Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zheng Gong is active.

Publication


Featured researches published by Zheng Gong.


information security practice and experience | 2011

On the security of 4-bit involutive S-boxes for lightweight designs

Bozhong Liu; Zheng Gong; Weidong Qiu; Dong Zheng

In this work we investigate all the 4-bit involutive S-boxes with linear, differential and almost resilient analysis. The results show that involutive S-boxes can be optimal against linear attack. We prove that for a 4-bit involutive S-box there always exists a pair of input and output differences such that the Hamming distance is 1, which does not satisfy the strict resistance on differential analysis. Moreover, we find that the almost resilient property is not effective to judge the security of 4-bit involutive S-boxes in practise. How to use the almost resilient property to set up a criterion for an optimal secure S-box needs investigations.


Journal of Information Science and Engineering | 2010

Transitive Signature Scheme from LFSR

Zheng Gong; Zheng Huang; Weidong Qiu; Kefei Chen

Linear feedback sequence register (LFSR) is a useful cryptographic primitive which is widely implemented in many cryptosystems to represent finite field elements with the counterparts of minimal polynomials. In this paper, an efficient transitive signature scheme from LFSR (LFSR-TS) is considered. First, two derived LFSR sequence operations are designed for LFSR-TS, which are not proposed prior to the current work. Next, the security of LFSR-TS is proven to be existentially unforgeable against the adaptive chosen-message attack in the standard model, which only requires the assumption of the discrete logarithm problem (DLP). Finally, the comparison of performances is presented amongst LFSR-TS and some related schemes.


software engineering, artificial intelligence, networking and parallel/distributed computing | 2007

Efficient Partially Blind Signature from LFSR

Zheng Gong; Yu Long; Kefei Chen

An image segmentation method based on the OTSU and improved genetic algorithm (GA) is presented. The OTSU is taken as evaluation function and the segmentation problem is turned to the optimization problem. That is, GA efficiently searches the segmentation parameter space in order to obtain the optimal threshold. On the other hand, to overcome some limitation of GA, elite reinsertion is applied. The experimental results indicate that the method can not only obtain a better result, but also shorten the processing time.In this paper, we provide a new partially blind signature scheme which is based on n-th order characteristic sequences generated by LFSR, and then prove its security in the random oracle model (ROM). Compares with the finite field based schemes, our scheme shows advantages on the computation and storage since the reduced representation of finite field elements by LFSR. It will make those applications more efficient in hardware-limited environments, such as cellular networks, tactical networks and sensor nets.


Science in China Series F: Information Sciences | 2016

Biclique cryptanalysis using balanced complete bipartite subgraphs

Zheng Gong; Shusheng Liu; Yamin Wen; Yiyuan Luo; Weidong Qiu

1School of Computer Science, South China Normal University, Guangzhou 510631, China; 2State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; 3School of Mathematics and Statistics, Guangdong University of Finance and Economics, Guangzhou 510320, China; 4School of Electronics and Information, Shanghai Dian Ji University, Shanghai 200240, China; 5School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai 200240, China


Knowledge and Information Systems | 2011

Restrictive partially blind signature for resource-constrained information systems

Weidong Qiu; Zheng Gong; Bozhong Liu; Yu Long; Kefei Chen

Restrictive partially blind signature, which is designed for privacy-oriented information systems, allows a user to obtain a blind signature from a signer while the blind message must obey some certain rules. In order to reduce storage and communication costs, several public-key cryptosystems are constructed using characteristic sequences generated by linear feedback shift register (LFSR). In this paper, we present a new partially blind signature scheme with the restrictive property, which is based on nth order characteristic sequences generated by LFSR. By assuming the intractability of the discrete logarithm problem, our sequence-based schemes are provably secure in the random oracle model. We also present a practical e-cash application based on our restrictive partially blind signature. Due to the reduced representation of finite field elements and feasible sequence operations from LFSR, our scheme is time- and storage-efficient on both of signer and user sides. The advantages will make privacy-oriented applications more practical for resource-constrained devices.


Journal of Central South University | 2013

Key-insulated encryption based group key management for wireless sensor network

Weidong Qiu; Yaowei Zhou; Bo Zhu; Yanfei Zheng; Zheng Gong


Journal of Information Science and Engineering | 2016

GPU-Based High Performance Password Recovery Technique for Hash Functions.

Weidong Qiu; Zheng Gong; Yidong Guo; Bozhong Liu; Xiaoming Tang; Yuheng Yuan


International Journal of Network Security | 2009

Provably Secure Identity-based Threshold Key Escrow from Pairing

Yu Long; Zheng Gong; Kefei Chen; Shengli Liu


information security | 2014

Acceleration of AES Encryption with OpenCL

Yuheng Yuan; Zhenzhong He; Zheng Gong; Weidong Qiu


Chinese Journal of Electronics | 2017

Automatic Search of Threshold Implementations of 4-Bit S-Boxes Resisting DPA

Bozhong Liu; Zheng Gong; Weidong Qiu

Collaboration


Dive into the Zheng Gong's collaboration.

Top Co-Authors

Avatar

Weidong Qiu

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Bozhong Liu

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Kefei Chen

Hangzhou Normal University

View shared research outputs
Top Co-Authors

Avatar

Yu Long

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Dong Zheng

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Yuheng Yuan

South China Normal University

View shared research outputs
Top Co-Authors

Avatar

Bo Zhu

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Shengli Liu

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Shusheng Liu

South China Normal University

View shared research outputs
Top Co-Authors

Avatar

Xiaoming Tang

Shanghai Jiao Tong University

View shared research outputs
Researchain Logo
Decentralizing Knowledge