Bei Liang

Orcid: 0000-0002-8622-8596

According to our database1, Bei Liang authored at least 35 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Efficient Secure Multiparty Computation for Multidimensional Arithmetics and Its Application in Privacy-Preserving Biometric Identification.
IACR Cryptol. ePrint Arch., 2023

2021
Homomorphic signcryption with public plaintext-result checkability.
IET Inf. Secur., 2021

Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning.
IACR Cryptol. ePrint Arch., 2021

Turn-Based Communication Channels.
IACR Cryptol. ePrint Arch., 2021

sf DEVA: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning.
Proceedings of the Information Security - 24th International Conference, 2021

2020
Compact Authenticated Key Exchange in the Quantum Random Oracle Model.
IACR Cryptol. ePrint Arch., 2020

Statically Aggregate Verifiable Random Functions and Application to E-Lottery.
Cryptogr., 2020

2019
Decentralised Functional Signatures.
Mob. Networks Appl., 2019

A more compact multi-id identity-based FHE scheme in the standard model and its applications.
Sci. China Inf. Sci., 2019

Hierarchical Functional Signcryption: Notion and Construction.
Proceedings of the Provable Security, 2019

Robust Distributed Pseudorandom Functions for mNP Access Structures.
Proceedings of the Information Security - 22nd International Conference, 2019

Code-Based Zero Knowledge PRF Arguments.
Proceedings of the Information Security - 22nd International Conference, 2019

Public-Coin Differing-Inputs Obfuscator for Hiding-Input Point Function with Multi-bit Output and Its Applications.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019

Witness Encryption with (Weak) Unique Decryption and Message Indistinguishability: Constructions and Applications.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Lattice-Based Simulatable VRFs: Challenges and Future Directions.
J. Internet Serv. Inf. Secur., 2018

Understanding and Constructing AKE via Double-key Key Encapsulation Mechanism.
IACR Cryptol. ePrint Arch., 2018

Strongly Secure Authenticated Key Exchange from Supersingular Isogeny.
IACR Cryptol. ePrint Arch., 2018

Verifiable Homomorphic Secret Sharing.
Proceedings of the Provable Security, 2018

On Constructing Pairing-Free Identity-Based Encryptions.
Proceedings of the Information Security - 21st International Conference, 2018

Private Functional Signatures: Definition and Construction.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation.
IACR Cryptol. ePrint Arch., 2017

A Differentially Private Encryption Scheme.
Proceedings of the Information Security - 20th International Conference, 2017

Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

Compact Hierarchical IBE from Lattices in the Standard Model.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Distributed Pseudorandom Functions for General Access Structures in NP.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2015
Secure Mobile Agent from Leakage-Resilient Proxy Signatures.
Mob. Inf. Syst., 2015

Constrained Verifiable Random Functions from Indistinguishability Obfuscation.
Proceedings of the Provable Security, 2015

The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures.
Proceedings of the Information Security - 18th International Conference, 2015

One-Round Witness Indistinguishability from Indistinguishability Obfuscation.
Proceedings of the Information Security Practice and Experience, 2015

Verifiable Random Functions from (Leveled) Multilinear Maps.
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015

2014
Attribute-Based Signatures for Circuits from Multilinear Maps.
Proceedings of the Information Security - 17th International Conference, 2014

Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

2013
Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model.
IACR Cryptol. ePrint Arch., 2013

Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP.
Proceedings of the Network and System Security - 7th International Conference, 2013

Leakage-Resilient Proxy Signatures.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013


  Loading...