Shengli Liu

According to our database1, Shengli Liu authored at least 108 papers between 1999 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A generic construction of tightly secure signatures in the multi-user setting.
Theor. Comput. Sci., 2019

QANIZK for adversary-dependent languages and their applications.
Theor. Comput. Sci., 2019

AeroMRP: A Multipath Reliable Transport Protocol for Aeronautical Ad Hoc Networks.
IEEE Internet of Things Journal, 2019

Proofs of retrievability from linearly homomorphic structure-preserving signatures.
IJICS, 2019

Generic Constructions of Robustly Reusable Fuzzy Extractor.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Pseudorandom Functions from LWE: RKA Security and Application.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Solving ECDLP via List Decoding.
IACR Cryptology ePrint Archive, 2018

Reusable fuzzy extractor from the decisional Diffie-Hellman assumption.
Des. Codes Cryptogr., 2018

Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness.
Des. Codes Cryptogr., 2018

Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system.
Des. Codes Cryptogr., 2018

Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption.
Cryptography, 2018

Computational Robust Fuzzy Extractor.
Comput. J., 2018

Public-Key Encryption with Tight Simulation-Based Selective-Opening Security.
Comput. J., 2018

Tightly Secure Encryption Schemes against Related-Key Attacks.
Comput. J., 2018

Function Recognition in Stripped Binary of Embedded Devices.
IEEE Access, 2018

Bidirectional Mobile Offloading in LTE-U and WiFi Coexistence Systems.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Robustly Reusable Fuzzy Extractor from Standard Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

Reusable Fuzzy Extractor from LWE.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption.
Security and Communication Networks, 2017

Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman.
Inf. Sci., 2017

Insight of the protection for data security under selective opening attacks.
Inf. Sci., 2017

Applying Binary Patch Comparison to Cisco IOS.
Proceedings of the VI International Conference on Network, Communication and Computingm, 2017

Detecting Remote Access Trojans through External Control at Area Network Borders.
Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems, 2017

Tightly-Secure Signatures from the Decisional Composite Residuosity Assumption.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

KDM-Secure Public-Key Encryption from Constant-Noise LPN.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Efficient chosen ciphertext secure identity-based encryption against key leakage attacks.
Security and Communication Networks, 2016

Public key cryptosystems secure against memory leakage attacks.
IET Information Security, 2016

Super-Strong RKA Secure MAC, PKE and SE from Tag-based Hash Proof System.
IACR Cryptology ePrint Archive, 2016

How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

Homomorphic Linear Authentication Schemes from (ε)-Authentication Codes.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption.
IEEE Trans. Information Forensics and Security, 2015

A note on the security of KHL scheme.
Theor. Comput. Sci., 2015

n-Evasive all-but-many lossy trapdoor function and its constructions.
Security and Communication Networks, 2015

Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience.
IET Information Security, 2015

Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited.
Applied Mathematics and Computer Science, 2015

Prediction and Clustering of User Relationship in Social Network.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Continuous Non-malleable Key Derivation and Its Application to Related-Key Security.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Server-Aided Revocable Identity-Based Encryption.
Proceedings of the Computer Security - ESORICS 2015, 2015

Non-malleability Under Selective Opening Attacks: Implication and Separation.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Efficient computation outsourcing for inverting a class of homomorphic functions.
Inf. Sci., 2014

Public-key encryption scheme with selective opening chosen-ciphertext security based on the Decisional Diffie-Hellman assumption.
Concurrency and Computation: Practice and Experience, 2014

High-Payload Image-Hiding Scheme Based on Best-Block Matching and Multi-layered Syndrome-Trellis Codes.
Proceedings of the Web Information Systems Engineering - WISE 2014, 2014

Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Proofs of Retrievability Based on MRD Codes.
Proceedings of the Information Security Practice and Experience, 2014

Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

2013
Efficient chosen ciphertext secure public-key encryption under factoring assumption.
Security and Communication Networks, 2013

The Hamiltonian Structure-Preserving Control and Some Applications to Nonlinear Astrodynamics.
J. Applied Mathematics, 2013

Efficient Computation Outsourcing for Inverting a Class of Homomorphic Functions.
IACR Cryptology ePrint Archive, 2013

Proofs of Data Possession and Retrievability Based on MRD Codes.
IACR Cryptology ePrint Archive, 2013

Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Efficient Leakage-Resilient Identity-Based Encryption with CCA Security.
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013

Fixing the Sender-Equivocable Encryption Scheme in Eurocrypt 2010.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

Security Model and Analysis of FHMQV, Revisited.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Leakage-resilient lossy trapdoor functions and public-key encryption.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption.
Proceedings of the Network and System Security - 6th International Conference, 2012

Zero-Value Point Attacks on Kummer-Based Cryptosystem.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption.
J. Inf. Sci. Eng., 2011

Key updating technique in identity-based encryption.
Inf. Sci., 2011

General Construction of Chameleon All-But-One Trapdoor Functions.
Proceedings of the Provable Security - 5th International Conference, 2011

Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Homomorphic Linear Authentication Schemes for Proofs of Retrievability.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

An Adaptive Control Method of Shunt Active Power Filter DC Bus Voltage.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

2010
New Constructions for Identity-Based Unidirectional Proxy Re-Encryption.
J. Comput. Sci. Technol., 2010

Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings.
Inf. Sci., 2010

Efficient CCA-Secure PKE from Identity-Based Techniques.
Proceedings of the Topics in Cryptology, 2010

2009
Provably Secure Identity-based Threshold Key Escrow from Pairing.
I. J. Network Security, 2009

AE-BP: Adaptive Erasure Belief Propagation Decoding Algorithm of LDPC Codes.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

RSA-Based Certificateless Public Key Encryption.
Proceedings of the Information Security Practice and Experience, 2009

2008
Identity-Based Parallel Key-Insulated Signature Without Random Oracles.
J. Inf. Sci. Eng., 2008

Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme.
J. Comput. Sci. Technol., 2008

Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings.
IACR Cryptology ePrint Archive, 2008

Identity-Based Parallel Key-Insulated Signature: Framework and Construction.
Journal of Research and Practice in Information Technology, 2008

A New-Style Domain Integrating Management of Windows and UNIX.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Collecting Internet Malware Based on Client-side Honeypot.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Identity-Based Threshold Key-Insulated Encryption without Random Oracles.
Proceedings of the Topics in Cryptology, 2008

Chosen-Ciphertext Secure Proxy Re-encryption without Pairings.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
ID-based restrictive partially blind signatures and applications.
Journal of Systems and Software, 2007

On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature.
IACR Cryptology ePrint Archive, 2007

Pirate decoder for the broadcast encryption schemes from Crypto 2005.
Science in China Series F: Information Sciences, 2007

ID-based threshold decryption secure against adaptive chosen-ciphertext attack.
Computers & Electrical Engineering, 2007

Identity-Based Threshold Decryption Revisited.
Proceedings of the Information Security Practice and Experience, 2007

2006
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing.
Informatica, Lith. Acad. Sci., 2006

Cryptanalysis of REESSE1+ Public Key Cryptosystem.
IACR Cryptology ePrint Archive, 2006

Analysis and improvement of fair certified e-mail delivery protocol.
Computer Standards & Interfaces, 2006

Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction.
Proceedings of the Progress in Cryptology, 2006

Identity-Based Key-Insulated Signature with Secure Key-Updates.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

Identity-Based Key-Insulated Signature Without Random Oracles.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
ID-based Restrictive Partially Blind Signatures and Applications.
IACR Cryptology ePrint Archive, 2005

Transitive Signatures Based on Bilinear Maps.
Proceedings of the Security in Information Systems, 2005

Efficient and Proactive Threshold Signcryption.
Proceedings of the Information Security, 8th International Conference, 2005

ID-Based Restrictive Partially Blind Signatures.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Authenticating Tripartite Key Agreement Protocol with Pairings.
J. Comput. Sci. Technol., 2004

2003
Cryptanalysis of B.Lee-S.Kim-K.Kim Proxy Signature.
IACR Cryptology ePrint Archive, 2003

A Practical Protocol for Advantage Distillation and Information Reconciliation.
Des. Codes Cryptogr., 2003

2002
Attack on A New Public Key Cryptosystem from ISC'02 (LNCS 2433).
IACR Cryptology ePrint Archive, 2002

ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings.
IACR Cryptology ePrint Archive, 2002

A Spatial Constraint Template Problem.
Proceedings of the Seventh International Conference on CSCW in Design, 2002

Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2000
On Molecular Polarizability: 3. Relationship to the Ionization Potential of Haloalkanes, Amines, Alcohols, and Ethers.
Journal of Chemical Information and Computer Sciences, 2000

1999
An Authetnication Scheme over Non-Authentic Public Channel in Information-Theoretic Secret-Key Agreement.
Proceedings of the Applied Algebra, 1999


  Loading...