Publications

SoK: Stablecoins in Retail Payments.

Published in IEEE International Conference on Blockchain and Cryptocurrency 2026 (ICBC 2026). June 1 - 5, 2026, Brisbane, Australia, 2026

Recommended citation: Yuquan Li, Yuexin Xiang, Qin Wang, Tsz Hon Yuen, Andreas Deppeler and Jiangshan Yu. SoK: Stablecoins in Retail Payments. To appear in IEEE International Conference on Blockchain and Cryptocurrency (ICBC) 2026 https://arxiv.org/pdf/2604.03733

Measuring Memecoin Fragility.

Published in IEEE International Conference on Blockchain and Cryptocurrency 2026 (ICBC 2026). June 1 - 5, 2026, Brisbane, Australia, 2026

Recommended citation: Yuexin Xiang, Qishuang Fu, Yuquan Li, Qin Wang, Tsz Hon Yuen and Jiangshan Yu. Measuring Memecoin Fragility. To appear in IEEE International Conference on Blockchain and Cryptocurrency (ICBC) 2026 (Short paper). https://arxiv.org/pdf/2512.00377

Scalable zkSNARKs for Matrix Computations: A Generic Framework for Verifiable Deep Learning.

Published in The International Conference on the Theory and Application of Cryptology and Information Security 2025 (Asiacrypt 2025). December 8 - 12, 2025, Melbourne, Australia, 2025

Recommended citation: Mingshu Cong, Sherman S. M. Chow, Siu Ming Yiu, and Tsz Hon Yuen. Scalable zkSNARKs for Matrix Computations: A Generic Framework for Verifiable Deep Learning. In Asiacrypt 2025: 363-395. https://eprint.iacr.org/2025/1646

Plum: SNARK-Friendly Post-Quantum Signature based on Power Residue PRFs.

Published in The 19th International Conference on Provable and Practical Security (Provsec 2025). October 10 - 12, 2025, Yokohama, Japan, 2025

Recommended citation: Xinyu Zhang, Qishuang Fu, Ron Steinfeld, Joseph K. Liu, Tsz Hon Yuen, and Man Ho Au. Plum: SNARK-Friendly Post-Quantum Signature based on Power Residue PRFs. To appear in Provsec 2025

SoK: A Deep Dive into Anti-Money Laundering Techniques for Blockchain Cryptocurrencies.

Published in The 30th Australasian Conference on Information Security and Privacy (ACISP 2025). July 14 - 16, 2025, Wollongong, Australia, 2025

Recommended citation: Qishuang Fu, Joseph K. Liu, Shirui Pan and Tsz Hon Yuen. SoK: A Deep Dive into Anti-Money Laundering Techniques for Blockchain Cryptocurrencies. In ACISP 2025. Lecture Notes in Computer Science, Vol. 15658, Pages 310-330. https://doi.org/10.1007/978-981-96-9095-4_16

Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA.

Published in The 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023. Copenhagen, Denmark. November 26-30, 2023, 2023

Recommended citation: Haiyang Xue, Man Ho Au, Mengling Liu, Kwan Yin Chan, Handong Cui, Xiang Xie, Tsz Hon Yuen, Chengru Zhang: Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA. CCS 2023: 2974-2988 https://doi.org/10.1145/3576915.3616595

BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts.

Published in 44th IEEE Symposium on Security and Privacy, San Francisco, USA. May 22-25, 2023, 2023

Recommended citation: Xianrui Qin, Shimin Pan, Arash Mirzaei, Zhimei Sui, Oğuzhan Ersoy, Amin Sakzad, Muhammed F. Esgin, Joseph K. Liu, Jiangshan Yu, Tsz Hon Yuen: BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts. To appear in IEEE S&P 2023. Pages 2462 - 2480. https://eprint.iacr.org/2022/1735

Address-based Signature.

Published in The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2020) Guangzhou, China, December 29, 2020 - January 1, 2021, 2020

Recommended citation: Handong Cui and Tsz Hon Yuen: Address-based Signature. In IEEE TrustCom 2020: 884-891. https://doi.org/10.1109/TrustCom50675.2020.00119

RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security.

Published in The 24-th International Conference on Financial Cryptography and Data Security (FC 2020). Kota Kinabalu, Sabah, Malaysia. February 10–14, 2020, 2020

Recommended citation: Tsz Hon Yuen, Shi-feng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang and Dawu Gu: RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. In FC 2020, 464-483. https://doi.org/10.1007/978-3-030-51280-4_25

Securely Perturb Big Data by Using Inner Product Encryption.

Published in The 2019 IEEE Conference on Dependable and Secure Computing (DSC 2019), Hangzhou, China, 18-20 November 2019, 2019

Recommended citation: Mingli Wu and Tsz Hon Yuen: Securely Perturb Big Data by Using Inner Product Encryption. IEEE DSC 2019, pp. 1-8.

RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.

Published in Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II, 2017

Recommended citation: Shifeng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen: RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero. ESORICS (2) 2017: 456-474 https://doi.org/10.1007/978-3-319-66399-9_25

An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries.

Published in Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I, 2016

Recommended citation: Shifeng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen: An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries. ESORICS (1) 2016: 154-172 https://doi.org/10.1007/978-3-319-45744-4_8

Continuous Non-malleable Key Derivation and Its Application to Related-Key Security.

Published in Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015

Recommended citation: Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen: Continuous Non-malleable Key Derivation and Its Application to Related-Key Security. Public Key Cryptography 2015: 557-578 https://doi.org/10.1007/978-3-662-46447-2_25

Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks.

Published in Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I, 2014

Recommended citation: Tsz Hon Yuen, Ye Zhang, Siu-Ming Yiu, Joseph K. Liu: Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks. ESORICS (1) 2014: 130-147 https://doi.org/10.1007/978-3-319-11203-9_8