Publications

Multi-signatures for ECDSA and its Applications in Blockchain

Published in The 27th Australasian Conference on Information Security and Privacy, (ACISP 2022) Wollongong, Australia, November 28-30, 2022, 2022

Recommended citation: Shimin Pan, Kwan Yin Chan, Handong Cui and Tsz Hon Yuen: Multi-signatures for ECDSA and its Applications in Blockchain. To appear in ACISP 2022.

GCD-Filter: Private Set Intersection Without Encryption

Published in The 17th International Conference on Wireless Algorithms, Systems, and Applications, (WASA 2022) Dalian, China, October 28-30, 2022, 2022

Recommended citation: Mingli Wu and Tsz Hon Yuen: GCD-Filter: Private Set Intersection Without Encryption. To appear in WASA 2022.

Hash Proof System with Auxilary Inputs and Its Applications.

Published in The 21th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, (IEEE TrustCom 2022) Wuhan, China, October 28-30, 2022, 2022

Recommended citation: Cailing Cai, Tsz Hon Yuen and Siu-Ming Yiu: Hash Proof System with Auxiliary Inputs and Its Applications. To appear in IEEE TrustCom 2022.

Address-based Signature.

Published in The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2020) Guangzhou, China, December 29, 2020 - January 1, 2021, 2020

Recommended citation: Handong Cui and Tsz Hon Yuen: Address-based Signature. In IEEE TrustCom 2020: 884-891. https://doi.org/10.1109/TrustCom50675.2020.00119

RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security.

Published in The 24-th International Conference on Financial Cryptography and Data Security (FC 2020). Kota Kinabalu, Sabah, Malaysia. February 10–14, 2020, 2020

Recommended citation: Tsz Hon Yuen, Shi-feng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang and Dawu Gu: RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. In FC 2020, 464-483. https://doi.org/10.1007/978-3-030-51280-4_25

Securely Perturb Big Data by Using Inner Product Encryption.

Published in The 2019 IEEE Conference on Dependable and Secure Computing (DSC 2019), Hangzhou, China, 18-20 November 2019, 2019

Recommended citation: Mingli Wu and Tsz Hon Yuen: Securely Perturb Big Data by Using Inner Product Encryption. IEEE DSC 2019, pp. 1-8.

RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.

Published in Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II, 2017

Recommended citation: Shifeng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen: RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero. ESORICS (2) 2017: 456-474 https://doi.org/10.1007/978-3-319-66399-9_25

An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries.

Published in Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I, 2016

Recommended citation: Shifeng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen: An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries. ESORICS (1) 2016: 154-172 https://doi.org/10.1007/978-3-319-45744-4_8

Continuous Non-malleable Key Derivation and Its Application to Related-Key Security.

Published in Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015

Recommended citation: Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen: Continuous Non-malleable Key Derivation and Its Application to Related-Key Security. Public Key Cryptography 2015: 557-578 https://doi.org/10.1007/978-3-662-46447-2_25

Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks.

Published in Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I, 2014

Recommended citation: Tsz Hon Yuen, Ye Zhang, Siu-Ming Yiu, Joseph K. Liu: Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks. ESORICS (1) 2014: 130-147 https://doi.org/10.1007/978-3-319-11203-9_8