Publications (Full List)

Generally, the list my publications can be found on DBLP, Researchgate, Schloar, IEEE, and Web of Science.

    Journals

  • PriParkRec: Privacy-Preserving Decentralized Parking Recommendation Services.[paper]
    Zengpeng Li, Mamoun Alazab, Sahil Garg, M. Shamim Hossain.
    In IEEE Transactions on Vehicular Technology (2021).
    BibTex
      @article{TVT:LAGH21,
      author = {Zengpeng Li and Mamoun Alazab and Sahil Garg and M. Shamim Hossain},
      title = {PriParkRec: Privacy-Preserving Decentralized Parking Recommendation Service},
      journal = {{IEEE} Transactions on Vehicular Technology},
      volume = {70},
      number = {5},
      pages = {4037--4050},
      year = {2021},
      url = {https://doi.org/10.1109/TVT.2021.3074820},
      doi = {10.1109/TVT.2021.3074820},
      }
  • Quantum-Safe Round-Optimal Password Authentication for Mobile Devices.[paper]
    Zengpeng Li, Ding Wang, and Eduardo Morais.
    In IEEE Transactions on Dependable and Secure Computing (2020).
    BibTex
      @article{TDSC:LWM20,
      author = {Zengpeng Li and Ding Wang and Eduardo Morais},
      title = {Quantum-Safe Round-Optimal Password Authentication for Mobile Devices},
      journal = {{IEEE} Transactions on Dependable and Secure Computing},
      volume = {},
      number = {},
      pages = {},
      year = {2020},
      url = {https://doi.org/10.1109/TDSC.2020.3040776},
      doi = {10.1109/TDSC.2020.3040776},
      }
  • Building Low-Interactivity Multi-Factor Authenticated Key Exchange for Industrial Internet-of-Things.[paper]
    Zengpeng Li, Zheng Yang, Pawel Szalachowsk, and Jianying Zhou.
    In IEEE Internet of Things Journal (2020).
    BibTex
      @article{IoT:LYSZ20,
      author = {Zengpeng Li and Zheng Yang and Pawel Szalachowski and Jianying Zhou},
      title = {Building Low-Interactivity Multi-Factor Authenticated Key Exchange for Industrial Internet-of-Things},
      journal = {{IEEE} Internet of Things Journal},
      volume = {},
      number = {},
      pages = {},
      year = {2020},
      url = {https://doi.org/10.1109/JIOT.2020.3008773},
      doi = {10.1109/JIOT.2020.3008773},
      }
  • Preserving Data Privacy via Federated Learning: Challenges and Solutions.[paper]
    Zengpeng Li, Vishal Sharma, and Saraju P. Mohanty.
    In IEEE Consumer Electronics Magazine (2020).
    BibTex
      @article{CEM:LiShaMoh20,
      author = {Zengpeng Li and Vishal Sharma and Saraju P. Mohanty},
      title = {Preserving Data Privacy via Federated Learning: Challenges and Solutions},
      journal = {{IEEE} Consumer Electronics Magazine},
      volume = {9},
      number = {3},
      pages = {8--16},
      year = {2020},
      url = {https://doi.org/10.1109/MCE.2019.2959108},
      doi = {10.1109/MCE.2019.2959108},
      }
  • Ciphertext-Policy Attribute-Based Proxy Re-Encryption via Constrained PRFs.[paper]
    Zengpeng Li, Vishal Sharma, Chunguang Ma, Chunpeng Ge, and Willy Susilo.
    In SCIENCE CHINA Information Sciences (2020).
    BibTex
      @article{SCIS:LSMGS20,
      author = {Zengpeng Li and Vishal Sharma and Chunguang Ma and Chunpeng Ge, and Willy Susilo},
      title = {Ciphertext-Policy Attribute-Based Proxy Re-Encryption via Constrained PRFs},
      journal = {SCIENCE CHINA Information Sciences},
      volume = {64},
      number = {6},
      pages = {169301:1--169301:2},
      year = {2021},
      url = {https://doi.org/10.1007/s11432-019-2856-8},
      doi = {10.1007/s11432-019-2856-8},
      }
  • Multi-Factor Password-Authenticated Key Exchange via Pythia PRF Service.[paper]
    Zengpeng Li, Jiuru Wang, Chang Choi, and Wenyin Zhan.
    In Computers, Materials & Continua (2020).
    BibTex
      @article{CMC:LWCZ19,
      AUTHOR = {Zengpeng Li and Jiuru Wang and Chang Choi and Wenyin Zhang},
      TITLE = {Multi-Factor Password-Authenticated Key Exchange via Pythia PRF Service},
      JOURNAL = {Computers, Materials \& Continua},
      VOLUME = {63},
      YEAR = {2020},
      NUMBER = {2},
      PAGES = {663--674},
      URL = {http://www.techscience.com/cmc/v63n2/38536},
      DOI = {10.32604/cmc.2020.06565}
      }
  • Achieving One-Round Password-based Authenticated Key Exchange over Lattices.[paper]
    Zengpeng Li and Ding Wang.
    In IEEE Transactions on Services Computing 2019.
    BibTex
      @article{TSC:LiWan19,
      author = {Zengpeng Li and Ding Wang},
      title = {Achieving One-Round Password-based Authenticated Key Exchange over Lattices},
      journal = {{IEEE} Trans. Service Computing},
      year = {2019},
      url = {https://doi.org/10.1109/TSC.2019.2939836},
      doi = {10.1109/TSC.2019.2939836},
      }
  • Revisiting post-quantum hash proof systems over lattices for Internet of Thing authentications.[paper]
    Zengpeng Li, Jiuru Wang, and Wenyin Zhang.
    In Journal of Ambient Intelligence and Humanized Computing (2019).
    BibTex
      @article{JCIE:LMZC19,
      author = {Zengpeng Li and Chunguang Ma and Minghao Zhao and Chang Choi},
      title = {Revisiting post-quantum hash proof systems over lattices for Internet of Thing authentications},
      journal = {J Ambient Intell Human Comput},
      year = {2019},
      doi = {10.1007/s12652-019-01529-2},
      URL = {https://doi.org/10.1007/s12652-019-01529-2},
      }
  • Efficient oblivious transfer construction via multiple bits dual-mode cryptosystem for secure selection in the cloud.[paper]
    Zengpeng Li, Chunguang Ma, Minghao Zhao, and Chang Choi.
    In Journal of the Chinese Institute of Engineers (2019).
    BibTex
      @article{JCIE:LMZC19,
      author = {Zengpeng Li and Chunguang Ma and Minghao Zhao and Chang Choi},
      title = {Efficient oblivious transfer construction via multiple bits dual-mode cryptosystem for secure selection in the cloud},
      journal = {Journal of the Chinese Institute of Engineers},
      volume = {42},
      number = {1},
      pages = {97-106},
      year = {2019},
      publisher = {Taylor \& Francis},
      doi = {10.1080/02533839.2018.1537809},
      URL = {https://doi.org/10.1080/02533839.2018.1537809},
      eprint = {https://doi.org/10.1080/02533839.2018.1537809},
      }
  • Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography.[paper]
    Zengpeng Li, Can Xiang, and Chenyu Wang.
    In Wireless Communications and Mobile Computing 2018: 5973285:1-5973285:11 (2018).
    BibTex
      @article{WCMC:LiXiaWan18,
      author = {Zengpeng Li, Can Xiang, and Chenyu Wang},
      title = {Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography},
      journal = {Wireless Communications and Mobile Computin},
      volume = {2018},
      pages = {5973285:1--5973285:11},
      year = {2018},
      url = {https://doi.org/10.1155/2018/5973285},
      doi = {10.1155/2018/5973285},
      }
  • Multi-Key FHE on Multi-Bit Messages.[paper] [supplementary]
    Zengpeng Li, Chunguang Ma and Hong-Sheng Zhou.
    In SCIENCE CHINA Information Sciences 2018.
    BibTex
      @article{SCIS:LiMaZho18,
      author = {Zengpeng Li and Chunguang Ma and Hong{-}Sheng Zhou},
      title = {Multi-key {FHE} for multi-bit messages},
      journal = {{SCIENCE} {CHINA} Information Sciences},
      volume = {61},
      number = {2},
      pages = {029101:1--029101:3},
      year = {2018},
      url = {https://doi.org/10.1007/s11432-017-9206-y},
      doi = {10.1007/s11432-017-9206-y},
      }
  • Achieving Multi-Hop PRE via Branching Program. [paper]
    Zengpeng Li, Chunguang Ma and Ding Wang.
    In IEEE Transactions on Cloud Computing, 2017.
    BibTex
      @article{TCC:LiMaWan17,
      author = {Zengpeng Li and Chunguang Ma and Ding Wang},
      title = {Achieving Multi-Hop PRE via Branching Program},
      journal = {IEEE Transactions on Cloud Computing},
      year = {2017},
      url = {https://doi.org/10.1109/TCC.2017.2764082},
      doi = {10.1109/TCC.2017.2764082},
      }
  • Leakage Resilient Leveled FHE on Multiple Bit Message. [paper]
    Zengpeng Li, Chunguang Ma and Ding Wang.
    In IEEE Transactions on Big Data, 2017.
    BibTex
      @article{TBD:LiMaWan17,
      author = {Zengpeng Li and Chunguang Ma and Ding Wang},
      title = {Leakage Resilient Leveled FHE on Multiple Bit Message},
      journal = {IEEE Transactions on Big Data},
      year = {2017},
      url = {https://doi.org/10.1109/TBDATA.2017.2726554},
      doi = {10.1109/TBDATA.2017.2726554},
      }
  • Towards Multi-Hop Homomorphic Identity-Based Proxy Re-Encryption via Branching Program. [paper]
    Zengpeng Li, Chunguang Ma and Ding Wang.
    In IEEE Access 2017.
    BibTex
      @article{Access:LiMaWan17,
      author = {Zengpeng Li and Chunguang Ma and Ding Wang},
      title = {Towards Multi-Hop Homomorphic Identity-Based Proxy Re-Encryption via Branching Program},
      journal = {{IEEE} Access},
      volume = {5},
      pages = {16214--16228},
      year = {2017},
      url = {https://doi.org/10.1109/ACCESS.2017.2740720},
      doi = {10.1109/ACCESS.2017.2740720},
      }
  • Toward single-server private information retrieval protocol via learning with errors.[paper]
    Zengpeng Li, Chunguang Ma, Ding Wang, and Gang Du.
    In Journal of Information Security and Applications. 34: 280-284 (2017).
    BibTex
      @article{JISA:LMWD17,
      author = {Zengpeng Li and Chunguang Ma and Ding Wang and Gang Du},
      title = {Toward single-server private information retrieval protocol via learning with errors},
      journal = {J. Inf. Secur. Appl.},
      volume = {34},
      pages = {280--284},
      year = {2017},
      url = {https://doi.org/10.1016/j.jisa.2016.11.003},
      doi = {10.1016/j.jisa.2016.11.003},
      }
  • Conferences

  • Two-Round PAKE Protocol over Lattices Without NIZK. [paper]
    Zengpeng Li and Ding Wang.
    In Inscrypt 2018 (Best Paper Award (2/81)).
    BibTex
      @inproceedings{INscrypt:LiWan18,
      author = {Zengpeng Li and Ding Wang},
      title = {Two-Round {PAKE} Protocol over Lattices Without {NIZK}},
      booktitle = {Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers},
      series = {Lecture Notes in Computer Science},
      volume = {11449},
      pages = {138--159},
      publisher = {Springer},
      year = {2018},
      }
  • Toward Proxy Re-encryption From Learning with Errors in the Exponent. [paper]
    Zengpeng Li, Chunguang Ma, Ding Wang, Minghao Zhao, Qian Zhao and Lu Zhou.
    In Trustcom 2017.
    BibTex
      @inproceedings{Trustcom:LMWZZZ17,
      author = {Zengpeng Li and Chunguang Ma and Ding Wang and Minghao Zhao and Qian Zhao and Lu Zhou},
      title = {Toward Proxy Re-encryption From Learning with Errors in the Exponent},
      booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017},
      pages = {683--690},
      publisher = {{IEEE} Computer Society},
      year = {2017},
      }
  • Multi-bit Leveled Homomorphic Encryption via Dual.LWE-Based. [paper]
    Zengpeng Li, Chunguang Ma, Eduardo Morais and Gang Du.
    In Inscrypt 2016.
    BibTex
      @inproceedings{Inscrypt:LMMD16,
      author = {Zengpeng Li and Chunguang Ma and Eduardo Morais and Gang Du},
      title = {Multi-bit Leveled Homomorphic Encryption via Dual.LWE -Based},
      booktitle = {Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers},
      series = {Lecture Notes in Computer Science},
      volume = {10143},
      pages = {221--242},
      publisher = {Springer},
      year = {2016},
      }
  • Dual LWE-Based Fully Homomorphic Encryption with Errorless Key Switching. [paper]
    Zengpeng Li, Chunguang Ma, Gang Du, Weiping Ouyang.
    In ICPADS 2016.
    BibTex
      @inproceedings{ICPADS:LMDO16,
      author = {Zengpeng Li and Chunguang Ma and Gang Du and Weiping Ouyang},
      title = {Dual LWE-Based Fully Homomorphic Encryption with Errorless Key Switching},
      booktitle = {22nd {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2016, Wuhan, China, December 13-16, 2016},
      pages = {1169--1174},
      publisher = {{IEEE} Computer Society},
      year = {2016},
      url = {https://doi.org/10.1109/ICPADS.2016.0154},
      doi = {10.1109/ICPADS.2016.0154},
      }
  • Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme. [paper]
    Zengpeng Li, Steven D. Galbraith, and Chunguang Ma.
    In Provsec 2016.
    BibTex
      @inproceedings{Provsec:LiGalMa16,
      author = {Zengpeng Li and Steven D. Galbraith and Chunguang Ma},
      title = {Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme},
      booktitle = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings},
      series = {Lecture Notes in Computer Science},
      volume = {10005},
      pages = {373--383},
      year = {2016},
      url = {https://doi.org/10.1007/978-3-319-47422-9\_22},
      doi = {10.1007/978-3-319-47422-9\_22},
      }

Manuscripts

  • Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme. [paper]
    Zengpeng Li, Steven Galbraith and Chunguang Ma.
    BibTex
      @misc{EPRINT:LiGalMa16,
      author = {Zengpeng Li and Steven D. Galbraith and Chunguang Ma},
      title = {Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme},
      howpublished = {Cryptology ePrint Archive, Report 2016/1146},
      year = {2016},
      note = {\url{https://eprint.iacr.org/2016/1146}},
      }
​ ​

© Zengpeng Li All Rights Reseverd | Design by Zengpeng LI| Updated 1/29/2020