF Zhang, R Safavi-Naini
Designs, Codes and Cryptography 77, 563-585, 2015
112015
Efficient threshold function secret sharing with information-theoretic security
J Luo, LF Zhang, F Lin, C Lin
IEEE Access 8, 6523-6532, 2020
102020
Generalized homomorphic MACs with efficient verification
LF Zhang, R Safavi-Naini
Proceedings of the 2nd ACM workshop on ASIA public-key cryptography, 3-12, 2014
92014
Two-server private information retrieval with result verification
P Ke, LF Zhang
2022 IEEE International Symposium on Information Theory (ISIT), 408-413, 2022
82022
Towards efficient information-theoretic function secret sharing
WM Li, LF Zhang
IEEE Access 8, 28512-28523, 2020
72020
Verifiable local computation on distributed data
LF Zhang, R Safavi-Naini, XW Liu
Proceedings of the 2nd international workshop on Security in cloud computing …, 2014
72014
Communication-efficient distributed oblivious transfer
A Beimel, YM Chee, H Wang, LF Zhang
Journal of Computer and System Sciences 78 (4), 1142-1157, 2012
72012
Batch verifiable computation of polynomials on outsourced data
LF Zhang, R Safavi-Naini
European Symposium on Research in Computer Security, 167-185, 2015
62015
可验证计算研究进展
薛锐, 吴迎, 刘牧华, 张良峰, 章睿
中国科学: 信息科学, 1370-1388, 2015
62015
Verifiable homomorphic secret sharing for low degree polynomials
X Chen, LF Zhang, J Liu
IEEE Transactions on Dependable and Secure Computing, 2022
52022
Two-server delegation of computation on label-encrypted data
X Chen, LF Zhang
IEEE Transactions on Cloud Computing 9 (4), 1645-1656, 2019
52019
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20