Sherman S. M. Chow
According to our database^{1},
Sherman S. M. Chow
authored at least 163 papers
between 2003 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
Homepages:

at orcid.org
On csauthors.net:
Bibliography
2019
Forkfree hybrid consensus with flexible ProofofActivity.
Future Generation Comp. Syst., 2019
Let a Nonbarking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog.
Proceedings of the PublicKey Cryptography  PKC 2019, 2019
StructurePreserving Certificateless Encryption and Its Application.
Proceedings of the Topics in Cryptology  CTRSA 2019, 2019
2018
Outsourced Biometric Identification With Privacy.
IEEE Trans. Information Forensics and Security, 2018
Searchable Encryption over FeatureRich Data.
IEEE Trans. Dependable Sec. Comput., 2018
Multiauthority finegrained access control with accountability and its application in cloud.
J. Network and Computer Applications, 2018
Geosocial Query with UserControlled Privacy.
IACR Cryptology ePrint Archive, 2018
Can you find the one for me? PrivacyPreserving Matchmaking via Threshold PSI.
IACR Cryptology ePrint Archive, 2018
Can You Find The One for Me?
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018
Simple PasswordHardened Encryption Services.
Proceedings of the 27th USENIX Security Symposium, 2018
Position Paper on Blockchain Technology: Smart Contract and Applications.
Proceedings of the Network and System Security  12th International Conference, 2018
InstantCryptoGram: Secure Image Retrieval Service.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Systematic Market Control of Cryptocurrency Inflations.
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, 2018
Multikey Homomorphic Signatures Unforgeable Under Insider Corruption.
Proceedings of the Advances in Cryptology  ASIACRYPT 2018, 2018
2017
Are you The One to Share? Secret Transfer with Access Structure.
PoPETs, 2017
ForkingFree Hybrid Consensus with Generalized ProofofActivity.
IACR Cryptology ePrint Archive, 2017
Efficient Sanitizable Signatures without Random Oracles.
IACR Cryptology ePrint Archive, 2017
ForwardSecure Searchable Encryption on Labeled Bipartite Graphs.
IACR Cryptology ePrint Archive, 2017
Geosocial query with usercontrolled privacy.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Phoenix: Rebirth of a Cryptographic PasswordHardening Service.
Proceedings of the 26th USENIX Security Symposium, 2017
Secure Strategyproof AscendingPrice Spectrum Auction.
Proceedings of the IEEE Symposium on PrivacyAware Computing, 2017
Real Hidden IdentityBased Signatures.
Proceedings of the Financial Cryptography and Data Security, 2017
PrivacyPreserving Decision Trees Evaluation via Linear Functions.
Proceedings of the Computer Security  ESORICS 2017, 2017
Updatable BlockLevel MessageLocked Encryption.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
ForwardSecure Searchable Encryption on Labeled Bipartite Graphs.
Proceedings of the Applied Cryptography and Network Security, 2017
2016
Secure Cloud Storage Meets with Secure Network Coding.
IEEE Trans. Computers, 2016
Special Issue on Security and Privacy in Mobile Clouds.
Pervasive and Mobile Computing, 2016
A Zoo of Homomorphic Signatures: MultiKey and KeyHomomorphism.
IACR Cryptology ePrint Archive, 2016
Faulty Instantiations of Threshold Ring Signature from Threshold ProofofKnowledge Protocol.
Comput. J., 2016
Securing Fast Learning! Ridge Regression over Encrypted Big Data.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
PrivacyPreserving Multipattern Matching.
Proceedings of the Security and Privacy in Communication Networks, 2016
Parallel and Dynamic Structured Encryption.
Proceedings of the Security and Privacy in Communication Networks, 2016
A Framework of MultiAuthority AttributeBased Encryption with Outsourcing and Revocation.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
Towards Proofs of Ownership Beyond Bounded Leakage.
Proceedings of the Provable Security, 2016
NonMalleable Functions and Their Applications.
Proceedings of the PublicKey Cryptography  PKC 2016, 2016
Privacy Preserving Credit Systems.
Proceedings of the Network and System Security  10th International Conference, 2016
Another Look at Anonymous Communication  Security and Modular Constructions.
Proceedings of the Paradigms in Cryptology  Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
PrivacyPreserving WiFi Fingerprinting Indoor Localization.
Proceedings of the Advances in Information and Computer Security, 2016
Cryptography for Parallel RAM from Indistinguishability Obfuscation.
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016
Efficient Sanitizable Signatures Without Random Oracles.
Proceedings of the Computer Security  ESORICS 2016, 2016
Combiners for ChosenCiphertext Security.
Proceedings of the Computing and Combinatorics  22nd International Conference, 2016
Efficient Authenticated MultiPattern Matching.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
PasswordControlled Encryption with Accountable BreakGlass Access.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Functional Credentials for Internet of Things.
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, 2016
2015
TimeBound Anonymous Authentication for Roaming Networks.
IEEE Trans. Information Forensics and Security, 2015
Postchallenge leakage in publickey encryption.
Theor. Comput. Sci., 2015
Practical (fully) distributed signatures provably secure in the standard model.
Theor. Comput. Sci., 2015
Are you The One to Share? Secret Transfer with Access Structure.
IACR Cryptology ePrint Archive, 2015
NonMalleable Functions and Their Applications.
IACR Cryptology ePrint Archive, 2015
ComputationTrace Indistinguishability Obfuscation and its Applications.
IACR Cryptology ePrint Archive, 2015
Comments on 'Efficient Revocable Certificateless Encryption Secure in the Standard Model'.
Comput. J., 2015
BlackBox Separations of HashandSign Signatures in the NonProgrammable Random Oracle Model.
Proceedings of the Provable Security, 2015
Structured Encryption with Noninteractive Updates and Parallel Traversal.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
Privacy Preserving Collaborative Filtering from Asymmetric Randomized Encoding.
Proceedings of the Financial Cryptography and Data Security, 2015
Related Randomness Attacks for Public Key Cryptosystems.
Proceedings of the 10th ACM Symposium on Information, 2015
2014
KeyAggregate Cryptosystem for Scalable Data Sharing in Cloud Storage.
IEEE Trans. Parallel Distrib. Syst., 2014
CloudAssisted MobileAccess of Health Data With Privacy and Auditability.
IEEE J. Biomedical and Health Informatics, 2014
Exponentinversion Signatures and IBE under Static Assumptions.
IACR Cryptology ePrint Archive, 2014
Secure Friend Discovery via PrivacyPreserving and Decentralized Community Detection.
CoRR, 2014
Secure cloud storage meets with secure network coding.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage.
Proceedings of the Computer Security  ESORICS 2014, 2014
Practical Distributed Signatures in the Standard Model.
Proceedings of the Topics in Cryptology  CTRSA 2014, 2014
Practical DualReceiver Encryption  Soundness, Complete Nonmalleability, and Applications.
Proceedings of the Topics in Cryptology  CTRSA 2014, 2014
A tale of two clouds: Computing on data encrypted under multiple keys.
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Security of Direct Anonymous Authentication Using TPM 2.0 Signature  A Possible Implementation Flaw.
Proceedings of the Information Security and Cryptology  10th International Conference, 2014
Trapdoors for Ideal Lattices with Applications.
Proceedings of the Information Security and Cryptology  10th International Conference, 2014
Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
AllbutOne Dual Projective Hashing and Its Applications.
Proceedings of the Applied Cryptography and Network Security, 2014
2013
PrivacyPreserving Public Auditing for Secure Cloud Storage.
IEEE Trans. Computers, 2013
ConstantSize Dynamic $k$ Times Anonymous Authentication.
IEEE Systems Journal, 2013
Serveraided signatures verification secure against collusion attack.
Inf. Sec. Techn. Report, 2013
Doubletrapdoor anonymous tags for traceable signatures.
Int. J. Inf. Sec., 2013
Practical DualReceiver Encryption  Soundness, Complete NonMalleability, and Applications.
IACR Cryptology ePrint Archive, 2013
Towards Anonymous Ciphertext Indistinguishability with Identity Leakage.
Proceedings of the Provable Security  7th International Conference, 2013
Storing Shared Data on the Cloud via SecurityMediator.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013
Accumulators and UProve Revocation.
Proceedings of the Financial Cryptography and Data Security, 2013
Computing encrypted cloud data efficiently under multiple keys.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Towards auditable cloudassisted access of encrypted health data.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Secure OnetoGroup Communications EscrowFree IDBased Asymmetric Group Key Agreement.
Proceedings of the Information Security and Cryptology  9th International Conference, 2013
Multikey leakageresilient threshold cryptography.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
ZeroKnowledge Argument for Simultaneous Discrete Logarithms.
Algorithmica, 2012
IdentityBased Encryption Resilient to Continual Auxiliary Leakage.
Proceedings of the Advances in Cryptology  EUROCRYPT 2012, 2012
PE(AR)2: PrivacyEnhanced Anonymous Authentication with Reputation and Revocation.
Proceedings of the Computer Security  ESORICS 2012, 2012
Dynamic Secure Cloud Storage with Provenance.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
SPICE  Simple PrivacyPreserving IdentityManagement for Cloud Environment.
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Exclusionintersection encryption.
IJSN, 2011
Optimal Sybilresilient node admission control.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Efficient Secure TwoParty Exponentiation.
Proceedings of the Topics in Cryptology  CTRSA 2011, 2011
Noninteractive Confirmer Signatures.
Proceedings of the Topics in Cryptology  CTRSA 2011, 2011
Multiauthority ciphertextpolicy attributebased encryption with accountability.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Secure mobile subscription of sensorencrypted data.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Identitybased online/offline key encapsulation and encryption.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Serveraided signatures verification secure against collusion attack.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
DoubleTrapdoor Anonymous Tags for Traceable Signatures.
Proceedings of the Applied Cryptography and Network Security, 2011
2010
An efficient signcryption scheme with key privacy and its extension to ring signcryption.
Journal of Computer Security, 2010
IdentityBased Online/Offline Key Encapsulation and Encryption.
IACR Cryptology ePrint Archive, 2010
Brief announcement: improving socialnetworkbased sybilresilient node admission control.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010
ZeroKnowledge Argument for Simultaneous Discrete Logarithms.
Proceedings of the Computing and Combinatorics, 16th Annual International Conference, 2010
Practical leakageresilient identitybased encryption from simple assumptions.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Efficient Unidirectional Proxy ReEncryption.
Proceedings of the Progress in Cryptology, 2010
2009
Certificateless Encryption.
Proceedings of the IdentityBased Cryptography, 2009
Partial decryption attacks in securitymediated certificateless encryption.
IET Information Security, 2009
PrivacyPreserving Public Auditing for Secure Cloud Storage.
IACR Cryptology ePrint Archive, 2009
Efficient Unidirectional Proxy ReEncryption.
IACR Cryptology ePrint Archive, 2009
Blind signature and ring signature schemes: Rehabilitation and attack.
Computer Standards & Interfaces, 2009
Real Traceable Signatures.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009
Removing Escrow from IdentityBased Encryption.
Proceedings of the Public Key Cryptography, 2009
TwoParty Computation Model for PrivacyPreserving Queries over Distributed Databases.
Proceedings of the Network and Distributed System Security Symposium, 2009
Improving privacy and security in multiauthority attributebased encryption.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Conditional Proxy Broadcast ReEncryption.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2008
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model.
J. UCS, 2008
Multiplicative ForwardSecure Threshold Signature Scheme.
I. J. Network Security, 2008
MultiDesignated Verifiers Signatures Revisited.
I. J. Network Security, 2008
General Certificateless Encryption and TimedRelease Encryption.
IACR Cryptology ePrint Archive, 2008
General Certificateless Encryption and TimedRelease Encryption.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
TimedRelease Encryption Revisited.
Proceedings of the Provable Security, Second International Conference, 2008
Robust ReceiptFree Election System with Ballot Secrecy and Verifiability.
Proceedings of the Network and Distributed System Security Symposium, 2008
Proxy Resignatures in the Standard Model.
Proceedings of the Information Security, 11th International Conference, 2008
2007
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model.
IACR Cryptology ePrint Archive, 2007
Certificateless Ring Signatures.
IACR Cryptology ePrint Archive, 2007
StronglySecure Identitybased Key Agreement and Anonymous Extension.
IACR Cryptology ePrint Archive, 2007
Batch Pairing Delegation.
Proceedings of the Advances in Information and Computer Security, 2007
StronglySecure IdentityBased Key Agreement and Anonymous Extension.
Proceedings of the Information Security, 10th International Conference, 2007
TokenControlled Public Key Encryption in the Standard Model.
Proceedings of the Information Security, 10th International Conference, 2007
An Efficient Signcryption Scheme with Key Privacy.
Proceedings of the Public Key Infrastructure, 2007
Anonymous Identification and DesignatedVerifiers Signatures from Insecure Batch Verification.
Proceedings of the Public Key Infrastructure, 2007
Running on Karma  P2P Reputation and Currency Systems.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
Security Mediated Certificateless Signatures.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
Generic Construction of (Identitybased) Perfect Concurrent Signatures.
IACR Cryptology ePrint Archive, 2006
Practical electronic lotteries with offline TTP.
Computer Communications, 2006
Escrowed Linkability of Ring Signatures and Its Applications.
Proceedings of the Progressin Cryptology, 2006
SecurityMediated Certificateless Cryptography.
Proceedings of the Public Key Cryptography, 2006
IdentityBased Strong MultiDesignated Verifiers Signatures.
Proceedings of the Public Key Infrastructure, 2006
Short Linkable Ring Signatures Revisited.
Proceedings of the Public Key Infrastructure, 2006
Ring signatures without random oracles.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
2005
A generic antispyware solution by access control list at kernel level.
Journal of Systems and Software, 2005
ExclusionIntersection Encryption.
IACR Cryptology ePrint Archive, 2005
Ring Signatures without Random Oracles.
IACR Cryptology ePrint Archive, 2005
Forwardsecure multisignature and blind signature schemes.
Applied Mathematics and Computation, 2005
Signcryption in Hierarchical Identity Based Cryptosystem.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Identity Based Delegation Network.
Proceedings of the Progress in Cryptology, 2005
Short ECash.
Proceedings of the Progress in Cryptology, 2005
Separable and Anonymous IdentityBased Key Issuing.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Supporting Efficient Authorization in Delegation with Supervision.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Generic Construction of (IdentityBased) Perfect Concurrent Signatures.
Proceedings of the Information and Communications Security, 7th International Conference, 2005
An eLottery Scheme Using Verifiable Random Function.
Proceedings of the Computational Science and Its Applications, 2005
Identity Based Ring Signature: Why, How and What Next.
Proceedings of the Public Key Infrastructure, 2005
Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
Efficient Identity Based Ring Signature.
Proceedings of the Applied Cryptography and Network Security, 2005
Role Activation Management in Role Based Access Control.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
Two Improved Partially Blind Signature Schemes from Bilinear Pairings.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
Separable and Anonymous IdentityBased Key Issuing.
IACR Cryptology ePrint Archive, 2004
Signcryption in Hierarchical Identity Based Cryptosystem.
IACR Cryptology ePrint Archive, 2004
Efficient Identity Based Ring Signature.
IACR Cryptology ePrint Archive, 2004
Two Improved Partially Blind Signature Schemes from Bilinear Pairings.
IACR Cryptology ePrint Archive, 2004
Identity Based Threshold Ring Signature.
IACR Cryptology ePrint Archive, 2004
Security Flaws in a Pairingbased Group Signature Scheme.
IACR Cryptology ePrint Archive, 2004
Verifiable Pairing and Its Applications.
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Identity Based Threshold Ring Signature.
Proceedings of the Information Security and Cryptology, 2004
Secure Hierarchical Identity Based Signature and Its Application.
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Impact of Recent Advances in Crytography on Online Game.
Proceedings of the 3rd International Conference on Application and Development of Computer Games (ADCOG 2004) held on 2627 April 2004 in City University of Hong Kong, 2004
2003
A Secure Modified IDBased Undeniable Signature Scheme.
IACR Cryptology ePrint Archive, 2003
Efficient Forward and Provably Secure IDBased Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity.
Proceedings of the Information Security and Cryptology, 2003