Zi-Yuan Liu

Orcid: 0000-0001-7164-088X

According to our database1, Zi-Yuan Liu authored at least 36 papers between 2018 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Cryptanalysis of a round optimal lattice-based multisignature scheme.
Inf. Process. Lett., August, 2023

Comments on "Dynamic Consensus Committee-Based for Secure Data Sharing With Authorized Multi-Receiver Searchable Encryption".
CoRR, 2023

A Provably Secure Lattice-Based Fuzzy Signature Scheme Using Linear Sketch.
IEEE Access, 2023

2022
Identity-Certifying Authority-Aided Identity-Based Searchable Encryption Framework in Cloud Systems.
IEEE Syst. J., 2022

Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT.
J. Syst. Archit., 2022

Extension of elliptic curve Qu-Vanstone certificates and their applications.
J. Inf. Secur. Appl., 2022

Quantum-resistant anonymous identity-based encryption with trable identities.
IET Inf. Secur., 2022

Public-Key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-Resistant Instantiation.
Comput. J., 2022

Quantum-Resistant 1-out-of-N Oblivious Signatures from Lattices.
Proceedings of the Advances in Information and Computer Security, 2022

Blockchain-Based Confidential Payment System with Controllable Regulation.
Proceedings of the Information Security Practice and Experience, 2022

Blockchain-Based Self-Sovereign Identity System with Attribute-Based Issuance.
Proceedings of the Information Security Practice and Experience, 2022

Public Key Encryption with Hierarchical Authorized Keyword Search.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022

Cryptanalysis to Ming et al.'s Revocable Multi-Authority Attribute-Based Encryption.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

2021
Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function.
Secur. Commun. Networks, 2021

Designated-ciphertext searchable encryption.
J. Inf. Secur. Appl., 2021

Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation.
IACR Cryptol. ePrint Arch., 2021

Quantum-resistant Anonymous IBE with Traceable Identities.
IACR Cryptol. ePrint Arch., 2021

Notes on a lattice-based proxy-oriented identity-based encryption with keyword search.
IACR Cryptol. ePrint Arch., 2021

Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud System.
IACR Cryptol. ePrint Arch., 2021

Cryptanalysis on 'An efficient identity-based proxy signcryption using lattice'.
IACR Cryptol. ePrint Arch., 2021

Partially Blind ECDSA Scheme and Its Application to Bitcoin.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

Improved Proxy Re-encryption Scheme with Equality Test.
Proceedings of the 16th Asia Joint Conference on Information Security, 2021

2020
PrivGRU: Privacy-preserving GRU inference using additive secret sharing.
J. Intell. Fuzzy Syst., 2020

A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism.
IACR Cryptol. ePrint Arch., 2020

Practical Predicate Encryption for Inner Product.
IACR Cryptol. ePrint Arch., 2020

Quantum-resistant Public-key Authenticated Encryption with Keyword Search for Industrial Internet of Things.
IACR Cryptol. ePrint Arch., 2020

Cryptanalysis of "FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things".
IACR Cryptol. ePrint Arch., 2020

A Study on Privacy-Preserving GRU Inference Framework.
IACR Cryptol. ePrint Arch., 2020

Multi-value Private Information Retrieval using Homomorphic Encryption.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

Defense against N-pixel Attacks based on Image Reconstruction.
Proceedings of the 8th International Workshop on Security in Blockchain and Cloud Computing, 2020

2019
Quantum-resistant Designated-ciphertext Searchable Encryption.
IACR Cryptol. ePrint Arch., 2019

Identity-Based Blind Multisignature From Lattices.
IEEE Access, 2019

Malware Image Classification Using One-Shot Learning with Siamese Networks.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

An Improved Non-Interactive Zero-Knowledge Range Proof for Decentralized Applications.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2019

Signcryption from NTRU Lattices Without Random Oracles.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2018
Policy-Controlled Signature from NTRU Lattice.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018


  Loading...