scispace - formally typeset
Z

Zengpeng Li

Researcher at Qingdao University

Publications -  42
Citations -  417

Zengpeng Li is an academic researcher from Qingdao University. The author has contributed to research in topics: Computer science & Learning with errors. The author has an hindex of 9, co-authored 30 publications receiving 188 citations. Previous affiliations of Zengpeng Li include Virginia Commonwealth University & Singapore University of Technology and Design.

Papers
More filters
Journal ArticleDOI

Preserving Data Privacy via Federated Learning: Challenges and Solutions

TL;DR: This article focuses on the most significant challenges associated with the preservation of data privacy via federated learning and valuable attack mechanisms are discussed, and associated solutions are highlighted to the corresponding attack.
Journal ArticleDOI

Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification

TL;DR: A novel Accumulative Authentication Tag (AAT) based on the symmetric-key cryptography to generate an authentication tag for each keyword is designed and the security analysis and the performance evaluation results show that the proposed scheme is secure and efficient.
Journal ArticleDOI

Quantum-Safe Round-Optimal Password Authentication for Mobile Devices

TL;DR: This article resorts tosmooth projective hash functions, which enable the server to store a hash of the user's password with a random salt, providing guarantees that the user’s password is never transmitted in plain-text to the server when login.
Journal ArticleDOI

Achieving One-Round Password-based Authenticated Key Exchange over Lattices

TL;DR: This work designs a quantum-resistant round-optimal lattice-based cryptography, a promising candidate for post-quantum cryptography, and optimized Katz-Vaikuntanathan’s approximate design over lattices.
Journal ArticleDOI

Towards Multi-Hop Homomorphic Identity-Based Proxy Re-Encryption via Branching Program

TL;DR: This scheme is the first multi-hop homomorphic identity-based proxy re-encryption scheme that supports homomorphic evaluation and is proved secure under the decisional assumption.