Jing Liu, Liang Feng Zhang*: Matproofs: maintainable matrix commitment with efficient aggregation. The 29th ACM Conference on Computer and Communications Security (CCS 2022), pp. 2041-2054, 2022.
Liang Feng Zhang, Huaxiong Wang: Multi-server verifiable computation of low-degree polynomials. The 43rd IEEE Symposium on Security and Privacy (IEEE S&P 2022), pp. 596-613, 2022.
Xin Chen, Liang Feng Zhang*, Jing Liu: Verifiable homomorphic secret sharing for low-degree polynomials. IEEE Transactions on Dependable and Secure Computing, early access, 2022.
Jing Liu, Liang Feng Zhang*: Privacy-preserving and publicly verifiable matrix multiplication. IEEE Transactions on Services Computing, early access, 2022.
Pengzhen Ke, Liang Feng Zhang*: Two-server private information retrieval with result verification. The 19th IEEE International Symposium on Information Theory (ISIT 2022), pp. 408-413, 2022.
Liang Feng Zhang, Huaxiong Wang, Li-Ping Wang: Byzantine-robust private information retrieval with low communication and efficient decoding. The 17th ACM Asia Conference on Computer and Communications Security (ASIACCS 2022), pp. 1079-1085, 2022.
Shuai Feng, Shuaijianni Xu, Liang Feng Zhang*: Multi-key homomorphic MACs with efficient verification for quadratic arithmetic circuits. The 17th ACM Asia Conference on Computer and Communications Security (ASIACCS 2022), pp. 17-27, 2022.
Lin Zhu, Wen Ming Li, Liang Feng Zhang*: On the modulus in matching vector codes. The Computer Journal, Vol. 65, No. 12, pp. 2991-2997, 2022.
Liang Feng Zhang*: Multi-server verifiable delegation of computations: unconditional security and practical efficiency. Information and Computation, Vol. 281, No. 104740, 2021.
Xin Chen, Liang Feng Zhang*: Two-server delegation of computation on label-encrypted data. IEEE Transactions on Cloud Computing, Vol. 9, No. 4, pp. 1645-1656, 2021.
Liang Feng Zhang*, Reihaneh Safavi-Naini: Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions. Designs, Codes and Cryptography, Vol. 88, No. 4, pp. 677-709, 2020.
Go Ohtake*, Reihaneh Safavi-Naini, Liang Feng Zhang: Outsourcing scheme of ABE encryption secure against malicious adversary. Computers & Security, Vol. 86, pp. 437-452, 2019.
Liang Feng Zhang, Reihaneh Safavi-Naini*: Batch verifiable computation of outsourced functions. Designs, Codes and Cryptography, Vol. 77, No. 2-3, pp. 563-585, 2015.
Liang Feng Zhang*, Reihaneh Safavi-Naini: Batch verifiable computation of polynomials on outsourced data. The 20th European Symposium on Research in Computer Security (ESORICS 2015), pp. 167-185, 2015.
Liang Feng Zhang*: A coding-theoretic application of Baranyai’s theorem. IEEE Transactions on Information Theory, Vol. 60, No. 11, pp. 6988-6992, 2014.
Liang Feng Zhang*, Reihaneh Safavi-Naini: Verifiable delegation of computations with storage-verification trade-off. The 19th European Symposium on Research in Computer Security (ESORICS 2014), pp. 112-129, 2014.
Liang Feng Zhang*, Reihaneh Safavi-Naini: Verifiable multi-server private information retrieval. The 12th International Conference on Applied Cryptography & Network Security (ACNS 2014), LNCS 8479, pp. 62-79, 2014.
Yeow Meng Chee, Tao Feng, San Ling, Huaxiong Wang, Liang Feng Zhang*: Query-efficient locally decodable codes of subexponential length. Computational Complexity, Vol. 22, No. 1, pp. 159-189, 2013.
Yeow Meng Chee, San Ling, Huaxiong Wang, Liang Feng Zhang*: Upper bounds on matching families in Z_pq^n. IEEE Transactions on Information Theory, Vol. 59, No. 8, pp. 5131-5139, 2013.
Liang Feng Zhang*, Reihaneh Safavi-Naini: Private outsourcing of polynomial evaluation and matrix multiplications using multilinear maps. The 12th International Conference on Cryptology and Network Security (CANS 2013), LNCS 8257, pp. 329-348, 2013.
Liang Feng Zhang*: On the eigenvalues of certain matrices over Z_m. Discrete Mathematics, Vol. 313, No. 7, pp. 886-895, 2013.
Amos Beimel, Yeow Meng Chee, Huaxiong Wang, Liang Feng Zhang*: Communication-efficient distributed oblivious transfer. Journal of Computer and System Sciences, Vol. 78, No. 4, pp. 1142-1157, 2012.