Zhen Liu

Orcid: 0000-0001-9268-702X

Affiliations:
  • City University of Hong Kong, Department of Computer Science, Hong Kong
  • Shanghai Jiao Tong University, Department of Computer Science and Engineering, Shanghai, China


According to our database1, Zhen Liu authored at least 46 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Secure and Efficient UAV Tracking in Space-Air-Ground Integrated Network.
IEEE Trans. Veh. Technol., August, 2023

RAI2: Responsible Identity Audit Governing the Artificial Intelligence.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key.
IEEE Trans. Dependable Secur. Comput., 2022

Secure Hierarchical Deterministic Wallet Supporting Stealth Address.
IACR Cryptol. ePrint Arch., 2022

MixCT: Mixing Confidential Transactions from Homomorphic Commitment.
IACR Cryptol. ePrint Arch., 2022

BRIEF but Powerful: Byzantine-Robust and Privacy-Preserving Federated Learning via Model Segmentation and Secure clustering.
CoRR, 2022

Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption.
Proceedings of the Computer Security - ESORICS 2022, 2022

Grape: Efficient Hybrid Consensus Protocol Using DAG.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022

2021
On Enabling Attribute-Based Encryption to Be Traceable Against Traitors.
Comput. J., 2021

MPC-in-Multi-Heads: A Multi-Prover Zero-Knowledge Proof System - (or: How to Jointly Prove Any NP Statements in ZK).
Proceedings of the Computer Security - ESORICS 2021, 2021

Fully Secure Lattice-Based ABE from Noisy Linear Functional Encryption.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

2020
A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Pri-RTB: Privacy-preserving real-time bidding for securing mobile advertisement in ubiquitous computing.
Inf. Sci., 2019

Fork-free hybrid consensus with flexible Proof-of-Activity.
Future Gener. Comput. Syst., 2019

All-But-Many Lossy Trapdoor Functions under Decisional RSA Subgroup Assumption and Application.
Comput. J., 2019

A Secure and Practical Blockchain Scheme for IoT.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Making Monero Hard-to-Trace and More Efficient.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Towards a Multi-chain Future of Proof-of-Space.
Proceedings of the Security and Privacy in Communication Networks, 2019

TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-Invisibility.
Proceedings of the Provable Security, 2019

A Practical Dynamic Enhanced BFT Protocol.
Proceedings of the Network and System Security - 13th International Conference, 2019

Gnocchi: Multiplexed Payment Channels for Cryptocurrencies.
Proceedings of the Network and System Security - 13th International Conference, 2019

Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol.
IACR Cryptol. ePrint Arch., 2018

Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.
IACR Cryptol. ePrint Arch., 2018

On Enabling Attribute-Based Encryption to Be Traceable against Traitors.
IACR Cryptol. ePrint Arch., 2018

Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain.
Proceedings of the Network and System Security - 12th International Conference, 2018

Dynamic Practical Byzantine Fault Tolerance.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Z-Channel: Scalable and Efficient Scheme in Zerocash.
IACR Cryptol. ePrint Arch., 2017

Forking-Free Hybrid Consensus with Generalized Proof-of-Activity.
IACR Cryptol. ePrint Arch., 2017

2016
Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups.
IACR Cryptol. ePrint Arch., 2016

Identity-based aggregate signcryption in the standard model from multilinear maps.
Frontiers Comput. Sci., 2016

Dealerless Corporate Key Generation for Identity-Based Encryption Schemes.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild.
IEEE Trans. Inf. Forensics Secur., 2015

Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable.
IACR Cryptol. ePrint Arch., 2015

Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Practical Attribute Based Encryption: Traitor Tracing, Revocation, and Large Universe.
IACR Cryptol. ePrint Arch., 2014

Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts.
IACR Cryptol. ePrint Arch., 2014

Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures.
IEEE Trans. Inf. Forensics Secur., 2013

Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Expressive Black-box Traceable Ciphertext-Policy Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2012

A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

2011
Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles.
Proceedings of the Computer Security - ESORICS 2011, 2011

2010
On Efficiently Transferring the Linear Secret-Sharing Scheme Matrix in Ciphertext-Policy Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2010


  Loading...