Sherman S. M. Chow

Orcid: 0000-0001-7306-453X

Affiliations:
  • The Chinese University of Hong Kong, Sha Tin, Hong Kong


According to our database1, Sherman S. M. Chow authored at least 183 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Shielding Graph for eXact Analytics With SGX.
IEEE Trans. Dependable Secur. Comput., 2023

On Sustainable Ring-based Anonymous Systems.
IACR Cryptol. ePrint Arch., 2023

Sanitizing Sentence Embeddings (and Labels) for Local Differential Privacy.
Proceedings of the ACM Web Conference 2023, 2023

SoK: Cryptographic Neural-Network Computation.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

How (Not) to Build Threshold EdDSA.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Real Threshold ECDSA.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Unconditionally Secure Access Control Encryption.
Proceedings of the IEEE International Symposium on Information Theory, 2023

Towards Decentralized Adaptive Control of Cryptocurrency Liquidity via Auction.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

SMART Credentials in the Multi-queue of Slackness (or Secure Management of Anonymous Reputation Traits without Global Halting).
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Cryptography-Inspired Federated Learning for Generative Adversarial Networks and Meta Learning.
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023

Secure Softmax/Sigmoid for Machine-learning Computation.
Proceedings of the Annual Computer Security Applications Conference, 2023

Anonymous (Hierarchical) Identity-Based Encryption from Broader Assumptions.
Proceedings of the Applied Cryptography and Network Security, 2023

Scored Anonymous Credentials.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions.
IEEE Trans. Dependable Secur. Comput., 2022

Forward and Backward-Secure Range-Searchable Symmetric Encryption.
Proc. Priv. Enhancing Technol., 2022

Non-Malleable Functions and their Applications.
J. Cryptol., 2022

Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication.
CoRR, 2022

Omnes pro uno: Practical Multi-Writer Encrypted Database.
Proceedings of the 31st USENIX Security Symposium, 2022

Secure-Computation-Friendly Private Set Intersection from Oblivious Compact Graph Evaluation.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Don't Tamper with Dual System Encryption - Beyond Polynomial Related-Key Security of IBE.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
Updatable Block-Level Message-Locked Encryption.
IEEE Trans. Dependable Secur. Comput., 2021

Editorial for accountability and privacy issues in blockchain and cryptocurrency.
Future Gener. Comput. Syst., 2021

Universal location referencing and homomorphic evaluation of geospatial query.
Comput. Secur., 2021

GForce: GPU-Friendly Oblivious and Rapid Neural Network Inference.
Proceedings of the 30th USENIX Security Symposium, 2021

Cross-Domain Access Control Encryption: Arbitrary-policy, Constant-size, Efficient.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Let's Stride Blindfolded in a Forest: Sublinear Multi-Client Decision Trees Evaluation.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

LDSP: Shopping with Cryptocurrency Privately and Quickly under Leadership.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-maps - (A Slot in Need is a Slot Indeed).
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

Sipster: Settling IOU Privately and Quickly with Smart Meters.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

Access Control Encryption from Group Encryption.
Proceedings of the Applied Cryptography and Network Security, 2021

Differential Privacy for Text Analytics via Natural Text Sanitization.
Proceedings of the Findings of the Association for Computational Linguistics: ACL/IJCNLP 2021, 2021

Goten: GPU-Outsourcing Trusted Execution of Neural Network Training.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Multi-Client Oblivious RAM with Poly-Logarithmic Communication.
IACR Cryptol. ePrint Arch., 2020

Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions.
CoRR, 2020

Learning Model with Error - Exposing the Hidden Model of BAYHENN.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Stargazing in the Dark: Secure Skyline Queries with SGX.
Proceedings of the Database Systems for Advanced Applications, 2020

2019
Introduction to the Special Issue on Cryptographic Engineering for Internet of Things: Security Foundations, Lightweight Solutions, and Attacks.
ACM Trans. Embed. Comput. Syst., 2019

Another Look at Anonymous Communication.
IEEE Trans. Dependable Secur. Comput., 2019

Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2019

Universal Location Referencing and Homomorphic Evaluation of Geospatial Query.
IACR Cryptol. ePrint Arch., 2019

Fork-free hybrid consensus with flexible Proof-of-Activity.
Future Gener. Comput. Syst., 2019

Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Structure-Preserving Certificateless Encryption and Its Application.
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019

Can We Securely Outsource Big Data Analytics with Lightweight Cryptography?
Proceedings of the 7th International Workshop on Security in Cloud Computing, 2019

Fast-to-Finalize Nakamoto-Like Consensus.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Outsourced Biometric Identification With Privacy.
IEEE Trans. Inf. Forensics Secur., 2018

Searchable Encryption over Feature-Rich Data.
IEEE Trans. Dependable Secur. Comput., 2018

Multi-authority fine-grained access control with accountability and its application in cloud.
J. Netw. Comput. Appl., 2018

Geosocial Query with User-Controlled Privacy.
IACR Cryptol. ePrint Arch., 2018

Can you find the one for me? Privacy-Preserving Matchmaking via Threshold PSI.
IACR Cryptol. ePrint Arch., 2018

Can You Find The One for Me?
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

Simple Password-Hardened Encryption Services.
Proceedings of the 27th USENIX Security Symposium, 2018

Position Paper on Blockchain Technology: Smart Contract and Applications.
Proceedings of the Network and System Security - 12th International Conference, 2018

Sharding Blockchain.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

InstantCryptoGram: Secure Image Retrieval Service.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Privacy-Preserving Machine Learning.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018

Systematic Market Control of Cryptocurrency Inflations.
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, 2018

Multi-key Homomorphic Signatures Unforgeable Under Insider Corruption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Are you The One to Share? Secret Transfer with Access Structure.
Proc. Priv. Enhancing Technol., 2017

Forking-Free Hybrid Consensus with Generalized Proof-of-Activity.
IACR Cryptol. ePrint Arch., 2017

Efficient Sanitizable Signatures without Random Oracles.
IACR Cryptol. ePrint Arch., 2017

Forward-Secure Searchable Encryption on Labeled Bipartite Graphs.
IACR Cryptol. ePrint Arch., 2017

Phoenix: Rebirth of a Cryptographic Password-Hardening Service.
Proceedings of the 26th USENIX Security Symposium, 2017

Secure Strategyproof Ascending-Price Spectrum Auction.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Real Hidden Identity-Based Signatures.
Proceedings of the Financial Cryptography and Data Security, 2017

Privacy-Preserving Decision Trees Evaluation via Linear Functions.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Secure Cloud Storage Meets with Secure Network Coding.
IEEE Trans. Computers, 2016

Special Issue on Security and Privacy in Mobile Clouds.
Pervasive Mob. Comput., 2016

A Zoo of Homomorphic Signatures: Multi-Key and Key-Homomorphism.
IACR Cryptol. ePrint Arch., 2016

Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol.
Comput. J., 2016

Securing Fast Learning! Ridge Regression over Encrypted Big Data.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Privacy-Preserving Multi-pattern Matching.
Proceedings of the Security and Privacy in Communication Networks, 2016

Parallel and Dynamic Structured Encryption.
Proceedings of the Security and Privacy in Communication Networks, 2016

A Framework of Multi-Authority Attribute-Based Encryption with Outsourcing and Revocation.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Towards Proofs of Ownership Beyond Bounded Leakage.
Proceedings of the Provable Security, 2016

Privacy Preserving Credit Systems.
Proceedings of the Network and System Security - 10th International Conference, 2016

Another Look at Anonymous Communication - Security and Modular Constructions.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization.
Proceedings of the Advances in Information and Computer Security, 2016

Cryptography for Parallel RAM from Indistinguishability Obfuscation.
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016

Combiners for Chosen-Ciphertext Security.
Proceedings of the Computing and Combinatorics - 22nd International Conference, 2016

Efficient Authenticated Multi-Pattern Matching.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Password-Controlled Encryption with Accountable Break-Glass Access.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Functional Credentials for Internet of Things.
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, 2016

2015
Time-Bound Anonymous Authentication for Roaming Networks.
IEEE Trans. Inf. Forensics Secur., 2015

Post-challenge leakage in public-key encryption.
Theor. Comput. Sci., 2015

Practical (fully) distributed signatures provably secure in the standard model.
Theor. Comput. Sci., 2015

Computation-Trace Indistinguishability Obfuscation and its Applications.
IACR Cryptol. ePrint Arch., 2015

Comments on 'Efficient Revocable Certificateless Encryption Secure in the Standard Model'.
Comput. J., 2015

Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model.
Proceedings of the Provable Security, 2015

Structured Encryption with Non-interactive Updates and Parallel Traversal.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Privacy Preserving Collaborative Filtering from Asymmetric Randomized Encoding.
Proceedings of the Financial Cryptography and Data Security, 2015

Related Randomness Attacks for Public Key Cryptosystems.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage.
IEEE Trans. Parallel Distributed Syst., 2014

Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability.
IEEE J. Biomed. Health Informatics, 2014

Exponent-inversion Signatures and IBE under Static Assumptions.
IACR Cryptol. ePrint Arch., 2014

Secure Friend Discovery via Privacy-Preserving and Decentralized Community Detection.
CoRR, 2014

Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage.
Proceedings of the Computer Security - ESORICS 2014, 2014

Practical Distributed Signatures in the Standard Model.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

A tale of two clouds: Computing on data encrypted under multiple keys.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Security of Direct Anonymous Authentication Using TPM 2.0 Signature - A Possible Implementation Flaw.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

Trapdoors for Ideal Lattices with Applications.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

All-but-One Dual Projective Hashing and Its Applications.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Privacy-Preserving Public Auditing for Secure Cloud Storage.
IEEE Trans. Computers, 2013

Constant-Size Dynamic $k$ -Times Anonymous Authentication.
IEEE Syst. J., 2013

Server-aided signatures verification secure against collusion attack.
Inf. Secur. Tech. Rep., 2013

Double-trapdoor anonymous tags for traceable signatures.
Int. J. Inf. Sec., 2013

Practical Dual-Receiver Encryption - Soundness, Complete Non-Malleability, and Applications.
IACR Cryptol. ePrint Arch., 2013

Towards Anonymous Ciphertext Indistinguishability with Identity Leakage.
Proceedings of the Provable Security - 7th International Conference, 2013

Storing Shared Data on the Cloud via Security-Mediator.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Accumulators and U-Prove Revocation.
Proceedings of the Financial Cryptography and Data Security, 2013

Computing encrypted cloud data efficiently under multiple keys.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Towards auditable cloud-assisted access of encrypted health data.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Multi-key leakage-resilient threshold cryptography.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Zero-Knowledge Argument for Simultaneous Discrete Logarithms.
Algorithmica, 2012

Identity-Based Encryption Resilient to Continual Auxiliary Leakage.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation.
Proceedings of the Computer Security - ESORICS 2012, 2012

Dynamic Secure Cloud Storage with Provenance.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Exclusion-intersection encryption.
Int. J. Secur. Networks, 2011

Optimal Sybil-resilient node admission control.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Efficient Secure Two-Party Exponentiation.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

Non-interactive Confirmer Signatures.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

Multi-authority ciphertext-policy attribute-based encryption with accountability.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Secure mobile subscription of sensor-encrypted data.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
New Privacy-Preserving Architectures for Identity-/Attribute-based Encryption.
PhD thesis, 2010

An efficient signcryption scheme with key privacy and its extension to ring signcryption.
J. Comput. Secur., 2010

Identity-Based Online/Offline Key Encapsulation and Encryption.
IACR Cryptol. ePrint Arch., 2010

Brief announcement: improving social-network-based sybil-resilient node admission control.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Practical leakage-resilient identity-based encryption from simple assumptions.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Certificateless Encryption.
Proceedings of the Identity-Based Cryptography, 2009

Partial decryption attacks in security-mediated certificateless encryption.
IET Inf. Secur., 2009

Efficient Unidirectional Proxy Re-Encryption.
IACR Cryptol. ePrint Arch., 2009

Blind signature and ring signature schemes: Rehabilitation and attack.
Comput. Stand. Interfaces, 2009

Real Traceable Signatures.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

Removing Escrow from Identity-Based Encryption.
Proceedings of the Public Key Cryptography, 2009

Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases.
Proceedings of the Network and Distributed System Security Symposium, 2009

Improving privacy and security in multi-authority attribute-based encryption.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Conditional Proxy Broadcast Re-Encryption.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model.
J. Univers. Comput. Sci., 2008

Multiplicative Forward-Secure Threshold Signature Scheme.
Int. J. Netw. Secur., 2008

Multi-Designated Verifiers Signatures Revisited.
Int. J. Netw. Secur., 2008

General Certificateless Encryption and Timed-Release Encryption.
IACR Cryptol. ePrint Arch., 2008

Timed-Release Encryption Revisited.
Proceedings of the Provable Security, Second International Conference, 2008

Robust Receipt-Free Election System with Ballot Secrecy and Verifiability.
Proceedings of the Network and Distributed System Security Symposium, 2008

Proxy Re-signatures in the Standard Model.
Proceedings of the Information Security, 11th International Conference, 2008

2007
Certificateless Ring Signatures.
IACR Cryptol. ePrint Arch., 2007

Strongly-Secure Identity-based Key Agreement and Anonymous Extension.
IACR Cryptol. ePrint Arch., 2007

Batch Pairing Delegation.
Proceedings of the Advances in Information and Computer Security, 2007

Token-Controlled Public Key Encryption in the Standard Model.
Proceedings of the Information Security, 10th International Conference, 2007

An Efficient Signcryption Scheme with Key Privacy.
Proceedings of the Public Key Infrastructure, 2007

Anonymous Identification and Designated-Verifiers Signatures from Insecure Batch Verification.
Proceedings of the Public Key Infrastructure, 2007

Running on Karma - P2P Reputation and Currency Systems.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

Security Mediated Certificateless Signatures.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Generic Construction of (Identity-based) Perfect Concurrent Signatures.
IACR Cryptol. ePrint Arch., 2006

Practical electronic lotteries with offline TTP.
Comput. Commun., 2006

Escrowed Linkability of Ring Signatures and Its Applications.
Proceedings of the Progressin Cryptology, 2006

Security-Mediated Certificateless Cryptography.
Proceedings of the Public Key Cryptography, 2006

Identity-Based Strong Multi-Designated Verifiers Signatures.
Proceedings of the Public Key Infrastructure, 2006

Short Linkable Ring Signatures Revisited.
Proceedings of the Public Key Infrastructure, 2006

2005
A generic anti-spyware solution by access control list at kernel level.
J. Syst. Softw., 2005

Ring Signatures without Random Oracles.
IACR Cryptol. ePrint Arch., 2005

Forward-secure multisignature and blind signature schemes.
Appl. Math. Comput., 2005

Identity Based Delegation Network.
Proceedings of the Progress in Cryptology, 2005

Short E-Cash.
Proceedings of the Progress in Cryptology, 2005

Supporting Efficient Authorization in Delegation with Supervision.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

An e-Lottery Scheme Using Verifiable Random Function.
Proceedings of the Computational Science and Its Applications, 2005

Identity Based Ring Signature: Why, How and What Next.
Proceedings of the Public Key Infrastructure, 2005

Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

Role Activation Management in Role Based Access Control.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
Separable and Anonymous Identity-Based Key Issuing.
IACR Cryptol. ePrint Arch., 2004

Signcryption in Hierarchical Identity Based Cryptosystem.
IACR Cryptol. ePrint Arch., 2004

Efficient Identity Based Ring Signature.
IACR Cryptol. ePrint Arch., 2004

Two Improved Partially Blind Signature Schemes from Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2004

Identity Based Threshold Ring Signature.
IACR Cryptol. ePrint Arch., 2004

Security Flaws in a Pairing-based Group Signature Scheme.
IACR Cryptol. ePrint Arch., 2004

Verifiable Pairing and Its Applications.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Secure Hierarchical Identity Based Signature and Its Application.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Impact of Recent Advances in Crytography on Online Game.
Proceedings of the 3rd International Conference on Application and Development of Computer Games (ADCOG 2004) held on 26-27 April 2004 in City University of Hong Kong, 2004

2003
A Secure Modified ID-Based Undeniable Signature Scheme.
IACR Cryptol. ePrint Arch., 2003

Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity.
Proceedings of the Information Security and Cryptology, 2003


  Loading...