Rui Zhang

ORCID: 0000-0002-4221-1311
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Complexity and Algorithms in Graphs
  • Cryptographic Implementations and Security
  • Cryptography and Residue Arithmetic
  • Coding theory and cryptography
  • Cloud Data Security Solutions
  • Chaos-based Image/Signal Encryption
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Authentication Protocols Security
  • Quantum Computing Algorithms and Architecture
  • Quantum Information and Cryptography
  • Security in Wireless Sensor Networks
  • Blockchain Technology Applications and Security
  • Access Control and Trust
  • Security and Verification in Computing
  • graph theory and CDMA systems
  • Caching and Content Delivery
  • Advanced Data Storage Technologies
  • Quantum Mechanics and Applications
  • User Authentication and Security Systems
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Advanced Malware Detection Techniques
  • Machine Learning and ELM
  • Advanced Memory and Neural Computing

Chinese Academy of Sciences
2016-2025

Institute of Information Engineering
2016-2025

University of Chinese Academy of Sciences
2016-2025

Hebei University of Engineering
2025

Institute of Acoustics
2023-2024

Xishuangbanna Tropical Botanical Garden
2024

Beijing Jiaotong University
2009-2023

State Key Laboratory of Information Security
2023

Nanjing University of Aeronautics and Astronautics
2022

Henan University
2020-2021

Extreme learning machines (ELMs) have been proposed for generalized single-hidden-layer feedforward networks which need not be neuron-like and perform well in both regression classification applications. In this brief, we propose an ELM with adaptive growth of hidden nodes (AG-ELM), provides a new approach the automated design networks. Different from other incremental ELMs (I-ELMs) whose existing are frozen when added one by one, AG-ELM number is determined way sense that may replaced newly...

10.1109/tnnls.2011.2178124 article EN IEEE Transactions on Neural Networks and Learning Systems 2012-01-06

We propose two ciphertext-policy attribute-based key encapsulation mechanism (CP-AB-KEM) schemes that for the first time achieve both outsourced encryption and decryption in system storage models give corresponding security analysis. In our schemes, heavy computations are to Encryption Service Providers (ESPs) or Decryption (DSPs), leaving only one modular exponentiation computation sender receiver. Moreover, we a general verification wide class of (cf. key-policy) AB-KEM which can check...

10.1109/tdsc.2015.2499755 article EN IEEE Transactions on Dependable and Secure Computing 2015-11-11

The immutability of blockchains is critical for cryptocurrencies, but an imperative need arises the redaction on-chain data due to privacy-protecting laws like GPDR. Recently, Ateniese et al. (EuroS&P 2017) proposed elegant solution this problem based on chameleon hash functions, followed by many subsequent works. While these works offered a permissioned blockchain, approaches were not efficient enough permissionless setting, in terms either security (which may cause inconsistent historical...

10.1109/tifs.2023.3245406 article EN IEEE Transactions on Information Forensics and Security 2023-01-01

Sharing digital medical records on public cloud storage via mobile devices facilitates patients (doctors) to get (offer) treatment of high quality and efficiency. However, challenges such as data privacy protection, flexible sharing, efficient authority delegation, computation efficiency optimization, are remaining toward achieving practical fine-grained access control in the Electronic Medical Record (EMR) system. In this work, we propose an innovative model a sharing mechanism for EMR,...

10.1109/tdsc.2018.2844814 article EN IEEE Transactions on Dependable and Secure Computing 2018-06-07

10.1016/j.compeleceng.2011.05.009 article EN Computers & Electrical Engineering 2011-06-18

The explosive growth of mobile-connected and location-aware devices makes it possible to have a new way establishing trust relationships, which we coin as spatiotemporal matching. In particular, mobile user could very easily maintain his profile recording continuous whereabouts in time, the level matching that other can be translated into they two each other. Since profiles contain sensitive personal information, privacy-preserving is needed ensure little information about either participant...

10.1109/infcom.2013.6566867 article EN 2013-04-01

Authenticated key exchange (AKE) is one of the most important applications in applied cryptography, where a user interacts with server to set up session pre-registered information (aka. authentication factor), such as password or biometrics, stored. While single-factor AKE widely used practice, higher security concerns call for multi-factor (MFAKE) schemes, e.g., combining both passwords and biometrics simultaneously. However, some casually designed even weakened sense that leakage factor...

10.1109/tdsc.2017.2700305 article EN IEEE Transactions on Dependable and Secure Computing 2017-05-02

10.1016/j.ins.2018.12.022 article EN Information Sciences 2018-12-17

SPHINCS was recently proposed as a stateless, quantum-resilient hash-based signature scheme. However, one possible limitation of is its signing speed, namely, the best known implementation merely produces few hundred signatures per second, which not good enough, e.g., for social website with huge amount users. Aiming at improving singing throughput, we present highly parallel and optimized implementations SPHINCS, can be deployed on various multi-core platforms. As first step, give an...

10.1109/tpds.2020.2995562 article EN IEEE Transactions on Parallel and Distributed Systems 2020-05-18

In alignment with China’s carbon peak and neutrality commitments, digital inclusive finance (DIF) has emerged as a strategic instrument for emission mitigation, facilitated by coordinated policy interventions market-driven innovations. This study conducted an original multi-dimensional investigation into DIF’s intensity reduction effects through integrated analytical framework. Employing two-way fixed mediation analysis models, we systematically evaluated both direct impacts...

10.3390/su17114813 article EN Sustainability 2025-05-23

Outsource encrypted data is a popular trend for storing sensitive in third party clouds. Many cloud applications need privacy preserving encryption services with two capabilities: On one hand, they querying over Web based hosting services. the other also to keep query keywords and associated search operations private such that service providers cannot gain access unauthorized content or trace infer stored servers. In this paper we present novel oriented framework verifiable searchable...

10.1109/icws.2016.62 article EN 2016-06-01

10.1109/tpds.2025.3529776 article EN IEEE Transactions on Parallel and Distributed Systems 2025-01-01

Abstract Multi-factor authentication (MFA) is extensively employed in mobile applications to enhance security, including Internet of Vehicles, healthcare systems, smart homes, etc. Traditional MFA requires users present specific factors, which can be inconvenient if certain factors are unavailable. To address this, $ (t, n) $-threshold (T-MFA) allows select any t out n registered for authentication. However, existing T-MFA solutions face four key issues: (i) reliance on n-1 devices, may...

10.1093/comjnl/bxaf001 article EN The Computer Journal 2025-01-06
Coming Soon ...