Attribute-based signatures for circuits from multilinear maps F Tang, H Li, B Liang International Conference on Information Security, 54-71, 2014 | 17 | 2014 |
Efficient leakage-resilient signature schemes in the generic bilinear group model F Tang, H Li, Q Niu, B Liang International Conference on Information Security Practice and Experience …, 2014 | 13 | 2014 |
The generic transformation from standard signatures to identity-based aggregate signatures B Liang, H Li, J Chang International Conference on Information Security, 21-41, 2015 | 6 | 2015 |
Understanding and constructing AKE via double-key key encapsulation mechanism H Xue, X Lu, B Li, B Liang, J He International Conference on the Theory and Application of Cryptology and …, 2018 | 5 | 2018 |
Strongly Secure Authenticated Key Exchange from Supersingular Isogeny. X Xu, H Xue, K Wang, S Tian, B Liang, W Yu IACR Cryptol. ePrint Arch. 2018, 760, 2018 | 5 | 2018 |
Verifiable homomorphic secret sharing G Tsaloli, B Liang, A Mitrokotsa International Conference on Provable Security, 40-55, 2018 | 4 | 2018 |
One-round witness indistinguishability from indistinguishability obfuscation Q Niu, H Li, G Huang, B Liang, F Tang International Conference on Information Security Practice and Experience …, 2015 | 4 | 2015 |
Leakage-resilient zero-knowledge proofs of knowledge for NP H Li, Q Niu, B Liang International Conference on Network and System Security, 365-380, 2013 | 3 | 2013 |
Lattice-Based Simulatable VRFs: Challenges and Future Directions. C Brunetta, B Liang, A Mitrokotsa J. Internet Serv. Inf. Secur. 8 (4), 57-69, 2018 | 2 | 2018 |
Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation. B Liang, A Mitrokotsa IACR Cryptol. ePrint Arch. 2017, 969, 2017 | 2 | 2017 |
Code-Based Zero Knowledge PRF Arguments C Brunetta, B Liang, A Mitrokotsa International Conference on Information Security, 171-189, 2019 | 1 | 2019 |
Witness encryption with (weak) unique decryption and message indistinguishability: constructions and applications D Pan, B Liang, H Li, P Ni Australasian Conference on Information Security and Privacy, 609-619, 2019 | 1 | 2019 |
Decentralised functional signatures B Liang, A Mitrokotsa Mobile Networks and Applications 24 (3), 934-946, 2019 | 1 | 2019 |
Distributed pseudorandom functions for general access structures in NP B Liang, A Mitrokotsa International Conference on Information and Communications Security, 81-87, 2017 | 1 | 2017 |
A Differentially Private Encryption Scheme C Brunetta, C Dimitrakakis, B Liang, A Mitrokotsa International Conference on Information Security, 309-326, 2017 | 1 | 2017 |
Constrained verifiable random functions from indistinguishability obfuscation B Liang, H Li, J Chang International Conference on Provable Security, 43-60, 2015 | 1 | 2015 |
Leakage-resilient proxy signatures F Tang, H Li, Q Niu, B Liang 2013 5th International Conference on Intelligent Networking and …, 2013 | 1 | 2013 |
Statically Aggregate Verifiable Random Functions and Application to E-Lottery B Liang, G Banegas, A Mitrokotsa Cryptography 4 (4), 37, 2020 | | 2020 |
Public-Coin Differing-Inputs Obfuscator for Hiding-Input Point Function with Multi-bit Output and Its Applications D Pan, B Liang, H Li, P Ni International Conference on Cryptology in India, 297-317, 2019 | | 2019 |
Hierarchical Functional Signcryption: Notion and Construction D Pan, B Liang, H Li, P Ni International Conference on Provable Security, 167-185, 2019 | | 2019 |