Qiang Tang

From MaRDI portal
(Redirected from Person:476850)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Asymptotically optimal adaptive asynchronous common coin and DKG with silent setup2026-02-04Paper
Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy
Journal of Cryptology
2026-01-23Paper
Efficient secure storage with version control and key rotation2024-09-13Paper
Predicate aggregate signatures and applications2024-06-26Paper
Retraction Note: Cost-optimized data placement strategy for social network with security awareness in edge-cloud computing environment
Journal of Combinatorial Optimization
2024-05-02Paper
Privacy-preserving decentralised singular value decomposition2024-04-19Paper
Verifiable capacity-bound functions: a new primitive from Kolmogorov complexity. (Revisiting space-based security in the adaptive setting)
Lecture Notes in Computer Science
2023-11-16Paper
Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds)
Lecture Notes in Computer Science
2023-05-12Paper
Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy2023-04-13Paper
CCA updatable encryption against malicious re-encryption attacks2023-03-29Paper
Retracted article: Cost-optimized data placement strategy for social network with security awareness in edge-cloud computing environment
Journal of Combinatorial Optimization
2022-12-01Paper
Privacy-preserving and yet robust collaborative filtering recommender as a service
Information Security and Cryptology
2022-10-14Paper
Making \textit{any} attribute-based encryption accountable, efficiently2022-08-25Paper
Making Any Identity-Based Encryption Accountable, Efficiently
Computer Security -- ESORICS 2015
2022-08-19Paper
Witness authenticating NIZKs and applications2022-05-18Paper
Multi-input laconic function evaluation2021-06-08Paper
Dumbo-MVBA: Optimal Multi-Valued Validated Asynchronous Byzantine Agreement, Revisited
Proceedings of the 39th Symposium on Principles of Distributed Computing
2021-03-15Paper
A survey on true random number generators based on chaos
Discrete Dynamics in Nature and Society
2020-02-18Paper
Let a non-barking watchdog bite: cliptographic signatures with an offline watchdog2020-01-28Paper
Graded signatures2018-10-18Paper
Key recovery attacks against NTRU-based somewhat homomorphic encryption schemes2018-10-18Paper
Distributed parameter generation for bilinear Diffie Hellman exponentiation and applications2018-10-18Paper
Correcting subverted random oracles2018-09-26Paper
Making public key functional encryption function private, distributively2018-05-29Paper
Updatable functional encryption2017-10-23Paper
A Homotopy Method for Locating All the Poles of a Parallel Plate Waveguide With the PML
IEEE Transactions on Antennas and Propagation
2017-09-20Paper
Cliptography: clipping the power of kleptographic attacks
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Honey Encryption Beyond Message Recovery Security
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Communication optimal Tardos-based asymmetric fingerprinting
Lecture Notes in Computer Science
2016-03-02Paper
Towards forward security properties for PEKS and IBE
Information Security and Privacy
2015-10-20Paper
On key recovery attacks against existing somewhat homomorphic encryption schemes
Progress in Cryptology - LATINCRYPT 2014
2015-09-17Paper
Efficient algorithms for secure outsourcing of bilinear pairings
Theoretical Computer Science
2014-12-02Paper
New algorithms for secure outsourcing of modular exponentiations
Computer Security – ESORICS 2012
2013-10-23Paper
Extended KCI attack against two-party key establishment protocols
Information Processing Letters
2013-04-04Paper
Public key encryption schemes supporting equality test with authorisation of different granularity
International Journal of Applied Cryptography
2012-11-16Paper
Towards a security model for computational puzzle schemes
International Journal of Computer Mathematics
2011-11-29Paper
Kalwen+: practical key management schemes for gossip-based wireless medical sensor networks
Information Security and Cryptology
2011-07-29Paper
scientific article; zbMATH DE number 5926874 (Why is no real title available?)2011-07-19Paper
Towards public key encryption scheme supporting equality test with fine-grained authorization
Information Security and Privacy
2011-07-07Paper
COMPARISON OF DIFFERENT DAILY STREAMFLOW SERIES IN US AND CHINA, UNDER A VIEWPOINT OF COMPLEX NETWORKS
Modern Physics Letters B
2010-09-23Paper
TF/TA<sup>2</sup> trajectory tracking using nonlinear predictive control approach
Journal of Systems Engineering and Electronics
2009-11-06Paper
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
Lecture Notes in Computer Science
2009-09-29Paper
Inter-domain Identity-Based Proxy Re-encryption
Information Security and Cryptology
2009-04-29Paper
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
Information Security and Privacy
2009-03-06Paper
Type-Based Proxy Re-encryption and Its Construction
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
SCALING BEHAVIOR OF DIFFUSION LIMITED AGGREGATION IN PERCOLATION CLUSTER
Modern Physics Letters B
2008-11-03Paper
Bilateral unknown key-share attacks in key agreement protocols2008-08-07Paper
Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability
Lecture Notes in Computer Science
2008-06-24Paper
Extended Private Information Retrieval and Its Application in Biometrics Authentications
Cryptology and Network Security
2008-04-15Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2007-05-02Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper


Research outcomes over time


This page was built for person: Qiang Tang