Publications

Address-based Signature.

Published in The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2020) Guangzhou, China, December 29, 2020 - January 1, 2021, 2020

Recommended citation: Handong Cui and Tsz Hon Yuen: Address-based Signature. To appear in IEEE TrustCom 2020.

RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security.

Published in The 24-th International Conference on Financial Cryptography and Data Security (FC 2020). Kota Kinabalu, Sabah, Malaysia. February 10–14, 2020, 2020

Recommended citation: Tsz Hon Yuen, Shi-feng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang and Dawu Gu: RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. In FC 2020, 464-483. https://doi.org/10.1007/978-3-030-51280-4_25

Securely Perturb Big Data by Using Inner Product Encryption.

Published in The 2019 IEEE Conference on Dependable and Secure Computing (DSC 2019), Hangzhou, China, 18-20 November 2019, 2019

Recommended citation: Mingli Wu and Tsz Hon Yuen: Securely Perturb Big Data by Using Inner Product Encryption. IEEE DSC 2019, pp. 1-8.

RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.

Published in Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II, 2017

Recommended citation: Shifeng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen: RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero. ESORICS (2) 2017: 456-474 https://doi.org/10.1007/978-3-319-66399-9_25

An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries.

Published in Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I, 2016

Recommended citation: Shifeng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen: An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries. ESORICS (1) 2016: 154-172 https://doi.org/10.1007/978-3-319-45744-4_8

Continuous Non-malleable Key Derivation and Its Application to Related-Key Security.

Published in Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015

Recommended citation: Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen: Continuous Non-malleable Key Derivation and Its Application to Related-Key Security. Public Key Cryptography 2015: 557-578 https://doi.org/10.1007/978-3-662-46447-2_25

Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks.

Published in Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I, 2014

Recommended citation: Tsz Hon Yuen, Ye Zhang, Siu-Ming Yiu, Joseph K. Liu: Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks. ESORICS (1) 2014: 130-147 https://doi.org/10.1007/978-3-319-11203-9_8