Zhenfei Zhang
2023
Origami: Fold a Plonk for Ethereum’s VDF
HyperPlonk: Plonk with Linear-Time Prover and High-Degree Custom Gates
Binyi Chen, Benedikt Bünz, Dan Boneh and Zhenfei Zhang
Eurocrypt 2023. IACR eprint , github .
VERI-ZEXE: Decentralized Private Computation with Universal Setup
Alex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell and Philippe Camacho
USENIX security 2023. IACR eprint . Github .
2022
An SVP attack on Vortex
Squirrel: Efficient Synchronized Multi-Signatures from Lattices.
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain
Maxime Buser and Rafael Dowsley and Muhammed F. Esgin and Shabnam Kasra Kermanshahi and Veronika Kuchta and Joseph K. Liu and Raphael Phan and Zhenfei Zhang
ESORICS 2022. IACR eprint .
2021
Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field
Manta: a Plug and Play Private DeFi Stack
Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand
Muhammed F. Esgin and Veronika Kuchta and Amin Sakzad and Ron Steinfeld and Zhenfei Zhang and Shifeng Sun and Shumo Chu
Financial Cryptography 2021. IACR eprint . Source code .
TensorCrypto: High Throughput Acceleration of Lattice-based Cryptography Using Tensor Core on GPU
Hybrid Dual Attack on LWE with Arbitrary Secrets
ZEN: Efficient Zero-Knowledge Proofs for Neural Networks
2020
Manta: Privacy Preserving Decentralized Exchange
Pointproofs: Aggregating Proofs for Multiple Vector Commitments
MPSign: A Signature from Small-Secret Middle-Product Learning with Errors
Shi Bai, Dipayan Das, Ryo Hiromasa, Miruna Rosca, Amin Sakzad, Damien Stehle, Ron Steinfeld, Zhenfei Zhang
PKC 2020. IACR eprint . Source code
Modular Lattice Signatures, revisited
Dipayan Das, Jeffrey Hoffstein, Jill Pipher, William Whyte, Zhenfei Zhang
Design, Codes and Cryptography. IACR eprint . Source code .
1st round , NIST post-quantum cryptography standardization process.
BLS Signatures
2019
Middle-Product Learning with Rounding Problem and its Applications
Shi Bai, Katharina Boudgoust, Dipayan Das, Adeline Roux-Langlois, Weiqiang Wen, Zhenfei Zhang
Asiacrypt 2019. IACR eprint .
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications
Rupeng Yang, Man Ho Au, Zhenfei Zhang, Qiuliang Xu, Zuoxia Yu, William Whyte
Crypto 2019. IACR eprint .
(Linkable) Ring Signature from Hash-Then-One-Way Signature
Xingye Lu, Man Ho Au, Zhenfei Zhang
TrustCom 2019. IACR eprint .
Ring Signatures based on Middle-Product Learning with Errors Problems
Dipayan Das, Man Ho Au, Zhenfei Zhang
Africacrypt 2019.
Raptor: A Practical Lattice-Based (Linkable) Ring Signature
Round5: Compact and Fast Post-Quantum Public-Key Encryption
Hayo Baan, Sauvik Bhattacharya, Scott Fluhrer, Oscar Garcia-Morchon, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang
PQCrypto 2019. IACR eprint . Website .
2nd round , NIST post-quantum cryptography standardization process.
Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS’15
Zhen Liu, Yanbin Pan, Zhenfei Zhang
PQCrypto 2019. IACR eprint .
2018
LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus
Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M
Markku-Juhani O. Saarinen, Sauvik Bhattacharya, Oscar Garcia-Morchon, Ronald Rietman, Ludo Tolhuizen, Zhenfei Zhang
Cardis 2018. IACR eprint .
On the Hardness of the Computational Ring-LWR Problem and its Applications
Long Chen, Zhenfeng Zhang, Zhenfei Zhang
Asiacrypt 2018. IACR eprint .
A signature scheme from the finite field isomorphism problem.
Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed Construction.
Xingye Lu, Zhenfei Zhang, Man Ho Au
ACISP 2018. Manuscript .
Optimizing polynomial convolution for NTRUEncrypt.
Fully Homomorphic Encryption from the Finite Field Isomorphism Problem.
Yarkin Doröz, Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman, Berk Sunar, William Whyte, Zhenfei Zhang:
PKC 2018. IACR eprint .
2017 and earlier
Choosing parameters for NTRUEncrypt
Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang
CT-RSA 2017. IACR eprint .
Round2: KEM and PKE based on GLWR.
Hayo Baan, Sauvik Bhattacharya, Óscar García-Morchón, Ronald Rietman, Ludo Tolhuizen, Jose Luis Torre-Arce, Zhenfei Zhang
NIST PQC submission. IACR eprint .
A signature scheme from Learning with Truncation.
Jeffrey Hoffstein, Jill Pipher, William Whyte, Zhenfei Zhang
Pre-print. IACR eprint .
Anonymous Announcement System (AAS) for Electric Vehicle in VANETs.
Man Ho Au, Joseph K. Liu, Zhenfei Zhang, Willy Susilo, Jin Li
The Computer Journal. Manuscript .
Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world.
NTRU modular lattice signature scheme on CUDA GPUs.
Wei Dai, Berk Sunar, John M. Schanck, William Whyte, Zhenfei Zhang
HPCS 2016. IACR eprint .
LLL for ideal lattices: re-evaluation of the security of Gentry-Halevi’s FHE scheme.
Thomas Plantard, Willy Susilo, Zhenfei Zhang
Design, Codes and Cryptography. Manuscript .
DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation.
Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang
Pre-print. IACR eprint .
Fully Homomorphic Encryption Using Hidden Ideal Lattice.
Thomas Plantard, Willy Susilo, Zhenfei Zhang
IEEE Transation on Information Forensics and Security. Manuscript .
Adaptive Precision Floating Point LLL.
Thomas Plantard, Willy Susilo, Zhenfei Zhang
ACISP 2013. Manuscript .
On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers.
Zhenfei Zhang, Thomas Plantard, Willy Susilo
ISPEC 2012. Manuscript .
Lattice Reduction for Modular Knapsack.
Thomas Plantard, Willy Susilo, Zhenfei Zhang
SAC 2012. Manuscript .
Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes.
Zhenfei Zhang, Thomas Plantard, Willy Susilo
ICISC 2011. Manuscript .