Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zhenfei Zhang is active.

Publication


Featured researches published by Zhenfei Zhang.


the cryptographers’ track at the rsa conference | 2017

Choosing Parameters for NTRUEncrypt

Jeffrey Hoffstein; Jill Pipher; John M. Schanck; Joseph H. Silverman; William Whyte; Zhenfei Zhang

We describe a method for generating parameter sets, and calculating security estimates, for NTRUEncrypt. Our security analyses consider lattice attacks, the hybrid attack, subfield attacks, and quantum search. Analyses are provided for the IEEE 1363.1-2008 product-form parameter sets, for the NTRU Challenge parameter sets, and for two new parameter sets. These new parameter sets are designed to provide \(\ge 128\)-bit post-quantum security.


privacy enhancing technologies | 2016

Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world

John M. Schanck; William Whyte; Zhenfei Zhang

Abstract We propose a circuit extension handshake for Tor that is forward secure against adversaries who gain quantum computing capabilities after session negotiation. In doing so, we refine the notion of an authenticated and confidential channel establishment (ACCE) protocol and define pre-quantum, transitional, and post-quantum ACCE security. These new definitions reflect the types of adversaries that a protocol might be designed to resist. We prove that, with some small modifications, the currently deployed Tor circuit extension handshake, ntor, provides pre-quantum ACCE security. We then prove that our new protocol, when instantiated with a post-quantum key encapsulation mechanism, achieves the stronger notion of transitional ACCE security. Finally, we instantiate our protocol with NTRU-Encrypt and provide a performance comparison between ntor, our proposal, and the recent design of Ghosh and Kate.


public key cryptography | 2018

Fully Homomorphic Encryption from the Finite Field Isomorphism Problem

Yarkin Doröz; Jeffrey Hoffstein; Jill Pipher; Joseph H. Silverman; Berk Sunar; William Whyte; Zhenfei Zhang

If q is a prime and n is a positive integer then any two finite fields of order \(q^n\) are isomorphic. Elements of these fields can be thought of as polynomials with coefficients chosen modulo q, and a notion of length can be associated to these polynomials. A non-trivial isomorphism between the fields, in general, does not preserve this length, and a short element in one field will usually have an image in the other field with coefficients appearing to be randomly and uniformly distributed modulo q. This key feature allows us to create a new family of cryptographic constructions based on the difficulty of recovering a secret isomorphism between two finite fields. In this paper we describe a fully homomorphic encryption scheme based on this new hard problem.


international conference on high performance computing and simulation | 2016

NTRU modular lattice signature scheme on CUDA GPUs

Wei Dai; Berk Sunar; John M. Schanck; William Whyte; Zhenfei Zhang

In this work we show how to use Graphics Processing Units (GPUs) with Compute Unified Device Architecture (CUDA) to accelerate a lattice based signature scheme, namely, the NTRU modular lattice signature (NTRU-MLS) scheme. Lattice based schemes require operations on large vectors that are perfect candidates for GPU implementations. In addition, similar to most lattice based signature schemes, NTRU-MLS provides transcript security with a rejection sampling technique. With a GPU implementation, we are able to generate many candidates simultaneously, and hence mitigate the performance slowdown from rejection sampling. Our implementation results show that for the original NTRU-MLS parameter sets, we obtain a 2x improvement in the signing speed; for the revised parameter sets, where acceptance rate of rejection sampling is down to around 1%, our implementation can be as much as 47x faster than a CPU implementation.


IACR Cryptology ePrint Archive | 2015

Choosing Parameters for NTRUEncrypt.

Jeffrey Hoffstein; Jill Pipher; John M. Schanck; Joseph H. Silverman; William Whyte; Zhenfei Zhang


IACR Cryptology ePrint Archive | 2015

A quantum-safe circuit-extension handshake for Tor.

John M. Schanck; William Whyte; Zhenfei Zhang


Archive | 2016

Quantum-Safe Hybrid (QSH) Ciphersuite for Transport Layer Security (TLS) version 1.3

John M. Schanck; Zhenfei Zhang; William Whyte


IEEE Transactions on Computers | 2018

Optimizing Polynomial Convolution for NTRUEncrypt

Wei Dai; William Whyte; Zhenfei Zhang


IACR Cryptology ePrint Archive | 2018

A signature scheme from the finite field isomorphism problem.

Jeffrey Hoffstein; Joseph H. Silverman; William Whyte; Zhenfei Zhang


IACR Cryptology ePrint Archive | 2018

Optimizing polynomial convolution for NTRUEncrypt.

Wei Dai; William Whyte; Zhenfei Zhang

Collaboration


Dive into the Zhenfei Zhang's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Wei Dai

Worcester Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar

Berk Sunar

Worcester Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yarkin Doröz

Worcester Polytechnic Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge