The following pages link to Joseph K. Liu (Q338379):
Displaying 50 items.
- On the security of two identity-based conditional proxy re-encryption schemes (Q338380) (← links)
- Lattice-based zero-knowledge arguments for additive and multiplicative relations (Q831178) (← links)
- Efficient lattice-based polynomial evaluation and batch ZK arguments (Q832321) (← links)
- A new blockchain-based value-added tax system (Q1616911) (← links)
- A new public remote integrity checking scheme with user and data privacy (Q1626117) (← links)
- Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation List (Q1656069) (← links)
- Revocable identity-based encryption from the computational Diffie-Hellman problem (Q1784457) (← links)
- Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice ringct v1.0) (Q1784493) (← links)
- Expressive attribute-based keyword search with constant-size ciphertext (Q1800303) (← links)
- Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction (Q1935797) (← links)
- Post-quantum ID-based ring signatures from symmetric-key primitives (Q2096649) (← links)
- Towards efficient and strong backward private searchable encryption with secure enclaves (Q2117028) (← links)
- DualRing: generic construction of ring signatures with efficient instantiations (Q2120078) (← links)
- An efficient non-interactive multi-client searchable encryption with support for Boolean queries (Q2165467) (← links)
- Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security (Q2167753) (← links)
- DGM: a \underline{D}ynamic and revocable \underline{G}roup \underline{M}erkle signature (Q2167769) (← links)
- Dynamic searchable symmetric encryption with forward and stronger backward privacy (Q2167777) (← links)
- Generic multi-keyword ranked search on encrypted cloud data (Q2167780) (← links)
- Lattice-based zero-knowledge proofs: new techniques for shorter and faster constructions and applications (Q2181847) (← links)
- Lattice RingCT v2.0 with multiple input and multiple output wallets (Q2183923) (← links)
- Fast-to-finalize Nakamoto-like consensus (Q2183931) (← links)
- Risk of asynchronous protocol update: attacks to Monero protocols (Q2183932) (← links)
- Access control encryption with efficient verifiable sanitized decryption (Q2200529) (← links)
- RingCT 3.0 for blockchain confidential transaction: shorter size and stronger security (Q2226609) (← links)
- Accelerating forward and backward private searchable encryption using trusted execution (Q2229385) (← links)
- Short lattice-based one-out-of-many proofs and applications to ring signatures (Q2291378) (← links)
- Strong leakage and tamper-resilient PKE from refined hash proof system (Q2291404) (← links)
- Evaluating cryptonote-style blockchains (Q2331938) (← links)
- An encrypted database with enforced access control and blockchain validation (Q2331955) (← links)
- A multi-client DSSE scheme supporting range queries (Q2331959) (← links)
- Analyzing use of high privileges on Android: an empirical case study of screenshot and screen recording applications (Q2331969) (← links)
- Attribute-based encryption with expressive and authorized keyword search (Q2399949) (← links)
- Towards revocable fine-grained encryption of cloud data: reducing trust upon cloud (Q2399951) (← links)
- Multi-user cloud-based secure keyword search (Q2399959) (← links)
- A general framework for secure sharing of personal health records in cloud system (Q2403233) (← links)
- A generic construction of tightly secure signatures in the multi-user setting (Q2419110) (← links)
- Building a dynamic searchable encrypted medical database for multi-client (Q2663516) (← links)
- On Lightweight Security Enforcement in Cyber-Physical Systems (Q2788819) (← links)
- Towards Anonymous Ciphertext Indistinguishability with Identity Leakage (Q2856161) (← links)
- Towards Certificate-Based Group Encryption (Q2953867) (← links)
- <inline-formula><tex-math>$k$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="huang-ieq1-2366741.gif"/></alternatives></inline-formula>-Times Attribute-Based Anonymous Access Control for C (Q2982110) (← links)
- Cost-Effective Authentic and Anonymous Data Sharing with Forward Security (Q2982309) (← links)
- Two-Factor Data Security Protection Mechanism for Cloud Storage System (Q2985457) (← links)
- Identity-Based Server-Aided Decryption (Q3013001) (← links)
- Online/Offline Identity-Based Signcryption Revisited (Q3019914) (← links)
- A New Public Remote Integrity Checking Scheme with User Privacy (Q3194614) (← links)
- Senarai: A Sustainable Public Blockchain-Based Permanent Storage Protocol (Q3297624) (← links)
- ENHANCED SECURITY MODELS AND A GENERIC CONSTRUCTION APPROACH FOR LINKABLE RING SIGNATURE (Q3421853) (← links)
- Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach (Q3467165) (← links)
- Traceable and Retrievable Identity-Based Encryption (Q3506404) (← links)