Qiang Tang

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Efficient secure storage with version control and key rotation2024-09-13Paper
Predicate aggregate signatures and applications2024-06-26Paper
Retraction Note: Cost-optimized data placement strategy for social network with security awareness in edge-cloud computing environment
Journal of Combinatorial Optimization
2024-05-02Paper
Privacy-preserving decentralised singular value decomposition2024-04-19Paper
Verifiable capacity-bound functions: a new primitive from Kolmogorov complexity. (Revisiting space-based security in the adaptive setting)
Lecture Notes in Computer Science
2023-11-16Paper
Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds)
Lecture Notes in Computer Science
2023-05-12Paper
Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy2023-04-13Paper
CCA updatable encryption against malicious re-encryption attacks2023-03-29Paper
Retracted article: Cost-optimized data placement strategy for social network with security awareness in edge-cloud computing environment
Journal of Combinatorial Optimization
2022-12-01Paper
Privacy-preserving and yet robust collaborative filtering recommender as a service
Information Security and Cryptology
2022-10-14Paper
Making \textit{any} attribute-based encryption accountable, efficiently2022-08-25Paper
Making Any Identity-Based Encryption Accountable, Efficiently
Computer Security -- ESORICS 2015
2022-08-19Paper
Witness authenticating NIZKs and applications2022-05-18Paper
Multi-input laconic function evaluation2021-06-08Paper
Dumbo-MVBA: Optimal Multi-Valued Validated Asynchronous Byzantine Agreement, Revisited
Proceedings of the 39th Symposium on Principles of Distributed Computing
2021-03-15Paper
A survey on true random number generators based on chaos
Discrete Dynamics in Nature and Society
2020-02-18Paper
Let a non-barking watchdog bite: cliptographic signatures with an offline watchdog2020-01-28Paper
Graded signatures2018-10-18Paper
Key recovery attacks against NTRU-based somewhat homomorphic encryption schemes2018-10-18Paper
Distributed parameter generation for bilinear Diffie Hellman exponentiation and applications2018-10-18Paper
Correcting subverted random oracles2018-09-26Paper
Making public key functional encryption function private, distributively2018-05-29Paper
Updatable functional encryption2017-10-23Paper
A Homotopy Method for Locating All the Poles of a Parallel Plate Waveguide With the PML
IEEE Transactions on Antennas and Propagation
2017-09-20Paper
Cliptography: clipping the power of kleptographic attacks
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Honey Encryption Beyond Message Recovery Security
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Communication optimal Tardos-based asymmetric fingerprinting
Lecture Notes in Computer Science
2016-03-02Paper
Towards forward security properties for PEKS and IBE
Information Security and Privacy
2015-10-20Paper
On key recovery attacks against existing somewhat homomorphic encryption schemes
Progress in Cryptology - LATINCRYPT 2014
2015-09-17Paper
Efficient algorithms for secure outsourcing of bilinear pairings
Theoretical Computer Science
2014-12-02Paper
New algorithms for secure outsourcing of modular exponentiations
Computer Security – ESORICS 2012
2013-10-23Paper
Extended KCI attack against two-party key establishment protocols
Information Processing Letters
2013-04-04Paper
Public key encryption schemes supporting equality test with authorisation of different granularity
International Journal of Applied Cryptography
2012-11-16Paper
Towards a security model for computational puzzle schemes
International Journal of Computer Mathematics
2011-11-29Paper
Kalwen+: practical key management schemes for gossip-based wireless medical sensor networks
Information Security and Cryptology
2011-07-29Paper
scientific article; zbMATH DE number 5926874 (Why is no real title available?)2011-07-19Paper
Towards public key encryption scheme supporting equality test with fine-grained authorization
Information Security and Privacy
2011-07-07Paper
COMPARISON OF DIFFERENT DAILY STREAMFLOW SERIES IN US AND CHINA, UNDER A VIEWPOINT OF COMPLEX NETWORKS
Modern Physics Letters B
2010-09-23Paper
TF/TA<sup>2</sup> trajectory tracking using nonlinear predictive control approach
Journal of Systems Engineering and Electronics
2009-11-06Paper
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
Lecture Notes in Computer Science
2009-09-29Paper
Inter-domain Identity-Based Proxy Re-encryption
Information Security and Cryptology
2009-04-29Paper
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
Information Security and Privacy
2009-03-06Paper
Type-Based Proxy Re-encryption and Its Construction
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
SCALING BEHAVIOR OF DIFFUSION LIMITED AGGREGATION IN PERCOLATION CLUSTER
Modern Physics Letters B
2008-11-03Paper
Bilateral unknown key-share attacks in key agreement protocols2008-08-07Paper
Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability
Lecture Notes in Computer Science
2008-06-24Paper
Extended Private Information Retrieval and Its Application in Biometrics Authentications
Cryptology and Network Security
2008-04-15Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2007-05-02Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper


Research outcomes over time


This page was built for person: Qiang Tang