| Publication | Date of Publication | Type |
|---|
| Adaptively secure identity-based encryption from middle-product learning with errors | 2024-01-11 | Paper |
Ideal dynamic threshold multi-secret data sharing in smart environments for sustainable cities Information Sciences | 2023-09-08 | Paper |
Public-key watermarking schemes for pseudorandom functions Advances in Cryptology – CRYPTO 2022 | 2023-06-28 | Paper |
| Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting | 2023-03-21 | Paper |
| Collusion resistant watermarkable PRFs from standard assumptions | 2022-11-09 | Paper |
| DualRing: generic construction of ring signatures with efficient instantiations | 2022-03-31 | Paper |
| Anonymous post-quantum cryptocash | 2021-03-17 | Paper |
| RingCT 3.0 for blockchain confidential transaction: shorter size and stronger security | 2021-02-08 | Paper |
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation Theoretical Computer Science | 2020-11-06 | Paper |
Efficient attribute-based encryption with attribute revocation for assured data deletion Information Sciences | 2020-10-07 | Paper |
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters Information Sciences | 2020-09-22 | Paper |
Practical Range Proof for Cryptocurrency Monero with Provable Security Information and Communications Security | 2020-07-20 | Paper |
| Efficient lattice-based zero-knowledge arguments with standard soundness: construction and applications | 2020-05-20 | Paper |
| Strongly secure authenticated key exchange from supersingular isogenies | 2020-05-20 | Paper |
| Collusion resistant watermarking schemes for cryptographic functionalities | 2020-05-20 | Paper |
| Ring signatures based on Middle-Product Learning with Errors problems | 2020-05-06 | Paper |
| Raptor: a practical lattice-based (linkable) ring signature | 2020-01-30 | Paper |
| Strong leakage and tamper-resilient PKE from refined hash proof system | 2020-01-30 | Paper |
A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices IEEE Transactions on Computers | 2020-01-28 | Paper |
| An efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks using online/offline certificateless aggregate signature | 2020-01-10 | Paper |
Simulation-based selective opening security for receivers under chosen-ciphertext attacks Designs, Codes and Cryptography | 2019-05-24 | Paper |
| Fuzzy public-key encryption based on biometric data | 2018-11-07 | Paper |
Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps Soft Computing | 2018-10-22 | Paper |
| Unforgeable watermarking schemes with public extraction | 2018-10-17 | Paper |
| Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice ringct v1.0) | 2018-09-26 | Paper |
| Lattice-based universal accumulator with nonmembership arguments | 2018-09-26 | Paper |
| Practical signatures from the Partial Fourier Recovery problem revisited: a provably-secure and Gaussian-distributed construction | 2018-09-26 | Paper |
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation Information Security and Privacy | 2018-09-26 | Paper |
| Hedged nonce-based public-key encryption: adaptive security under randomness failures | 2018-05-16 | Paper |
Functional encryption for computational hiding in prime order groups via pair encodings Designs, Codes and Cryptography | 2018-01-26 | Paper |
A general framework for secure sharing of personal health records in cloud system Journal of Computer and System Sciences | 2017-09-15 | Paper |
| Exploring effect of location number on map-based graphical password authentication | 2017-08-25 | Paper |
<inline-formula><tex-math>$k$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="huang-ieq1-2366741.gif"/></alternatives></inline-formula>-Times Attribute-Based Anonymous Access Control for Cloud Computing IEEE Transactions on Computers | 2017-05-16 | Paper |
Fully secure ciphertext-policy attribute based encryption with security mediator Information and Communications Security | 2016-12-19 | Paper |
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups Lecture Notes in Computer Science | 2016-10-21 | Paper |
Generic anonymous identity-based broadcast encryption with chosen-ciphertext security Information Security and Privacy | 2016-09-02 | Paper |
Leakage-resilient functional encryption via pair encodings Information Security and Privacy | 2016-08-31 | Paper |
Public cloud data auditing with practical key update and zero knowledge privacy Information Security and Privacy | 2016-08-31 | Paper |
Relations between robustness and RKA security under public-key encryption Theoretical Computer Science | 2016-04-13 | Paper |
Complete robustness in identity-based encryption Provable Security | 2015-09-29 | Paper |
PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption Computer Security - ESORICS 2014 | 2015-07-27 | Paper |
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents Information Processing Letters | 2015-06-25 | Paper |
Optimistic fair exchange in the enhanced chosen-key model Theoretical Computer Science | 2014-12-02 | Paper |
Attribute-based optimistic fair exchange: how to restrict brokers with policies Theoretical Computer Science | 2014-03-13 | Paper |
Efficient semi-static secure broadcast encryption scheme Pairing-Based Cryptography – Pairing 2013 | 2014-02-18 | Paper |
Anonymous signcryption against linear related-key attacks Provable Security | 2013-10-23 | Paper |
Fairness in concurrent signatures revisited Information Security and Privacy | 2013-06-28 | Paper |
Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt” Information Security and Privacy | 2013-06-28 | Paper |
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction Theoretical Computer Science | 2013-02-19 | Paper |
Efficient escrow-free identity-based signature Provable Security | 2012-11-06 | Paper |
Electronic cash with anonymous user suspension Information Security and Privacy | 2011-07-07 | Paper |
Oblivious transfer with access control: realizing disjunction without duplication Lecture Notes in Computer Science | 2010-11-26 | Paper |
A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) Provable Security | 2010-10-12 | Paper |
Escrowed deniable identification schemes Security Technology | 2010-04-23 | Paper |
Is the notion of divisible on-line/off-line signatures stronger than on-line/off-line signatures? Provable Security | 2009-12-11 | Paper |
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems Topics in Cryptology – CT-RSA 2009 | 2009-04-29 | Paper |
Practical Compact E-Cash Information Security and Privacy | 2009-03-06 | Paper |
Constant-Size Dynamic k-TAA Lecture Notes in Computer Science | 2008-11-27 | Paper |
Traceable and Retrievable Identity-Based Encryption Applied Cryptography and Network Security | 2008-06-13 | Paper |
Compact E-Cash from Bounded Accumulator Lecture Notes in Computer Science | 2008-04-17 | Paper |
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
(Convertible) Undeniable Signatures Without Random Oracles Information and Communications Security | 2008-03-25 | Paper |
Short E-Cash Progress in Cryptology - INDOCRYPT 2005 | 2008-03-17 | Paper |
Event-Oriented k-Times Revocable-iff-Linked Group Signatures Information Security and Privacy | 2007-09-07 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |