Qiang Tang

According to our database1, Qiang Tang authored at least 28 papers between 2010 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

2018
Space Efficient Computational Multi-Secret Sharing and Its Applications.
IACR Cryptology ePrint Archive, 2018

Making Public Key Functional Encryption Function Private, Distributively.
IACR Cryptology ePrint Archive, 2018

People Who Live in Glass Houses Should not Throw Stones: Targeted Opening Message Franking Schemes.
IACR Cryptology ePrint Archive, 2018

ZebraLancer: Private and Anonymous Crowdsourcing System atop Open Blockchain.
CoRR, 2018

Enabling Efficient and Fine-Grained DNA Similarity Search with Access Control over Encrypted Cloud Data.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Censorship Resistant Decentralized IoT Management Systems.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

On Enabling Machine Learning Tasks atop Public Blockchains: A Crowdsourcing Approach.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

Making Any Attribute-Based Encryption Accountable, Efficiently.
Proceedings of the Computer Security, 2018

Correcting Subverted Random Oracles.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Generic Semantic Security against a Kleptographic Adversary.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

Cliptography: Post-Snowden Cryptography.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption.
IACR Cryptology ePrint Archive, 2016

Honey Encryption Beyond Message Recovery Security.
IACR Cryptology ePrint Archive, 2016

Efficient Encrypted Keyword Search for Multi-user Data Sharing.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
Optimal Rate Private Information Retrieval from Homomorphic Encryption.
PoPETs, 2015

Cliptography: Clipping the Power of Kleptographic Attacks.
IACR Cryptology ePrint Archive, 2015

Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications.
Proceedings of the Information Security - 18th International Conference, 2015

Graded Signatures.
Proceedings of the Information Security - 18th International Conference, 2015

Making Any Identity-Based Encryption Accountable, Efficiently.
Proceedings of the Computer Security - ESORICS 2015, 2015

Communication Optimal Tardos-Based Asymmetric Fingerprinting.
Proceedings of the Topics in Cryptology, 2015

Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Near Optimal Rate Homomorphic Encryption for Branching Programs.
IACR Cryptology ePrint Archive, 2014

Graded Encryption, or How to Play "Who Wants To Be A Millionaire?" Distributively.
Proceedings of the Information Security - 17th International Conference, 2014

2013
How to Keep a Secret: Leakage Deterring Public-key Cryptography.
IACR Cryptology ePrint Archive, 2013

On the Security of Key Extraction from Measuring Physical Quantities.
CoRR, 2013

How to keep a secret: leakage deterring public-key cryptosystems.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2010
Verifiable Attribute Based Encryption.
I. J. Network Security, 2010


  Loading...