Identity-based key agreement protocols from pairings L Chen, Z Cheng, NP Smart International Journal of Information Security 6 (4), 213-241, 2007 | 609 | 2007 |
Security proof of Sakai-Kasahara’s identity-based encryption scheme L Chen, Z Cheng Cryptography and Coding, 442-459, 2005 | 191 | 2005 |
On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases. Z Cheng, M Nistazakis, R Comley, L Vasiu IACR Cryptology ePrint Archive 2005, 129, 2005 | 101 | 2005 |
Efficient Certificateless Public Key Encryption. Z Cheng, R Comley IACR Cryptology ePrint Archive 2005, 12, 2005 | 96 | 2005 |
Efficient certificateless public key encryption Z Cheng, R Comley Cryptology ePrint Archive, Report 2005/012, 2005 | 96* | 2005 |
Efficient ID-KEM based on the Sakai–Kasahara key construction L Chen, Z Cheng, J Malone-Lee, MP Smart IEE Proceedings-Information Security 153 (1), 19-26, 2006 | 76 | 2006 |
On security proof of McCullaghBarreto's key agreement protocol and its variants Z Cheng, L Chen International Journal of Security and Networks 2 (3), 251-259, 2007 | 48 | 2007 |
Remove key escrow from the identity-based encryption system. RA Comley, L Vasiu, Z Cheng IFIP Eighteenth World Computer Congress, Information Technology, TC1 3rd …, 2004 | 38* | 2004 |
Remove key escrow from the identity-based encryption system Z Cheng, R Comley, L Vasiu Exploring New Frontiers of Theoretical Informatics, 37-50, 2004 | 38 | 2004 |
Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode S Wang, Z Cao, Z Cheng, KKR Choo Science in China Series F: Information Sciences 52 (8), 1358-1370, 2009 | 37 | 2009 |
Pairing-Based One-Round Tripartite Key Agreement Protocols. Z Cheng, L Vasiu, R Comley IACR Cryptology ePrint Archive 2004, 79, 2004 | 37 | 2004 |
General and efficient certificateless public key encryption constructions Z Cheng, L Chen, L Ling, R Comley Pairing-Based Cryptography–Pairing 2007, 83-107, 2007 | 35 | 2007 |
Identity-based key agreement with unilateral identity privacy using pairings Z Cheng, L Chen, R Comley, Q Tang Information Security Practice and Experience, 202-213, 2006 | 30 | 2006 |
Attacks On An ISO/IEC 11770-2 Key Establishment Protocol. Z Cheng, R Comley IACR Cryptology ePrint Archive 2004, 249, 2004 | 17 | 2004 |
SK− KEM: An Identity− based Kem M Barbosa, L Chen, Z Cheng, M Chimley, A Dent, P Farshim, K Harrison, ... IEEE P1363. 3: Identity-Based Public Key Cryptography, 2006 | 15 | 2006 |
Implementing pairing-based cryptosystems Z Cheng, M Nistazakis Proceedings of IWWST, 2005 | 15 | 2005 |
Pairing-based cryptosystems and key agreement protocols Z Cheng Thesis, Middlesex University, 2007 | 6 | 2007 |
Security Analysis of LWAPP Z Cheng, M Nistazakis, R Comely IWWST’04, 60, 2004 | 6 | 2004 |
Simple SK-ID-KEM1 Z Cheng | 1 | 2005 |
Computing migration through context awareness and context transmission. Z Cheng, K Chin, Y Luo ICWI, 386-394, 2003 | 1 | 2003 |