Joseph K. Liu

From MaRDI portal
Person:338379

Available identifiers

zbMath Open liu.joseph-k-kMaRDI QIDQ338379

List of research outcomes

PublicationDate of PublicationType
Post-quantum verifiable random function from symmetric primitives in PoS blockchain2023-07-21Paper
Compact Ring Signature in the Standard Model for Blockchain2023-06-30Paper
Post-quantum ID-based ring signatures from symmetric-key primitives2022-11-09Paper
Revocable and Linkable Ring Signature2022-10-14Paper
Public-Key Puncturable Encryption: Modular and Compact Constructions2022-10-13Paper
Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security2022-08-25Paper
DGM: a \underline{D}ynamic and revocable \underline{G}roup \underline{M}erkle signature2022-08-25Paper
Dynamic searchable symmetric encryption with forward and stronger backward privacy2022-08-25Paper
Generic multi-keyword ranked search on encrypted cloud data2022-08-25Paper
An efficient non-interactive multi-client searchable encryption with support for Boolean queries2022-08-19Paper
DualRing: generic construction of ring signatures with efficient instantiations2022-03-31Paper
Efficient lattice-based polynomial evaluation and batch ZK arguments2022-03-25Paper
Towards efficient and strong backward private searchable encryption with secure enclaves2022-03-21Paper
Lattice-based zero-knowledge arguments for additive and multiplicative relations2021-05-10Paper
Building a dynamic searchable encrypted medical database for multi-client2021-04-19Paper
Accelerating forward and backward private searchable encryption using trusted execution2021-02-23Paper
RingCT 3.0 for blockchain confidential transaction: shorter size and stronger security2021-02-08Paper
Access control encryption with efficient verifiable sanitized decryption2020-09-22Paper
Senarai: A Sustainable Public Blockchain-Based Permanent Storage Protocol2020-07-20Paper
Lattice RingCT v2.0 with multiple input and multiple output wallets2020-05-27Paper
Fast-to-finalize Nakamoto-like consensus2020-05-27Paper
Risk of asynchronous protocol update: attacks to Monero protocols2020-05-27Paper
Lattice-based zero-knowledge proofs: new techniques for shorter and faster constructions and applications2020-05-20Paper
Short lattice-based one-out-of-many proofs and applications to ring signatures2020-01-30Paper
Strong leakage and tamper-resilient PKE from refined hash proof system2020-01-30Paper
Evaluating cryptonote-style blockchains2019-10-31Paper
An encrypted database with enforced access control and blockchain validation2019-10-31Paper
A multi-client DSSE scheme supporting range queries2019-10-31Paper
Analyzing use of high privileges on Android: an empirical case study of screenshot and screen recording applications2019-10-31Paper
A generic construction of tightly secure signatures in the multi-user setting2019-05-29Paper
A new public remote integrity checking scheme with user and data privacy2018-11-26Paper
A new blockchain-based value-added tax system2018-11-07Paper
Expressive attribute-based keyword search with constant-size ciphertext2018-10-23Paper
Revocable identity-based encryption from the computational Diffie-Hellman problem2018-09-26Paper
Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice ringct v1.0)2018-09-26Paper
Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation List2018-08-10Paper
A general framework for secure sharing of personal health records in cloud system2017-09-15Paper
Attribute-based encryption with expressive and authorized keyword search2017-08-25Paper
Towards revocable fine-grained encryption of cloud data: reducing trust upon cloud2017-08-25Paper
Multi-user cloud-based secure keyword search2017-08-25Paper
<inline-formula><tex-math>$k$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="huang-ieq1-2366741.gif"/></alternatives></inline-formula>-Times Attribute-Based Anonymous Access Control for Cloud Computing2017-05-16Paper
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security2017-05-16Paper
Two-Factor Data Security Protection Mechanism for Cloud Storage System2017-05-16Paper
Towards Certificate-Based Group Encryption2017-01-06Paper
Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator2016-12-19Paper
On the security of two identity-based conditional proxy re-encryption schemes2016-11-04Paper
On Lightweight Security Enforcement in Cyber-Physical Systems2016-02-22Paper
Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach2016-01-27Paper
A New Public Remote Integrity Checking Scheme with User Privacy2015-10-20Paper
Towards Anonymous Ciphertext Indistinguishability with Identity Leakage2013-10-23Paper
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction2013-02-19Paper
Efficient Escrow-Free Identity-Based Signature2012-11-06Paper
Online/Offline Identity-Based Signcryption Revisited2011-07-29Paper
Identity-Based Server-Aided Decryption2011-07-07Paper
A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)2010-10-12Paper
Sanitizable Signatures Revisited2009-01-09Paper
Efficient Certificate-Based Encryption in the Standard Model2008-11-20Paper
Certificate-Based Signature Schemes without Pairings or Random Oracles2008-11-20Paper
https://portal.mardi4nfdi.de/entity/Q35184182008-08-07Paper
Traceable and Retrievable Identity-Based Encryption2008-06-13Paper
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature2008-04-11Paper
(Convertible) Undeniable Signatures Without Random Oracles2008-03-25Paper
On the Security Models of (Threshold) Ring Signature Schemes2008-03-17Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
ENHANCED SECURITY MODELS AND A GENERIC CONSTRUCTION APPROACH FOR LINKABLE RING SIGNATURE2007-02-08Paper
Information Security and Cryptology2006-11-14Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Information Security Practice and Experience2005-09-13Paper
Information Security and Privacy2005-09-07Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Joseph K. Liu