Joseph K. Liu

From MaRDI portal
(Redirected from Person:338379)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Loquat: a SNARK-friendly post-quantum signature based on the Legendre PRF with applications in ring and aggregate signatures2024-12-04Paper
Post-quantum verifiable random function from symmetric primitives in PoS blockchain
Computer Security – ESORICS 2022
2023-07-21Paper
Compact Ring Signature in the Standard Model for Blockchain
Information Security Practice and Experience
2023-06-30Paper
Post-quantum ID-based ring signatures from symmetric-key primitives2022-11-09Paper
Revocable and linkable ring signature
Information Security and Cryptology
2022-10-14Paper
Public-key puncturable encryption: modular and compact constructions
Lecture Notes in Computer Science
2022-10-13Paper
Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security
(available as arXiv preprint)
2022-08-25Paper
DGM: a \underline{D}ynamic and revocable \underline{G}roup \underline{M}erkle signature2022-08-25Paper
Dynamic searchable symmetric encryption with forward and stronger backward privacy2022-08-25Paper
Generic multi-keyword ranked search on encrypted cloud data2022-08-25Paper
An efficient non-interactive multi-client searchable encryption with support for Boolean queries2022-08-19Paper
DualRing: generic construction of ring signatures with efficient instantiations2022-03-31Paper
Efficient lattice-based polynomial evaluation and batch ZK arguments2022-03-25Paper
Towards efficient and strong backward private searchable encryption with secure enclaves2022-03-21Paper
Lattice-based zero-knowledge arguments for additive and multiplicative relations
Designs, Codes and Cryptography
2021-05-10Paper
Building a dynamic searchable encrypted medical database for multi-client
Information Sciences
2021-04-19Paper
Accelerating forward and backward private searchable encryption using trusted execution
(available as arXiv preprint)
2021-02-23Paper
RingCT 3.0 for blockchain confidential transaction: shorter size and stronger security2021-02-08Paper
Access control encryption with efficient verifiable sanitized decryption
Information Sciences
2020-09-22Paper
Senarai: a sustainable public blockchain-based permanent storage protocol
Cryptology and Network Security
2020-07-20Paper
Lattice RingCT v2.0 with multiple input and multiple output wallets2020-05-27Paper
Fast-to-finalize Nakamoto-like consensus2020-05-27Paper
Risk of asynchronous protocol update: attacks to Monero protocols2020-05-27Paper
Lattice-based zero-knowledge proofs: new techniques for shorter and faster constructions and applications2020-05-20Paper
Short lattice-based one-out-of-many proofs and applications to ring signatures2020-01-30Paper
Strong leakage and tamper-resilient PKE from refined hash proof system2020-01-30Paper
Evaluating cryptonote-style blockchains2019-10-31Paper
An encrypted database with enforced access control and blockchain validation2019-10-31Paper
A multi-client DSSE scheme supporting range queries2019-10-31Paper
Analyzing use of high privileges on Android: an empirical case study of screenshot and screen recording applications
(available as arXiv preprint)
2019-10-31Paper
A generic construction of tightly secure signatures in the multi-user setting
Theoretical Computer Science
2019-05-29Paper
A new public remote integrity checking scheme with user and data privacy
International Journal of Applied Cryptography
2018-11-26Paper
A new blockchain-based value-added tax system2018-11-07Paper
Expressive attribute-based keyword search with constant-size ciphertext
Soft Computing
2018-10-23Paper
Revocable identity-based encryption from the computational Diffie-Hellman problem2018-09-26Paper
Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice ringct v1.0)2018-09-26Paper
Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation List2018-08-10Paper
A general framework for secure sharing of personal health records in cloud system
Journal of Computer and System Sciences
2017-09-15Paper
Attribute-based encryption with expressive and authorized keyword search2017-08-25Paper
Multi-user cloud-based secure keyword search2017-08-25Paper
Towards revocable fine-grained encryption of cloud data: reducing trust upon cloud2017-08-25Paper
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
IEEE Transactions on Computers
2017-05-16Paper
Two-Factor Data Security Protection Mechanism for Cloud Storage System
IEEE Transactions on Computers
2017-05-16Paper
<inline-formula><tex-math>$k$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="huang-ieq1-2366741.gif"/></alternatives></inline-formula>-Times Attribute-Based Anonymous Access Control for Cloud Computing
IEEE Transactions on Computers
2017-05-16Paper
Towards certificate-based group encryption
Provable Security
2017-01-06Paper
Fully secure ciphertext-policy attribute based encryption with security mediator
Information and Communications Security
2016-12-19Paper
On the security of two identity-based conditional proxy re-encryption schemes
Theoretical Computer Science
2016-11-04Paper
On lightweight security enforcement in cyber-physical systems
Lecture Notes in Computer Science
2016-02-22Paper
Lightweight anonymous authentication for ad hoc group: a ring signature approach
Provable Security
2016-01-27Paper
A new public remote integrity checking scheme with user privacy
Information Security and Privacy
2015-10-20Paper
Towards anonymous ciphertext indistinguishability with identity leakage
Provable Security
2013-10-23Paper
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction
Theoretical Computer Science
2013-02-19Paper
Efficient escrow-free identity-based signature
Provable Security
2012-11-06Paper
Online/offline identity-based signcryption revisited
Information Security and Cryptology
2011-07-29Paper
Identity-based server-aided decryption
Information Security and Privacy
2011-07-07Paper
A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)
Provable Security
2010-10-12Paper
Sanitizable Signatures Revisited
Cryptology and Network Security
2009-01-09Paper
Certificate-Based Signature Schemes without Pairings or Random Oracles
Lecture Notes in Computer Science
2008-11-20Paper
Efficient Certificate-Based Encryption in the Standard Model
Lecture Notes in Computer Science
2008-11-20Paper
Certificateless public key encryption secure against malicious KGC attacks in the standard model2008-08-07Paper
Traceable and Retrievable Identity-Based Encryption
Applied Cryptography and Network Security
2008-06-13Paper
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
(Convertible) Undeniable Signatures Without Random Oracles
Information and Communications Security
2008-03-25Paper
On the Security Models of (Threshold) Ring Signature Schemes
Lecture Notes in Computer Science
2008-03-17Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
ENHANCED SECURITY MODELS AND A GENERIC CONSTRUCTION APPROACH FOR LINKABLE RING SIGNATURE
International Journal of Foundations of Computer Science
2007-02-08Paper
Information Security and Cryptology
Lecture Notes in Computer Science
2006-11-14Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Information Security Practice and Experience
Lecture Notes in Computer Science
2005-09-13Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper


Research outcomes over time


This page was built for person: Joseph K. Liu