Skip to content Skip to navigation


Futai Zhang Professor

Academic Area: 
cryptology and its applications
Research Interests: 
  • Cryptography
  • Applications of cryptography in Cyberspace Security

Educational Background:

Visiting Scholar, University of Wollongong, Australia (2009-2010)

PhD, Cryptology, Xidian University, China (2001)

MS, Mathematics, Shaanxi Normal University, China (1990)



Research Projects

National Natural Science Foundation of China (NSFC), Grant number: 61572198. “Research on Key Technologies of Information Security and Privacy Preservation for Vehicular Ad Hoc Networks and Vehicular Cloud”. (2016-2019)

National Natural Science Foundation of China (NSFC), Grant number: 61502237. “Data Confidentiality Protection and Access Control Based on Certificateless Encryption in Cloud Storage”. (2016-2018)

Natural Science Foundation of Jiangsu Province, Grant number: 13KJD520006. “Certificateless Public Key Cryptosystems with the Functionality of User Revocation”.  (2013-2015)

National Natural Science Foundation of China (NSFC), Grant number: 61170298.

Leakage Resilient Identity-based and certificateless cryptosystems ”. (2012-2015)

National Natural Science Foundation of China (NSFC), Grant number: 60673070.

Efficient Certificateless Cryptosystems and Their Applications ”. (2007-2009)

Natural Science Foundation of Jiangsu Province, Grant number: BK2006217.

“Research on the Basic Theories and Technologies of Certificateless Cryptography”. (2006-2008)

Journal Articles

Yanhong Liu, Futai Zhang, Jie Zhang. Attacks to some verifiable multi secret sharing schemes and two improved schemes. Information Sciences, 329 (2016): 524–539.

Yinxia Sun, Futai Zhang, Limin Shen. Efficient Revocable Certificateless Signature Against Signing Key Exposure (in Chinese). Journal of software, 2015, 26(12): 3196−3203.

Zhigao Liu, Futai Zhang. On Extended Algebraic Immunity of Concatenated Boolean Functions (in Chinese). Journal of Cryptologic Research,2015,2(3):226–234.

Yinxia Sun, Futai Zhang, Limin Shen. Efficient revocable certificateless encryption against decryption key exposure, IET Information Security, 2015, 9 (3): 158-166 .

Limin Shen, Futai Zhang, Yinxia Sun, Sujuan Li. Cryptanalysis and improvement on a certificateless encryption scheme in the standard model. International Journal of Information and Computer Security, 2014, 6(4) 354-371.

Yinxia Sun, Futai Zhang, Limin Shen. A revocable certificateless signature scheme. Journal of Computers, 2014, 9(8),1843-1850.

Wenjie Yang, Futai Zhang, Limin Shen. Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles. Security and Communication Networks, 2014, 7(2): 445-454, DOI: 10.1002/sec.826.

Futai Zhang, Jie Zhang. Efficient and Information-Theoretical Secure Verifiable Secret Sharing over Bilinear Groups. Chinese Journal of Electronics, 2014, 23(1): 13-17.

Limin Shen, Futai Zhang,  Yinxia Sun. Efficient revocable certificateless encryption secure in the standard model. Computer Journal, 2014, 57(4): 592-601, doi: 10.1093/comjnl/bxt040, Apr.

Futai Zhang, Limin Shen, Ge Wu. Notes on the security of certificateless aggregate signature schemes. Information Sciences, 2014, 287: 32–37.

Yinxia Sun, Futai Zhang, Limin Shen. A Revocable Certificateless Signature Scheme. JCP, 2014, 9(8): 1843-1850.

Limin Shen, Futai Zhang, Yinxia Sun. Security Analysis of a Certificateless Signcryption Scheme without Bilinear Pairing (in Chinese). Journal of Cryptologic Research, 2014, 1(2):146–154.

Songqin Miao, Futai Zhang, Sujuan Li, Yi Mu. On security of a certificateless signcryption scheme. Inf. Sci. 2013, 232(5): 475-481.

Lei Zhang, Futai Zhang, Bo Qin, Shubo Liu: Corrigendum: "Provably-secure electronic cash based on certicateless partially-blind signatures". Electronic Commerce Research and Applications, 2013, 12(1): 60.

Sujuan Li, Futai Zhang: Leakage-resilient identity-based encryption scheme. International Journal of Grid and Utility Computing (IJGUC), 2013, 4(2/3): 187-196.

Jie Zhang, Futai Zhang: Linear threshold verifiable secret sharing in bilinear groups. IJGUC, 2013, 4(2/3): 212-218.

Sujuan Li, Futai Zhang. Efficient leakage-resilient public key encryption from DDH assumption. Cluster Computing, 2013, 16, Issue 4: 797–806, 797-806 DOI: 10.1007/s10586-013-0253-z.

Conference Papers

Jie Zhang, Futai Zhang. Information-Theoretical Secure Veri_able Secret Sharing with Vector Space Access Structures over Bilinear Groups. X. Huang and J. Zhou (Eds.): ISPEC 2014, LNCS 8434, pp. 318–329, 2014.

Huaqun Wang, Qianhong Wu, Bo Qin, Futai Zhang, Josep Domingo-Ferrer: A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience. ISPEC 2014: 388-402, 2014.

Jie Zhang, Futai Zhang: Secure Distributed Key Generation on Vector Space Access Structures in Bilinear Groups. INCoS 2013: 803-808, 2013.

Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng: Revocable Identity-Based Signature without Pairing. INCoS 2013: 363-365, 2013.