Joseph K. Liu

From MaRDI portal
Revision as of 04:37, 7 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:338379

Available identifiers

zbMath Open liu.joseph-k-kMaRDI QIDQ338379

List of research outcomes





PublicationDate of PublicationType
Loquat: a SNARK-friendly post-quantum signature based on the Legendre PRF with applications in ring and aggregate signatures2024-12-04Paper
Post-quantum verifiable random function from symmetric primitives in PoS blockchain2023-07-21Paper
Compact Ring Signature in the Standard Model for Blockchain2023-06-30Paper
Post-quantum ID-based ring signatures from symmetric-key primitives2022-11-09Paper
Revocable and Linkable Ring Signature2022-10-14Paper
Public-Key Puncturable Encryption: Modular and Compact Constructions2022-10-13Paper
Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security2022-08-25Paper
DGM: a \underline{D}ynamic and revocable \underline{G}roup \underline{M}erkle signature2022-08-25Paper
Dynamic searchable symmetric encryption with forward and stronger backward privacy2022-08-25Paper
Generic multi-keyword ranked search on encrypted cloud data2022-08-25Paper
An efficient non-interactive multi-client searchable encryption with support for Boolean queries2022-08-19Paper
DualRing: generic construction of ring signatures with efficient instantiations2022-03-31Paper
Efficient lattice-based polynomial evaluation and batch ZK arguments2022-03-25Paper
Towards efficient and strong backward private searchable encryption with secure enclaves2022-03-21Paper
Lattice-based zero-knowledge arguments for additive and multiplicative relations2021-05-10Paper
Building a dynamic searchable encrypted medical database for multi-client2021-04-19Paper
Accelerating forward and backward private searchable encryption using trusted execution2021-02-23Paper
RingCT 3.0 for blockchain confidential transaction: shorter size and stronger security2021-02-08Paper
Access control encryption with efficient verifiable sanitized decryption2020-09-22Paper
Senarai: A Sustainable Public Blockchain-Based Permanent Storage Protocol2020-07-20Paper
Lattice RingCT v2.0 with multiple input and multiple output wallets2020-05-27Paper
Fast-to-finalize Nakamoto-like consensus2020-05-27Paper
Risk of asynchronous protocol update: attacks to Monero protocols2020-05-27Paper
Lattice-based zero-knowledge proofs: new techniques for shorter and faster constructions and applications2020-05-20Paper
Short lattice-based one-out-of-many proofs and applications to ring signatures2020-01-30Paper
Strong leakage and tamper-resilient PKE from refined hash proof system2020-01-30Paper
Evaluating cryptonote-style blockchains2019-10-31Paper
An encrypted database with enforced access control and blockchain validation2019-10-31Paper
A multi-client DSSE scheme supporting range queries2019-10-31Paper
Analyzing use of high privileges on Android: an empirical case study of screenshot and screen recording applications2019-10-31Paper
A generic construction of tightly secure signatures in the multi-user setting2019-05-29Paper
A new public remote integrity checking scheme with user and data privacy2018-11-26Paper
A new blockchain-based value-added tax system2018-11-07Paper
Expressive attribute-based keyword search with constant-size ciphertext2018-10-23Paper
Revocable identity-based encryption from the computational Diffie-Hellman problem2018-09-26Paper
Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice ringct v1.0)2018-09-26Paper
Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation List2018-08-10Paper
A general framework for secure sharing of personal health records in cloud system2017-09-15Paper
Attribute-based encryption with expressive and authorized keyword search2017-08-25Paper
Towards revocable fine-grained encryption of cloud data: reducing trust upon cloud2017-08-25Paper
Multi-user cloud-based secure keyword search2017-08-25Paper
<inline-formula><tex-math>$k$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="huang-ieq1-2366741.gif"/></alternatives></inline-formula>-Times Attribute-Based Anonymous Access Control for Cloud Computing2017-05-16Paper
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security2017-05-16Paper
Two-Factor Data Security Protection Mechanism for Cloud Storage System2017-05-16Paper
Towards Certificate-Based Group Encryption2017-01-06Paper
Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator2016-12-19Paper
On the security of two identity-based conditional proxy re-encryption schemes2016-11-04Paper
On Lightweight Security Enforcement in Cyber-Physical Systems2016-02-22Paper
Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach2016-01-27Paper
A New Public Remote Integrity Checking Scheme with User Privacy2015-10-20Paper
Towards Anonymous Ciphertext Indistinguishability with Identity Leakage2013-10-23Paper
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction2013-02-19Paper
Efficient Escrow-Free Identity-Based Signature2012-11-06Paper
Online/Offline Identity-Based Signcryption Revisited2011-07-29Paper
Identity-Based Server-Aided Decryption2011-07-07Paper
A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)2010-10-12Paper
Sanitizable Signatures Revisited2009-01-09Paper
Efficient Certificate-Based Encryption in the Standard Model2008-11-20Paper
Certificate-Based Signature Schemes without Pairings or Random Oracles2008-11-20Paper
https://portal.mardi4nfdi.de/entity/Q35184182008-08-07Paper
Traceable and Retrievable Identity-Based Encryption2008-06-13Paper
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature2008-04-11Paper
(Convertible) Undeniable Signatures Without Random Oracles2008-03-25Paper
On the Security Models of (Threshold) Ring Signature Schemes2008-03-17Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
ENHANCED SECURITY MODELS AND A GENERIC CONSTRUCTION APPROACH FOR LINKABLE RING SIGNATURE2007-02-08Paper
Information Security and Cryptology2006-11-14Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Information Security Practice and Experience2005-09-13Paper
Information Security and Privacy2005-09-07Paper

Research outcomes over time

This page was built for person: Joseph K. Liu