头像

Peng Zeng

      

About

  • Department: Software Engineering Institute
  • Graduate School:
  • Degree:
  • Academic Credentials:
  • PostCode:
  • Tel: 021-62231530
  • Fax: +86-21-62232584
  • Email: pzeng@sei.ecnu.edu.cn
  • Office: Room B1213, Science building
  • Address: School of Computer Science and Software Engineering, East China Normal University, 3663 Zhongshan Road (North), Shanghai, P. R. China

Education

WorkExperience

Resume

Other Appointments

Research Fields

Security and privacy protection in big data, blockchain, cloud computing security, anti-quantum attack cryptography, etc

Enrollment and Training

Course

Scientific Research

Academic Achievements

n  Tongtong Sang, Peng Zeng*, and Kim-Kwang Raymond Choo, Provable multiple copy integrity auditing scheme for cloud-based IoT, IEEE Systems Journal, Mar. 1, 2023, 17(1): 224-233. (SCI, EI)

n  Jiayan Shen, Peng Zeng*, Kim-Kwang Raymond Choo, and Chengju Li, A certificateless provable datapossession scheme for cloud-based EHRs, IEEE Transactions on Information Forensics & Security, Jan. 20, 2023, 18: 1156-1168. (CCF A)

n  Xiangqi Kong, Peng Zeng*, and Chengju Li, PPFP: An efficient privacy-preserving fair payment protocol for V2G based on blockchain, in: Proceedings of the 2022 IEEE the 8th International Conference on Computer and Communications (ICCC 2022), 1308-1313. (EI)

n  Huajie Cheng, Peng Zeng*, and Chengju Li, LBFP: A lightweight bitcoin-based fair payment for outsourced computation, in: Proceedings of the 2022 IEEE the 8th International Conference on Computer and Communications (ICCC 2022), 1344-1349. (EI)

n  Yinzhao Lei, Chengju Li*, Yansheng Wu, Peng Zeng, More results on hulls of some primitive binary and ternary BCH codes, Finite Fields and Their Applications, September 2022, 82(2022)102066: 1-29. (SCI)

n  Siyuan Chen, Peng Zeng*, and Kim-Kwang Raymond Choo, A new code-based blind signature scheme, The Computer Journal, July 15, 2022, 65(7): 1776–1786. (SCI, EI, CCF B)

n  Jiayan Shen, Peng Zeng*, and Kim-Kwang Raymond Choo, Multicopy and multiserver provable data possession for cloud-based IoT, IEEE Internet of Things Journal, July 15, 2022, 9(14): 12300-12310. (SCI, EI)

n  Peng Zeng, Zhiting Zhang*, Rongxing Lu, and Kim-Kwang Raymond Choo*, Efficient policy-hiding and large universe attribute-based encryption with public traceability for internet of medical things, IEEE Internet of Things Journal, July 1, 2021, 8(13): 10963-10972. (SCI, EI)

n  Zhiting Zhang, Peng Zeng*, Bofeng Pan, and Kim-Kwang Raymond Choo, Large-universe attribute-based encryption with public traceability for cloud storage, IEEE Internet of Things Journal, Oct. 9, 2020, 7(10): 10314-10323. (SCI, EI)

n  Yue Huang, Peng Zeng*, and Kim-Kwang Raymond Choo, An efficient privacy-preserving protocol for computing k-th minimum value in P2P networks, Journal of Circuits, Systems, and Computers, July 2020, 29(9) 2050138: 1-20. (SCI, EI)

n  Peng Zeng, Bofeng Pan*, Kim-Kwang Raymond Choo, and Hong Liu*, MMDA: multidimensional and multidirectional data aggregation for edge computing-enhanced IoT, Journal of Systems Architecture, June 2020, 106 (2020) 101713: 1-9. (SCI, EI, CCF B)

n  Jing Zhao and Peng Zeng*, Efficient and large universe ciphertext-policy attribute-based encryption with black-box traceability for ehealth, in: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), Haikou, China, Feb. 28-29, 2020, AISC 1147: 480–485, Mar. 2020. (EI)

n  Yuzhuang Zhou, Peng Zeng*, and Siyuan Chen, An improved code-based encryption scheme with a new construction of public key, in: Proceedings of the 2019 International Conference on Applications and Techniques in Cyber Intelligence (ATCI 2019), Anhui, China, June 21-23, 2019, AISC 1017: 959–968, Jan. 2020. (EI)

n  Peng Zeng, Siyuan Chen*, and Kim-Kwang Raymond Choo, An IND-CCA2 secure post-quantum encryption scheme and a secure cloud storage use case, Human-centric Computing and Information Sciences, Dec. 2019, 9(1): 1-15. (SCI)

n  Chengju Li and Peng Zeng*, Constructions of linear codes with one-dimensional hull, IEEE Transactions on Information Theory, March 2019, 65(3): 1668-1676. (SCI, EI, CCF A)

n  Zuming Shen and Peng Zeng*, An RFID path authentication protocol based on Chebyshev polynomials, in: Proceedings of the 2018 International Conference on Applications and Techniques in Cyber Security and Intelligence (ATCI 2018), Shanghai, China, July 11-13, 2018, AISC 842: 17-27, Jan. 2019. (EI)

n  Yuyin Qian and Peng Zeng*, An efficient authentication protocol for RFID-based supply chains, in: Proceedings of the 2018 International Conference on Applications and Techniques in Cyber Security and Intelligence (ATCI 2018), Shanghai, China, July 11-13, 2018, AISC 842: 28-37, Jan. 2019. (EI)

n  Yuyin Qian, Peng Zeng*, Zuming Shen, and Kim-Kwang Raymond Choo, A lightweight path authentication protocol for RFID-based supply chainsin: Proceedings of the 2018 17th IEEE International Conference on Trust, Security And Privacy in Computing And Communications (TrustCom 2018), New York, USA, Aug. 1-3, 2018: 1297-1302, Sep. 6, 2018. (EI, CCF C)

n  Shanshan Ge, Peng Zeng*, Rongxing Lu, and Kim-Kwang Raymond Choo, FGDA: Fine-grained data analysis in privacy-preserving smart grid communicationsPeer-to-Peer Networking and Applications, Sep. 1, 2018, 11(5): 966-978. (SCI, EI, CCF C)

n  Siyuan Chen, Peng Zeng*, Kim-Kwang Raymond Choo, and Xiaolei Dong, Efficient ring signature and group signature schemes based on q-ary identification protocolsThe Computer Journal, April 1, 2018, 61(4): 545–560. (SCI, EI, CCF B)

n  Shanshan Ge, Peng Zeng*, and Kim-Kwang Raymond Choo, An enhanced anonymous identification scheme for smart grids, in: Proceedings of the 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence (ATCI 2017), Ningbo, China, June 16-18, 2017, AISC 580: 329-337, Oct. 21, 2017. (EI)

n  Guomin Zhou, Peng Zeng*, Xiaohui Yuan*, Siyuan Chen, and Kim-Kwang Raymond Choo, An efficient code-based threshold ring signature scheme with a leader-participate model, Security and Communication Networks, August 2017, Volume 2017 (2017), Article ID 1915239, 7 pages. (SCI, EI, CCF C)

n  Bofeng Pan, Peng Zeng*, and Kim-Kwang Raymond Choo, An efficient data aggregation scheme in privacy-preserving smart grid communications with a high practicability, in: Proceedings of the 11th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS 2017), Torino, Italy, June 28-30, 2017, AISC 611: 677-688, July 6, 2017. (EI)

n  Siyuan Chen, Peng Zeng*, and Kim-Kwang Raymond Choo, A provably secure blind signature based on coding theory, in: Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems (ICPADS 2016), Wuhan, China, Dec. 13th -16th, 2016: 376-382, Jan. 19, 2017. (EI, CCF C)

n  Siyuan Chen, Peng Zeng*, Kim-Kwang Raymond Choo, and Qin Wang, An efficient ring signature scheme based on syndrome decoding problem, in: Proceedings of the 12th International Conference on Computational Intelligence and Security (CIS 2016), IEEE Press, Wuxi, China, Dec. 16th – 19th, 2016: 228-232, Jan. 19, 2017. (EI)

n  Ya Gao, Peng Zeng*, Kim-Kwang Raymond Choo, and Fu Song, An improved online/offline identity-based signature scheme for WSNs, International Journal of Network Security, Nov. 2016, 18(6): 1143-1151. (EI)

n  Shengbao Wang, Peng Zeng*, Kim-Kwang Raymond Choo, and Hongbing Wang, A CCA2-secure multi-decrypter encryption scheme without random oracles, Informatica, Sep. 2015, 26(3): 543-556. (SCI)

n  Tom Hoholdt, Fernando Pinero, and Peng Zeng*, Optimal codes as tanner codes with cyclic component codes, Designs, Codes and Cryptography, July 2015, 76(1): 37-47. (SCI, EI, CCF B)

n  Ya Gao, Peng Zeng*, and Kim-Kwang Raymond Choo, Multi-sender broadcast authentication in wireless sensor networks, in: proceedings of the 2014 10th International Conference on Computational Intelligence and Security (CIS 2014), IEEE Press, Yunnan, China, Nov. 15th -16th, 2014: 633-637, Jan. 22, 2015. (EI)

n  Hongbing Wang, Peng Zeng*, and Kim-Kwang Raymond Choo, MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption, Security and Communication Networks, Nov. 2014, 7(11): 1641-1651. (SCI, EI, CCF C)

n  Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin, and Peng Zeng, Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security, Information Sciences, July 2014, 272: 223-237. (SCI, EI, CCF B)

n  Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer, Peng Zeng, Jianwei Liu, Ruiying Du, A generic construction of proxy signatures from certificateless signatures, in: proceedings of the IEEE 27th International Conference on Advanced Information Networking and Applications, Spain, Mar. 25th - 28th, 2013: 259-266, 2013. (EI)

n  Shengbao Wang, Qi Xie, Qiang Tang, Peng Zeng*, and Wei Chen, A two-party combined cryptographic scheme and its application, Chinese Journal of Electronics, Oct. 2012, 21(4): 687-691. (SCI, EI)

n  Peng Zeng, Zhenfu Cao, and Kim-Kwang Raymond Choo, An ID-based digital watermarking protocol for copyright protection, Computers & Electrical Engineering, July 2011, 37(4): 526-531. (SCI, EI)

n  Peng Zeng, Zhenfu Cao, and Huang Lin, Analysis and enhancement of a watermarking protocol for web context, Journal of Shanghai Jiaotong University (Science), Aug. 2010, 15(4): 392-396. (EI)

n  Peng Zeng, Zhenfu Cao, and Huang Lin, A new buyer-seller watermarking protocol without double embedding, Journal of Shanghai Jiaotong University (Science), Aug. 2010, 15(4): 397-402. (EI)

n  Peng Zeng, Kim-Kwang Raymond Choo, and Da-Zhi Sun, On the security of an enhanced novel access control protocol for wireless sensor networks, IEEE Transactions on Consumer Electronics, May 2010, 56(2): 566-569. (SCI, EI)


Honor

10 Visits

Related to the teacher