Tsz Hon Yuen

From MaRDI portal
Person:1656068



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A practical forward-secure DualRing2024-06-05Paper
Practical verifiable random function with RKA security2024-01-11Paper
Scored anonymous credentials2023-11-10Paper
Attribute-based anonymous credential: optimization for single-use and multi-use
Cryptology and Network Security
2023-07-28Paper
Multi-signatures for ECDSA and its applications in blockchain
Information Security and Privacy
2023-07-26Paper
Compact Ring Signature in the Standard Model for Blockchain
Information Security Practice and Experience
2023-06-30Paper
A Trustless GQ Multi-signature Scheme with Identifiable Abort2023-04-13Paper
Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT2023-03-21Paper
Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE2022-11-09Paper
An efficient non-interactive multi-client searchable encryption with support for Boolean queries2022-08-19Paper
One-more unforgeability of blind ECDSA2022-06-24Paper
DualRing: generic construction of ring signatures with efficient instantiations2022-03-31Paper
Compact zero-knowledge proofs for threshold ECDSA with trustless setup2021-12-21Paper
LPPRS: new location privacy preserving schemes based on ring signature over mobile social networks2021-12-08Paper
RingCT 3.0 for blockchain confidential transaction: shorter size and stronger security2021-02-08Paper
PAChain: private, authenticated and auditable consortium blockchain
Cryptology and Network Security
2020-07-20Paper
Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation List2018-08-10Paper
A general framework for secure sharing of personal health records in cloud system
Journal of Computer and System Sciences
2017-09-15Paper
<inline-formula><tex-math>$k$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="huang-ieq1-2366741.gif"/></alternatives></inline-formula>-Times Attribute-Based Anonymous Access Control for Cloud Computing
IEEE Transactions on Computers
2017-05-16Paper
Efficient completely non-malleable and RKA secure public key encryptions
Information Security and Privacy
2016-09-02Paper
Continuous non-malleable key derivation and its application to related-key security
Lecture Notes in Computer Science
2015-08-27Paper
Escrowed Linkability of Ring Signatures and Its Applications
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
Towards anonymous ciphertext indistinguishability with identity leakage
Provable Security
2013-10-23Paper
PE(AR)\(^2\): Privacy-enhanced anonymous authentication with reputation and revocation
Computer Security – ESORICS 2012
2013-10-23Paper
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction
Theoretical Computer Science
2013-02-19Paper
Fully leakage-resilient signatures with auxiliary inputs
Information Security and Privacy
2012-09-07Paper
Identity-based encryption resilient to continual auxiliary leakage
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles
Computer Security – ESORICS 2011
2011-11-22Paper
Concurrent signatures with fully negotiable binding control
Provable Security
2011-09-16Paper
Towards a cryptographic treatment of publish/subscribe systems
Cryptology and Network Security
2010-12-07Paper
Efficient Non-interactive Range Proof
Lecture Notes in Computer Science
2009-07-23Paper
Sanitizable Signatures Revisited
Cryptology and Network Security
2009-01-09Paper
Practical Threshold Signatures Without Random Oracles
Provable Security
2008-06-10Paper
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
(Convertible) Undeniable Signatures Without Random Oracles
Information and Communications Security
2008-03-25Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
Topics in Cryptology – CT-RSA 2005
Lecture Notes in Computer Science
2005-12-08Paper


Research outcomes over time


This page was built for person: Tsz Hon Yuen