Match!
Kai Zhang
Shanghai University of Electric Power
11Publications
4H-index
37Citations
Publications 11
Newest
#1Ming Zeng (ECNU: East China Normal University)
#2Kai Zhang (SUEP: Shanghai University of Electric Power)H-Index: 4
Last.Jie Chen (ECNU: East China Normal University)H-Index: 12
view all 5 authors...
Source
#1Lifei Wei (College of Information Technology)H-Index: 12
#2Kai Zhang (ECNU: East China Normal University)H-Index: 4
Last.Dongmei Huang (College of Information Technology)H-Index: 2
view all 4 authors...
Source
#1Lifei WeiH-Index: 12
#2Lei ZhangH-Index: 2
Last.Guojian WuH-Index: 1
view all 6 authors...
Data authenticated aggregation is always a significant issue for wireless sensor networks (WSNs). The marine sensors are deployed far away from the security monitoring. Secure data aggregation for marine WSNs has emerged and attracted the interest of researchers and engineers. A multi-signature enables the data aggregation through one signature to authenticate various signers on the acknowledgement of a message, which is quite fit for data authenticated aggregation marine WSNs. However, most of ...
1 CitationsSource
#1Kai Zhang (ECNU: East China Normal University)H-Index: 4
#2Lifei Wei (Shanghai Ocean University)H-Index: 1
Last.Haifeng Qian (ECNU: East China Normal University)H-Index: 10
view all 4 authors...
In the marine wireless sensor networks, marine sensors collect multidimensional data such as temperature, salinity, dissolved oxygen and chlorophyll concentration in the ocean using a single hardware unit for further statistical analysis. Once these data are collected, they will be sent to the satellites or vessels for scientific information processing purposes, e.g. computing the mean, the variance and making regression analysis. Verifiable computation (VC) always allows the computationally wea...
3 CitationsSource
May 1, 2017 in ICNSC (International Conference on Networking, Sensing and Control)
#1Lifei Wei (College of Information Technology)H-Index: 12
#2Lei Zhang (College of Information Technology)H-Index: 2
Last.Kai Zhang (ECNU: East China Normal University)H-Index: 4
view all 4 authors...
Data aggregation is a significant issue for marine wireless sensor networks. However, marine sensors are always deployed far away from the security monitoring. Thus, the secure data aggregation for marine sensor networks emerges and attracts the researchers and engineers. Multi-signature enables the data aggregation with a single signature to authenticate the message under different signers. However, most of the previous multi-signature schemes rely on the technique of bilinear pairing involving...
1 CitationsSource
#1Kai ZhangH-Index: 4
#2Lifei WeiH-Index: 1
Last.Haifeng QianH-Index: 10
view all 4 authors...
Outsourcing computation with verifiability is a merging notion in cloud computing, which enables lightweight clients to outsource costly computation tasks to the cloud and efficiently check the correctness of the result in the end. This advanced notion is more important in marine mobile computing since the oceangoing vessels are usually constrained with less storage and computation resources. In such a scenario, vessels always firstly outsource data set and perform a function computing over them...
1 CitationsSource
#1Kai Zhang (ECNU: East China Normal University)H-Index: 4
#2Wen Chen (ECNU: East China Normal University)H-Index: 1
Last.Haifeng Qian (ECNU: East China Normal University)H-Index: 10
view all 5 authors...
4 CitationsSource
#1Lei Zhang (Beijing University of Posts and Telecommunications)H-Index: 2
#2Lifei Wei (College of Information Technology)H-Index: 12
Last.Kaoru Ota (MuIT: Muroran Institute of Technology)H-Index: 30
view all 6 authors...
Because the technology of mobile cloud computing has brought several benefits to information world, many applications in mobile devices based on cloud have emerged and boomed in the last years. According to the storage limitation, data owners would like to upload and further share the data through the cloud. Because of the safety requirements, mobile data owners are requested to provide credentials such as authentication tags along with the data. However, it is impossible to require mobile data ...
13 CitationsSource
Jul 4, 2016 in ACISP (Australasian Conference on Information Security and Privacy)
#1Yujuan Sun (ECNU: East China Normal University)H-Index: 1
#2Yu Yu (SJTU: Shanghai Jiao Tong University)H-Index: 10
Last.Yuan ZhouH-Index: 5
view all 6 authors...
In a verifiable computation VC scheme, a client asks a server to perform some outsourced computations, and the latter returns the results as its response. The results can be verified privately or publicly. Fiore and Gennaro CCS 2012 constructed publicly verifiable protocols for secure outsourcing polynomials and matrix computations. Batch verifiable computation BVC schemes allow a client to outsource multiple functions on a same input, and thus much reduce the storage overhead at the server side...
6 CitationsSource
May 30, 2016 in CCS (Computer and Communications Security)
#1Kai Zhang (ECNU: East China Normal University)H-Index: 4
#2Junqing Gong (SJTU: Shanghai Jiao Tong University)H-Index: 6
Last.Zhenfu Cao (ECNU: East China Normal University)H-Index: 40
view all 7 authors...
In cloud computing, computationally weak users are always willing to outsource costly computations to a cloud, and at the same time they need to check the correctness of the result provided by the cloud. Such activities motivate the occurrence of verifiable computation (VC). Recently, Parno, Raykova and Vaikuntanathan showed any VC protocol can be constructed from an attribute-based encryption (ABE) scheme for a same class of functions. In this paper, we propose two practical and efficient semi-...
4 CitationsSource
12