Tsz Hon Yuen

Orcid: 0000-0002-0629-6792

According to our database1, Tsz Hon Yuen authored at least 89 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
zkMatrix: Batched Short Proof for Committed Matrix Multiplication.
IACR Cryptol. ePrint Arch., 2024

Bandwidth-Efficient Zero-Knowledge Proofs For Threshold ECDSA.
Comput. J., 2024

2023
Practical fully leakage resilient signatures with auxiliary inputs.
Future Gener. Comput. Syst., April, 2023

Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA.
IACR Cryptol. ePrint Arch., 2023

DIDO: Data Provenance from Restricted TLS 1.3 Websites.
IACR Cryptol. ePrint Arch., 2023

Efficient Unbalanced Private Set Intersection Cardinality and User-friendly Privacy-preserving Contact Tracing.
Proceedings of the 32nd USENIX Security Symposium, 2023

Scored Anonymous Credentials.
Proceedings of the Applied Cryptography and Network Security, 2023

Practical Verifiable Random Function with RKA Security.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation.
IEEE Trans. Dependable Secur. Comput., 2022

Efficient Online-friendly Two-Party ECDSA Signature.
IACR Cryptol. ePrint Arch., 2022

BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts.
IACR Cryptol. ePrint Arch., 2022

Attribute-based Anonymous Credential: Optimization for Single-Use and Multi-Use.
IACR Cryptol. ePrint Arch., 2022

GCD-Filter: Private Set Intersection Without Encryption.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Hash Proof System with Auxiliary Inputs and Its Application.
Proceedings of the IEEE International Conference on Trust, 2022

Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Don't Tamper with Dual System Encryption - Beyond Polynomial Related-Key Security of IBE.
Proceedings of the Applied Cryptography and Network Security, 2022

Multi-signatures for ECDSA and Its Applications in Blockchain.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
DualRing: Generic Construction of Ring Signatures with Efficient Instantiations.
IACR Cryptol. ePrint Arch., 2021

Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup.
IACR Cryptol. ePrint Arch., 2021

One-more Unforgeability of Blind ECDSA.
IACR Cryptol. ePrint Arch., 2021

A Practical Forward-Secure DualRing.
IACR Cryptol. ePrint Arch., 2021

A Trustless GQ Multi-Signature Scheme with Identifiable Abort.
IACR Cryptol. ePrint Arch., 2021

Security on SM2 and GOST Signatures against Related Key Attacks.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

2020
Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach.
IACR Cryptol. ePrint Arch., 2020

PAChain: Private, authenticated & auditable consortium blockchain and its implementation.
Future Gener. Comput. Syst., 2020

Server-aided revocable attribute-based encryption for cloud computing services.
Concurr. Comput. Pract. Exp., 2020

Address-based Signature.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT.
Proceedings of the Information Security - 23rd International Conference, 2020

LPPRS: New Location Privacy Preserving Schemes Based on Ring Signature over Mobile Social Networks.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security.
IACR Cryptol. ePrint Arch., 2019

Strong Known Related-Key Attacks and the Security of ECDSA.
Proceedings of the Network and System Security - 13th International Conference, 2019

Securely Perturb Big Data by using Inner Product.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

PAChain: Private, Authenticated and Auditable Consortium Blockchain.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List.
IACR Cryptol. ePrint Arch., 2018

Compact Ring Signature in the Standard Model for Blockchain.
Proceedings of the Information Security Practice and Experience, 2018

Anonymity Reduction Attacks to Monero.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
A general framework for secure sharing of personal health records in cloud system.
J. Comput. Syst. Sci., 2017

RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
IACR Cryptol. ePrint Arch., 2017

RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
ABKS-CSC: attribute-based keyword search with constant-size ciphertexts.
Secur. Commun. Networks, 2016

Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption.
Inf. Sci., 2016

An Efficient Non-Interactive Multi-client Searchable Encryption with Support for Boolean Queries.
IACR Cryptol. ePrint Arch., 2016

Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles.
Comput. J., 2016

Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
k-Times Attribute-Based Anonymous Access Control for Cloud Computing.
IEEE Trans. Computers, 2015

Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security.
IACR Cryptol. ePrint Arch., 2015

Related Randomness Attacks for Public Key Cryptosystems.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Towards a cryptographic treatment of publish/subscribe systems.
J. Comput. Secur., 2014

Exponent-inversion Signatures and IBE under Static Assumptions.
IACR Cryptol. ePrint Arch., 2014

Improvements on an authentication scheme for vehicular sensor networks.
Expert Syst. Appl., 2014

Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction.
Theor. Comput. Sci., 2013

Encryption Schemes with Post-Challenge Auxiliary Inputs.
IACR Cryptol. ePrint Arch., 2013

Efficient Linkable and/or Threshold Ring Signature Without Random Oracles.
Comput. J., 2013

Towards Anonymous Ciphertext Indistinguishability with Identity Leakage.
Proceedings of the Provable Security - 7th International Conference, 2013

Threshold-Oriented Optimistic Fair Exchange.
Proceedings of the Network and System Security - 7th International Conference, 2013

Attribute Specified Identity-Based Encryption.
Proceedings of the Information Security Practice and Experience, 2013

Multi-key leakage-resilient threshold cryptography.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Leakage-resilient certificateless public key encryption.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

2012
Forward Secure Attribute-Based Signatures.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Identity-Based Encryption Resilient to Continual Auxiliary Leakage.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation.
Proceedings of the Computer Security - ESORICS 2012, 2012

Fully Leakage-Resilient Signatures with Auxiliary Inputs.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Forward Secure Ring Signature without Random Oracles.
IACR Cryptol. ePrint Arch., 2011

Concurrent Signatures with Fully Negotiable Binding Control.
Proceedings of the Provable Security - 5th International Conference, 2011

Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles.
Proceedings of the Computer Security - ESORICS 2011, 2011

Threshold ring signature without random oracles.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
How to construct identity-based signatures without the key escrow problem.
Int. J. Inf. Sec., 2010

2009
Efficient Non-interactive Range Proof.
Proceedings of the Computing and Combinatorics, 15th Annual International Conference, 2009

2008
Sanitizable Signatures Revisited.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
(Convertible) Undeniable Signatures without Random Oracles.
IACR Cryptol. ePrint Arch., 2007

Practical Threshold Signatures Without Random Oracles.
Proceedings of the Provable Security, 2007

Certificate Based (Linkable) Ring Signature.
Proceedings of the Information Security Practice and Experience, 2007

2006
(Hierarchical Identity-Based) Threshold Ring Signatures.
IACR Cryptol. ePrint Arch., 2006

Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles.
IACR Cryptol. ePrint Arch., 2006

Escrowed Linkability of Ring Signatures and Its Applications.
Proceedings of the Progressin Cryptology, 2006

ID-Based Ring Signature Scheme Secure in the Standard Model.
Proceedings of the Advances in Information and Computer Security, 2006

Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature.
Proceedings of the Progress in Cryptology, 2006

WebQuest Markup Language (WQML) for Sharable Inquiry-Based Learning.
Proceedings of the Computational Science and Its Applications, 2006

Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles.
IACR Cryptol. ePrint Arch., 2005

Group Signature where Group Manager, Members and Open Authority are Identity-Based.
IACR Cryptol. ePrint Arch., 2005

More short signatures without random oracles.
IACR Cryptol. ePrint Arch., 2005

Ring Signatures without Random Oracles.
IACR Cryptol. ePrint Arch., 2005

2004
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings.
IACR Cryptol. ePrint Arch., 2004

Signcryption in Hierarchical Identity Based Cryptosystem.
IACR Cryptol. ePrint Arch., 2004


  Loading...