Joseph K. Liu

Orcid: 0000-0001-6656-6240

Affiliations:
  • Monash University, Faculty of Information Technology, Melbourne, Australia (since 2015)
  • Institute for Infocomm Research, Singapore (2007 - 2015)
  • University of Bristol, UK (2005 - 2007)
  • Chinese University of Hong Kong, Department of Information Engineering, Hong Kong (PhD 2004)


According to our database1, Joseph K. Liu authored at least 267 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Fast and private multi-dimensional range search over encrypted data.
Inf. Sci., January, 2024

Practical Multi-Source Multi-Client Searchable Encryption With Forward Privacy: Refined Security Notion and New Constructions.
IEEE Trans. Dependable Secur. Comput., 2024

2023
Verifiable Privacy-Enhanced Rotation Invariant LBP Feature Extraction in Fog Computing.
IEEE Trans. Ind. Informatics, December, 2023

Enhancing Blockchain Adoption through Tailored Software Engineering: An Industrial-grounded Study in Education Credentialing.
Distributed Ledger Technol. Res. Pract., December, 2023

A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions.
ACM Comput. Surv., December, 2023

Shorter Linkable Ring Signature Based on Middle-Product Learning with Errors Problem.
Comput. J., December, 2023

ShieldDB: An Encrypted Document Database With Padding Countermeasures.
IEEE Trans. Knowl. Data Eng., April, 2023

Privacy-Preserving and Outsourced Multi-Party K-Means Clustering Based on Multi-Key Fully Homomorphic Encryption.
IEEE Trans. Dependable Secur. Comput., 2023

Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity.
IEEE Trans. Dependable Secur. Comput., 2023

Outsourcing LDA-Based Face Recognition to an Untrusted Cloud.
IEEE Trans. Dependable Secur. Comput., 2023

AgrEvader: Poisoning Membership Inference against Byzantine-robust Federated Learning.
Proceedings of the ACM Web Conference 2023, 2023

2022
Achieving Searchable Encryption Scheme With Search Pattern Hidden.
IEEE Trans. Serv. Comput., 2022

Efficient Encrypted Data Search With Expressive Queries and Flexible Update.
IEEE Trans. Serv. Comput., 2022

Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation.
IEEE Trans. Dependable Secur. Comput., 2022

Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes.
IEEE Trans. Dependable Secur. Comput., 2022

Geometric Range Search on Encrypted Data With Forward/Backward Security.
IEEE Trans. Dependable Secur. Comput., 2022

${\sf PBT}$PBT: A New Privacy-Preserving Payment Protocol for Blockchain Transactions.
IEEE Trans. Dependable Secur. Comput., 2022

Range search on encrypted spatial data with dynamic updates.
J. Comput. Secur., 2022

A comprehensive overview of Deepfake: Generation, detection, datasets, and opportunities.
Neurocomputing, 2022

MoNet: A Fast Payment Channel Network for Scriptless Cryptocurrency Monero.
IACR Cryptol. ePrint Arch., 2022

AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains.
IACR Cryptol. ePrint Arch., 2022

BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts.
IACR Cryptol. ePrint Arch., 2022

Post-Quantum ID-based Ring Signatures from Symmetric-key Primitives.
IACR Cryptol. ePrint Arch., 2022

A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions.
IACR Cryptol. ePrint Arch., 2022

Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage.
Frontiers Comput. Sci., 2022

CVallet: A Blockchain-Oriented Application Development for Education and Recruitment.
Proceedings of the Network and System Security - 16th International Conference, 2022

Blockchain Based Regulatory Technology Deployment for Real Estate Transaction.
Proceedings of the Network and System Security - 16th International Conference, 2022

OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control.
Proceedings of the Information Security - 25th International Conference, 2022

Blockchain-based Solutions for Education Credentialing System: Comparison and Implications for Future Development.
Proceedings of the IEEE International Conference on Blockchain, 2022

2021
Efficient and Adaptive Procurement Protocol with Purchasing Privacy.
IEEE Trans. Serv. Comput., 2021

Enabling Authorized Encrypted Search for Multi-Authority Medical Databases.
IEEE Trans. Emerg. Top. Comput., 2021

Multi-Client Cloud-Based Symmetric Searchable Encryption.
IEEE Trans. Dependable Secur. Comput., 2021

hPRESS: A Hardware-Enhanced Proxy Re-Encryption Scheme Using Secure Enclave.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021

Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy.
IACR Cryptol. ePrint Arch., 2021

DualRing: Generic Construction of Ring Signatures with Efficient Instantiations.
IACR Cryptol. ePrint Arch., 2021

Non-Slanderability of Linkable Spontaneous Anonymous Group Signature (LSAG).
IACR Cryptol. ePrint Arch., 2021

Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain.
IACR Cryptol. ePrint Arch., 2021

Lattice-based zero-knowledge arguments for additive and multiplicative relations.
Des. Codes Cryptogr., 2021

Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

OblivSketch: Oblivious Network Measurement as a Cloud Service.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

OblivShare: Towards Privacy-Preserving File Sharing with Oblivious Expiration Control.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

Efficient and Verifiable Proof of Replication with Fast Fault Localization.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy.
Proceedings of the Computer Security - ESORICS 2021, 2021

On the Shutdown Price of Blockchain Mining Machines.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves.
Proceedings of the Applied Cryptography and Network Security, 2021

Transparency or Anonymity Leak: Monero Mining Pools Data Publication.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
DeepPAR and DeepDPA: Privacy Preserving and Asynchronous Deep Learning for Industrial IoT.
IEEE Trans. Ind. Informatics, 2020

Practical Escrow Protocol for Bitcoin.
IEEE Trans. Inf. Forensics Secur., 2020

Private Machine Learning Classification Based on Fully Homomorphic Encryption.
IEEE Trans. Emerg. Top. Comput., 2020

Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2020

Building a dynamic searchable encrypted medical database for multi-client.
Inf. Sci., 2020

Enabling Efficient Privacy-Assured Outlier Detection Over Encrypted Incremental Data Sets.
IEEE Internet Things J., 2020

Forward and Backward Private Dynamic Searchable Symmetric Encryption for Conjunctive Queries.
IACR Cryptol. ePrint Arch., 2020

Public-Key Puncturable Encryption: Modular and Compact Constructions.
IACR Cryptol. ePrint Arch., 2020

Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach.
IACR Cryptol. ePrint Arch., 2020

Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes.
IACR Cryptol. ePrint Arch., 2020

Analysing Mining Machine Shutdown Price.
IACR Cryptol. ePrint Arch., 2020

Efficient Lattice-Based Polynomial Evaluation and Batch ZK Arguments.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020

Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
A generic construction of tightly secure signatures in the multi-user setting.
Theor. Comput. Sci., 2019

Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
J. Univers. Comput. Sci., 2019

Efficient threshold password-authenticated secret sharing protocols for cloud computing.
J. Parallel Distributed Comput., 2019

Forward and Backward Private DSSE for Range Queries.
IACR Cryptol. ePrint Arch., 2019

Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy.
IACR Cryptol. ePrint Arch., 2019

RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security.
IACR Cryptol. ePrint Arch., 2019

Lattice RingCT v2.0 with Multiple Input and Output Wallets.
IACR Cryptol. ePrint Arch., 2019

Sucker punch makes you richer: Rethinking Proof-of-Work security model.
IACR Cryptol. ePrint Arch., 2019

MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol.
IACR Cryptol. ePrint Arch., 2019

Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications.
IACR Cryptol. ePrint Arch., 2019

Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets.
CoRR, 2019

Security Analysis Methods on Ethereum Smart Contract Vulnerabilities: A Survey.
CoRR, 2019

Catfish Effect Between Internal and External Attackers: Being Semi-honest is Helpful.
CoRR, 2019

Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward/Backward Privacy.
CoRR, 2019

GraphSE<sup>2</sup>: An Encrypted Graph Database for Privacy-Preserving Social Search.
CoRR, 2019

Proof-of-QoS: QoS based blockchain consensus protocol.
Comput. Secur., 2019

Generic Multi-keyword Ranked Search on Encrypted Cloud Data.
Proceedings of the Computer Security - ESORICS 2019, 2019

DGM: A Dynamic and Revocable Group Merkle Signature.
Proceedings of the Computer Security - ESORICS 2019, 2019

Consolidating Hash Power in Blockchain Shards with a Forest.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

Revocable and Linkable Ring Signature.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

On The Unforkability of Monero.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

GraphSE²: An Encrypted Graph Database for Privacy-Preserving Social Search.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Senarai: A Sustainable Public Blockchain-Based Permanent Storage Protocol.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

Designing Smart Contract for Electronic Document Taxation.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

A Blockchain-Enabled Society.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System.
Proceedings of the Applied Cryptography and Network Security, 2019

A Flexible Instant Payment System Based on Blockchain.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

Risk of Asynchronous Protocol Update: Attacks to Monero Protocols.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

Lattice RingCT V2.0 with Multiple Input and Multiple Output Wallets.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

Fast-to-Finalize Nakamoto-Like Consensus.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

Ring Signature.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2018
Rethinking Authentication on Smart Mobile Devices.
Wirel. Commun. Mob. Comput., 2018

Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices.
IEEE Trans. Ind. Informatics, 2018

Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2018

Expressive attribute-based keyword search with constant-size ciphertext.
Soft Comput., 2018

Access control encryption with efficient verifiable sanitized decryption.
Inf. Sci., 2018

GO-CP-ABE: group-oriented ciphertext-policy attribute-based encryption.
Int. J. Embed. Syst., 2018

Platform-independent Secure Blockchain-Based Voting System.
IACR Cryptol. ePrint Arch., 2018

Monero Ring Attack: Recreating Zero Mixin Transaction Effect.
IACR Cryptol. ePrint Arch., 2018

Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0).
IACR Cryptol. ePrint Arch., 2018

Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List.
IACR Cryptol. ePrint Arch., 2018

Result Pattern Hiding Searchable Encryption for Conjunctive Queries.
IACR Cryptol. ePrint Arch., 2018

Short Lattice-based One-out-of-Many Proofs and Applications to Ring Signatures.
IACR Cryptol. ePrint Arch., 2018

An efficient access control scheme with outsourcing capability and attribute update for fog computing.
Future Gener. Comput. Syst., 2018

Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control.
Future Gener. Comput. Syst., 2018

Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat.
Future Gener. Comput. Syst., 2018

Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption.
Cryptogr., 2018

A Survey on Access Control in Fog Computing.
IEEE Commun. Mag., 2018

IoTChain: Establishing Trust in the Internet of Things Ecosystem Using Blockchain.
IEEE Cloud Comput., 2018

Towards Privacy-Preserving Forensic Analysis for Time-Series Medical Data.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Position Paper on Blockchain Technology: Smart Contract and Applications.
Proceedings of the Network and System Security - 12th International Conference, 2018

Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs.
Proceedings of the Network and System Security - 12th International Conference, 2018

Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits.
Proceedings of the Information Security Practice and Experience, 2018

Compact Ring Signature in the Standard Model for Blockchain.
Proceedings of the Information Security Practice and Experience, 2018

Forward Secure Searchable Encryption Using Key-Based Blocks Chain Technique.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security.
Proceedings of the Computer Security, 2018

Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database.
Proceedings of the Computer Security, 2018

Anonymity Reduction Attacks to Monero.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

An Encrypted Database with Enforced Access Control and Blockchain Validation.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

A Multi-client DSSE Scheme Supporting Range Queries.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Evaluating CryptoNote-Style Blockchains.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Towards secure and cost-effective fuzzy access control in mobile cloud computing.
Soft Comput., 2017

Erratum to: Special issue on security and privacy for smart cities.
Pers. Ubiquitous Comput., 2017

Special issue on security and privacy for smart cities.
Pers. Ubiquitous Comput., 2017

A general framework for secure sharing of personal health records in cloud system.
J. Comput. Syst. Sci., 2017

A new public remote integrity checking scheme with user and data privacy.
Int. J. Appl. Cryptogr., 2017

RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
IACR Cryptol. ePrint Arch., 2017

FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance.
IACR Cryptol. ePrint Arch., 2017

Editorial: Special issue on security data science and cyber threat management.
Comput. Secur., 2017

Anonymous Announcement System (AAS) for Electric Vehicle in VANETs.
Comput. J., 2017

Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks Analytics.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A New Blockchain-Based Value-Added Tax System.
Proceedings of the Provable Security, 2017

Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
Proceedings of the Provable Security, 2017

A Multi-client Dynamic Searchable Symmetric Encryption System with Physical Deletion.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
Proceedings of the Computer Security - ESORICS 2017, 2017

Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

Multi-user Cloud-Based Secure Keyword Search.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

Attribute-Based Encryption with Expressive and Authorized Keyword Search.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

An implementation of access-control protocol for IoT home scenario.
Proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science, 2017

2016
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2016

Attribute-Based Data Sharing Scheme Revisited in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2016

Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services.
IEEE Trans. Inf. Forensics Secur., 2016

Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data.
IEEE Trans. Inf. Forensics Secur., 2016

Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud.
IEEE Trans. Inf. Forensics Secur., 2016

On the security of two identity-based conditional proxy re-encryption schemes.
Theor. Comput. Sci., 2016

Two-Factor Data Security Protection Mechanism for Cloud Storage System.
IEEE Trans. Computers, 2016

Special Issue on Security and Privacy in Mobile Clouds.
Pervasive Mob. Comput., 2016

An Efficient Non-Interactive Multi-client Searchable Encryption with Support for Boolean Queries.
IACR Cryptol. ePrint Arch., 2016

Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing.
Future Gener. Comput. Syst., 2016

RKA-Secure Public Key Encryptions Against Efficiently Invertible Functions.
Comput. J., 2016

Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol.
Comput. J., 2016

Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles.
Comput. J., 2016

Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Trust and Privacy Preserving Handover Authentication Protocol for Wireless Networks.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Trust Enhancement over Range Search for Encrypted Data.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Towards Certificate-Based Group Encryption.
Proceedings of the Provable Security, 2016

Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing.
Proceedings of the Network and System Security - 10th International Conference, 2016

While Mobile Encounters with Clouds.
Proceedings of the Network and System Security - 10th International Conference, 2016

Anonymizing Bitcoin Transaction.
Proceedings of the Information Security Practice and Experience, 2016

Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Time-Bound Anonymous Authentication for Roaming Networks.
IEEE Trans. Inf. Forensics Secur., 2015

Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage.
IEEE Trans. Inf. Forensics Secur., 2015

A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid.
IEEE Trans. Cloud Comput., 2015

k-Times Attribute-Based Anonymous Access Control for Cloud Computing.
IEEE Trans. Computers, 2015

Cost-Effective Authentic and Anonymous Data Sharing with Forward Security.
IEEE Trans. Computers, 2015

On the security of a lightweight authentication and encryption scheme for mobile ad hoc network.
Secur. Commun. Networks, 2015

Secure sharing and searching for real-time video data in mobile cloud.
IEEE Netw., 2015

A Resolving Set based Algorithm for Fault Identification in Wireless Mesh Networks.
J. Univers. Comput. Sci., 2015

Universal designated verifier transitive signatures for graph-based big data.
Inf. Sci., 2015

Privacy Concerns for Photo Sharing in Online Social Networks.
IEEE Internet Comput., 2015

Cooperative attribute-based access control for enterprise computing system.
Int. J. Embed. Syst., 2015

Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption.
Future Gener. Comput. Syst., 2015

A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing.
Future Gener. Comput. Syst., 2015

Towards secure and reliable cloud storage against data re-outsourcing.
Future Gener. Comput. Syst., 2015

Comments on 'Efficient Revocable Certificateless Encryption Secure in the Standard Model'.
Comput. J., 2015

Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption.
Comput. J., 2015

Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach.
Proceedings of the Provable Security, 2015

On Lightweight Security Enforcement in Cyber-Physical Systems.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2015

PEVTS: Privacy-Preserving Electric Vehicles Test-Bedding Scheme.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Practical Threshold Password-Authenticated Secret Sharing Protocol.
Proceedings of the Computer Security - ESORICS 2015, 2015

Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data.
Proceedings of the Computer Security - ESORICS 2015, 2015

Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data.
Proceedings of the 10th ACM Symposium on Information, 2015

A New Public Remote Integrity Checking Scheme with User Privacy.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
A New Payment System for Enhancing Location Privacy of Electric Vehicles.
IEEE Trans. Veh. Technol., 2014

Linkable Ring Signature with Unconditional Anonymity.
IEEE Trans. Knowl. Data Eng., 2014

A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
IEEE Trans. Inf. Forensics Secur., 2014

An efficient PHR service system supporting fuzzy keyword search and fine-grained access control.
Soft Comput., 2014

Toward efficient and privacy-preserving computing in big data era.
IEEE Netw., 2014

A secure remote data integrity checking cloud storage system from threshold encryption.
J. Ambient Intell. Humaniz. Comput., 2014

Improvements on an authentication scheme for vehicular sensor networks.
Expert Syst. Appl., 2014

GO-ABE: Group-Oriented Attribute-Based Encryption.
Proceedings of the Network and System Security - 8th International Conference, 2014

TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing.
Proceedings of the Information Security Practice and Experience, 2014

Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014

New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era.
Proceedings of the Computer Security - ESORICS 2014, 2014

An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Realizing Fully Secure Unrestricted ID-Based Ring Signature in the Standard Model Based on HIBE.
IEEE Trans. Inf. Forensics Secur., 2013

Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction.
Theor. Comput. Sci., 2013

Security Concerns in Popular Cloud Storage Services.
IEEE Pervasive Comput., 2013

Comments on "Analysis and Improvement of a Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions".
IEEE Commun. Lett., 2013

Efficient Linkable and/or Threshold Ring Signature Without Random Oracles.
Comput. J., 2013

Towards Anonymous Ciphertext Indistinguishability with Identity Leakage.
Proceedings of the Provable Security - 7th International Conference, 2013

Threshold-Oriented Optimistic Fair Exchange.
Proceedings of the Network and System Security - 7th International Conference, 2013

Privacy-preserving smart metering with regional statistics and personal enquiry services.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Enhancing Location Privacy for Electric Vehicles (at the right time).
IACR Cryptol. ePrint Arch., 2012

Efficient Escrow-Free Identity-Based Signature.
Proceedings of the Provable Security - 6th International Conference, 2012

Forward Secure Attribute-Based Signatures.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Verifier-local revocation group signatures with time-bound keys.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Forward Secure Ring Signature without Random Oracles.
IACR Cryptol. ePrint Arch., 2011

Short and Efficient Certificate-Based Signature.
IACR Cryptol. ePrint Arch., 2011

Threshold ring signature without random oracles.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Identity-Based Server-Aided Decryption.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Efficient online/offline identity-based signature for wireless sensor network.
Int. J. Inf. Sec., 2010

Online/Offline Identity-Based Signcryption Revisited.
IACR Cryptol. ePrint Arch., 2010

Practical ID-based Encryption for Wireless Sensor Network.
IACR Cryptol. ePrint Arch., 2010

Identity-Based Online/Offline Key Encapsulation and Encryption.
IACR Cryptol. ePrint Arch., 2010

A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract).
Proceedings of the Provable Security - 4th International Conference, 2010

Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model.
Proceedings of the Computer Security, 2010

2009
Certificate-based sequential aggregate signature.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Online/Offline Ring Signature Scheme.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

An Efficient Identity-Based Online/Offline Encryption Scheme.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model.
J. Univers. Comput. Sci., 2008

Solutions to Key Exposure Problem in Ring Signature.
Int. J. Netw. Secur., 2008

Certificate-Based Signature Schemes without Pairings or Random Oracles.
IACR Cryptol. ePrint Arch., 2008

A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack.
IACR Cryptol. ePrint Arch., 2008

Efficient Certificate-Based Encryption in the Standard Model.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Robust Receipt-Free Election System with Ballot Secrecy and Verifiability.
Proceedings of the Network and Distributed System Security Symposium, 2008

Sanitizable Signatures Revisited.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

Traceable and Retrievable Identity-Based Encryption.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Revocable Ring Signature.
J. Comput. Sci. Technol., 2007

A More Efficient Instantiation of Witness-Indistinguishable Signature.
Int. J. Netw. Secur., 2007

(Convertible) Undeniable Signatures without Random Oracles.
IACR Cryptol. ePrint Arch., 2007

Certificate Based (Linkable) Ring Signature.
Proceedings of the Information Security Practice and Experience, 2007

2006
Enhanced Security Models and a Generic Construction Approach for Linkable Ring Signature.
Int. J. Found. Comput. Sci., 2006

Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model.
IACR Cryptol. ePrint Arch., 2006

Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles.
IACR Cryptol. ePrint Arch., 2006

Malicious KGC Attacks in Certificateless Cryptography.
IACR Cryptol. ePrint Arch., 2006

Ring Signature with Designated Linkability.
Proceedings of the Advances in Information and Computer Security, 2006

ID-Based Ring Signature Scheme Secure in the Standard Model.
Proceedings of the Advances in Information and Computer Security, 2006

Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature.
Proceedings of the Progress in Cryptology, 2006

Single Sign-On and Key Establishment for Ubiquitous Smart Environments.
Proceedings of the Computational Science and Its Applications, 2006

2005
A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity.
IACR Cryptol. ePrint Arch., 2005

Ring Signatures without Random Oracles.
IACR Cryptol. ePrint Arch., 2005

Transferable E-Cash Revisit.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

A Restricted Multi-show Credential System and Its Application on E-Voting.
Proceedings of the Information Security Practice and Experience, 2005

Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms.
Proceedings of the Information Security and Cryptology, 2005

Linkable Ring Signatures: Security Models and New Schemes.
Proceedings of the Computational Science and Its Applications, 2005

Recoverable and Untraceable E-Cash.
Proceedings of the Public Key Infrastructure, 2005

Efficient Verifiable Ring Encryption for Ad Hoc Groups.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005

Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

2004
Separable Linkable Threshold Ring Signatures.
IACR Cryptol. ePrint Arch., 2004

Custodian-Hiding Verifiable Encryption.
IACR Cryptol. ePrint Arch., 2004

Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups.
IACR Cryptol. ePrint Arch., 2004

On the Security Models of (Threshold) Ring Signature Schemes.
Proceedings of the Information Security and Cryptology, 2004

Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups.
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004

Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract).
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
A Separable Threshold Ring Signature Scheme.
Proceedings of the Information Security and Cryptology, 2003

On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Evaluation on Security and Privacy of Web-Based Learning Systems.
Proceedings of the 2003 IEEE International Conference on Advanced Learning Technologies, 2003


  Loading...