Research

Selected Funded Projects

Thank You to NSFC, NSFC-SD, NSFC-QD, Huawei, and Bitmain for their generous support.

ongoing

  • 具有鲁棒性的自适应安全门限签名构造方法研究 (Adaptive-Secure Threshold Signatures with Robustness)
    Natural Science Foundation of China (grant No. 62472255)
  • 基于隐私增强技术的口令安全认证机制研究 (Research on Password-based Authentication)
    Natural Science Foundation of China (grant No. 62302271)
  • (Sigma安全智算与认证创新团队)自适应安全门限签名的实用化构造研究 (Adaptive-Secure Threshold Signatures)
    山东省高等学校青创科技支持计划 Youth Innovation Team of Shandong Province (grant No. 2024KJH179)
  • 基于格密码的分布式随机信标生成机制研究 (Research on Distributed Random Beacon over Lattices)
    Natural Science Foundation of Shandong Province, China (grant No. ZR2023MF045)
  • 工业互联网口令认证关键问题研究 (Research on Password-Authenticated Key Exchange for Industrial IoT)
    Natural Science Foundation of Shandong Province, China (grant No. ZR2023QF088)
  • 去中心化随机信标生成关键技术研究 (Cryptographic Techniques for Decentralized Randomness Generation)
    Natural Science Foundation of Qingdao, China (grant No. 23-2-1-152-zyyd-jch)
  • National Key Research and Development Program of China (grant No. 2022YFB2701700)
  • National Key Research and Development Program of China (grant No. 2021YFA1000600)
  • Department of Science&Technology of Shandong Province (grant No.SYS202201)
  • Quan Cheng Laboratory (grant No. QCLZD202302)

done

  • 基于格基全同态加密的密文安全计算研究 (Research on Secure Computing of Encrypted Data via Lattice-Based Fully Homomorphic Encryption) No. 61802214 National Natural Science Foundation of China, NSFC.
  • 基于格的受限伪随机函数关键问题研究 (Research on Constrained PRF over lattices) No. ZR2019BF009 National Natural Science Foundation of Shandong Province, China.
  • 基于格密码的可验证伪随机函数安全计算研究 (Research on VRF over lattices) No. 19-6-2-cg Qingdao Applied Foundational Research Program, China

Publications

Generally, the list our publications can be found on DBLP, Researchgate, Schloar, IEEE, and Web of Science.

ongoing

  • GreatSage: Securing Authentication with Anonymous Access Tokens
  • PADRE: Privacy-Aware Decentralized Randomness
  • KAME: Privacy-Preserving Proximity Test
  • MPC-Friendly Key (and Randomness) Generation for Dynamic-Committee
  • Robust Threshold ECDSA
  • Blind-Envoy: Magical Private Message Service

2023

  • Funder: Future-Proof Unbiased Decentralized Randomness
    Zengpeng Li, Mei Wang, Teik Guan Tan, Jianying Zhou. IEEE Internet of Things Journal(2023)
    BibTex
    @ARTICLE{10297306,
    author={Li, Zengpeng and Wang, Mei and Tan, Teik Guan and Zhou, Jianying},
    journal={IEEE Internet of Things Journal},
    title={Funder: Future-Proof Unbiased Decentralized Randomness},
    year={2023},
    volume={},
    number={},
    pages={1-1},
    doi={10.1109/JIOT.2023.3327733}
    }
  • QR-PUF: Design and Implementation of a RFID-Based Secure Inpatient Management System Using XOR-Arbiter-PUF and QR-Code
    Prosanta Gope, Yuening Wang, Zengpeng Li, Biplab Sikdar. IEEE Transactions on Network Science and Engineering(2023)
    BibTex
    @ARTICLE{9807448,
    author={Gope, Prosanta and Wang, Yuening and Li, Zengpeng and Sikdar, Biplab},
    journal={IEEE Transactions on Network Science and Engineering},
    title={QR-PUF: Design and Implementation of a RFID-Based Secure Inpatient Management System Using XOR-Arbiter-PUF and QR-Code},
    year={2023},
    volume={10},
    number={5},
    pages={2637-2650},
    doi={10.1109/TNSE.2022.3186478}
    }
  • Controlled Search: Building Inverted-Index PEKS with Less Leakage in Multi-User Setting
    Guiyun Qin, Pengtao Liu, Chengyu Hu, Zengpeng Li, Shanqing Guo. IEEE Internet of Things Journal(2023)
    BibTex
    @ARTICLE{10155288,
    author={Qin, Guiyun and Liu, Pengtao and Hu, Chengyu and Li, Zengpeng and Guo, Shanqing},
    journal={IEEE Internet of Things Journal},
    title={Controlled Search: Building Inverted-Index PEKS with Less Leakage in Multi-User Setting},
    year={2023},
    volume={},
    number={},
    pages={1-1},
    doi={10.1109/JIOT.2023.3287353}
    }
  • Retrieval Transformation: Dynamic Searchable Symmetric Encryption With Strong Security
    Guiyun Qin, Pengtao Liu, Chengyu Hu, Zengpeng Li, Shanqing Guo. IEEE Systems Journal(2023)
    BibTex
    @ARTICLE{10287254,
    author={Qin, Guiyun and Liu, Pengtao and Hu, Chengyu and Li, Zengpeng and Guo, Shanqing},
    journal={IEEE Systems Journal},
    title={Retrieval Transformation: Dynamic Searchable Symmetric Encryption With Strong Security},
    year={2023},
    volume={},
    number={},
    pages={1-12},
    doi={10.1109/JSYST.2023.3288052}
    }
  • 新形态伪随机函数研究
    李增鹏,王梅,陈梦佳. 信息网络安全 (2023)
    BibTex
    @article{李增鹏:11,
    author = {李增鹏, 王梅, 陈梦佳},
    title = {新形态伪随机函数研究},
    publisher = {信息网络安全},
    year = {2023},
    journal = {信息网络安全},
    volume = {23},
    number = {5},
    eid = {11},
    numpages = {10},
    pages = {11},
    keywords = {;格基密码学;全同态加密;安全多方计算;伪随机函数;密文安全计算},
    url = {http://netinfo-security.org/CN/abstract/article_7617.shtml},
    doi = {10.3969/j.issn.1671-1122.2023.05.002}
    }
  • Security Authentication Protocol for Massive Machine Type Communication in 5G Networks
    Junfeng Miao, Zhaoshun Wang, Mei Wang, Xiao Feng, Nan Xiao, Xiaoxue Sun, Chenglu Jin. Wireless Communications & Mobile Computing (2023)
    BibTex
    @article{10.1155/2023/6086686,
    author = {Miao, Junfeng and Wang, Zhaoshun and Wang, Mei and Feng, Xiao and Xiao, Nan and Sun, Xiaoxue and Jin, Chenglu},
    title = {Security Authentication Protocol for Massive Machine Type Communication in 5G Networks},
    year = {2023},
    issue_date = {2023},
    publisher = {John Wiley and Sons Ltd.},
    address = {GBR},
    volume = {2023},
    issn = {1530-8669},
    url = {https://doi.org/10.1155/2023/6086686},
    doi = {10.1155/2023/6086686},
    }

2022

  • PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices
    Mei Wang, Kun He, Jing Chen, Ruiying Du, Bingsheng Zhang, Zengpeng Li. Future Generation Computer Systems (2022)
    BibTex
    @article{WANG202228,
    title = {PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices},
    journal = {Future Generation Computer Systems},
    volume = {131},
    pages = {28-42},
    year = {2022},
    issn = {0167-739X},
    doi = {https://doi.org/10.1016/j.future.2022.01.007},
    url = {https://www.sciencedirect.com/science/article/pii/S0167739X22000152},
    author = {Mei Wang and Kun He and Jing Chen and Ruiying Du and Bingsheng Zhang and Zengpeng Li},
    keywords = {Privacy-preserving data aggregation, Trusted Execution Environment}
    }
  • Quantum-Safe Round-Optimal Password Authentication for Mobile Devices
    Zengpeng Li, Ding Wang, Eduardo Morais. IEEE Transactions on Dependable and Secure Computing (2022)
    BibTex
    @ARTICLE{9272675,
    author={Li, Zengpeng and Wang, Ding and Morais, Eduardo},
    journal={IEEE Transactions on Dependable and Secure Computing},
    title={Quantum-Safe Round-Optimal Password Authentication for Mobile Devices},
    year={2022},
    volume={19},
    number={3},
    pages={1885-1899},
    doi={10.1109/TDSC.2020.3040776}}
  • Achieving One-Round Password-Based Authenticated Key Exchange over Lattices
    Zengpeng Li, Ding Wang. IEEE Transactions on Services Computing (2022)
    BibTex
    @ARTICLE{8826379,
    author={Li, Zengpeng and Wang, Ding},
    journal={IEEE Transactions on Services Computing},
    title={Achieving One-Round Password-Based Authenticated Key Exchange over Lattices},
    year={2022},
    volume={15},
    number={1},
    pages={308-321},
    doi={10.1109/TSC.2019.2939836}}

2021

  • Biometrics-Authenticated Key Exchange for Secure Messaging
    Mei Wang, Kun He, Jing Chen, Zengpeng Li, Wei Zhao, Ruiying Du. ACM CCS (2021)
    BibTex
    @inproceedings{10.1145/3460120.3484746,
    author = {Wang, Mei and He, Kun and Chen, Jing and Li, Zengpeng and Zhao, Wei and Du, Ruiying},
    title = {Biometrics-Authenticated Key Exchange for Secure Messaging},
    year = {2021},
    isbn = {9781450384544},
    publisher = {Association for Computing Machinery},
    address = {New York, NY, USA},
    url = {https://doi.org/10.1145/3460120.3484746},
    doi = {10.1145/3460120.3484746},
    }
  • PriParkRec: Privacy-Preserving Decentralized Parking Recommendation Services
    Zengpeng Li, Mamoun Alazab, Sahil Garg, M. Shamim Hossain. IEEE Transactions on Vehicular Technology (2021)
    BibTex
    @ARTICLE{9427358,
    author={Li, Zengpeng and Alazab, Mamoun and Garg, Sahil and Hossain, M. Shamim},
    journal={IEEE Transactions on Vehicular Technology},
    title={PriParkRec: Privacy-Preserving Decentralized Parking Recommendation Service},
    year={2021},
    volume={70},
    number={5},
    pages={4037-4050},
    doi={10.1109/TVT.2021.3074820}}
  • Building Low-Interactivity Multifactor Authenticated Key Exchange for Industrial Internet of Things
    Zengpeng Li, Zheng Yang, Pawel Szalachowski, Jianying Zhou. IEEE Internet of Things Journal (2021)
    BibTex
    @ARTICLE{9139491,
    author={Li, Zengpeng and Yang, Zheng and Szalachowski, Pawel and Zhou, Jianying},
    journal={IEEE Internet of Things Journal},
    title={Building Low-Interactivity Multifactor Authenticated Key Exchange for Industrial Internet of Things},
    year={2021},
    volume={8},
    number={2},
    pages={844-859},
    doi={10.1109/JIOT.2020.3008773}}
  • Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification
    Xinrui Ge, Jia Yu, Hanlin Zhang, Chengyu Hu, Zengpeng Li, Zhan Qin, Rong Hao. IEEE Transactions on Dependable and Secure Computing (2021).
    BibTex
    @ARTICLE{8630039,
    author={Ge, Xinrui and Yu, Jia and Zhang, Hanlin and Hu, Chengyu and Li, Zengpeng and Qin, Zhan and Hao, Rong},
    journal={IEEE Transactions on Dependable and Secure Computing},
    title={Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification},
    year={2021},
    volume={18},
    number={1},
    pages={490-504},
    doi={10.1109/TDSC.2019.2896258}}
  • 基于格的口令散列方案
    李增鹏,汪定. 中国科学:信息科学,2021,51(08):1375-1390
    BibTex
    @article{李增鹏2021基于格的口令散列方案,
    title={基于格的口令散列方案},
    author={李增鹏 and 汪定},
    journal={中国科学:信息科学},
    number={051-008},
    year={2021},
    }

2020

  • Quantum-Safe Round-Optimal Password Authentication for Mobile Devices
    Zengpeng Li, Ding Wang, and Eduardo Morais. IEEE Transactions on Dependable and Secure Computing (2020).
    BibTex
    @ARTICLE{9272675,
    author={Li, Zengpeng and Wang, Ding and Morais, Eduardo},
    journal={IEEE Transactions on Dependable and Secure Computing},
    title={Quantum-Safe Round-Optimal Password Authentication for Mobile Devices},
    year={2022},
    volume={19},
    number={3},
    pages={1885-1899},
    doi={10.1109/TDSC.2020.3040776}}
  • Building Low-Interactivity Multi-Factor Authenticated Key Exchange for Industrial Internet-of-Things
    Zengpeng Li, Zheng Yang, Pawel Szalachowsk, and Jianying Zhou. IEEE Internet of Things Journal (2020).
    BibTex
    @ARTICLE{9139491,
    author={Li, Zengpeng and Yang, Zheng and Szalachowski, Pawel and Zhou, Jianying},
    journal={IEEE Internet of Things Journal},
    title={Building Low-Interactivity Multifactor Authenticated Key Exchange for Industrial Internet of Things},
    year={2021},
    volume={8},
    number={2},
    pages={844-859},
    doi={10.1109/JIOT.2020.3008773}}
  • Preserving Data Privacy via Federated Learning: Challenges and Solutions
    Zengpeng Li, Vishal Sharma, and Saraju P. Mohanty. IEEE Consumer Electronics Magazine (2020).
    BibTex
    @article{2020Preserving,
    title={Preserving Data Privacy via Federated Learning: Challenges and Solutions},
    author={ Li, Z. and Sharma, V. and Mohanty, S. P. },
    journal={IEEE Consumer Electronics Magazine},
    volume={9},
    number={3},
    pages={8-16},
    year={2020},
    }
  • Ciphertext-Policy Attribute-Based Proxy Re-Encryption via Constrained PRFs
    Zengpeng Li, Vishal Sharma, Chunguang Ma, Chunpeng Ge, and Willy Susilo. SCIENCE CHINA Information Sciences (2020).
    BibTex
    @article{SCIS:LSMGS20,
    author = {Zengpeng Li and Vishal Sharma and Chunguang Ma and Chunpeng Ge, and Willy Susilo},
    title = {Ciphertext-Policy Attribute-Based Proxy Re-Encryption via Constrained PRFs},
    journal = {SCIENCE CHINA Information Sciences},
    volume = {64},
    number = {6},
    pages = {169301:1--169301:2},
    year = {2021},
    url = {https://doi.org/10.1007/s11432-019-2856-8},
    doi = {10.1007/s11432-019-2856-8},
    }
  • Multi-Factor Password-Authenticated Key Exchange via Pythia PRF Service
    Zengpeng Li, Jiuru Wang, Chang Choi, and Wenyin Zhan. Computers, Materials & Continua (2020).
    BibTex
    @article{CMC:LWCZ19,
    AUTHOR = {Zengpeng Li and Jiuru Wang and Chang Choi and Wenyin Zhang},
    TITLE = {Multi-Factor Password-Authenticated Key Exchange via Pythia PRF Service},
    JOURNAL = {Computers, Materials \& Continua},
    VOLUME = {63},
    YEAR = {2020},
    NUMBER = {2},
    PAGES = {663--674},
    URL = {http://www.techscience.com/cmc/v63n2/38536},
    DOI = {10.32604/cmc.2020.06565}
    }
  • SecDedup: Secure Encrypted Data Deduplication With Dynamic Ownership Updating
    Shuguang Zhang, Hequn Xian, Zengpeng Li, Liming Wang. IEEE Access (2020).
    BibTex
    @ARTICLE{9194768,
    author={Zhang, Shuguang and Xian, Hequn and Li, Zengpeng and Wang, Liming},
    journal={IEEE Access},
    title={SecDedup: Secure Encrypted Data Deduplication With Dynamic Ownership Updating},
    year={2020},
    volume={8},
    number={},
    pages={186323-186334},
    doi={10.1109/ACCESS.2020.3023387}}
  • 一种基于对偶Regev加密的门限公钥加密方案
    李增鹏,王九如,张问银. 北京邮电大学学报,2020,43(04):83-87.DOI:10.13190/j.jbupt.2019-239.
    BibTex
    @article{ 马春光:83,
    author = {[ 马春光, 王九如, 张问银, 李增鹏]},
    title = {一种基于对偶Regev加密的门限公钥加密方案},
    publisher = {北京邮电大学学报},
    year = {2020},
    journal = {北京邮电大学学报},
    volume = {43},
    number = {4},
    eid = {83},
    pages = {83-87},
    keywords = {格基密码学;门限密码;容错学习;安全协议},
    doi = https://journal.bupt.edu.cn/CN/10.13190/j.jbupt.2019-239
    }

2019

  • Achieving One-Round Password-based Authenticated Key Exchange over Lattices
    Zengpeng Li and Ding Wang. IEEE Transactions on Services Computing 2019.
    BibTex
    @ARTICLE{8826379,
    author={Li, Zengpeng and Wang, Ding},
    journal={IEEE Transactions on Services Computing},
    title={Achieving One-Round Password-Based Authenticated Key Exchange over Lattices},
    year={2022},
    volume={15},
    number={1},
    pages={308-321},
    doi={10.1109/TSC.2019.2939836}}
  • Revisiting post-quantum hash proof systems over lattices for Internet of Thing authentications
    Zengpeng Li, Jiuru Wang, and Wenyin Zhang. Journal of Ambient Intelligence and Humanized Computing (2019).
    BibTex
    @article{JCIE:LMZC19,
    author = {Zengpeng Li and Chunguang Ma and Minghao Zhao and Chang Choi},
    title = {Revisiting post-quantum hash proof systems over lattices for Internet of Thing authentications},
    journal = {J Ambient Intell Human Comput},
    year = {2019},
    doi = {10.1007/s12652-019-01529-2},
    URL = {https://doi.org/10.1007/s12652-019-01529-2},
    }
  • Efficient oblivious transfer construction via multiple bits dual-mode cryptosystem for secure selection in the cloud
    Zengpeng Li, Chunguang Ma, Minghao Zhao, and Chang Choi. Journal of the Chinese Institute of Engineers (2019).
    BibTex
    @article{JCIE:LMZC19,
    author = {Zengpeng Li and Chunguang Ma and Minghao Zhao and Chang Choi},
    title = {Efficient oblivious transfer construction via multiple bits dual-mode cryptosystem for secure selection in the cloud},
    journal = {Journal of the Chinese Institute of Engineers},
    volume = {42},
    number = {1},
    pages = {97-106},
    year = {2019},
    publisher = {Taylor \& Francis},
    doi = {10.1080/02533839.2018.1537809},
    URL = {https://doi.org/10.1080/02533839.2018.1537809},
    eprint = {https://doi.org/10.1080/02533839.2018.1537809},
    }
  • 抵抗自适应密钥恢复攻击的层级全同态加密
    李增鹏,马春光,赵明昊. 计算机研究与发展,2019,56(03):496-507.
    BibTex
    @article{李增鹏2019抵抗自适应密钥恢复攻击的层级全同态加密,
    title={抵抗自适应密钥恢复攻击的层级全同态加密},
    author={李增鹏 and 马春光 and 赵明昊},
    journal={计算机研究与发展},
    volume={56},
    number={3},
    pages={12},
    year={2019},
    }

2018

  • Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography
    Zengpeng Li, Can Xiang, and Chenyu Wang. Wireless Communications and Mobile Computing 2018: 5973285:1-5973285:11 (2018).
    BibTex
    @article{WCMC:LiXiaWan18,
    author = {Zengpeng Li, Can Xiang, and Chenyu Wang},
    title = {Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography},
    journal = {Wireless Communications and Mobile Computin},
    volume = {2018},
    pages = {5973285:1--5973285:11},
    year = {2018},
    url = {https://doi.org/10.1155/2018/5973285},
    doi = {10.1155/2018/5973285},
    }
  • Multi-Key FHE on Multi-Bit Messages
    Zengpeng Li, Chunguang Ma and Hong-Sheng Zhou. SCIENCE CHINA Information Sciences 2018.
    BibTex
    @article{2018Multi,
    title={Multi-Key FHE on Multi-Bit Messages},
    author={ Zengpeng, L. I. and Chunguang, M. A. and Zhou, Hongsheng },
    journal={中国科学:信息科学(英文版)},
    volume={61},
    number={2},
    pages={3},
    year={2018},
    }
  • Two-Round PAKE Protocol over Lattices Without NIZK
    Zengpeng Li and Ding Wang. Inscrypt 2018 (Best Paper Award (2/81)).
    BibTex
    @inproceedings{INscrypt:LiWan18,
    author = {Zengpeng Li and Ding Wang},
    title = {Two-Round {PAKE} Protocol over Lattices Without {NIZK}},
    booktitle = {Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers},
    series = {Lecture Notes in Computer Science},
    volume = {11449},
    pages = {138--159},
    publisher = {Springer},
    year = {2018},
    }

2017

  • Achieving Multi-Hop PRE via Branching Program
    Zengpeng Li, Chunguang Ma and Ding Wang. IEEE Transactions on Cloud Computing, 2017.
    BibTex
    @article{TCC:LiMaWan17,
    author = {Zengpeng Li and Chunguang Ma and Ding Wang},
    title = {Achieving Multi-Hop PRE via Branching Program},
    journal = {IEEE Transactions on Cloud Computing},
    year = {2017},
    url = {https://doi.org/10.1109/TCC.2017.2764082},
    doi = {10.1109/TCC.2017.2764082},
    }
  • Leakage Resilient Leveled FHE on Multiple Bit Message
    Zengpeng Li, Chunguang Ma and Ding Wang. IEEE Transactions on Big Data, 2017.
    BibTex
    @article{TBD:LiMaWan17,
    author = {Zengpeng Li and Chunguang Ma and Ding Wang},
    title = {Leakage Resilient Leveled FHE on Multiple Bit Message},
    journal = {IEEE Transactions on Big Data},
    year = {2017},
    url = {https://doi.org/10.1109/TBDATA.2017.2726554},
    doi = {10.1109/TBDATA.2017.2726554},
    }
  • Towards Multi-Hop Homomorphic Identity-Based Proxy Re-Encryption via Branching Program
    Zengpeng Li, Chunguang Ma and Ding Wang. IEEE Access 2017.
    BibTex
    @article{2017Towards,
    title={Towards Multi-Hop Homomorphic Identity-Based Proxy Re-Encryption via Branching Program},
    author={ Li, Z. and Ma, C. and Ding, W. },
    journal={IEEE Access},
    volume={5},
    number={99},
    pages={16214-16228},
    year={2017},
    }
  • Toward single-server private information retrieval protocol via learning with errors
    Zengpeng Li, Chunguang Ma, Ding Wang, and Gang Du. Journal of Information Security and Applications. 34: 280-284 (2017).
    BibTex
    @article{JISA:LMWD17,
    author = {Zengpeng Li and Chunguang Ma and Ding Wang and Gang Du},
    title = {Toward single-server private information retrieval protocol via learning with errors},
    journal = {J. Inf. Secur. Appl.},
    volume = {34},
    pages = {280--284},
    year = {2017},
    url = {https://doi.org/10.1016/j.jisa.2016.11.003},
    doi = {10.1016/j.jisa.2016.11.003},
    }
  • Toward Proxy Re-encryption From Learning with Errors in the Exponent
    Zengpeng Li, Chunguang Ma, Ding Wang, Minghao Zhao, Qian Zhao and Lu Zhou. Trustcom 2017.
    BibTex
    @inproceedings{2017Toward,
    title={Toward Proxy Re-encryption From Learning with Errors in the Exponent},
    author={ Li, Z. and Ma, C. and Ding, W. and Zhao, M. and Lu, Z. },
    booktitle={2017 IEEE Trustcom/BigDataSE/ICESS},
    year={2017},
    }
  • 全同态加密研究
    李增鹏,马春光,周红生. 密码学报,2017,4(06):561-578.DOI:10.13868/j.cnki.jcr.000208.
    BibTex
    @article{李增鹏2017全同态加密研究,
    title={全同态加密研究},
    author={李增鹏 and 马春光 and 周红生},
    journal={密码学报},
    number={6},
    pages={18},
    year={2017},
    }
  • 两类基于容错学习的多比特格公钥加密方案
    李增鹏,马春光,张磊. 信息网络安全,2017,No.202(10):1-7.
    BibTex
    @article{李增鹏:1,
    author = {李增鹏, 马春光, 张磊, 张雯雯},
    title = {两类基于容错学习的多比特格公钥加密方案},
    publisher = {信息网络安全},
    year = {2017},
    journal = {信息网络安全},
    volume = {17},
    number = {10},
    eid = {1},
    numpages = {6},
    pages = {1},
    keywords = {格基密码;容错学习;多比特加密;全同态加密},
    url = {http://netinfo-security.org/CN/abstract/article_6453.shtml},
    doi = {10.3969/j.issn.1671-1122.2017.10.001}
    }

2016

  • Multi-bit Leveled Homomorphic Encryption via Dual.LWE-Based
    Zengpeng Li, Chunguang Ma, Eduardo Morais and Gang Du. In Inscrypt 2016.
    BibTex
    @inproceedings{Inscrypt:LMMD16,
    author = {Zengpeng Li and Chunguang Ma and Eduardo Morais and Gang Du},
    title = {Multi-bit Leveled Homomorphic Encryption via Dual.LWE -Based},
    booktitle = {Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers},
    series = {Lecture Notes in Computer Science},
    volume = {10143},
    pages = {221--242},
    publisher = {Springer},
    year = {2016},
    }
  • Dual LWE-Based Fully Homomorphic Encryption with Errorless Key Switching
    Zengpeng Li, Chunguang Ma, Gang Du, Weiping Ouyang. ICPADS 2016.
    BibTex
    @inproceedings{2016Dual,
    title={Dual LWE-Based Fully Homomorphic Encryption with Errorless Key Switching},
    author={ Li, Z. and Ma, C. and Gang, D. and Ouyang, W. },
    booktitle={IEEE International Conference on Parallel & Distributed Systems},
    year={2016},
    }
  • Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme
    Zengpeng Li, Steven D. Galbraith, and Chunguang Ma. Provsec 2016.
    BibTex
    @inproceedings{Provsec:LiGalMa16,
    author = {Zengpeng Li and Steven D. Galbraith and Chunguang Ma},
    title = {Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme},
    booktitle = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings},
    series = {Lecture Notes in Computer Science},
    volume = {10005},
    pages = {373--383},
    year = {2016},
    url = {https://doi.org/10.1007/978-3-319-47422-9\_22},
    doi = {10.1007/978-3-319-47422-9\_22},
    }

Patent

  • 李增鹏, 崔浩宇, 王梅, 王书超, 王思旸, 丁江. 基于GPU快速响应的隐私信息检索方法及系统. 申请号:ZL 2024 1 1186276.3
  • 王梅, 葛菲, 刘芮洁, 李路岩, 王浩, 李增鹏. 一种具有盲验证功能的辅助异构远程认证方法及系统. 申请号:ZL 2024 1 1417819.8
  • 李增鹏, 陈梦佳, 王梅, 丁江, 张国艳, 王伟嘉. 基于匿名凭证的身份认证方法、设备及介质. 申请号:ZL 2023 1 1073298.4
  • 李增鹏, 吕英杰, 李蔚, 王梅, 陈少伟. 基于非交互分布式密钥的门限ECDSA签名方法及系统. 申请号:ZL 2023 1 1303452.2
  • 李增鹏, 朱豪, 王梅, 王书超, 王伟嘉, 王瑞锦. 基于密码采样的概率权益证明方法及系统. 申请号: ZL 2023 1 1553217.0
  • 李增鹏, 朱豪, 王书超, 王梅, 杨铮. 基于可验证随机和延迟函数的匿名网络构建方法及系统. 申请号:ZL 2023 1 1313377.8
  • 李增鹏, 韦肖扬, 王思旸, 王梅. 一种基于BFV全同态加密算法的近邻检测方法及系统. 申请号:ZL 2023 1 1161324.9
  • 李增鹏, 赵子硕, 王书超, 王梅, 魏普文. 一种轻量级隐私安全的分布式随机信标生成方法及系统. 申请号:ZL 2023 1 1533417X
  • 李增鹏, 王书超, 马增妍, 王梅, 崔浩宇. 一种基于GPU的同态密文人脸隐匿查询方法及系统. 申请号: ZL 2024 1 0680715X
  • 王梅, 杨潇然, 李增鹏, 王世晞, 顾益宇, 杨铮. 一种抗预计算攻击的低交互设备互联通信方法及系统. 申请号: ZL 2024 1 05148333
  • 李增鹏, 丁江, 王梅. 一种后量子安全的VOPRF协议、匿名令牌认证方法及系统. 申请号: ZL 2024 1 03071695
  • 李增鹏, 李蔚, 吕英杰, 王梅, 廖光宇, 耿春秋, 陈少伟. 基于伪随机数生成器的门限ECDSA签名方法及系统. 申请号: ZL 2024 1 00392567
  • 李增鹏, 耿春秋, 廖光宇, 王梅, 陈少伟, 顾益宇. 基于格的分布式可验证随机函数构造方法及系统. 申请号: ZL 2024 1 01930054
  • 王梅, 王思旸, 冯相迪, 李增鹏. 基于面部识别的认证密钥安全通信方法及系统. 申请号: ZL 2024 1 00159011
  • 王梅, 李文文, 李增鹏, 杨潇然, 李宣仪, 苟桂甲. 基于CL同态加密的指定验证者零知识证明方法. 专利号:CN 2025 1 0014068.3 授权公告号:CN 119420487A. 授权公告日:2025-02-11.
  • 李增鹏, 匡金明, 王梅, 程向军, 霍朝宾, 王瑞锦. 用于联邦学习的可验证主动安全聚合方法及系统. 专利号:CN 2025 1 0031099.X 授权公告号:CN 119416266A. 授权公告日:2025-02-11.
  • 杨铮, 金程路, 宁建廷, 李增鹏, 刘波, 尹超. 一种组时间基一次性密码方法及设备. 专利号:CN 2021 1 1186553.7 授权公告号:CN 113839774B. 授权公告日:2022-07-01.
  • 陈晶, 王梅, 何琨, 杜瑞颖. 一种面向安全通信的生物认证密钥协商方法及系统. 专利号:CN2021 1 1241229.0 授权公告号:CN 114003884A. 授权公告日:2022-02-01
  • 陈晶, 王梅, 何琨, 杜瑞颖, 郑明辉, 徐丽华, 董喆. 一种轻量级非交互隐私保护数据聚合方法. 专利号:CN 2021 1 0353614.8 授权公告号:CN 112733179B. 授权公告日:2021-06-25.
  • 李增鹏,王斌,张磊. 一种数据安全储存器. 专利号: ZL 2019 2 0760908.0. 授权公告号: CN 209842676 U. 授权公告日:2019-12-24.
  • 李增鹏,王斌,张磊. 一种数据安全保护防窃取设备. 专利号: ZL 2019 2 0587509.9. 授权公告号: CN 209674373 U. 授权公告日:2019-11-22.
  • 李增鹏,王斌,张磊. 一种数据安全监测装置. 专利号: ZL 2019 2 0438941.1. 授权公告号: CN 209526800 U. 授权公告日:2019-10-22.
  • 基于GPU快速实现的同态密文人脸隐匿查询系统V1.0. 登记号: 2024SR0993451. 证书号: 软著登字第13397324号.
  • 面向位置保护的隐私距离计算与近邻检测软件[ABY-PPLP]V1.0. 登记号:2023SR1523592. 证书号:软著登字第12110765号.
  • 敏感数据泄密检查与取证系统[SIGMA-DBS]V1.0. 登记号:2024SR0993761. 证书号:软著登字第13397634号.
  • 密码信息服务管理系统V1.0. 登记号: 2019SR0476964. 证书号: 软著登字第3897721号.
  • 密码安全智能存储系统V1.0. 登记号: 2019SR0483198. 证书号: 软著登字第3903955号.

Competition

全国信息安全竞赛

  • 基于伪随机数生成器的轻量级门限签名方案, 2024, 三等奖,朗泓森、徐家兴、张海洋、迟曼
  • Zapper:简洁低交互的物联网设备互联认证协议,2024,优胜奖,赵嵘晖、王佳乐、陈子豪
  • LocAnon: 隐私感知近邻检索与距离计算平台,2023,三等奖 韦肖扬、李博睿、仇召昱、李卓群
  • 公平使者:面向未来基于同态加密的无偏置去中心化随机信标,2023,优胜奖 杨尚华、周世焜、李恒远、刘畅 (https://119.45.125.251/)

全国密码科普竞赛

  • 哈希函数:密码学的守护者,2024,二等奖,耿春秋、陈梦佳、匡金明
  • 三分钟带你走进零知识证明,2024,三等奖,李蔚、李宣仪、周婷婷
  • 全同态加密科普介绍,2023,二等奖,赵子硕、吕英杰、李蔚
  • 隐私信息检索技术科普,2023,三等奖,丁江、朱豪、陈梦佳
  • 差分隐私,2021,三等奖,邓旭东,魏令涛,高菲

全国密码技术竞赛

  • 基于可验证随机函数的鲁棒分布式随机信标,2023,二等奖 赵子硕、王书超、李宣仪
  • 基于去中心化的匿名网络设计与实现,2023,三等奖 朱豪 杨潇然 葛菲
  • 隐私保护近邻检测,2022,三等奖 韦肖扬、倪晓晗、倪佳蔚 (https://PPLP-ABY.github.io)
  • ECDSA签名私钥恢复,2021,三等奖 高菲,李金凤,邓旭东