


default search action
Cong Zuo 0001
Person information
- affiliation: Beijing Institute of Technology, School of Cyberspace Science and Technology, Beijing, China
- affiliation (PhD 2020): Monash University, Faculty of Information Technology, Clayton, Australia
- affiliation (former): Zhejiang Gongshang University, School of Computer and Information Engineering, Zhejiang, China
Other persons with the same name
- Cong Zuo 0002 — Zhongke Zhiyu (Shouguang) Safety Technology Co., Ltd, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j19]Wei Wang
, Junke Duan
, Cong Zuo
, Licheng Wang
, Haipeng Peng
, Xiuju Huang
:
A TimeBound NFT Rights Protocol From Time Interval Signatures. IEEE Trans. Dependable Secur. Comput. 23(1): 209-220 (2026)
[j18]Yumeng Xie
, Qing Fan
, Tong Wu
, Cong Zuo
, Weixiao Wang
, Chuan Zhang
, Liehuang Zhu
:
A Decentralized Blockchain Transaction Verification Scheme in the Weighted Setting. IEEE Trans. Dependable Secur. Comput. 23(2): 1782-1794 (2026)- 2025
[j17]Jingjing Zhang
, Yinxia Ran, Xiuju Huang, Cong Zuo, Junke Duan, Yun Pan, Licheng Wang, Jingtao Wang
:
A Survey on Proof of Sequential Work: Development, Security Analysis, and Application Prospects. Entropy 28(1): 33 (2025)
[j16]Cong Zuo, Shangqi Lai, Shi-Feng Sun, Xingliang Yuan, Joseph K. Liu, Jun Shao, Huaxiong Wang, Liehuang Zhu, Shujie Cui:
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy. Proc. Priv. Enhancing Technol. 2025(1): 440-455 (2025)
[j15]Weixiao Wang
, Qing Fan
, Chuan Zhang
, Cong Zuo, Liehuang Zhu
:
Forward-Secure Multi-User Graph Searchable Encryption for Exact Shortest Path Queries. IEEE Trans. Cloud Comput. 13(4): 1446-1457 (2025)
[j14]Xiuju Huang
, Cong Zuo
, Jun Shao
, Junke Duan
, Wei Wang
, Yin Meng, Licheng Wang:
Timed Anonymous Ring Signature With Application to Bidding Systems. IEEE Trans. Inf. Forensics Secur. 20: 8210-8223 (2025)
[c19]Yufeng Jiang, Jianghua Liu, Chenhao Xu
, Cong Zuo, Lei Xu, Jian Lei:
A Dropout-Resilient and Privacy-Preserving Framework for Federated Learning via Lightweight Masking. ICICS (2) 2025: 293-312
[c18]Jun Zhao
, Jiangshan Yu
, Xingliang Yuan
, Joseph K. Liu
, Cong Zuo
, Hui Cui
:
SEARCHAIN: Searchable Encryption As Rewarded-Useful-Work on Blockchain. ProvSec 2025: 368-384
[i14]Yu Cui, Cong Zuo:
Practical Reasoning Interruption Attacks on Reasoning Large Language Models. CoRR abs/2505.06643 (2025)
[i13]Yue Su, Meng Shen, Cong Zuo, Yuzhi Liu, Liehuang Zhu:
S-Leak: Leakage-Abuse Attack Against Efficient Conjunctive SSE via s-term Leakage. CoRR abs/2507.04077 (2025)
[i12]Yu Cui, Hang Fu, Haibin Zhang, Licheng Wang, Cong Zuo:
Free-MAD: Consensus-Free Multi-Agent Debate. CoRR abs/2509.11035 (2025)
[i11]Yu Cui, Sicheng Pan, Yifei Liu, Haibin Zhang, Cong Zuo:
VortexPIA: Indirect Prompt Injection Attack against LLMs for Efficient Extraction of User Privacy. CoRR abs/2510.04261 (2025)
[i10]Yu Cui, Yifei Liu, Hang Fu, Sicheng Pan, Haibin Zhang, Cong Zuo, Licheng Wang:
Can LLMs Threaten Human Survival? Benchmarking Potential Existential Threats from LLMs via Prefix Completion. CoRR abs/2511.19171 (2025)
[i9]Yu Cui, Hang Fu, Sicheng Pan, Zhuoyu Sun, Yifei Liu, Yuhong Nie, Bo Ran, Baohan Huang, Xufeng Zhang, Haibin Zhang, Cong Zuo, Licheng Wang:
Towards Provably Secure Generative AI: Reliable Consensus Sampling. CoRR abs/2512.24925 (2025)
[i8]Jingwei Hu, Zhiqi Liu, Cong Zuo:
Delegated Multi-party Private Set Intersection from Secret Sharing. IACR Cryptol. ePrint Arch. 2025: 30 (2025)- 2024
[c17]Liehuang Zhu
, Danlei Xiao
, Haotian Deng
, Zihao Wang
, Cong Zuo
, Licheng Wang
, Chuan Zhang
:
A Flexible and Privacy-preserving Cross-chain Identity Authentication System based on Anonymous Credentials. BSCI 2024: 1-7
[c16]Pratima Jana, Ratna Dutta, Cong Zuo:
Quantum Safe Computation-Friendly Identity-Binding Password Authenticated Key Exchange. ProvSec (2) 2024: 298-309- 2023
[j13]Dandan Yuan, Cong Zuo, Shujie Cui, Giovanni Russello:
Result-pattern-hiding Conjunctive Searchable Symmetric Encryption with Forward and Backward Privacy. Proc. Priv. Enhancing Technol. 2023(2): 40-58 (2023)
[c15]Yuchen Yin, Qingqing Gan, Cong Zuo, Ning Liu, Changji Wang, Yuning Jiang:
A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability. ISPEC 2023: 380-398
[c14]Jun Zhao
, Jiangshan Yu, Xingliang Yuan, Joseph K. Liu, Cong Zuo:
Rethinking Practical Blockchain-Based Symmetric Searchable Encryption Services. TrustCom 2023: 307-317- 2022
[j12]Qingqing Gan, Joseph K. Liu, Xiaoming Wang, Xingliang Yuan, Shifeng Sun, Daxin Huang, Cong Zuo, Jianfeng Wang
:
Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage. Frontiers Comput. Sci. 16(6): 166820 (2022)
[j11]Cong Zuo
, Shifeng Sun
, Joseph K. Liu
, Jun Shao
, Josef Pieprzyk
, Lei Xu
:
Forward and Backward Private DSSE for Range Queries. IEEE Trans. Dependable Secur. Comput. 19(1): 328-338 (2022)
[j10]Shifeng Sun
, Cong Zuo
, Joseph K. Liu
, Amin Sakzad
, Ron Steinfeld, Tsz Hon Yuen
, Xingliang Yuan
, Dawu Gu
:
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation. IEEE Trans. Dependable Secur. Comput. 19(1): 452-467 (2022)- 2021
[j9]Fan Zhang
, Ziyuan Liang
, Cong Zuo
, Jun Shao
, Jianting Ning
, Jun Sun
, Joseph K. Liu
, Yibao Bao:
hPRESS: A Hardware-Enhanced Proxy Re-Encryption Scheme Using Secure Enclave. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6): 1144-1157 (2021)
[j8]Shabnam Kasra Kermanshahi
, Joseph K. Liu
, Ron Steinfeld, Surya Nepal
, Shangqi Lai
, Randolph Loh, Cong Zuo
:
Multi-Client Cloud-Based Symmetric Searchable Encryption. IEEE Trans. Dependable Secur. Comput. 18(5): 2419-2437 (2021)
[j7]Lei Xu
, Shifeng Sun
, Xingliang Yuan
, Joseph K. Liu
, Cong Zuo
, Chungen Xu
:
Enabling Authorized Encrypted Search for Multi-Authority Medical Databases. IEEE Trans. Emerg. Top. Comput. 9(1): 534-546 (2021)
[c13]Joseph K. Liu, Man Ho Au, Tsz Hon Yuen
, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li
, Kim-Kwang Raymond Choo:
Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach. ISPEC 2021: 327-344
[i7]Cong Zuo, Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Jun Shao, Huaxiong Wang:
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy. IACR Cryptol. ePrint Arch. 2021: 1585 (2021)- 2020
[j6]Chungen Xu
, Yingying Zhang, Lin Mei, Lei Xu, Cong Zuo:
Attacking the Niederreiter-type cryptosystem based on rank metric. Int. J. Embed. Syst. 13(4): 398-404 (2020)
[j5]Lei Xu
, Chungen Xu
, Joseph K. Liu, Cong Zuo, Peng Zhang:
Building a dynamic searchable encrypted medical database for multi-client. Inf. Sci. 527: 394-405 (2020)
[i6]Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li:
Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach. IACR Cryptol. ePrint Arch. 2020: 528 (2020)
[i5]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Guiyi Wei:
Forward and Backward Private Dynamic Searchable Symmetric Encryption for Conjunctive Queries. IACR Cryptol. ePrint Arch. 2020: 1357 (2020)
2010 – 2019
- 2019
[c12]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk
:
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy. ESORICS (2) 2019: 283-303
[c11]Qingqing Gan
, Cong Zuo, Jianfeng Wang
, Shifeng Sun, Xiaoming Wang:
Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey. NSS 2019: 37-52
[i4]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk:
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward/Backward Privacy. CoRR abs/1905.08561 (2019)
[i3]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk:
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy. IACR Cryptol. ePrint Arch. 2019: 1055 (2019)
[i2]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Lei Xu:
Forward and Backward Private DSSE for Range Queries. IACR Cryptol. ePrint Arch. 2019: 1240 (2019)- 2018
[j4]Cong Zuo
, Jun Shao, Guiyi Wei, Mande Xie, Min Ji
:
CCA-secure ABE with outsourced decryption for fog computing. Future Gener. Comput. Syst. 78: 730-738 (2018)
[j3]Cong Zuo
, Jun Shao, Joseph K. Liu
, Guiyi Wei, Yun Ling:
Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage. IEEE Trans. Inf. Forensics Secur. 13(1): 186-196 (2018)
[c10]Shangqi Lai
, Sikhar Patranabis, Amin Sakzad
, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, Cong Zuo:
Result Pattern Hiding Searchable Encryption for Conjunctive Queries. CCS 2018: 745-762
[c9]Zhimei Sui, Shangqi Lai
, Cong Zuo, Xingliang Yuan, Joseph K. Liu, Haifeng Qian:
An Encrypted Database with Enforced Access Control and Blockchain Validation. Inscrypt 2018: 260-273
[c8]Randolph Loh, Cong Zuo, Joseph K. Liu, Shifeng Sun:
A Multi-client DSSE Scheme Supporting Range Queries. Inscrypt 2018: 289-307
[c7]Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk
:
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security. ESORICS (2) 2018: 228-246
[i1]Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, Cong Zuo:
Result Pattern Hiding Searchable Encryption for Conjunctive Queries. IACR Cryptol. ePrint Arch. 2018: 1168 (2018)- 2017
[j2]Cong Zuo, Kaitai Liang
, Zoe Lin Jiang, Jun Shao, Jun-bin Fang
:
Cost-effective privacy-preserving vehicular urban sensing system. Pers. Ubiquitous Comput. 21(5): 893-901 (2017)
[c6]Lei Xu
, Chungen Xu
, Joseph K. Liu, Cong Zuo, Peng Zhang:
A Multi-client Dynamic Searchable Symmetric Encryption System with Physical Deletion. ICICS 2017: 516-528
[c5]Xinxin Ma, Jun Shao, Cong Zuo, Ru Meng:
Efficient Certificate-Based Signature and Its Aggregation. ISPEC 2017: 391-408
[c4]Cong Zuo, Jun Shao, Zhe Liu, Yun Ling, Guiyi Wei:
Hidden-Token Searchable Public-Key Encryption. TrustCom/BigDataSE/ICESS 2017: 248-254- 2016
[j1]Jun Shao, Xiaodong Lin, Rongxing Lu, Cong Zuo:
A Threshold Anonymous Authentication Protocol for VANETs. IEEE Trans. Veh. Technol. 65(3): 1711-1720 (2016)
[c3]Cong Zuo, Jun Shao, Guiyi Wei, Mande Xie, Min Ji
:
Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption. ACISP (1) 2016: 495-508
[c2]Cong Zuo, James Macindoe, Siyin Yang, Ron Steinfeld, Joseph K. Liu:
Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption. Trustcom/BigDataSE/ISPA 2016: 113-120- 2015
[c1]Jun Shao, Rongxing Lu, Xiaodong Lin, Cong Zuo:
New threshold anonymous authentication for VANETs. ICCC 2015: 1-6
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-27 21:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







