Yi Liu

Orcid: 0000-0003-1722-6746

Affiliations:
  • Southern University of Science and Technology, Department of Computer Science and Engineering, Shenzhen, China


According to our database1, Yi Liu authored at least 13 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Efficient and Privacy-Preserving Ride Matching Over Road Networks Against Malicious ORH Server.
IEEE Trans. Inf. Forensics Secur., 2025

Highly Efficient Actively Secure Two-Party Computation with One-Bit Advantage Bound.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Towards Efficient and Practical Multi-party Computation under Inconsistent Trust in TEEs.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Zero-Knowledge Protocols with PVC Security: Striking the Balance Between Security and Efficiency.
Proceedings of the Information and Communications Security - 27th International Conference, 2025

2024
MTDCAP: Moving Target Defense-Based CAN Authentication Protocol.
IEEE Trans. Intell. Transp. Syst., September, 2024

Enabling Privacy-Preserving and Publicly Auditable Federated Learning.
Proceedings of the IEEE International Conference on Communications, 2024

2023
Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Making Private Function Evaluation Safer, Faster, and Simpler.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Improved Zero-Knowledge Argument of Encrypted Extended Permutation.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

Blind Polynomial Evaluation and Data Trading.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
An Improvement of Multi-exponentiation with Encrypted Bases Argument: Smaller and Faster.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2017
An E-voting Protocol Based on Blockchain.
IACR Cryptol. ePrint Arch., 2017


  Loading...