Portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 2 
Published in PST 2017, 2017
This paper is about nonoutsourceable puzzle in blockchain.
Recommended citation: G Zeng, SM Yiu, J Zhang, H Kuzuno, MH Au. A nonoutsourceable puzzle under GHOST rule. PST 2017
Download Paper
Published in Journal of Computer Security, 2018
This paper is about verifiable elastic net among multiple institutions.
Recommended citation: J Zhang, M He, G Zeng, SM Yiu. Privacy-preserving verifiable elastic net among multiple institutions in the cloud. Journal of Computer Security 26(6):791-815(2018).
Download Paper
Published in ICISC 2018, 2018
This paper is about a new privacy-preserving searching model based on blockchain.
Recommended citation: M He, G Zeng, J Zhang, L Zhang, Y Chen, SM Yiu. A new privacy-preserving searching model on blockchain. ICISC 2018.
Download Paper
Published in IEEE Transactions on Vehicular Technology, 2018
This paper is about anonymous counting problem in VANET.
Recommended citation: CY Yeung, LCK Hui, TW Chim, SM Yiu, G Zeng, J Chen. Anonymous counting problem in trust level warning system for VANET. IEEE Transactions on Vehicular Technology 68(1):34-48(2018).
Download Paper
Published in WISA 2019, 2019
This paper is about a self-tallying e-voting scheme based on blockchain.
Recommended citation: G Zeng, M He, SM Yiu. A secure and self-tallying e-voting system based on blockchain. WISA 2019
Download Paper
Published in Chinese Journal of Computers, 2019
This paper is about a lattice-based ring signature, designed for VANET.
Recommended citation: Y Cui, L Cao, X Zhang, G Zeng. Ring signature based on lattice and VANET privacy perservation. Chinese Journal of Computers 40(5):980-992(2019).
Download Paper
Published in The Computer Journal, 2021
This paper constitutes an extended full version of a paper published in the Information Security Applications—20th International Conference (WISA 2019). The journal version improves the technical details and contains additional explanations and experiments.
Recommended citation: G Zeng, M He, SM Yiu, Z Huang. A self-tallying electronic voting based on blockchain. The Computer Journal 65(12):3020-3034(2022).
Download Paper
Published in Designs, Codes and Cryptography, 2022
This paper is about RSO.
Recommended citation: Z Huang, J Lai, G Zeng, X Mu. Receiver selective opening security for identity-based encryption in the multi-challenge setting. DCC 91(4):1233-1259(2023).
Download Paper
Published in ASIACRYPT 2022, 2022
This paper is about the composition of Sigma protocols for relations in CNF.
Recommended citation: G Zeng, J Lai, Z Huang, Y Wang, Z Zheng. DAG-Σ: A DAG-based Sigma protocol for relations in CNF. ASIACRYPT 2022
Download Paper | Download Slides
Published in EUROCRYPT 2023, 2023
This paper is about the message franking in group communication scenarios.
Recommended citation: J Lai, G Zeng, Z Huang, SM Yiu, X Mu, J Weng. Asymmetric group message franking: definitions and constructions. EUROCRYPT 2023
Download Paper | Download Slides
Published in Soft Computing, 2023
This paper is about strongly nonoutsourceable scratch-off puzzles in blockchain.
Recommended citation: G Zeng, Z Huang, Y Wang, X Mu, C Zhang. Strongly nonoutsourceable scratch-off puzzles in blockchain. Soft Computing 27 (17), 11941-11960 (2023).
Download Paper
Published in ASIACRYPT 2023, 2023
This paper is about non-interactive zero-knowledge functional proofs.
Recommended citation: G Zeng, J Lai, Z Huang, L Zhang, X Wang, KY Lam, H Wang, J Weng. Non-interactive zero-knowledge functional proofs. ASIACRYPT 2023.
Download Paper | Download Slides
Published in ASIACRYPT 2024, 2024
This paper is about the abuse in message franking.
Recommended citation: Z Huang, J Lai, G Zeng, J Weng. Mild asymmetric message franking: illegal-messages-only and retrospective content moderation. ASIACRYPT 2024.
Download Paper | Download Slides
Published:
This is a description of your talk, which is a markdown file that can be all markdown-ified like any other post. Yay markdown!
Published:
This is a description of your conference proceedings talk, note the different field in type. You can put anything in this field.
Undergraduate course, SYSU, school of cyber science and technology, 2025
TBA
Undergraduate course, SYSU, school of cyber science and technology, 2026
TBA