Segui
Dr. Zhen Liu
Dr. Zhen Liu
Shanghai Jiao Tong University
Email verificata su my.cityu.edu.hk - Home page
Titolo
Citata da
Citata da
Anno
White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures
Z Liu, Z Cao, DS Wong
Information Forensics and Security, IEEE Transactions on 8 (1), 76-88, 2013
2572013
Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay
Z Liu, Z Cao, DS Wong
Proceedings of the 2013 ACM SIGSAC conference on Computer & communicationsá…, 2013
1682013
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles
Z Liu, Z Cao, Q Huang, DS Wong, TH Yuen
Computer Security–ESORICS 2011: 16th European Symposium on Research iná…, 2011
1552011
Efficient generation of linear secret sharing scheme matrices from threshold access trees
Z Liu, Z Cao, DS Wong
Cryptology ePrint Archive, 2010
129*2010
Securely outsourcing exponentiations with single untrusted program for cloud storage
Y Wang, Q Wu, DS Wong, B Qin, SSM Chow, Z Liu, X Tan
Computer Security-ESORICS 2014: 19th European Symposium on Research iná…, 2014
1262014
Time-domain attribute-based access control for cloud-based video content sharing: A cryptographic approach
K Yang, Z Liu, X Jia, XS Shen
IEEE Transactions on Multimedia 18 (5), 940-950, 2016
1042016
Traceable CP-ABE: How to trace decryption devices found in the wild
Z Liu, Z Cao, DS Wong
IEEE Transactions on Information Forensics and Security 10 (1), 55-68, 2014
982014
Practical attribute-based encryption: traitor tracing, revocation and large universe
Z Liu, DS Wong
The Computer Journal 59 (7), 983-1004, 2016
802016
A CCA-secure identity-based conditional proxy re-encryption without random oracles
K Liang, Z Liu, X Tan, DS Wong, C Tang
Information Security and Cryptology–ICISC 2012: 15th Internationalá…, 2013
702013
Z-channel: Scalable and efficient scheme in zerocash
Y Zhang, Y Long, Z Liu, Z Liu, D Gu
Computers & Security 86, 112-131, 2019
472019
Practical ciphertext-policy attribute-based encryption: traitor tracing, revocation, and large universe
Z Liu, DS Wong
International Conference on Applied Cryptography and Network Security, 127-146, 2015
432015
Fork-free hybrid consensus with flexible proof-of-activity
Z Liu, S Tang, SSM Chow, Z Liu, Y Long
Future Generation Computer Systems 96, 515-524, 2019
412019
Research on scalability of blockchain technology: Problems and methods
C Pan, Z Liu, Z Liu, Y Long
Journal of computer research and development 55 (10), 2099-2110, 2018
382018
A lattice-based linkable ring signature supporting stealth addresses
Z Liu, K Nguyen, G Yang, H Wang, DS Wong
Computer Security–ESORICS 2019: 24th European Symposium on Research iná…, 2019
322019
Taac: Temporal attribute-based access control for multi-authority cloud storage systems
K Yang, Z Liu, Z Cao, X Jia, DS Wong, K Ren
Cryptology ePrint Archive, 2012
242012
Attribute based encryption: Traitor tracing, revocation and fully security on prime order groups
X Li, K Liang, Z Liu, DS Wong
Cryptology ePrint Archive, 2016
182016
Traceable CP-ABE on prime order groups: Fully secure and fully collusion-resistant blackbox traceable
Z Liu, DS Wong
International Conference on Information and Communications Security, 109-124, 2015
172015
Identity-based aggregate signcryption in the standard model from multilinear maps
H Wang, Z Liu, Z Liu, DS Wong
Frontiers of Computer Science 10, 741-754, 2016
162016
Goshawk: a novel efficient, robust and flexible blockchain protocol
C Wan, S Tang, Y Zhang, C Pan, Z Liu, Y Long, Z Liu, Y Yu
Information Security and Cryptology: 14th International Conference, Inscryptá…, 2019
152019
Key-insulated and privacy-preserving signature scheme with publicly derived public key
Z Liu, G Yang, DS Wong, K Nguyen, H Wang
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 215-230, 2019
132019
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20