Tsz Hon Yuen
Orcid: 0000-0002-0629-6792
According to our database1,
Tsz Hon Yuen
authored at least 106 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
CoRR, January, 2025
IEEE Trans. Dependable Secur. Comput., 2025
IEEE Trans. Dependable Secur. Comput., 2025
Pegasus and PegaRing: Efficient (Ring) Signatures from Sigma-Protocols for Power Residue PRFs with (Q)ROM Security.
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
Scalable zkSNARKs for Matrix Computations: A Generic Framework for Verifiable Deep Learning.
IACR Cryptol. ePrint Arch., 2025
Universally Composable Traceable Ring Signature with Verifiable Random Function in Logarithmic Size.
Cryptogr., 2025
Proceedings of the Provable and Practical Security, 2025
More Practical Non-interactive Encrypted Conjunctive Search with Leakage and Storage Suppression.
Proceedings of the Provable and Practical Security, 2025
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025
SoK: A Deep Dive Into Anti-money Laundering Techniques for Blockchain Cryptocurrencies.
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025
2024
IACR Commun. Cryptol., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Provable and Practical Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Future Gener. Comput. Syst., April, 2023
Efficient Unbalanced Private Set Intersection Cardinality and User-friendly Privacy-preserving Contact Tracing.
Proceedings of the 32nd USENIX Security Symposium, 2023
BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the Information Security Practice and Experience, 2023
Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023
Proceedings of the Applied Cryptography and Network Security, 2023
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the Cryptology and Network Security - 21st International Conference, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Don't Tamper with Dual System Encryption - Beyond Polynomial Related-Key Security of IBE.
Proceedings of the Applied Cryptography and Network Security, 2022
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022
2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the Public-Key Cryptography - PKC 2021, 2021
Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
IACR Cryptol. ePrint Arch., 2020
PAChain: Private, authenticated & auditable consortium blockchain and its implementation.
Future Gener. Comput. Syst., 2020
Concurr. Comput. Pract. Exp., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Information Security - 23rd International Conference, 2020
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security.
Proceedings of the Financial Cryptography and Data Security, 2020
LPPRS: New Location Privacy Preserving Schemes Based on Ring Signature over Mobile Social Networks.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
2018
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List.
Proceedings of the Applied Cryptography and Network Security, 2018
2017
J. Comput. Syst. Sci., 2017
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
IACR Cryptol. ePrint Arch., 2017
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
Proceedings of the Computer Security - ESORICS 2017, 2017
2016
Secur. Commun. Networks, 2016
Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption.
Inf. Sci., 2016
Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles.
Comput. J., 2016
An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries.
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
IEEE Trans. Computers, 2015
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Expert Syst. Appl., 2014
Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction.
Theor. Comput. Sci., 2013
IACR Cryptol. ePrint Arch., 2013
Comput. J., 2013
Proceedings of the Provable Security - 7th International Conference, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Information Security Practice and Experience, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013
2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
Proceedings of the Provable Security - 5th International Conference, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles.
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010
2009
Proceedings of the Public Key Infrastructures, Services and Applications, 2009
Proceedings of the Computing and Combinatorics, 15th Annual International Conference, 2009
2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
2007
Proceedings of the Provable Security, 2007
Proceedings of the Information Security Practice and Experience, 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles.
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Progressin Cryptology, 2006
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
2005
Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles.
IACR Cryptol. ePrint Arch., 2005
Signcryption in Hierarchical Identity Based Cryptosystem.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the Topics in Cryptology, 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005