Sherman S. M. Chow

According to our database1, Sherman S. M. Chow authored at least 150 papers between 2003 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Introduction to the Special Issue on Cryptographic Engineering for Internet of Things: Security Foundations, Lightweight Solutions, and Attacks.
ACM Trans. Embedded Comput. Syst., 2019

Another Look at Anonymous Communication.
IEEE Trans. Dependable Sec. Comput., 2019

Forward and Backward-Secure Range-Searchable Symmetric Encryption.
IACR Cryptology ePrint Archive, 2019

Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption.
IACR Cryptology ePrint Archive, 2019

Universal Location Referencing and Homomorphic Evaluation of Geospatial Query.
IACR Cryptology ePrint Archive, 2019

Fork-free hybrid consensus with flexible Proof-of-Activity.
Future Generation Comp. Syst., 2019

Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Structure-Preserving Certificateless Encryption and Its Application.
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019

Fast-to-Finalize Nakamoto-Like Consensus.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Outsourced Biometric Identification With Privacy.
IEEE Trans. Information Forensics and Security, 2018

Searchable Encryption over Feature-Rich Data.
IEEE Trans. Dependable Sec. Comput., 2018

Multi-authority fine-grained access control with accountability and its application in cloud.
J. Network and Computer Applications, 2018

Can you find the one for me? Privacy-Preserving Matchmaking via Threshold PSI.
IACR Cryptology ePrint Archive, 2018

Can You Find The One for Me?
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

Simple Password-Hardened Encryption Services.
Proceedings of the 27th USENIX Security Symposium, 2018

Position Paper on Blockchain Technology: Smart Contract and Applications.
Proceedings of the Network and System Security - 12th International Conference, 2018

Sharding Blockchain.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

InstantCryptoGram: Secure Image Retrieval Service.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Systematic Market Control of Cryptocurrency Inflations.
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, 2018

Multi-key Homomorphic Signatures Unforgeable Under Insider Corruption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Are you The One to Share? Secret Transfer with Access Structure.
PoPETs, 2017

Forking-Free Hybrid Consensus with Generalized Proof-of-Activity.
IACR Cryptology ePrint Archive, 2017

Geosocial query with user-controlled privacy.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Phoenix: Rebirth of a Cryptographic Password-Hardening Service.
Proceedings of the 26th USENIX Security Symposium, 2017

Secure Strategyproof Ascending-Price Spectrum Auction.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Real Hidden Identity-Based Signatures.
Proceedings of the Financial Cryptography and Data Security, 2017

Privacy-Preserving Decision Trees Evaluation via Linear Functions.
Proceedings of the Computer Security - ESORICS 2017, 2017

Updatable Block-Level Message-Locked Encryption.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Forward-Secure Searchable Encryption on Labeled Bipartite Graphs.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Special Issue on Security and Privacy in Mobile Clouds.
Pervasive and Mobile Computing, 2016

A Zoo of Homomorphic Signatures: Multi-Key and Key-Homomorphism.
IACR Cryptology ePrint Archive, 2016

Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol.
Comput. J., 2016

Securing Fast Learning! Ridge Regression over Encrypted Big Data.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Privacy-Preserving Multi-pattern Matching.
Proceedings of the Security and Privacy in Communication Networks, 2016

Parallel and Dynamic Structured Encryption.
Proceedings of the Security and Privacy in Communication Networks, 2016

A Framework of Multi-Authority Attribute-Based Encryption with Outsourcing and Revocation.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Towards Proofs of Ownership Beyond Bounded Leakage.
Proceedings of the Provable Security, 2016

Non-Malleable Functions and Their Applications.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Privacy Preserving Credit Systems.
Proceedings of the Network and System Security - 10th International Conference, 2016

Another Look at Anonymous Communication - Security and Modular Constructions.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization.
Proceedings of the Advances in Information and Computer Security, 2016

Cryptography for Parallel RAM from Indistinguishability Obfuscation.
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016

Efficient Sanitizable Signatures Without Random Oracles.
Proceedings of the Computer Security - ESORICS 2016, 2016

Combiners for Chosen-Ciphertext Security.
Proceedings of the Computing and Combinatorics - 22nd International Conference, 2016

Efficient Authenticated Multi-Pattern Matching.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Password-Controlled Encryption with Accountable Break-Glass Access.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Functional Credentials for Internet of Things.
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, 2016

2015
Time-Bound Anonymous Authentication for Roaming Networks.
IEEE Trans. Information Forensics and Security, 2015

Post-challenge leakage in public-key encryption.
Theor. Comput. Sci., 2015

Practical (fully) distributed signatures provably secure in the standard model.
Theor. Comput. Sci., 2015

Are you The One to Share? Secret Transfer with Access Structure.
IACR Cryptology ePrint Archive, 2015

Computation-Trace Indistinguishability Obfuscation and its Applications.
IACR Cryptology ePrint Archive, 2015

Comments on 'Efficient Revocable Certificateless Encryption Secure in the Standard Model'.
Comput. J., 2015

Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model.
Proceedings of the Provable Security, 2015

Structured Encryption with Non-interactive Updates and Parallel Traversal.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Privacy Preserving Collaborative Filtering from Asymmetric Randomized Encoding.
Proceedings of the Financial Cryptography and Data Security, 2015

Related Randomness Attacks for Public Key Cryptosystems.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage.
IEEE Trans. Parallel Distrib. Syst., 2014

Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability.
IEEE J. Biomedical and Health Informatics, 2014

Exponent-inversion Signatures and IBE under Static Assumptions.
IACR Cryptology ePrint Archive, 2014

Secure cloud storage meets with secure network coding.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage.
Proceedings of the Computer Security - ESORICS 2014, 2014

Practical Distributed Signatures in the Standard Model.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Practical Dual-Receiver Encryption - Soundness, Complete Non-malleability, and Applications.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

A tale of two clouds: Computing on data encrypted under multiple keys.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Security of Direct Anonymous Authentication Using TPM 2.0 Signature - A Possible Implementation Flaw.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

Trapdoors for Ideal Lattices with Applications.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

All-but-One Dual Projective Hashing and Its Applications.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Privacy-Preserving Public Auditing for Secure Cloud Storage.
IEEE Trans. Computers, 2013

Constant-Size Dynamic $k$ -Times Anonymous Authentication.
IEEE Systems Journal, 2013

Towards Anonymous Ciphertext Indistinguishability with Identity Leakage.
Proceedings of the Provable Security - 7th International Conference, 2013

Storing Shared Data on the Cloud via Security-Mediator.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Accumulators and U-Prove Revocation.
Proceedings of the Financial Cryptography and Data Security, 2013

Computing encrypted cloud data efficiently under multiple keys.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Towards auditable cloud-assisted access of encrypted health data.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Multi-key leakage-resilient threshold cryptography.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Identity-Based Encryption Resilient to Continual Auxiliary Leakage.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation.
Proceedings of the Computer Security - ESORICS 2012, 2012

Dynamic Secure Cloud Storage with Provenance.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Exclusion-intersection encryption.
IJSN, 2011

Optimal Sybil-resilient node admission control.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Efficient Secure Two-Party Exponentiation.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

Non-interactive Confirmer Signatures.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

Multi-authority ciphertext-policy attribute-based encryption with accountability.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Secure mobile subscription of sensor-encrypted data.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Identity-based online/offline key encapsulation and encryption.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Server-aided signatures verification secure against collusion attack.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Double-Trapdoor Anonymous Tags for Traceable Signatures.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
An efficient signcryption scheme with key privacy and its extension to ring signcryption.
Journal of Computer Security, 2010

Brief announcement: improving social-network-based sybil-resilient node admission control.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Zero-Knowledge Argument for Simultaneous Discrete Logarithms.
Proceedings of the Computing and Combinatorics, 16th Annual International Conference, 2010

Practical leakage-resilient identity-based encryption from simple assumptions.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Efficient Unidirectional Proxy Re-Encryption.
Proceedings of the Progress in Cryptology, 2010

2009
Certificateless Encryption.
Proceedings of the Identity-Based Cryptography, 2009

Partial decryption attacks in security-mediated certificateless encryption.
IET Information Security, 2009

Privacy-Preserving Public Auditing for Secure Cloud Storage.
IACR Cryptology ePrint Archive, 2009

Blind signature and ring signature schemes: Rehabilitation and attack.
Computer Standards & Interfaces, 2009

Real Traceable Signatures.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

Removing Escrow from Identity-Based Encryption.
Proceedings of the Public Key Cryptography, 2009

Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases.
Proceedings of the Network and Distributed System Security Symposium, 2009

Improving privacy and security in multi-authority attribute-based encryption.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Conditional Proxy Broadcast Re-Encryption.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model.
J. UCS, 2008

Multiplicative Forward-Secure Threshold Signature Scheme.
I. J. Network Security, 2008

Multi-Designated Verifiers Signatures Revisited.
I. J. Network Security, 2008

General Certificateless Encryption and Timed-Release Encryption.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Timed-Release Encryption Revisited.
Proceedings of the Provable Security, Second International Conference, 2008

Robust Receipt-Free Election System with Ballot Secrecy and Verifiability.
Proceedings of the Network and Distributed System Security Symposium, 2008

Proxy Re-signatures in the Standard Model.
Proceedings of the Information Security, 11th International Conference, 2008

2007
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model.
IACR Cryptology ePrint Archive, 2007

Certificateless Ring Signatures.
IACR Cryptology ePrint Archive, 2007

Batch Pairing Delegation.
Proceedings of the Advances in Information and Computer Security, 2007

Strongly-Secure Identity-Based Key Agreement and Anonymous Extension.
Proceedings of the Information Security, 10th International Conference, 2007

Token-Controlled Public Key Encryption in the Standard Model.
Proceedings of the Information Security, 10th International Conference, 2007

An Efficient Signcryption Scheme with Key Privacy.
Proceedings of the Public Key Infrastructure, 2007

Anonymous Identification and Designated-Verifiers Signatures from Insecure Batch Verification.
Proceedings of the Public Key Infrastructure, 2007

Running on Karma - P2P Reputation and Currency Systems.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

Security Mediated Certificateless Signatures.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Practical electronic lotteries with offline TTP.
Computer Communications, 2006

Escrowed Linkability of Ring Signatures and Its Applications.
Proceedings of the Progressin Cryptology, 2006

Security-Mediated Certificateless Cryptography.
Proceedings of the Public Key Cryptography, 2006

Identity-Based Strong Multi-Designated Verifiers Signatures.
Proceedings of the Public Key Infrastructure, 2006

Short Linkable Ring Signatures Revisited.
Proceedings of the Public Key Infrastructure, 2006

Ring signatures without random oracles.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
A generic anti-spyware solution by access control list at kernel level.
Journal of Systems and Software, 2005

Exclusion-Intersection Encryption.
IACR Cryptology ePrint Archive, 2005

Ring Signatures without Random Oracles.
IACR Cryptology ePrint Archive, 2005

Forward-secure multisignature and blind signature schemes.
Applied Mathematics and Computation, 2005

Signcryption in Hierarchical Identity Based Cryptosystem.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Identity Based Delegation Network.
Proceedings of the Progress in Cryptology, 2005

Short E-Cash.
Proceedings of the Progress in Cryptology, 2005

Separable and Anonymous Identity-Based Key Issuing.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Supporting Efficient Authorization in Delegation with Supervision.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Generic Construction of (Identity-Based) Perfect Concurrent Signatures.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

An e-Lottery Scheme Using Verifiable Random Function.
Proceedings of the Computational Science and Its Applications, 2005

Identity Based Ring Signature: Why, How and What Next.
Proceedings of the Public Key Infrastructure, 2005

Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

Efficient Identity Based Ring Signature.
Proceedings of the Applied Cryptography and Network Security, 2005

Role Activation Management in Role Based Access Control.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

Two Improved Partially Blind Signature Schemes from Bilinear Pairings.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
Security Flaws in a Pairing-based Group Signature Scheme.
IACR Cryptology ePrint Archive, 2004

Verifiable Pairing and Its Applications.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Identity Based Threshold Ring Signature.
Proceedings of the Information Security and Cryptology, 2004

Secure Hierarchical Identity Based Signature and Its Application.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Impact of Recent Advances in Crytography on Online Game.
Proceedings of the 3rd International Conference on Application and Development of Computer Games (ADCOG 2004) held on 26-27 April 2004 in City University of Hong Kong, 2004

2003
A Secure Modified ID-Based Undeniable Signature Scheme.
IACR Cryptology ePrint Archive, 2003

Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity.
Proceedings of the Information Security and Cryptology, 2003


  Loading...