Tsz Hon Yuen

Orcid: 0000-0002-0629-6792

According to our database1, Tsz Hon Yuen authored at least 106 papers between 2005 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Large Language Models for Cryptocurrency Transaction Analysis: A Bitcoin Case Study.
CoRR, January, 2025

Message Control for Blockchain Rewriting.
IEEE Trans. Dependable Secur. Comput., 2025

DIDO+: Data Provenance From Restricted TLS 1.3 Websites With Selective Disclosure.
IEEE Trans. Dependable Secur. Comput., 2025

Pegasus and PegaRing: Efficient (Ring) Signatures from Sigma-Protocols for Power Residue PRFs with (Q)ROM Security.
IACR Cryptol. ePrint Arch., 2025

A Dilithium-like Multisignature in Fully Split Ring and Quantum Random Oracle Model.
IACR Cryptol. ePrint Arch., 2025

DualMatrix: Conquering zkSNARK for Large Matrix Multiplication.
IACR Cryptol. ePrint Arch., 2025

Scalable zkSNARKs for Matrix Computations: A Generic Framework for Verifiable Deep Learning.
IACR Cryptol. ePrint Arch., 2025

Universally Composable Traceable Ring Signature with Verifiable Random Function in Logarithmic Size.
Cryptogr., 2025

Plum: SNARK-Friendly Post-Quantum Signature Based on Power Residue PRFs.
Proceedings of the Provable and Practical Security, 2025

More Practical Non-interactive Encrypted Conjunctive Search with Leakage and Storage Suppression.
Proceedings of the Provable and Practical Security, 2025

Posterior Security: Anonymity and Message Hiding of Standard Signatures.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

Efficient Private Set Intersection by Utilizing Oblivious Transfer Extension.
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025

SoK: A Deep Dive Into Anti-money Laundering Techniques for Blockchain Cryptocurrencies.
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025

2024
Bandwidth-Efficient Zero-Knowledge Proofs For Threshold ECDSA.
Comput. J., 2024

Exponent-Inversion P-Signatures and Accountable Identity-Based Encryption from SXDH.
IACR Commun. Cryptol., 2024

O-Ring and K-Star: Efficient Multi-party Private Set Intersection.
Proceedings of the 33rd USENIX Security Symposium, 2024

Threshold Ring Signatures: From DualRing to the t+1 Rings.
Proceedings of the Provable and Practical Security, 2024

zkMatrix: Batched Short Proof for Committed Matrix Multiplication.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

Reconstructing Chameleon Hash: Full Security and the Multi-Party Setting.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Practical fully leakage resilient signatures with auxiliary inputs.
Future Gener. Comput. Syst., April, 2023

Efficient Unbalanced Private Set Intersection Cardinality and User-friendly Privacy-preserving Contact Tracing.
Proceedings of the 32nd USENIX Security Symposium, 2023

BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

DIDO: Data Provenance from Restricted TLS 1.3 Websites.
Proceedings of the Information Security Practice and Experience, 2023

Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

A Practical Forward-Secure DualRing.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023

Scored Anonymous Credentials.
Proceedings of the Applied Cryptography and Network Security, 2023

Practical Verifiable Random Function with RKA Security.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation.
IEEE Trans. Dependable Secur. Comput., 2022

GCD-Filter: Private Set Intersection Without Encryption.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Hash Proof System with Auxiliary Inputs and Its Application.
Proceedings of the IEEE International Conference on Trust, 2022

Attribute-Based Anonymous Credential: Optimization for Single-Use and Multi-Use.
Proceedings of the Cryptology and Network Security - 21st International Conference, 2022

Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Don't Tamper with Dual System Encryption - Beyond Polynomial Related-Key Security of IBE.
Proceedings of the Applied Cryptography and Network Security, 2022

Multi-signatures for ECDSA and Its Applications in Blockchain.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
Security on SM2 and GOST Signatures against Related Key Attacks.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

One-More Unforgeability of Blind ECDSA.
Proceedings of the Computer Security - ESORICS 2021, 2021

DualRing: Generic Construction of Ring Signatures with Efficient Instantiations.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Efficient Online-friendly Two-Party ECDSA Signature.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

A Trustless GQ Multi-signature Scheme with Identifiable Abort.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach.
IACR Cryptol. ePrint Arch., 2020

PAChain: Private, authenticated & auditable consortium blockchain and its implementation.
Future Gener. Comput. Syst., 2020

Server-aided revocable attribute-based encryption for cloud computing services.
Concurr. Comput. Pract. Exp., 2020

Address-based Signature.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT.
Proceedings of the Information Security - 23rd International Conference, 2020

RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security.
Proceedings of the Financial Cryptography and Data Security, 2020

LPPRS: New Location Privacy Preserving Schemes Based on Ring Signature over Mobile Social Networks.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
Strong Known Related-Key Attacks and the Security of ECDSA.
Proceedings of the Network and System Security - 13th International Conference, 2019

Securely Perturb Big Data by using Inner Product.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

PAChain: Private, Authenticated and Auditable Consortium Blockchain.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
Compact Ring Signature in the Standard Model for Blockchain.
Proceedings of the Information Security Practice and Experience, 2018

Anonymity Reduction Attacks to Monero.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
A general framework for secure sharing of personal health records in cloud system.
J. Comput. Syst. Sci., 2017

RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
IACR Cryptol. ePrint Arch., 2017

RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
ABKS-CSC: attribute-based keyword search with constant-size ciphertexts.
Secur. Commun. Networks, 2016

Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption.
Inf. Sci., 2016

Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles.
Comput. J., 2016

An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries.
Proceedings of the Computer Security - ESORICS 2016, 2016

Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
k-Times Attribute-Based Anonymous Access Control for Cloud Computing.
IEEE Trans. Computers, 2015

Continuous Non-malleable Key Derivation and Its Application to Related-Key Security.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Related Randomness Attacks for Public Key Cryptosystems.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Exponent-inversion Signatures and IBE under Static Assumptions.
IACR Cryptol. ePrint Arch., 2014

Improvements on an authentication scheme for vehicular sensor networks.
Expert Syst. Appl., 2014

Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction.
Theor. Comput. Sci., 2013

Encryption Schemes with Post-Challenge Auxiliary Inputs.
IACR Cryptol. ePrint Arch., 2013

Efficient Linkable and/or Threshold Ring Signature Without Random Oracles.
Comput. J., 2013

Towards Anonymous Ciphertext Indistinguishability with Identity Leakage.
Proceedings of the Provable Security - 7th International Conference, 2013

Threshold-Oriented Optimistic Fair Exchange.
Proceedings of the Network and System Security - 7th International Conference, 2013

Attribute Specified Identity-Based Encryption.
Proceedings of the Information Security Practice and Experience, 2013

Multi-key leakage-resilient threshold cryptography.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Leakage-resilient certificateless public key encryption.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

2012
Forward Secure Attribute-Based Signatures.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Identity-Based Encryption Resilient to Continual Auxiliary Leakage.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation.
Proceedings of the Computer Security - ESORICS 2012, 2012

Fully Leakage-Resilient Signatures with Auxiliary Inputs.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Concurrent Signatures with Fully Negotiable Binding Control.
Proceedings of the Provable Security - 5th International Conference, 2011

Forward Secure Ring Signature without Random Oracles.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles.
Proceedings of the Computer Security - ESORICS 2011, 2011

Threshold ring signature without random oracles.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Towards a Cryptographic Treatment of Publish/Subscribe Systems.
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010

2009
How to Construct Identity-Based Signatures without the Key Escrow Problem.
Proceedings of the Public Key Infrastructures, Services and Applications, 2009

Efficient Non-interactive Range Proof.
Proceedings of the Computing and Combinatorics, 15th Annual International Conference, 2009

2008
Sanitizable Signatures Revisited.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
Practical Threshold Signatures Without Random Oracles.
Proceedings of the Provable Security, 2007

Certificate Based (Linkable) Ring Signature.
Proceedings of the Information Security Practice and Experience, 2007

(Convertible) Undeniable Signatures Without Random Oracles.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

2006
(Hierarchical Identity-Based) Threshold Ring Signatures.
IACR Cryptol. ePrint Arch., 2006

Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles.
IACR Cryptol. ePrint Arch., 2006

Escrowed Linkability of Ring Signatures and Its Applications.
Proceedings of the Progressin Cryptology, 2006

ID-Based Ring Signature Scheme Secure in the Standard Model.
Proceedings of the Advances in Information and Computer Security, 2006

Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature.
Proceedings of the Progress in Cryptology, 2006

WebQuest Markup Language (WQML) for Sharable Inquiry-Based Learning.
Proceedings of the Computational Science and Its Applications, 2006

Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Ring signatures without random oracles.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles.
IACR Cryptol. ePrint Arch., 2005

More short signatures without random oracles.
IACR Cryptol. ePrint Arch., 2005

Signcryption in Hierarchical Identity Based Cryptosystem.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Fast and Proven Secure Blind Identity-Based Signcryption from Pairings.
Proceedings of the Topics in Cryptology, 2005

Group Signature Where Group Manager, Members and Open Authority Are Identity-Based.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005


  Loading...