White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures Z Liu, Z Cao, DS Wong Information Forensics and Security, IEEE Transactions on 8 (1), 76-88, 2013 | 204 | 2013 |
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles Z Liu, Z Cao, Q Huang, DS Wong, TH Yuen European Symposium on Research in Computer Security, 278-297, 2011 | 143 | 2011 |
Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on eBay Z Liu, Z Cao, DS Wong Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 126 | 2013 |
Securely outsourcing exponentiations with single untrusted program for cloud storage Y Wang, Q Wu, DS Wong, B Qin, SSM Chow, Z Liu, X Tan European symposium on research in computer security, 326-343, 2014 | 115 | 2014 |
Efficient generation of linear secret sharing scheme matrices from threshold access trees Z Liu, Z Cao, DS Wong Cryptology ePrint Archive, 2010 | 101* | 2010 |
Time-domain attribute-based access control for cloud-based video content sharing: A cryptographic approach K Yang, Z Liu, X Jia, XS Shen IEEE Transactions on Multimedia 18 (5), 940-950, 2016 | 90 | 2016 |
Traceable CP-ABE: how to trace decryption devices found in the wild Z Liu, Z Cao, DS Wong IEEE Transactions on Information Forensics and Security 10 (1), 55-68, 2014 | 81 | 2014 |
A CCA-secure identity-based conditional proxy re-encryption without random oracles K Liang, Z Liu, X Tan, DS Wong, C Tang International Conference on Information Security and Cryptology, 231-246, 2012 | 63 | 2012 |
Practical attribute-based encryption: traitor tracing, revocation and large universe Z Liu, DS Wong The Computer Journal 59 (7), 983-1004, 2016 | 62 | 2016 |
Maternal lead exposure and risk of congenital heart defects occurrence in offspring Z Liu, Y Yu, X Li, A Wu, M Mu, N Li, Y Deng, X Jin, S Li, Y Lin, X Chen, ... Reproductive Toxicology 51, 1-6, 2015 | 40 | 2015 |
Practical ciphertext-policy attribute-based encryption: traitor tracing, revocation, and large universe Z Liu, DS Wong International Conference on Applied Cryptography and Network Security, 127-146, 2015 | 35 | 2015 |
Fork-free hybrid consensus with flexible proof-of-activity Z Liu, S Tang, SSM Chow, Z Liu, Y Long Future Generation Computer Systems 96, 515-524, 2019 | 25 | 2019 |
Z-channel: Scalable and efficient scheme in zerocash Y Zhang, Y Long, Z Liu, Z Liu, D Gu Computers & Security 86, 112-131, 2019 | 23 | 2019 |
Assessment of interaction between maternal polycyclic aromatic hydrocarbons exposure and genetic polymorphisms on the risk of congenital heart diseases N Li, Y Mu, Z Liu, Y Deng, Y Guo, X Zhang, X Li, P Yu, Y Wang, J Zhu Scientific reports 8 (1), 1-13, 2018 | 22 | 2018 |
Taac: Temporal attribute-based access control for multi-authority cloud storage systems K Yang, Z Liu, Z Cao, X Jia, DS Wong, K Ren Cryptology ePrint Archive, 2012 | 20 | 2012 |
A lattice-based linkable ring signature supporting stealth addresses Z Liu, K Nguyen, G Yang, H Wang, DS Wong European Symposium on Research in Computer Security, 726-746, 2019 | 14 | 2019 |
Traceable CP-ABE on prime order groups: Fully secure and fully collusion-resistant blackbox traceable Z Liu, DS Wong International Conference on Information and Communications Security, 109-124, 2015 | 14 | 2015 |
Goshawk: a novel efficient, robust and flexible blockchain protocol C Wan, S Tang, Y Zhang, C Pan, Z Liu, Y Long, Z Liu, Y Yu International Conference on Information Security and Cryptology, 49-69, 2018 | 13 | 2018 |
Identity-based aggregate signcryption in the standard model from multilinear maps H Wang, Z Liu, Z Liu, DS Wong Frontiers of Computer Science 10 (4), 741-754, 2016 | 10 | 2016 |
Attribute based encryption: Traitor tracing, revocation and fully security on prime order groups X Li, K Liang, Z Liu, DS Wong Cryptology ePrint Archive, 2016 | 10 | 2016 |