Ph.D, Professor
E-mail: kzhang@shiep.edu.cn; zhangkaiecnu@163.com |
Kai Zhang is currently a professor at the College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai, China. Previously, he received Ph.D degree in East China Normal University (2012.09-2017.12) under the supervision of Prof. Jie Chen and Prof. Haifeng Qian. He was a research assistant in Nanyang Technological University (2017.03-2017.09) under the supervision of Prof. Huaxiong Wang. He visited Shanghai Jiaotong University (2023.09-2024.06) under the supervision of Prof. Haojin Zhu.
His research interests include applied cryptography and information security, he has published over 50 papers in international conferences and referred journals, such as EUROCRYPT, ASIACRYPT, PKC, ACM AsiaCCS and IEEE Transactions on Information Forensics and Security, IEEE Transactions on Dependable and Secure Computing, Theoretical Computer Science.
Applied Cryptography: Functional Encryption, Searchable Encryption
Privacy-Enhancing Techniques: Privacy-Preserving Issues in Smart Grid and IoT
Network Security: AI Security, Cloud Security, Blockchain
2024.01-Now, Professor, College of Computer Science and Technology, Shanghai University of Electric Power
2023.09-2024.06, Visiting Scholar, Computer Science and Technology, Shanghai Jiaotong University
2020.03-2023.12, Associate Professor, College of Computer Science and Technology, Shanghai University of Electric Power
2018.02-2020.03, Assistant Professor, College of Computer Science and Technology, Shanghai University of Electric Power
2017.03-2017.09, Research Assistant, Nanyang Technological University, Singapore
2012.09-2017.12, Ph.D, Computer Science and Technology, East China Normal University
2008.09-2012.06, Bachelor, Computer Science and Technology, Shandong Normal University
BPRM: Blockchain-Based Privacy-Preserving and Robust Data Aggregation Supporting Multi-Functionality for Fog-Assisted Smart Grid
Chuankun Zhao, Liangliang Wang, Zhiquan Liu, Kai Zhang, Libo Wang, Weiwei Li, Kefei Chen
IEEE Internet of Things Journal(IEEE IoT-J) (2024)
Fuzzy Multi-Keyword Search for Multi-Owner Scenario in IoV
Jinguo Li, Yin He, Kai Zhang*, Peichun Yuan, Jie Yu
IEEE Transactions on Vehicular Technology(IEEE TVT) (2024)
Malicious-Resistant Non-Interactive Verifiable Aggregation for Federated Learning
Yin Zhu, Junqing Gong, Kai Zhang, Haifeng Qian
IEEE Transactions on Dependable and Secure Computing(IEEE TDSC), 21(6): 5600-5616 (2024)
Verifiable and Privacy-Enhanced Authorized Keyword Search for Mobile Cloud Storage
Zhentao Long, Kai Zhang*, Jinguo Li, Pengfei Wu, Jianting Ning
IEEE Internet of Things Journal, (IEEE IoT-J) (2024)
KA2SE: Key-Aggregation Authorized Searchable Encryption Scheme for Data Sharing in Wireless Sensor Networks
Haijiang Wang, Jianting Ning, Wei Wu, Chao Lin, Kai Zhang
IEEE Transactions on Services Computing, (IEEE TSC) (2024)
Practical Searchable Symmetric Encryption for Arbitrary Boolean Query-Join in Cloud Storage
Jiawen Wu, Kai Zhang*, Lifei Wei, Junqing Gong, Jianting Ning
IEEE Transactions on Information Forensics and Security, (IEEE IIFS) 19:10086-10098 (2024)
Fine-Grained and Sanitizable Access Control Service for IoT-Based Digital Subscriptions
Shujun Wang, Jianting Ning, Shengmin Xu, Jiguo Li, Kai Zhang
IEEE Internet of Things Journal, (IEEE IoT-J) 11(20): 33940-33952 (2024)
TRA-PS: Accountable data Pub/Sub service with fast and fine-grained controllable subscription
Kai Zhang, Xiaobing Shi, Jinguo Li, Yi Wu, Jianting Ning
Journal of Systems Architecture, (JSA) 153(103197): 1-12 (2024)
Registered Functional Encryptions from Pairings
Ziqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian
43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, (EUROCRYPT) 2024(2): 373-402
Public-Key Encryption with Keyword Search in Multi-user, Multi-challenge Setting under Adaptive Corruptions
Yunhao Ling, Kai Zhang, Jie Chen, Qiong Huang, Haifeng Qian
IACR International Conference on Public-Key Cryptography, (PKC) 2024: 105-126
Revocable Certificateless Provable Data Possession with Identity Privacy in Cloud Storage
Kai Zhang, Zirui Guo, Liangliang Wang, Lei Zhang, Lifei Wei
Computer Standards & Interfaces(CSI), 90:103848 (2024)
A Security-Enhanced Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme for Vehicular Ad-Hoc Networks
Zhiyu Xu, Liangliang Wang, Yiyuan Luo, Yu Long, Kai Zhang, Hailun Yan, Kefei Chen
IEEE Internet of Things Journal(IEEE IoT-J), 11(8):13482-13495 (2024)
An Intrusion Detection Method Based on Attention Mechanism to Improve CNN-BiLSTM Model
Dingyu Shou, Chao Li, Zhen Wang, Song Cheng, Xiaobo Hu, Kai Zhang, Mi Wen, Yong Wang
The Computer Journal (COMJNL), 67(5):1851–1865 (2024)
Lavida: Large-universe, Verifiable and Dynamic Fine-grained Access Control for E-health Cloud
Jun Zhao, Kai Zhang, Junqing Gong, Haifeng Qian
IEEE Transactions on Information Forensics and Security(IEEE TIFS), 19:2732-2745 (2024)
Non-interactive Boolean Searchable Asymmetric Encryption with Bilateral Access Control
Xiwen Wang, Kai Zhang*, Jinguo Li, Mi Wen, Shengmin Xu, Jianting Ning
The Computer Journal (COMPJ), 67(1): 179–194 (2024)
Updatable Searchable Symmetric Encryption: Definitions and Constructions
Xiwen Wang, Kai Zhang*, Junqing Gong, Shi-Feng Sun, Jianting Ning
Theoretical Computer Science (TCS), 983: 114304 (2024)
Privacy-Preserving Traceable Encrypted Traffic Inspection in Blockchain-based Industrial IoT
Kai Zhang, Minjun Deng, Bei Gong, Yinbin Miao, Jianting Ning
IEEE Internet of Things Journal (IEEE IoT-J), 11(2):3484-3496 (2024)
FPCNN: A Fast Privacy-Preserving Outsourced Convolutional Neural Network with Low-Bandwidth
Jinguo Li, Yan Yan, Kai Zhang*, Chunlin Lia, Peichun Yuan
Knowledge-Based Systems (KBS), 283: 111181 (2024)
Registered ABE via Predicate Encodings
Ziqi Zhu, Kai Zhang, Junqing Gong, Haifeng Qian
29th Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT) 2023: 66–97. [国际三大密码会]
DCDPI: Dynamic and Continuous Deep Packet Inspection in Secure Outsourced Middleboxes
Minjun Deng, Kai Zhang*, Pengfei Wu, Mi Wen, Jianting Ning
IEEE Transactions on Cloud Computing (IEEE TCC), 11(4), 3510-3524 (2023)
Verifiable Cloud-Based Data Publish-Subscribe Service with Hidden Access Policy
Chunlin Li, Jinguo Li, Kai Zhang, Yan Yan, Jianting Ning
IEEE Transactions on Cloud Computing (IEEE TCC), 11(4), 3737-3749 (2023)
Multi-Client Boolean File Retrieval with Adaptable Authorization Switching for Secure Cloud Search Services
Kai Zhang, Xiwen Wang, Jianting Ning, Mi Wen, Rongxing Lu
IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 20(6), 4621-4636 (2023)
Secure Cloud-Assisted Data Pub/Sub Service with Fine-grained Bilateral Access Control
Kai Zhang, Xiwen Wang, Jianting Ning, Junqing Gong, Xinyi Huang
IEEE Transactions on Information Forensics & Security (IEEE TIFS), 18: 5286-5301 (2023)
Verifiable Conjunctive Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy
Haitang Lu, Jie Chen, Kai Zhang, Jianting Ning
The Computer Journal (COMPJ), 66(10): 2379–2392 (2023)
Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search
Zhe Jiang, Kai Zhang*, Liangliang Wang, Jianting Ning
The Computer Journal (COMPJ), 66(9): 2265–2278 (2023)
RDIMM: Revocable and dynamic identity-based multi-copy data auditing for multi-cloud storage
Zirui Guo, Kai Zhang*, Lifei Wei, Siyuan Chen, Liangliang Wang
Journal of Systems Architecture (JSA), 141: 102913 (2023)
Revocable identity-based matchmaking encryption in the standard model
Zhe Jiang, Xiwen Wang, Kai Zhang*, Junqing Gong, Jie Chen, Haifeng Qian
IET Information Security, 17(4): 567-581 (2023)
Bounded-collusion Decentralized ABE with Sublinear Parameters
Jun Zhao, Minghao Yang, Junqing Gong, Kai Zhang, Haifeng Qian
Theoretical Computer Science (TCS), 960: 113897 (2023)
Privacy-Preserving Federated Learning via Functional Encryption, Revisited
Yansong Chang, Kai Zhang, Junqing Gong, Haifeng Qian
IEEE Transactions on Information Forensics & Security (IEEE TIFS), 18: 1855-1869 (2023)
Dual-Server Boolean Data Retrieval for Highly-Scalable Secure File Sharing Services
Kai Zhang, Xiwen Wang, Jianting Ning, Xinyi Huang
IEEE Transactions on Information Forensics & Security (IEEE TIFS), 18: 449-462 (2023)
Efficient Certificateless
Online/Offline Signcryption Scheme for Edge IoT Devices
Jiasheng Chen, Liangliang Wang, Mi Wen, Kai Zhang, Kefei Chen
IEEE Internet of Things Journal (IEEE IoT) 9(11): 8967-8979 (2022)
Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage
Kai Zhang, Zhe Jiang, Jianting Ning, Xinyi Huang
IEEE Transactions on Information Forensics & Security (IEEE TIFS), 17 (2022): 1771 - 1784
FedDetect: A Novel
Privacy-Preserving Federated Learning Framework for Energy Theft Detection in Smart Grid
Mi Wen, Rong Xie, Kejie Lu, Liangliang Wang, Kai Zhang
IEEE Internet of Things Journal (IEEE IoT), 9(8): 6069-6080 (2022)
Blockchain-Based Access Control for Dynamic
Device Management in Microgrid
Kai Zhang, Jinhu Yu, Chao Lin, Jianting Ning
Peer-to-Peer Networking and Applications (PPNA), 15: 1653–1668 (2022)
Forward Secure Public Key Encryption with
Keyword Search for Outsourced Cloud Storage
Ming Zeng, Haifeng Qian, Jie Chen, Kai Zhang
IEEE Transactions on Cloud Computing (IEEE TCC), 10(1): 426-438 (2022)
Towards Requester-Provider Bilateral Utility Maximization and Collision Resistance in Blockchain-based Microgrid Energy Trading
Hailun Wang, Kai Zhang*, Lifei Wei, Lei Zhang
21st International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2021(3): 19-34
Multi-client Sub-Linear Boolean Keyword
Searching for Encrypted Cloud Storage with Owner-enforced Authorization
Kai Zhang, Mi Wen, Rongxing Lu, Kefei Chen
IEEE Transactions on Dependable and Secure Computing (IEEE TDSC) 18(6): 2875-2887 (2021)
Updatable All-But-One Dual Projective
Hashing and Its Applications
Kai Zhang, Zhe Jiang, Junqing Gong, Haifeng Qian
The 23rd International Conference on Information and Communications Security (ICICS) 2021:358-374
A Post-quantum Hybrid Encryption based on QC-LDPC code in the Multi-User Setting
Luping Wang, Jie Chen, Kai Zhang, Haifeng Qian
Theoretical Computer Science (TCS) 835: 82-96 (2020)
Cloud-assisted secure and conjunctive publish/subscribe service in smart grids
Jinguo Li, Mi Wen, Kai Zhang
IET Information Security 14(4): 470-481 (2020)
Public Key Encryption with Equality Test via Hash Proof System
Ming Zeng, Jie Chen, Kai Zhang, Haifeng Qian
Theoretical Computer Science (TCS) 2019, 795: 20-35
Energy Theft
Detection with Energy Privacy Preservation in the Smart Grid
Donghuan Yao, Mi Wen, Xiaohui Liang, Zipeng Fu, Kai Zhang, Baojia Yang
IEEE Internet of Things Journal (IEEE IoT) 6(5): 7659-7669 (2019)
A Searchable Asymmetric
Encryption Scheme with Support for Boolean Queries for Cloud Applications
Ming Zeng, Kai Zhang*, Haifeng Qian, Xiaofeng Chen and Jie Chen
The Computer Journal (COMPJ) 62(4): 563-578 (2019)
Efficient Public Key
Encryption with Equality Test in The Standard Model
Kai Zhang, Jie Chen, Hyung Tae Lee, Haifeng Qian, Huaxiong Wang
Theoretical Computer Science (TCS) 2019, 755:65-80
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017
Hyung Tae Lee, Huaxiong Wang, Kai Zhang*(alphabetical order)
Australasian Conference on Information Security and Privacy, (ACISP) 2018: 780-786
Lattice-Based Dual
Receiver Encryption and More
Daode Zhang, Kai Zhang*, Bao Li, Xianhui Lu, Haiyang Xue, Jie Li
Australasian Conference on Information Security and Privacy, (ACISP) 2018: 520-538
Scalable and Soundness Verifiable Outsourcing Computation in Marine Mobile Computing
Kai Zhang, Lifei Wei, Xiangxue Li, Haifeng Qian
Wireless Communications and Mobile Computing (WCMC), Volume 2017 (2017), Article ID 6128437, 11 pages
Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor Networks
Kai Zhang, Lifei Wei, Xiangxue Li, Haifeng Qian
International Conference on Wireless Algorithms, Systems, and Applications (WASA) 2017: 210-219
Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation
Kai Zhang, Junqing Gong, Shaohua Tang, Jie Chen, Xiangxue Li, Haifeng Qian, Zhenfu Cao
ACM on Asia Conference on Computer and Communications Security (AsiaCCS) 2016:269-279
New Application of Partitioning Methodology: Identity-Based Dual Receiver Encryption
Kai Zhang, Wen Chen, Xiangxue Li, Jie Chen, Haifeng Qian
Security and Communication Networks (SCN), 2016, 9(18): 5789-5802
Batch Verifiable
Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations
Yujuan Sun, Yu Yu, Xiangxue Li, Kai Zhang, Haifeng Qian, Yuan Zhou
Australasian Conference on Information Security and Privacy (ACISP) 2016: 293-309