欢迎光临张江的个人主页!

Welcome to Jiang Zhang’s HomePage!

 

Hi all, my name is Jiang Zhang (张 江) !
I’m an associate researcher at State Key Laboratory of Cryptology, Beijing, China.
My research interests focus on (post-quantum) cryptography and data privacy, particularly in Provable Security, Public Key Encryption, Key Establishment, Fully Homomorphic Encryption, Multiparty Computation, and Lattice-based Cryptography.

Education & Contact

  • 09/2009 – 07/2015: Ph.D. in Information Security, Institute of Software, CAS.
  • 09/2005 – 07/2009: B.S. in Information and Computational Sciences, SUN YAT-SEN University.

Email: mail (at) jiangzhang.net

Publication

  1. More Efficient MPC from Improved Triple Generation and Authenticated Garbling.
    In ACM CCS 2020. [pdf]
    Kang Yang, Xiao Wang, Jiang Zhang
  2. Ferret: Fast Extension for coRRElated oT with small communication.
    In ACM CCS 2020. [pdf]
    Kang Yang, Chenkai Weng, Xiao Lan, Jiang Zhang, Xiao Wang
  3. Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes.
    In PKC 2020. [pdf]
    Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang, Kang Yang
  4. Improved lattice-based CCA2-secure PKE in the standard model.
    In Science China Information Sciences (2020). [pdf]
    Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang
  5. An efficient NIZK scheme for privacy-preserving transactions over account-model blockchain.
    In IEEE Transactions on Dependable and Secure Computing (2020). [pdf]
    Shunli Ma, Yi Deng, Debiao He, Jiang Zhang, Xiang Xie
  6. Collision Resistant Hashing from Sub-exponential Learning Parity with Noise.
    In ASIACRYPT 2019. [pdf]
    Yu Yu, Jiang Zhang, Jian Weng, Chun Guo, Xiangxue Li
  7. Valiant’s universal circuits revisited: an overall improvement and a lower bound.
    In ASIACRYPT 2019. [pdf]
    Shuoyao Zhao, Yu Yu, Jiang Zhang, Hanlin Liu
  8. KDM Security for Identity-Based Encryption: Constructions and Separations.
    In Information Sciences (2019). [pdf]
    Yu Chen, Jiang Zhang, Yi Deng, Jinyong Chang
  9. Attribute-Based Keyword Search from Lattices.
    In INSCRYPT 2019. [pdf]
    Jie Li, Mimi Ma, Jiang Zhang, Shuqin Fan, Shuaigang Li
  10. On the Hardness of Learning Parity with Noise over Rings.
    In ProvSec 2018. [pdf]
    Shuoyao Zhao, Yu Yu, Jiang Zhang
  11. Two-Round PAKE from Approximate SPH and Instantiations from Lattices.
    In ASIACRYPT 2017. [pdf]
    Jiang Zhang, Yu Yu
  12. Anonymous Password Authenticated Key Exchange Protocol in the Standard Model.
    In Wireless Personal Communications (2017). [pdf]
    Xuexian Hu, Jiang Zhang, Zhenfeng Zhang, Fengmei Liu
  13. Towards Secure Data Distribution Systems in Mobile Cloud Computing.
    In IEEE Transactions on Mobile Computing (2017). [pdf]
    Jiang Zhang, Zhenfeng Zhang, Hui Guo
  14. Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes.
    In CRYPTO 2016. [pdf]
    Jiang Zhang, Yu Chen, Zhenfeng Zhang
  15. Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN.
    In CRYPTO 2016. [pdf]
    Yu Yu, Jiang Zhang
  16. Non-Malleable Functions and Their Applications.
    In PKC 2016. [pdf]
    Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S.M. Chow
  17. Universally Composable Anonymous Password Authenticated Key Exchange.
    In Science China Information Sciences (2016). [pdf]
    Xuexian Hu, Jiang Zhang, Zhenfeng Zhang, Jing Xu
  18. Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks.
    In Security Standardisation Research (SSR) 2015. [pdf]
    Zhenfeng Zhang, Kang Yang, Jiang Zhang, Cheng Chen
  19. Authenticated Key Exchange from Ideal Lattices.
    In EUROCRYPT 2015. [pdf]
    Jiang Zhang, Zhenfeng Zhang, Jintai Ding, Michael Snook, Özgür Dagdelen
  20. Simpler Efficient Group Signatures from Lattices.
    In PKC 2015. [pdf]
    Phong Q. Nguyen, Jiang Zhang, Zhenfeng Zhang
  21. Generic Constructions of Integrated PKE and PEKS.
    In Designs, Codes and Cryptography (2014). [pdf]
    Yu Chen, Jiang Zhang, Dongdai Lin, Zhenfeng Zhang
  22. Security Analysis of EMV Channel Establishment Protocol in an Enhanced Security Model.
    In ICICS 2014. [pdf]
    Yanfei Guo, Zhenfeng Zhang, Jiang Zhang, Xuexian Hu
  23. Black-Box Separations for One-More (Static) CDH and Its Generalization.
    In ASIACRYPT 2014. [pdf]
    Jiang Zhang, Zhenfeng Zhang, Yu Chen, Yanfei Guo, Zongyang Zhang
  24. Secure and Efficient Data-Sharing in Clouds.
    In Concurrency and Computation: Practice and Experience (2014). [pdf]
    Jiang Zhang, Zhenfeng Zhang
  25. Proxy Re-Encryption with Unforgeable Re-Encryption Keys.
    In CANS 2014. [pdf]
    Hui Guo, Zhenfeng Zhang, Jiang Zhang
  26. PRE: Stronger Security Notions and Efficient Construction with Non-interactive Opening.
    In Theoretical Computer Science (2014). [pdf]
    Jiang Zhang, Zhenfeng Zhang, Yu Chen
  27. Secure and Efficient Data-Sharing in Clouds.
    In EIDWT 2013. [pdf]
    Jiang Zhang, Zhenfeng Zhang
  28. Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
    In IEEE Transactions on Parallel and Distributed Systems (2013). [pdf]
    Aijun Ge, Jiang Zhang, Rui Zhang, Chuangui Ma, Zhenfeng Zhang
  29. Towards a Secure Certificateless Proxy Re-encryption Scheme.
    In ProvSec 2013. [pdf]
    Hui Guo, Zhenfeng Zhang, Jiang Zhang, Cheng Chen.
  30. Ciphertext policy attribute-based encryption from lattices.
    In ASIACCS 2012. [pdf]
    Jiang Zhang, Zhenfeng Zhang, Aijun Ge
  31. A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings.
    In INSCRYPT 2011. [pdf]
    Jiang Zhang, Zhenfeng Zhang
  32. A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening.
    In INSCRYPT 2011. [pdf]
    Jiang Zhang, Xiang Xie, Rui Zhang, Zhenfeng Zhang