Query-efficient locally decodable codes of subexponential length YM Chee, T Feng, S Ling, H Wang, LF Zhang Computational Complexity, 1-31, 2011 | 49 | 2011 |
Private outsourcing of polynomial evaluation and matrix multiplication using multilinear maps LF Zhang, R Safavi-Naini International Conference on Cryptology and Network Security, 329-348, 2013 | 28 | 2013 |
Verifiable multi-server private information retrieval LF Zhang, R Safavi-Naini Applied Cryptography and Network Security: 12th International Conference …, 2014 | 25 | 2014 |
Verifiable delegation of computations with storage-verification trade-off LF Zhang, R Safavi-Naini Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 23 | 2014 |
Outsourcing scheme of ABE encryption secure against malicious adversary G Ohtake, R Safavi-Naini, LF Zhang Computers & Security 86, 437-452, 2019 | 22 | 2019 |
Multi-server verifiable computation of low-degree polynomials LF Zhang, H Wang 2022 IEEE Symposium on Security and Privacy (SP), 596-613, 2022 | 14 | 2022 |
No need to lift a finger anymore? Assessing the quality of code generation by ChatGPT Z Liu, Y Tang, X Luo, Y Zhou, LF Zhang IEEE Transactions on Software Engineering, 2024 | 13 | 2024 |
Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions LF Zhang, R Safavi-Naini Designs, Codes and Cryptography 88 (4), 677-709, 2020 | 12 | 2020 |
Progress in verifiable computation R Xue, Y Wu, M Liu, L Zhang, R Zhang Scientia Sinica Informationis 45 (11), 1370-1388, 2015 | 12 | 2015 |
Batch verifiable computation of outsourced functions LF Zhang, R Safavi-Naini Designs, Codes and Cryptography 77, 563-585, 2015 | 11 | 2015 |
Efficient threshold function secret sharing with information-theoretic security J Luo, LF Zhang, F Lin, C Lin IEEE Access 8, 6523-6532, 2020 | 10 | 2020 |
Generalized homomorphic MACs with efficient verification LF Zhang, R Safavi-Naini Proceedings of the 2nd ACM workshop on ASIA public-key cryptography, 3-12, 2014 | 9 | 2014 |
Two-server private information retrieval with result verification P Ke, LF Zhang 2022 IEEE International Symposium on Information Theory (ISIT), 408-413, 2022 | 8 | 2022 |
Towards efficient information-theoretic function secret sharing WM Li, LF Zhang IEEE Access 8, 28512-28523, 2020 | 7 | 2020 |
Verifiable local computation on distributed data LF Zhang, R Safavi-Naini, XW Liu Proceedings of the 2nd international workshop on Security in cloud computing …, 2014 | 7 | 2014 |
Communication-efficient distributed oblivious transfer A Beimel, YM Chee, H Wang, LF Zhang Journal of Computer and System Sciences 78 (4), 1142-1157, 2012 | 7 | 2012 |
Batch verifiable computation of polynomials on outsourced data LF Zhang, R Safavi-Naini European Symposium on Research in Computer Security, 167-185, 2015 | 6 | 2015 |
可验证计算研究进展 薛锐, 吴迎, 刘牧华, 张良峰, 章睿 中国科学: 信息科学, 1370-1388, 2015 | 6 | 2015 |
Verifiable homomorphic secret sharing for low degree polynomials X Chen, LF Zhang, J Liu IEEE Transactions on Dependable and Secure Computing, 2022 | 5 | 2022 |
Two-server delegation of computation on label-encrypted data X Chen, LF Zhang IEEE Transactions on Cloud Computing 9 (4), 1645-1656, 2019 | 5 | 2019 |