Sitemap
A list of all the posts and pages found on the site. For you robots out there, there is an XML version available for digesting as well.
Pages
Posts
Future Blog Post
Published:
This post will show up by default. To disable scheduling of future posts, edit config.yml and set future: false.
Blog Post number 4
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 3
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 2
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 1
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
portfolio
Portfolio item number 1
Short description of portfolio item number 1
Portfolio item number 2
Short description of portfolio item number 2 
publications
A Nonoutsourceable Puzzle under GHOST Rule
Published in PST 2017, 2017
This paper is about nonoutsourceable puzzle in blockchain.
Recommended citation: G Zeng, SM Yiu, J Zhang, H Kuzuno, MH Au. A nonoutsourceable puzzle under GHOST rule. PST 2017
Download Paper
Privacy-Preserving Verifiable Elastic Net among Multiple Institutions in the Cloud
Published in Journal of Computer Security, 2018
This paper is about verifiable elastic net among multiple institutions.
Recommended citation: J Zhang, M He, G Zeng, SM Yiu. Privacy-preserving verifiable elastic net among multiple institutions in the cloud. Journal of Computer Security 26(6):791-815(2018).
Download Paper
A New Privacy-Preserving Searching Model on Blockchain
Published in ICISC 2018, 2018
This paper is about a new privacy-preserving searching model based on blockchain.
Recommended citation: M He, G Zeng, J Zhang, L Zhang, Y Chen, SM Yiu. A new privacy-preserving searching model on blockchain. ICISC 2018.
Download Paper
Anonymous Counting Problem in Trust Level Warning System for VANET
Published in IEEE Transactions on Vehicular Technology, 2018
This paper is about anonymous counting problem in VANET.
Recommended citation: CY Yeung, LCK Hui, TW Chim, SM Yiu, G Zeng, J Chen. Anonymous counting problem in trust level warning system for VANET. IEEE Transactions on Vehicular Technology 68(1):34-48(2018).
Download Paper
A Secure and Self-tallying E-voting System Based on Blockchain
Published in WISA 2019, 2019
This paper is about a self-tallying e-voting scheme based on blockchain.
Recommended citation: G Zeng, M He, SM Yiu. A secure and self-tallying e-voting system based on blockchain. WISA 2019
Download Paper
Ring Signature Based on Lattice and VANET Privacy Perservation
Published in Chinese Journal of Computers, 2019
This paper is about a lattice-based ring signature, designed for VANET.
Recommended citation: Y Cui, L Cao, X Zhang, G Zeng. Ring signature based on lattice and VANET privacy perservation. Chinese Journal of Computers 40(5):980-992(2019).
Download Paper
A Self-Tallying Electronic Voting Based on Blockchain
Published in The Computer Journal, 2021
This paper constitutes an extended full version of a paper published in the Information Security Applications—20th International Conference (WISA 2019). The journal version improves the technical details and contains additional explanations and experiments.
Recommended citation: G Zeng, M He, SM Yiu, Z Huang. A self-tallying electronic voting based on blockchain. The Computer Journal 65(12):3020-3034(2022).
Download Paper
Receiver Selective Opening Security for Identity-Based Encryption in the Multi-Challenge Setting
Published in Designs, Codes and Cryptography, 2022
This paper is about RSO.
Recommended citation: Z Huang, J Lai, G Zeng, X Mu. Receiver selective opening security for identity-based encryption in the multi-challenge setting. DCC 91(4):1233-1259(2023).
Download Paper
DAG-Σ: A DAG-Based Sigma Protocol for Relations in CNF
Published in ASIACRYPT 2022, 2022
This paper is about the composition of Sigma protocols for relations in CNF.
Recommended citation: G Zeng, J Lai, Z Huang, Y Wang, Z Zheng. DAG-Σ: A DAG-based Sigma protocol for relations in CNF. ASIACRYPT 2022
Download Paper | Download Slides
Asymmetric Group Message Franking: Definitions and Constructions
Published in EUROCRYPT 2023, 2023
This paper is about the message franking in group communication scenarios.
Recommended citation: J Lai, G Zeng, Z Huang, SM Yiu, X Mu, J Weng. Asymmetric group message franking: definitions and constructions. EUROCRYPT 2023
Download Paper | Download Slides
Strongly Nonoutsourceable Scratch-Off Puzzles in Blockchain
Published in Soft Computing, 2023
This paper is about strongly nonoutsourceable scratch-off puzzles in blockchain.
Recommended citation: G Zeng, Z Huang, Y Wang, X Mu, C Zhang. Strongly nonoutsourceable scratch-off puzzles in blockchain. Soft Computing 27 (17), 11941-11960 (2023).
Download Paper
Non-Interactive Zero-Knowledge Functional Proofs
Published in ASIACRYPT 2023, 2023
This paper is about non-interactive zero-knowledge functional proofs.
Recommended citation: G Zeng, J Lai, Z Huang, L Zhang, X Wang, KY Lam, H Wang, J Weng. Non-interactive zero-knowledge functional proofs. ASIACRYPT 2023.
Download Paper | Download Slides
Mild Asymmetric Message Franking: Illegal-Messages-Only and Retrospective Content Moderation
Published in ASIACRYPT 2024, 2024
This paper is about the abuse in message franking.
Recommended citation: Z Huang, J Lai, G Zeng, J Weng. Mild asymmetric message franking: illegal-messages-only and retrospective content moderation. ASIACRYPT 2024.
Download Paper | Download Slides
talks
Talk 1 on Relevant Topic in Your Field
Published:
This is a description of your talk, which is a markdown file that can be all markdown-ified like any other post. Yay markdown!
Conference Proceeding talk 3 on Relevant Topic in Your Field
Published:
This is a description of your conference proceedings talk, note the different field in type. You can put anything in this field.
teaching
Computational complexity, Fall, 2025
Undergraduate course, SYSU, school of cyber science and technology, 2025
TBA
C++, Spring, 2026
Undergraduate course, SYSU, school of cyber science and technology, 2026
TBA
