发表学术论文30余篇。 (*)通讯作者 会议论文: 15、Ziyu Wang, Jianwei Liu, Zongyang Zhang*, Yanting Zhang, Jiayuan Yin and Hui Yu. A Combined Micro-block Chain Truncation Attack on Bitcoin-NG. the 24th Australasian Conference on Information Security and Privacy (ACISP 2019), EI, CCF Rank C. 14、Geng Li, Jianwei Liu, Zongyang Zhang*. Steganography against Subversion in Multi-Surveillant Settings. the 24th Australasian Conference on Information Security and Privacy (ACISP 2019), EI, CCF Rank C. 13、Yanting Zhang, Jianwei Liu, Zongyang Zhang*, and Yang Hu. Multi-authority Fast Data Cloud-Outsourcing for Mobile Devices.the 21st Information Security Conference (ISC 2018), EI, CCF Rank C. 12、Jiayuan Yin, Changren Wang, Zongyang Zhang*, and Jianwei Liu. Revisiting the Incentive Mechanism of Bitcoin-NG. the 23rd Australasian Conference on Information Security and Privacy (ACISP 2018). EI, CCF Rank C. 11、Xingguang Zhou, Jie Chen, Zongyang Zhang*, Jianwei Liu, Qianhong Wu. Secure Role-based Access Control over Outsourced EMRs against Unwanted Leakage, the 9th International Symposium on Cyberspace Safety and Security(CSS 2017), Lecture Notes in Computer Science, Vol. 10581, pp. 411-426, Springer-Verlag, October 23–25, 2017.EI,最佳学生论文奖. Accession number: 20174704429805 10、Yuyu Wang, Zongyang Zhang*, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka. How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones.ASIACRYPT 2016, Lecture Notes in Computer Science, Vol.10032, pp. 465-495, Springer-Verlag, December, 2016.(CCF Rank B).Accession number: 20170103223195 9、Hongbing Wang, Yingjiu Li, Zongyang Zhang, Yunlei Zhao. Efficient Tag Path Authentication Protocol with Less Tag Memory.ISPEC 2016: Lecture Notes in Computer Science, Vol.10060, pp. 255-270, Springer-Verlag, November, 2016. Accession number: 20164803058576 8、Zongyang Zhang, Yu Chen, Sherman S.M. Chow, Goichiro Hanaoka, Zhenfu Cao, and Yunlei Zhao. Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model,PROVSEC 2015, Lecture Notes in Computer Science,Vol.9451, pp. 435-454, Springer-Verlag, November, 2015.Accession number: 20154901649023 7、Jiang Zhang, Zhenfeng Zhang, Yu Chen, Yanfei Guo,Zongyang Zhang. Black-Box Separations for One-More (Static) CDH and Its Generalization, the 20th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2014), Lecture Notes in Computer Science, Vol.8874, pp. 366-385, Springer-Verlag, December, 2014.(CCF Rank B).Accession number: 20145000322604 6、Yu Chen, Zongyang Zhang*. Publicly Evaluable Pseudorandom Functions and their Applications, the 9th Conference on Security and Cryptography for Networks (SCN 2014), Lecture Notes in Computer Science Volume 8642, pp 115-134, Springer-Verlag, September, 2014.Accession number: 20151600762144 5、Zongyang Zhang, Yu Chen, Sherman S.M. Chow, Goichiro Hanaoka, Zhenfu Cao, and Yunlei Zhao. All-but-One Dual Projective Hashing and Its Applications, the 12nd International Conference on Applied Cryptography and Network Security (ACNS 2014), Lecture Notes in Computer Science Volume 8479, pp 181-198, Springer-Verlag, June, 2014. (CCF Rank C)Accession number: 20142817915544 4、Yu Chen, Qiong Huang and Zongyang Zhang*. Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited, the 19th Australasian Conference on Information Security and Privacy (ACISP 2014), Lecture Notes in Computer Science Volume 8544, pp 274-289, Springer-Verlag, July, 2014. (CCF Rank C)Accession number: 20142917957128 3、Yu Chen, Zongyang Zhang*, Dongdai Lin and Zhenfu Cao. Anonymous Identity-Based Hash Proof System and Its Applications, Provable Security (ProvSec 2012), Lecture Notes in Computer Science, Vol.7496, pp. 143-160, Springer-Verlag, September, 2012.Accession number: 20123715434391 2、Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao. Identity Based Extractable Hash Proofs and their Applications, Applied Cryptography and Network Security (ACNS 2012), Lecture Notes in Computer Science, Vol. 7341, pp.153-170, Springer-Verlag, June, 2012. (CCF Rank C).Accession number: 20122815224979 1、Hongbing Wang, Yingjiu Li, Zongyang Zhangand Zhenfu Cao. Two-level Path Authentication in EPCglobal Network, 2012 IEEE International Conference on RFID (IEEE RFID 2012), pp. 24-31, April, 2012.Accession number:20122115052440 期刊论文: 17、 Ziyu Wang, Hui Yu, Zongyang Zhang*, Jiaming Piao, Jianwei Liu. ECDSA weak randomness in Bitcoin. Future Generation Computer Systems, Volume. 102, pp. 507-513, Jan, 2020. SCI.
16、黑一鸣, 刘建伟, 张宗洋*, 喻辉. 基于区块链的可公开验证公布式云存储系统[J]. 信息网络安全.2019,(3):52-60. 15、李耕, 刘建伟, 张宗洋*. 抗大规模监视密码学研究综述[J]. 密码学报, 2019, 6(3): 269-282. 14、刘懿中, 刘建伟, 张宗洋*, 徐同阁, 喻辉. 区块链共识机制研究综述[J]. 密码学报, 2019, 6(4): 395-432. 13、Dawei Li, Jianwei Liu,Zongyang Zhang*,Qianhong Wu, Wiran Liu. Revocable Hierarchical Identity-Based Broadcast Encryption,Tsinghua Science and Technology. Vol. 23, Issue 5, pp. 539-549.2018 SCI. Accession Number: WOS:000447277500003 12、吴进喜, 高莹, 张宗洋, 殷大鹏. 基于区块链的多方隐私保护公平合同签署协议. 信息安全学报. 2018 3(3): 8-16. 11、王子钰,刘建伟,张宗洋*, 喻辉. 基于聚合签名与加密交易的全匿名区块链[J]. 计算机研究与发展, 2018, 55(10): 2185-2198. 10、Xinguang Zhou, Jianwei Liu, Qianhong Wu and Zongyang Zhang*. Privacy Preservation for Outsourced Medical Data with Flexible Access Control,IEEE Access,Vol. 6, pp. 14827-14841,2018.JCR Q1,SCI. Accession number:WOS:000428959000001 9、喻辉,张宗洋*,刘建伟. 比特币区块链扩容技术研究. 计算机研究与发展, 2017, 54(10): 2390-2403.EI. Accession number: 20175004531143 8、Yu Chen and Zongyang Zhang*. Publicly Evaluable Pseudorandom Functions and Their Applications,Journal of Computer Security, Volume. 24, No. 2, pp. 289-320, 2016,CCF Rank B, Accession number: 20161902365114 7、Yu Chen, Qiong Huang and Zongyang Zhang*. Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Revisited and More,International Journal of Information Security, Volume 15, pp. 15–33, Feb, 2016. (JCR Q2),Accession Number:WOS:000369997700002 6、Yu Chen, Zongyang Zhang*, Dongdai Lin, Zhenfu Cao. Generalized (Identity-Based) Hash Proof System and Its Applications,Security and Communication Networks, Volume 9, pp. 1698–1716, Aug, 2016.(CCF Rank C, JCR Q4)Accession Number: WOS:000380004400006 5、Zongyang Zhang, Sherman S.M. Chow and Zhenfu Cao. Post-Challenge Leakage in Public-Key Encryption,Theoretical Computer Science, Volume 572, pp. 25–49, March, 2015. (CCF Rank B, JCR Q4),Accession Number:WOS:000350939800002 4、Zongyang Zhang, Zhenfu Cao, Haojin Zhu. Constant-Round Adaptive Zero-Knowledge Proofs for NP,Information Science, Volume 261, pp. 219-236, March, 2014. (CCF Rank B, JCR Q1),Accession Number:WOS:000331689700012 3、Yu Chen, Zongyang Zhang*, Dongdai Lin, Zhenfu Cao. CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof System,The Computer Journal, Volume 57, Issue 10, pp. 1537-1556, 2014. (CCF Rank B, JCR Q4),Accession Number:WOS:000343417100006 2、Zongyang Zhang, Zhenfu Cao and Haifeng Qian. Chosen-Ciphertext Attack Secure Public Key Encryption with Auxiliary Inputs,Security and Communication Networks, 2012, Vol. 5,No. 12, pp. 1404–1411, December, 2012 .(CCF Rank C, JCR Q4), Accession Number:WOS:000311403800011 1、Zongyang Zhang and Zhenfu Cao. Concurrent Non-Malleable Statistically Hiding Commitment,Information Processing Letters, Vol.12, No. 11, pp. 443–448, June, 2012. (CCF Rank C, JCR Q4),Accession Number:WOS:000303303000007 |