Bei Liang
Bei Liang
Chalmers Uniiversity of Technology
Email verificata su chalmers.se
Titolo
Citata da
Citata da
Anno
Attribute-based signatures for circuits from multilinear maps
F Tang, H Li, B Liang
International Conference on Information Security, 54-71, 2014
172014
Efficient leakage-resilient signature schemes in the generic bilinear group model
F Tang, H Li, Q Niu, B Liang
International Conference on Information Security Practice and Experienceá…, 2014
132014
The generic transformation from standard signatures to identity-based aggregate signatures
B Liang, H Li, J Chang
International Conference on Information Security, 21-41, 2015
62015
Understanding and constructing AKE via double-key key encapsulation mechanism
H Xue, X Lu, B Li, B Liang, J He
International Conference on the Theory and Application of Cryptology andá…, 2018
52018
Strongly Secure Authenticated Key Exchange from Supersingular Isogeny.
X Xu, H Xue, K Wang, S Tian, B Liang, W Yu
IACR Cryptol. ePrint Arch. 2018, 760, 2018
52018
Verifiable homomorphic secret sharing
G Tsaloli, B Liang, A Mitrokotsa
International Conference on Provable Security, 40-55, 2018
42018
One-round witness indistinguishability from indistinguishability obfuscation
Q Niu, H Li, G Huang, B Liang, F Tang
International Conference on Information Security Practice and Experienceá…, 2015
42015
Leakage-resilient zero-knowledge proofs of knowledge for NP
H Li, Q Niu, B Liang
International Conference on Network and System Security, 365-380, 2013
32013
Lattice-Based Simulatable VRFs: Challenges and Future Directions.
C Brunetta, B Liang, A Mitrokotsa
J. Internet Serv. Inf. Secur. 8 (4), 57-69, 2018
22018
Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation.
B Liang, A Mitrokotsa
IACR Cryptol. ePrint Arch. 2017, 969, 2017
22017
Code-Based Zero Knowledge PRF Arguments
C Brunetta, B Liang, A Mitrokotsa
International Conference on Information Security, 171-189, 2019
12019
Witness encryption with (weak) unique decryption and message indistinguishability: constructions and applications
D Pan, B Liang, H Li, P Ni
Australasian Conference on Information Security and Privacy, 609-619, 2019
12019
Decentralised functional signatures
B Liang, A Mitrokotsa
Mobile Networks and Applications 24 (3), 934-946, 2019
12019
Distributed pseudorandom functions for general access structures in NP
B Liang, A Mitrokotsa
International Conference on Information and Communications Security, 81-87, 2017
12017
A Differentially Private Encryption Scheme
C Brunetta, C Dimitrakakis, B Liang, A Mitrokotsa
International Conference on Information Security, 309-326, 2017
12017
Constrained verifiable random functions from indistinguishability obfuscation
B Liang, H Li, J Chang
International Conference on Provable Security, 43-60, 2015
12015
Leakage-resilient proxy signatures
F Tang, H Li, Q Niu, B Liang
2013 5th International Conference on Intelligent Networking andá…, 2013
12013
Statically Aggregate Verifiable Random Functions and Application to E-Lottery
B Liang, G Banegas, A Mitrokotsa
Cryptography 4 (4), 37, 2020
2020
Public-Coin Differing-Inputs Obfuscator for Hiding-Input Point Function with Multi-bit Output and Its Applications
D Pan, B Liang, H Li, P Ni
International Conference on Cryptology in India, 297-317, 2019
2019
Hierarchical Functional Signcryption: Notion and Construction
D Pan, B Liang, H Li, P Ni
International Conference on Provable Security, 167-185, 2019
2019
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20