|
- Name:Cao Zhenfu
- Title:Professor
- Office:3-437
- Office Phone:34205345
- Email:zfcao@cs.sjtu.edu.cn
- Website:http://tdt.sjtu.edu.cn/%7Ezfcao/index.html
|
Research Field
Number Theory, Modern Cryptography, Information Security, Network Security, Communication Security, Trusted Computing
Education
Ph.D in Mathematics, Harbin Institute of Technology, China.
Bachelor in Computer Science and Technology, Harbin Institute of Technology, China.
Work experience
1983-1987, Assistant, Department of Mathematics, Harbin Institute of Technology, China.
1987-1991, Associate Professor, Department of Mathematics, Harbin Institute of Technology, China.
1991-2001, Professor, Department of Mathematics, Harbin Institute of Technology, China.
2002 to present, Professor, Department of Computer Science and Engineering, Shanghai Jiao Tong University, China.
2002-2009, visiting scholar in University of Tsukuba (Japan), National Institute of Information and Communications Technology (NICT, Japan), Hong Kong Baptist University, Chinese University of Hong Kong, Hong Kong University of Science and Technology, National Chiao Tung University, and Nanyang Technological University (Singapore).
Research
Awards and Honors
Journal of Systems and Software
Teaching
Modern Cryptography
Fundamental of Cryptography
Discrete Mathematics
Number Theory And Its Applications
Public-Key Cryptography
Publications
Most of the papers (since 2002): http://tdt.sjtu.edu.cn/publication.htm
Most of the papers in Chinese (since 1981): http://tdt.sjtu.edu.cn/~zfcao/index.html
Selected Journal Papers (since 1985):
—————————————————
2009
[1]\tZhenfu Cao. Universal encrypted deniable authentication protocol. International Journal of Network Security, 8(2), 151-158, 2009.
[2]\tShengbao Wang, Zhenfu Cao, Zhaohui Cheng, and Kim-Kwang Raymond Choo. Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode, Science in China Series F, 52(8), 1358-1370, 2009.
[3]\tPeng Zeng, Zhenfu Cao, Kim-Kwang Raymond Choo, and Shengbao Wang. On the Anonymity of Some Authentication Schemes for Wireless Communications, IEEE Communications Letters, 13(3), 170-171, 2009.
[4]\tHai Huang and Zhenfu Cao. A Novel and Efficient Unlinkable Secret Handshakes Scheme, IEEE Communications Letters, 13(5), 363-365, 2009.
[5]\tPeng Zeng, Zhenfu Cao, Kim-Kwang Raymond Choo, and Shengbao Wang. Security Weakness in a Dynamic Program Update Protocol for Wireless Sensor Networks, IEEE Communications Letters, 13(6), 426-428, 2009.
[6]\tFeng Cao and Zhenfu Cao. A secure identity-based proxy multi-signature scheme, Information Sciences, 179(3), 292-302, 2009.
[7]\tShengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo, and Lihua Wang. An improved identity-based key agreement protocol and its security proof, Information Sciences, 179(3), 307-318, 2009.
[8]\tFeng Cao and Zhenfu Cao. An identity based universal designated verifier signature scheme secure in the standard model, Journal of Systems and Software, 82(4), 643-649, 2009.
[9]\tFeng Cao and Zhenfu Cao. A secure identity-based multi-proxy signature scheme, Computers & Electrical Engineering, 35(1), 86-95, 2009.
2008
[10]\tZhenfu Cao, Chuan I Chu, and Wai Chee Shiu. The exponontial Diophantine equation $AX^2 + BY^2 = \\lambda K^Z$ and its applications, Taiwanese Journal of Mathematics, 12(5), 1015-1034, 2008.
[11]\tXiaolei Dong, Zhenfu Cao, and Licheng Wang. New designing of cryptosystems based on quadratic fields, Science in China Series F, 51(8), 1106-1116, 2008.
[12]\tShengbao Wang, Zhenfu Cao, Maurizio Adriano Strangio, and Lihua Wang. Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol, IEEE Communications Letters, 12(2), 149-151, 2008.
[13]\tXiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin(Sherman) Shen, and Zhenfu Cao. TUA: A novel compromise-resilient authentication architecture for wireless mesh networks, IEEE Transactions on Wireless Communications, 7(4), 1389-1399, 2008.
[14]\tRongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, and Xiaohui Liang. New (t, n) threshold directed signature scheme with provable security, Information Sciences, 178 (3), 756-765, 2008.
[15]\tXiaohui Liang, Zhenfu Cao, Rongxing Lu, and Liuquan Qin. Efficient and secure protocol in fair document exchange, Computer Standards & Interfaces, 30 (3), 167-176, MAR 2008.
[16]\tLicheng Wang, Zhenfu Cao, Feng Cao. Haifeng Qian and Haiyong Bao. Biased bit commitment and applications, Journal of Information Science and Engineering, 24(2), 441-452, 2008.
[17]\tRongxing Lu, Xiaodong Lin, Zhenfu Cao, Liuquan Qin, and Xiaohui Liang. A simple deniable authentication protocol based on the Diffie-Hellman algorithm, International Journal of Computer Mathematics, 85(9), 1315-1323, 2008.
2007
[18]\tXiaolei Dong, W. C. Shiu, C. I. Chu, and Zhenfu Cao. The simultaneous Pell equations $y^2 - Dz^2 = 1$ and $x^2 - 2Dz^2 = 1$, Acta Arithmetica, 126(2), 115-123, 2007.
[19]\tRongxing Lu, Zhenfu Cao, and Xiaolei Dong. A new practical limited identity-based encryption scheme, Fundamenta Informaticae, 80(4), 461-474, 2007.
[20]\tDazhi Sun, Jinpeng Huai, Jizhou Sun, Zhenfu Cao. An efficient modular exponentiation algorithm against simple power analysis attacks, IEEE Transactions on Consumer Electronics, 53 (4): 1718-1723, 2007.
[21]\tLicheng Wang, Zhenfu Cao, Xiangxue Li and Haifeng Qian. Simulatability and security of certificateless threshold signatures, Information Sciences, 177(6), 1382-1394, 2007.
[22]\tYuan Zhou, Binxing Fang, Zhenfu Cao, Xiaochun Yun and Xiaoming Cheng. How to construct secure proxy cryptosystem, Information Sciences, 177(19), 4095-4108, 2007.
[23]\tZhenchuan Chai, Zhenfu Cao, and Xiaolei Dong. Efficient ID-based multi-receiver threshold decryption, International Journal of Foundations of Computer Science, 18(5), 987-1004, 2007.
[24]\tJun Shao, Zhenfu Cao, and Rongxing Lu. Improvement of Yang et al.\s threshold proxy signature scheme
Others
Most of the papers (since 2002): http://tdt.sjtu.edu.cn/publication.htm
Most of the papers in Chinese (since 1981): http://tdt.sjtu.edu.cn/~zfcao/index.html
Selected Journal Papers (since 1985):
—————————————————
2009
[1]\tZhenfu Cao. Universal encrypted deniable authentication protocol. International Journal of Network Security, 8(2), 151-158, 2009.
[2]\tShengbao Wang, Zhenfu Cao, Zhaohui Cheng, and Kim-Kwang Raymond Choo. Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode, Science in China Series F, 52(8), 1358-1370, 2009.
[3]\tPeng Zeng, Zhenfu Cao, Kim-Kwang Raymond Choo, and Shengbao Wang. On the Anonymity of Some Authentication Schemes for Wireless Communications, IEEE Communications Letters, 13(3), 170-171, 2009.
[4]\tHai Huang and Zhenfu Cao. A Novel and Efficient Unlinkable Secret Handshakes Scheme, IEEE Communications Letters, 13(5), 363-365, 2009.
[5]\tPeng Zeng, Zhenfu Cao, Kim-Kwang Raymond Choo, and Shengbao Wang. Security Weakness in a Dynamic Program Update Protocol for Wireless Sensor Networks, IEEE Communications Letters, 13(6), 426-428, 2009.
[6]\tFeng Cao and Zhenfu Cao. A secure identity-based proxy multi-signature scheme, Information Sciences, 179(3), 292-302, 2009.
[7]\tShengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo, and Lihua Wang. An improved identity-based key agreement protocol and its security proof, Information Sciences, 179(3), 307-318, 2009.
[8]\tFeng Cao and Zhenfu Cao. An identity based universal designated verifier signature scheme secure in the standard model, Journal of Systems and Software, 82(4), 643-649, 2009.
[9]\tFeng Cao and Zhenfu Cao. A secure identity-based multi-proxy signature scheme, Computers & Electrical Engineering, 35(1), 86-95, 2009.
2008
[10]\tZhenfu Cao, Chuan I Chu, and Wai Chee Shiu. The exponontial Diophantine equation $AX^2 + BY^2 = \\lambda K^Z$ and its applications, Taiwanese Journal of Mathematics, 12(5), 1015-1034, 2008.
[11]\tXiaolei Dong, Zhenfu Cao, and Licheng Wang. New designing of cryptosystems based on quadratic fields, Science in China Series F, 51(8), 1106-1116, 2008.
[12]\tShengbao Wang, Zhenfu Cao, Maurizio Adriano Strangio, and Lihua Wang. Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol, IEEE Communications Letters, 12(2), 149-151, 2008.
[13]\tXiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin(Sherman) Shen, and Zhenfu Cao. TUA: A novel compromise-resilient authentication architecture for wireless mesh networks, IEEE Transactions on Wireless Communications, 7(4), 1389-1399, 2008.
[14]\tRongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, and Xiaohui Liang. New (t, n) threshold directed signature scheme with provable security, Information Sciences, 178 (3), 756-765, 2008.
[15]\tXiaohui Liang, Zhenfu Cao, Rongxing Lu, and Liuquan Qin. Efficient and secure protocol in fair document exchange, Computer Standards & Interfaces, 30 (3), 167-176, MAR 2008.
[16]\tLicheng Wang, Zhenfu Cao, Feng Cao. Haifeng Qian and Haiyong Bao. Biased bit commitment and applications, Journal of Information Science and Engineering, 24(2), 441-452, 2008.
[17]\tRongxing Lu, Xiaodong Lin, Zhenfu Cao, Liuquan Qin, and Xiaohui Liang. A simple deniable authentication protocol based on the Diffie-Hellman algorithm, International Journal of Computer Mathematics, 85(9), 1315-1323, 2008.
2007
[18]\tXiaolei Dong, W. C. Shiu, C. I. Chu, and Zhenfu Cao. The simultaneous Pell equations $y^2 - Dz^2 = 1$ and $x^2 - 2Dz^2 = 1$, Acta Arithmetica, 126(2), 115-123, 2007.
[19]\tRongxing Lu, Zhenfu Cao, and Xiaolei Dong. A new practical limited identity-based encryption scheme, Fundamenta Informaticae, 80(4), 461-474, 2007.
[20]\tDazhi Sun, Jinpeng Huai, Jizhou Sun, Zhenfu Cao. An efficient modular exponentiation algorithm against simple power analysis attacks, IEEE Transactions on Consumer Electronics, 53 (4): 1718-1723, 2007.
[21]\tLicheng Wang, Zhenfu Cao, Xiangxue Li and Haifeng Qian. Simulatability and security of certificateless threshold signatures, Information Sciences, 177(6), 1382-1394, 2007.
[22]\tYuan Zhou, Binxing Fang, Zhenfu Cao, Xiaochun Yun and Xiaoming Cheng. How to construct secure proxy cryptosystem, Information Sciences, 177(19), 4095-4108, 2007.
[23]\tZhenchuan Chai, Zhenfu Cao, and Xiaolei Dong. Efficient ID-based multi-receiver threshold decryption, International Journal of Foundations of Computer Science, 18(5), 987-1004, 2007.
[24]\tJun Shao, Zhenfu Cao, and Rongxing Lu. Improvement of Yang et al.\s threshold proxy signature scheme