| Publication | Date of Publication | Type |
|---|
| A practical forward-secure DualRing | 2024-06-05 | Paper |
| Practical verifiable random function with RKA security | 2024-01-11 | Paper |
| Scored anonymous credentials | 2023-11-10 | Paper |
Attribute-based anonymous credential: optimization for single-use and multi-use Cryptology and Network Security | 2023-07-28 | Paper |
Multi-signatures for ECDSA and its applications in blockchain Information Security and Privacy | 2023-07-26 | Paper |
Compact Ring Signature in the Standard Model for Blockchain Information Security Practice and Experience | 2023-06-30 | Paper |
| A Trustless GQ Multi-signature Scheme with Identifiable Abort | 2023-04-13 | Paper |
| Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT | 2023-03-21 | Paper |
| Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE | 2022-11-09 | Paper |
| An efficient non-interactive multi-client searchable encryption with support for Boolean queries | 2022-08-19 | Paper |
| One-more unforgeability of blind ECDSA | 2022-06-24 | Paper |
| DualRing: generic construction of ring signatures with efficient instantiations | 2022-03-31 | Paper |
| Compact zero-knowledge proofs for threshold ECDSA with trustless setup | 2021-12-21 | Paper |
| LPPRS: new location privacy preserving schemes based on ring signature over mobile social networks | 2021-12-08 | Paper |
| RingCT 3.0 for blockchain confidential transaction: shorter size and stronger security | 2021-02-08 | Paper |
PAChain: private, authenticated and auditable consortium blockchain Cryptology and Network Security | 2020-07-20 | Paper |
| Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation List | 2018-08-10 | Paper |
A general framework for secure sharing of personal health records in cloud system Journal of Computer and System Sciences | 2017-09-15 | Paper |
<inline-formula><tex-math>$k$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="huang-ieq1-2366741.gif"/></alternatives></inline-formula>-Times Attribute-Based Anonymous Access Control for Cloud Computing IEEE Transactions on Computers | 2017-05-16 | Paper |
Efficient completely non-malleable and RKA secure public key encryptions Information Security and Privacy | 2016-09-02 | Paper |
Continuous non-malleable key derivation and its application to related-key security Lecture Notes in Computer Science | 2015-08-27 | Paper |
Escrowed Linkability of Ring Signatures and Its Applications Progress in Cryptology - VIETCRYPT 2006 | 2014-08-21 | Paper |
Towards anonymous ciphertext indistinguishability with identity leakage Provable Security | 2013-10-23 | Paper |
PE(AR)\(^2\): Privacy-enhanced anonymous authentication with reputation and revocation Computer Security – ESORICS 2012 | 2013-10-23 | Paper |
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction Theoretical Computer Science | 2013-02-19 | Paper |
Fully leakage-resilient signatures with auxiliary inputs Information Security and Privacy | 2012-09-07 | Paper |
Identity-based encryption resilient to continual auxiliary leakage Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles Computer Security – ESORICS 2011 | 2011-11-22 | Paper |
Concurrent signatures with fully negotiable binding control Provable Security | 2011-09-16 | Paper |
Towards a cryptographic treatment of publish/subscribe systems Cryptology and Network Security | 2010-12-07 | Paper |
Efficient Non-interactive Range Proof Lecture Notes in Computer Science | 2009-07-23 | Paper |
Sanitizable Signatures Revisited Cryptology and Network Security | 2009-01-09 | Paper |
Practical Threshold Signatures Without Random Oracles Provable Security | 2008-06-10 | Paper |
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
(Convertible) Undeniable Signatures Without Random Oracles Information and Communications Security | 2008-03-25 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2006-06-22 | Paper |
Topics in Cryptology – CT-RSA 2005 Lecture Notes in Computer Science | 2005-12-08 | Paper |