Identity-Based Encryption Resilient to Continual Auxiliary Leakage.
Tsz Hon Yuen, Sherman S. M. Chow, Ye Zhang, Siu-Ming Yiu: Identity-Based Encryption Resilient to Continual Auxiliary Leakage. EUROCRYPT 2012: 117-134
Tsz Hon Yuen, Sherman S. M. Chow, Ye Zhang, Siu-Ming Yiu: Identity-Based Encryption Resilient to Continual Auxiliary Leakage. EUROCRYPT 2012: 117-134
Kin Ying Yu, Tsz Hon Yuen, Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui: PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation. ESORICS 2012: 679-696
Cong Zhang, Tsz Hon Yuen, Hao Xiong, Sherman S. M. Chow, Siu-Ming Yiu, Yi Jun He: Multi-key leakage-resilient threshold cryptography. AsiaCCS 2013: 61-70
Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou: Efficient Linkable and/or Threshold Ring Signature Without Random Oracles. Comput. J. 56(4): 407-421 (2013)
Tsz Hon Yuen, Ye Zhang, Siu-Ming Yiu, Joseph K. Liu: Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks. ESORICS (1) 2014: 130-147
Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen: Continuous Non-malleable Key Derivation and Its Application to Related-Key Security. Public Key Cryptography 2015: 557-578
Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow, Siu-Ming Yiu: Related Randomness Attacks for Public Key Cryptosystems. AsiaCCS 2015: 215-223
Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou: k-Times Attribute-Based Anonymous Access Control for Cloud Computing. IEEE Trans. Computers 64(9): 2595-2608 (2015)
Shifeng Sun, Dawu Gu, Joseph K. Liu, Udaya Parampalli, Tsz Hon Yuen: Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption. AsiaCCS 2016: 901-906
Shifeng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen: An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries. ESORICS (1) 2016: 154-172
Joseph K. Liu, Willy Susilo, Tsz Hon Yuen, Man Ho Au, Jun-bin Fang, Zoe L. Jiang, Jianying Zhou: Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles. Comput. J. 59(7): 1040-1053 (2016)
Shifeng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen: RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero. ESORICS (2) 2017: 456-474
Man Ho Au, Tsz Hon Yuen, Joseph K. Liu, Willy Susilo, Xinyi Huang, Yang Xiang, Zoe L. Jiang: A General Framework for Secure Sharing of Personal Health Records in Cloud System. J. Comput. Syst. Sci. 90: 46-62 (2017)
Tsz Hon Yuen and Swee-Huay Heng: Security-Mediated Certificateless Undeniable Signature Scheme. ICICT 2018
Joseph K. Liu, Tsz Hon Yuen, Peng Zhang, Kaitai Liang: Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List. ACNS 2018: 516-534.
Hao Ren, Peng Zhang, Qingchun Shentu, Joseph K. Liu and Tsz Hon Yuen: Compact Ring Signature in the Standard Model for Blockchain. ISPEC 2018
Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu and Tsz Hon Yuen: Anonymity Reduction Attacks To Monero. Inscrypt 2018: 86-100
Tsz Hon Yuen: PAChain: Private, Authenticated Auditable Consortium Blockchain. CANS 2019: 214-234. Full version can be found in http://thyuen.github.io/files/cans.pdf
Mingli Wu and Tsz Hon Yuen: Securely Perturb Big Data by Using Inner Product Encryption. IEEE DSC 2019, pp. 1-8.
Tsz Hon Yuen and Siu-Ming Yiu: Strong Known Related-Key Attacks and the Security of ECDSA. NSS 2019: 130-145.
Hui Cui, Tsz Hon Yuen, Robert H. Deng, Guilin Wang: Server-aided revocable attribute-based encryption for cloud computing services. Concurr. Comput. Pract. Exp. 32(14) (2020).
Shi-Feng Sun, Cong Zuo, Joseph Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen, Xingliang Yuan, Dawu Gu: Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation. To appear in IEEE Transactions on Dependable and Secure Computing, 2020.
Tsz Hon Yuen, Shi-feng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang and Dawu Gu: RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. In FC 2020, 464-483.
Tsz Hon Yuen: PAChain: Private, Authenticated & Auditable Consortium Blockchain and its Implementation. Future Generation Computer Systems. Volume 112, November 2020, Pages 913-929.
Cailing Cai and Tsz Hon Yuen: LPPRS: New Location Privacy Preserving Schemes Based on Ring Signature over Mobile Social Networks. In Inscrypt 2020: 288-303.
Rouzbeh Behnia, Attila Altay Yavuz, Muslum Ozgur Ozmen, and Tsz Hon Yuen: Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT. In ISC 2020: 39-58.
Handong Cui and Tsz Hon Yuen: Address-based Signature. In IEEE TrustCom 2020: 884-891.
Tsz Hon Yuen, Handong Cui and Xiang Xie: Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup. In PKC 2021: 481-511.
Tsz Hon Yuen, Muhammed F. Esgin, Joseph K. Liu, Man Ho Au and Zhimin Ding: DualRing: Generic Construction of Ring Signatures with Efficient Instantiations. In CRYPTO 2021: 251-281.
Handong Cui, Xianrui Qin, Cailing Cai and Tsz Hon Yuen : Security on SM2 and GOST Signatures against Related Key Attacks. In IEEE Trustcom 2021: 155-163.
Xianrui Qin, Cailing Cai and Tsz Hon Yuen: One-more Unforgeability of Blind ECDSA. In ESORICS 2021: 313-331.
Haiyang Xue, Man Ho Au, Xiang Xie, Tsz Hon Yuen and Handong Cui: Efficient Online-friendly Two-Party ECDSA Signature. In CCS 2021: 558-573.
Handong Cui and Tsz Hon Yuen: A Trustless GQ Multi-Signature Scheme with Identifiable Abort. In ACISP 2021: 673-693.
Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li: Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach. In ISPEC 2021, 327-344.
Cailing Cai, Xianrui Qin, Tsz Hon Yuen and Siu-Ming Yiu: Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting. In AsiaCCS 2022: 42-53.
Michael Co, Tsz Hon Yuen and Ho Hung Cheung: Using clinical history taking chatbot mobile app for clinical bedside teachings - A prospective case control study. In Heliyon. Volume 8, Issue 6, June 2022.
Tsz Hon Yuen, Cong Zhang and Sherman S. M. Chow: Don’t Tamper with Dual System Encryption (Beyond Polynomial Related-Key Security of IBE). In ACNS 2022: 419-439.
Cailing Cai, Tsz Hon Yuen and Siu-Ming Yiu: Hash Proof System with Auxiliary Inputs and Its Applications. To appear in IEEE TrustCom 2022.
Mingli Wu and Tsz Hon Yuen: GCD-Filter: Private Set Intersection Without Encryption. To appear in WASA 2022.
Kwan Yin Chan and Tsz Hon Yuen: Attribute-based Anonymous Credential: Optimization for Single-Use and Multi-Use. In CANS 2022: 89-121.
Shimin Pan, Kwan Yin Chan, Handong Cui and Tsz Hon Yuen: Multi-signatures for ECDSA and its Applications in Blockchain. In ACISP 2022: 265-285.
Cailing Cai, Tsz Hon Yuen and Siu Ming Yiu: Hash Proof System With Auxiliary Inputs and Its Application. In IEEE Trustcom 2022, 52-59.
Zi Zheng Fong Hu, Tsz Hon Yuen: A Critique on Decentralized Finance from a Social, Political, and Economic Perspective. Blockchain 2023(1): 0006.
Cailing Cai, Shimin Pan, Tsz Hon Yuen, Siu-Ming Yiu: Practical fully leakage resilient signatures with auxiliary inputs. Future Generation Computer Systems. Volume 141, April 2023, Pages 448-461.
Xianrui Qin, Shimin Pan, Arash Mirzaei, Zhimei Sui, Oğuzhan Ersoy, Amin Sakzad, Muhammed F. Esgin, Joseph K. Liu, Jiangshan Yu, Tsz Hon Yuen: BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts. To appear in IEEE S&P 2023.
Handong Cui, Kwan Yin Chan, Tsz Hon Yuen, Xin Kang, Cheng-Kang Chu: Bandwidth-Efficient Zero-Knowledge Proofs For Threshold ECDSA. In the Computer Journal. bxad057.
Sherman S. M. Chow, Jack P. K. Ma and Tsz Hon Yuen: Scored Anonymous Credentials. In ACNS 2023: 484-515.
Tsz Hon Yuen, Shimin Pan, Sheng Huang and Xiaoting Zhang: Practical Verifiable Random Function with RKA Security. In ACISP 2023: 503-522.
Mingli Wu and Tsz Hon Yuen: Efficient Unbalanced Private Set Intersection Cardinality and User-friendly Privacy-preserving Contact Tracing. In USENIX 2023.
Kwan Yin Chan, Handong Cui, Tsz Hon Yuen: DIDO: Data Provenance from Restricted TLS 1.3 Websites. ISPEC 2023: 154-169
Haiyang Xue, Man Ho Au, Mengling Liu, Kwan Yin Chan, Handong Cui, Xiang Xie, Tsz Hon Yuen, Chengru Zhang: Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA. CCS 2023: 2974-2988
Yingjiu Li, Binanda Sengupta, Yangguang Tian, Jiaming Yuan, Tsz Hon Yuen: Message Control for Blockchain Rewriting. In IEEE Transactions on Dependable and Secure Computing, doi: 10.1109/TDSC.2024.3372631.
Kwan Yin Chan, Liqun Chen, Yangguang Tian, and Tsz Hon Yuen: Reconstructing Chameleon Hash: Full Security and the Multi-Party Setting. To appear in AsiaCCS 2024.
Mingshu Cong, Tsz Hon Yuen, Siu-Ming Yiu: zkMatrix: Batched Short Proof for Committed Matrix Multiplication. To appear in AsiaCCS 2024.
Mingli Wu, Tsz Hon Yuen: O-Ring and K-Star: Efficient Multi-party Private Set Intersection. To appear in USENIX Security 2024.
Tsz Hon Yuen, Sherman S. M. Chow, Huangting Wu, Cong Zhang, Siu-Ming Yiu: Exponent-Inversion P-Signatures and Accountable Identity-Based Encryption from SXDH. IACR Communications in Cryptology, vol. 1, no. 3, Oct 07, 2024, doi: 10.62056/ahsdkmp-3y
Invited Talk at 13th International Conference on Information Security Practice and Experience (ISPEC), Melbourne, Australia
Invited Talk at Second ACM Workshop on Blockchains, Cryptocurrencies and Contracts (BCC'18), Incheon, Korea
Invited Talk at The 29th Australasian Conference on Information Security and Privacy (ACISP 2024), Sydney, Australia