default search action
Tsz Hon Yuen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Tsz Hon Yuen, Sherman S. M. Chow, Huangting Wu, Cong Zhang, Siu-Ming Yiu:
Exponent-Inversion P-Signatures and Accountable Identity-Based Encryption from SXDH. IACR Commun. Cryptol. 1(3): 48 (2024) - [j15]Handong Cui, Kwan Yin Chan, Tsz Hon Yuen, Xin Kang, Cheng-Kang Chu:
Bandwidth-Efficient Zero-Knowledge Proofs For Threshold ECDSA. Comput. J. 67(4): 1265-1278 (2024) - [c70]Kwan Yin Chan, Liqun Chen, Yangguang Tian, Tsz Hon Yuen:
Reconstructing Chameleon Hash: Full Security and the Multi-Party Setting. AsiaCCS 2024 - [c69]Mingshu Cong, Tsz Hon Yuen, Siu-Ming Yiu:
zkMatrix: Batched Short Proof for Committed Matrix Multiplication. AsiaCCS 2024 - [c68]Mingli Wu, Tsz Hon Yuen, Kwan Yin Chan:
O-Ring and K-Star: Efficient Multi-party Private Set Intersection. USENIX Security Symposium 2024 - [i31]Mingshu Cong, Tsz Hon Yuen, Siu Ming Yiu:
zkMatrix: Batched Short Proof for Committed Matrix Multiplication. IACR Cryptol. ePrint Arch. 2024: 161 (2024) - 2023
- [j14]Cailing Cai, Shimin Pan, Tsz Hon Yuen, Siu-Ming Yiu:
Practical fully leakage resilient signatures with auxiliary inputs. Future Gener. Comput. Syst. 141: 448-461 (2023) - [c67]Tsz Hon Yuen, Shimin Pan, Sheng Huang, Xiaoting Zhang:
Practical Verifiable Random Function with RKA Security. ACISP 2023: 503-522 - [c66]Sherman S. M. Chow, Jack P. K. Ma, Tsz Hon Yuen:
Scored Anonymous Credentials. ACNS 2023: 484-515 - [c65]Nan Li, Yingjiu Li, Atsuko Miyaji, Yangguang Tian, Tsz Hon Yuen:
A Practical Forward-Secure DualRing. CANS 2023: 516-537 - [c64]Haiyang Xue, Man Ho Au, Mengling Liu, Kwan Yin Chan, Handong Cui, Xiang Xie, Tsz Hon Yuen, Chengru Zhang:
Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA. CCS 2023: 2974-2988 - [c63]Kwan Yin Chan, Handong Cui, Tsz Hon Yuen:
DIDO: Data Provenance from Restricted TLS 1.3 Websites. ISPEC 2023: 154-169 - [c62]Xianrui Qin, Shimin Pan, Arash Mirzaei, Zhimei Sui, Oguzhan Ersoy, Amin Sakzad, Muhammed F. Esgin, Joseph K. Liu, Jiangshan Yu, Tsz Hon Yuen:
BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts. SP 2023: 2462-2480 - [c61]Mingli Wu, Tsz Hon Yuen:
Efficient Unbalanced Private Set Intersection Cardinality and User-friendly Privacy-preserving Contact Tracing. USENIX Security Symposium 2023: 283-300 - [i30]Kwan Yin Chan, Handong Cui, Tsz Hon Yuen:
DIDO: Data Provenance from Restricted TLS 1.3 Websites. IACR Cryptol. ePrint Arch. 2023: 1056 (2023) - [i29]Haiyang Xue, Man Ho Au, Mengling Liu, Kwan Yin Chan, Handong Cui, Xiang Xie, Tsz Hon Yuen, Chengru Zhang:
Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA. IACR Cryptol. ePrint Arch. 2023: 1312 (2023) - 2022
- [j13]Shifeng Sun, Cong Zuo, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen, Xingliang Yuan, Dawu Gu:
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation. IEEE Trans. Dependable Secur. Comput. 19(1): 452-467 (2022) - [c60]Shimin Pan, Kwan Yin Chan, Handong Cui, Tsz Hon Yuen:
Multi-signatures for ECDSA and Its Applications in Blockchain. ACISP 2022: 265-285 - [c59]Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow:
Don't Tamper with Dual System Encryption - Beyond Polynomial Related-Key Security of IBE. ACNS 2022: 419-439 - [c58]Cailing Cai, Xianrui Qin, Tsz Hon Yuen, Siu-Ming Yiu:
Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting. AsiaCCS 2022: 42-53 - [c57]Kwan Yin Chan, Tsz Hon Yuen:
Attribute-Based Anonymous Credential: Optimization for Single-Use and Multi-Use. CANS 2022: 89-121 - [c56]Cailing Cai, Tsz Hon Yuen, Siu-Ming Yiu:
Hash Proof System with Auxiliary Inputs and Its Application. TrustCom 2022: 52-59 - [c55]Mingli Wu, Tsz Hon Yuen:
GCD-Filter: Private Set Intersection Without Encryption. WASA (2) 2022: 429-440 - [i28]Haiyang Xue, Man Ho Au, Xiang Xie, Tsz Hon Yuen, Handong Cui:
Efficient Online-friendly Two-Party ECDSA Signature. IACR Cryptol. ePrint Arch. 2022: 318 (2022) - [i27]Kwan Yin Chan, Tsz Hon Yuen:
Attribute-based Anonymous Credential: Optimization for Single-Use and Multi-Use. IACR Cryptol. ePrint Arch. 2022: 1585 (2022) - [i26]Xianrui Qin, Shimin Pan, Arash Mirzaei, Zhimei Sui, Oguzhan Ersoy, Amin Sakzad, Muhammed F. Esgin, Joseph K. Liu, Jiangshan Yu, Tsz Hon Yuen:
BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts. IACR Cryptol. ePrint Arch. 2022: 1735 (2022) - 2021
- [c54]Handong Cui, Tsz Hon Yuen:
A Trustless GQ Multi-signature Scheme with Identifiable Abort. ACISP 2021: 673-693 - [c53]Haiyang Xue, Man Ho Au, Xiang Xie, Tsz Hon Yuen, Handong Cui:
Efficient Online-friendly Two-Party ECDSA Signature. CCS 2021: 558-573 - [c52]Tsz Hon Yuen, Muhammed F. Esgin, Joseph K. Liu, Man Ho Au, Zhimin Ding:
DualRing: Generic Construction of Ring Signatures with Efficient Instantiations. CRYPTO (1) 2021: 251-281 - [c51]Xianrui Qin, Cailing Cai, Tsz Hon Yuen:
One-More Unforgeability of Blind ECDSA. ESORICS (2) 2021: 313-331 - [c50]Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li, Kim-Kwang Raymond Choo:
Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach. ISPEC 2021: 327-344 - [c49]Tsz Hon Yuen, Handong Cui, Xiang Xie:
Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup. Public Key Cryptography (1) 2021: 481-511 - [c48]Handong Cui, Xianrui Qin, Cailing Cai, Tsz Hon Yuen:
Security on SM2 and GOST Signatures against Related Key Attacks. TrustCom 2021: 155-163 - [i25]Rouzbeh Behnia, Attila A. Yavuz, Muslum Ozgur Ozmen, Tsz Hon Yuen:
Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT. CoRR abs/2103.09345 (2021) - [i24]Tsz Hon Yuen, Handong Cui, Xiang Xie:
Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup. IACR Cryptol. ePrint Arch. 2021: 205 (2021) - [i23]Handong Cui, Tsz Hon Yuen:
A Trustless GQ Multi-Signature Scheme with Identifiable Abort. IACR Cryptol. ePrint Arch. 2021: 664 (2021) - [i22]Tsz Hon Yuen, Muhammed F. Esgin, Joseph K. Liu, Man Ho Au, Zhimin Ding:
DualRing: Generic Construction of Ring Signatures with Efficient Instantiations. IACR Cryptol. ePrint Arch. 2021: 1213 (2021) - [i21]Xianrui Qin, Cailing Cai, Tsz Hon Yuen:
One-more Unforgeability of Blind ECDSA. IACR Cryptol. ePrint Arch. 2021: 1449 (2021) - [i20]Nan Li, Yingjiu Li, Atsuko Miyaji, Yangguang Tian, Tsz Hon Yuen:
A Practical Forward-Secure DualRing. IACR Cryptol. ePrint Arch. 2021: 1483 (2021) - 2020
- [j12]Hui Cui, Tsz Hon Yuen, Robert H. Deng, Guilin Wang:
Server-aided revocable attribute-based encryption for cloud computing services. Concurr. Comput. Pract. Exp. 32(14) (2020) - [j11]Tsz Hon Yuen:
PAChain: Private, authenticated & auditable consortium blockchain and its implementation. Future Gener. Comput. Syst. 112: 913-929 (2020) - [c47]Cailing Cai, Tsz Hon Yuen, Handong Cui, Mingli Wu, Siu-Ming Yiu:
LPPRS: New Location Privacy Preserving Schemes Based on Ring Signature over Mobile Social Networks. Inscrypt 2020: 288-303 - [c46]Tsz Hon Yuen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu:
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. Financial Cryptography 2020: 464-483 - [c45]Rouzbeh Behnia, Attila Altay Yavuz, Muslum Ozgur Ozmen, Tsz Hon Yuen:
Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT. ISC 2020: 39-58 - [c44]Handong Cui, Tsz Hon Yuen:
Address-based Signature. TrustCom 2020: 884-891 - [i19]Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li:
Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach. IACR Cryptol. ePrint Arch. 2020: 528 (2020)
2010 – 2019
- 2019
- [c43]Tsz Hon Yuen:
PAChain: Private, Authenticated and Auditable Consortium Blockchain. CANS 2019: 214-234 - [c42]Mingli Wu, Tsz Hon Yuen:
Securely Perturb Big Data by using Inner Product. DSC 2019: 1-8 - [c41]Tsz Hon Yuen, Siu-Ming Yiu:
Strong Known Related-Key Attacks and the Security of ECDSA. NSS 2019: 130-145 - [e2]Ron Steinfeld, Tsz Hon Yuen:
Provable Security - 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1-4, 2019, Proceedings. Lecture Notes in Computer Science 11821, Springer 2019, ISBN 978-3-030-31918-2 [contents] - [i18]Tsz Hon Yuen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu:
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. IACR Cryptol. ePrint Arch. 2019: 508 (2019) - 2018
- [c40]Joseph K. Liu, Tsz Hon Yuen, Peng Zhang, Kaitai Liang:
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List. ACNS 2018: 516-534 - [c39]Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Tsz Hon Yuen:
Anonymity Reduction Attacks to Monero. Inscrypt 2018: 86-100 - [c38]Hao Ren, Peng Zhang, Qingchun Shentu, Joseph K. Liu, Tsz Hon Yuen:
Compact Ring Signature in the Standard Model for Blockchain. ISPEC 2018: 50-65 - [i17]Joseph K. Liu, Tsz Hon Yuen, Peng Zhang, Kaitai Liang:
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List. IACR Cryptol. ePrint Arch. 2018: 330 (2018) - 2017
- [j10]Man Ho Au, Tsz Hon Yuen, Joseph K. Liu, Willy Susilo, Xinyi Huang, Yang Xiang, Zoe Lin Jiang:
A general framework for secure sharing of personal health records in cloud system. J. Comput. Syst. Sci. 90: 46-62 (2017) - [c37]Shifeng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen:
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero. ESORICS (2) 2017: 456-474 - [i16]Shifeng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Dawu Gu:
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero. IACR Cryptol. ePrint Arch. 2017: 921 (2017) - 2016
- [j9]Joseph K. Liu, Willy Susilo, Tsz Hon Yuen, Man Ho Au, Jun-bin Fang, Zoe Lin Jiang, Jianying Zhou:
Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles. Comput. J. 59(7): 1040-1053 (2016) - [j8]Jinguang Han, Ye Yang, Xinyi Huang, Tsz Hon Yuen, Jiguo Li, Jie Cao:
Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption. Inf. Sci. 345: 143-155 (2016) - [j7]Ye Yang, Jinguang Han, Willy Susilo, Tsz Hon Yuen, Jiguo Li:
ABKS-CSC: attribute-based keyword search with constant-size ciphertexts. Secur. Commun. Networks 9(18): 5003-5015 (2016) - [c36]Shifeng Sun, Udaya Parampalli, Tsz Hon Yuen, Yu Yu, Dawu Gu:
Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions. ACISP (2) 2016: 134-150 - [c35]Shifeng Sun, Dawu Gu, Joseph K. Liu, Udaya Parampalli, Tsz Hon Yuen:
Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption. AsiaCCS 2016: 901-906 - [c34]Shifeng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen:
An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries. ESORICS (1) 2016: 154-172 - [i15]Shifeng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen:
An Efficient Non-Interactive Multi-client Searchable Encryption with Support for Boolean Queries. IACR Cryptol. ePrint Arch. 2016: 1038 (2016) - 2015
- [j6]Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou:
k-Times Attribute-Based Anonymous Access Control for Cloud Computing. IEEE Trans. Computers 64(9): 2595-2608 (2015) - [c33]Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow, Siu-Ming Yiu:
Related Randomness Attacks for Public Key Cryptosystems. AsiaCCS 2015: 215-223 - [c32]Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen:
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security. Public Key Cryptography 2015: 557-578 - [i14]Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen:
Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security. IACR Cryptol. ePrint Arch. 2015: 3 (2015) - 2014
- [j5]Joseph K. Liu, Tsz Hon Yuen, Man Ho Au, Willy Susilo:
Improvements on an authentication scheme for vehicular sensor networks. Expert Syst. Appl. 41(5): 2559-2564 (2014) - [j4]Tsz Hon Yuen, Willy Susilo, Yi Mu:
Towards a cryptographic treatment of publish/subscribe systems. J. Comput. Secur. 22(1): 33-67 (2014) - [c31]Tsz Hon Yuen, Ye Zhang, Siu-Ming Yiu, Joseph K. Liu:
Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks. ESORICS (1) 2014: 130-147 - [i13]Tsz Hon Yuen, Sherman S. M. Chow, Cong Zhang, Siu-Ming Yiu:
Exponent-inversion Signatures and IBE under Static Assumptions. IACR Cryptol. ePrint Arch. 2014: 311 (2014) - 2013
- [j3]Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou:
Efficient Linkable and/or Threshold Ring Signature Without Random Oracles. Comput. J. 56(4): 407-421 (2013) - [j2]Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen:
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction. Theor. Comput. Sci. 469: 1-14 (2013) - [c30]Hao Xiong, Tsz Hon Yuen, Cong Zhang, Siu-Ming Yiu, Yi Jun He:
Leakage-resilient certificateless public key encryption. AsiaPKC@AsiaCCS 2013: 13-22 - [c29]Cong Zhang, Tsz Hon Yuen, Hao Xiong, Sherman S. M. Chow, Siu-Ming Yiu, Yi Jun He:
Multi-key leakage-resilient threshold cryptography. AsiaCCS 2013: 61-70 - [c28]Hao Xiong, Tsz Hon Yuen, Cong Zhang, Yi Jun He, Siu-Ming Yiu:
Attribute Specified Identity-Based Encryption. ISPEC 2013: 60-74 - [c27]Yang Wang, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Willy Susilo:
Threshold-Oriented Optimistic Fair Exchange. NSS 2013: 424-438 - [c26]Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow, Joseph K. Liu:
Towards Anonymous Ciphertext Indistinguishability with Identity Leakage. ProvSec 2013: 139-153 - [i12]Tsz Hon Yuen, Ye Zhang, Siu-Ming Yiu:
Encryption Schemes with Post-Challenge Auxiliary Inputs. IACR Cryptol. ePrint Arch. 2013: 323 (2013) - 2012
- [c25]Tsz Hon Yuen, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Fully Leakage-Resilient Signatures with Auxiliary Inputs. ACISP 2012: 294-307 - [c24]Kin Ying Yu, Tsz Hon Yuen, Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui:
PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation. ESORICS 2012: 679-696 - [c23]Tsz Hon Yuen, Sherman S. M. Chow, Ye Zhang, Siu-Ming Yiu:
Identity-Based Encryption Resilient to Continual Auxiliary Leakage. EUROCRYPT 2012: 117-134 - [c22]Hao Xiong, Cong Zhang, Tsz Hon Yuen, Echo P. Zhang, Siu-Ming Yiu, Sihan Qing:
Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model. ICICS 2012: 119-130 - [c21]Tsz Hon Yuen, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo, Jianying Zhou:
Forward Secure Attribute-Based Signatures. ICICS 2012: 167-177 - [e1]Tat Wing Chim, Tsz Hon Yuen:
Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings. Lecture Notes in Computer Science 7618, Springer 2012, ISBN 978-3-642-34128-1 [contents] - 2011
- [c20]Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou:
Threshold ring signature without random oracles. AsiaCCS 2011: 261-267 - [c19]Zhen Liu, Zhenfu Cao, Qiong Huang, Duncan S. Wong, Tsz Hon Yuen:
Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles. ESORICS 2011: 278-297 - [c18]Joseph K. Liu, Tsz Hon Yuen, Jianying Zhou:
Forward Secure Ring Signature without Random Oracles. ICICS 2011: 1-14 - [c17]Tsz Hon Yuen, Duncan S. Wong, Willy Susilo, Qiong Huang:
Concurrent Signatures with Fully Negotiable Binding Control. ProvSec 2011: 170-187 - [i11]Joseph K. Liu, Tsz Hon Yuen, Jianying Zhou:
Forward Secure Ring Signature without Random Oracles. IACR Cryptol. ePrint Arch. 2011: 472 (2011) - 2010
- [j1]Tsz Hon Yuen, Willy Susilo, Yi Mu:
How to construct identity-based signatures without the key escrow problem. Int. J. Inf. Sec. 9(4): 297-311 (2010) - [c16]Tsz Hon Yuen, Willy Susilo, Yi Mu:
Towards a Cryptographic Treatment of Publish/Subscribe Systems. CANS 2010: 201-220
2000 – 2009
- 2009
- [c15]Tsz Hon Yuen, Qiong Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Guomin Yang:
Efficient Non-interactive Range Proof. COCOON 2009: 138-147 - [c14]Tsz Hon Yuen, Willy Susilo, Yi Mu:
How to Construct Identity-Based Signatures without the Key Escrow Problem. EuroPKI 2009: 286-301 - [i10]Tsz Hon Yuen, Willy Susilo, Yi Mu:
How to Construct Identity-Based Signatures without the Key Escrow Problem. IACR Cryptol. ePrint Arch. 2009: 421 (2009) - 2008
- [c13]Tsz Hon Yuen, Willy Susilo, Joseph K. Liu, Yi Mu:
Sanitizable Signatures Revisited. CANS 2008: 80-97 - 2007
- [c12]Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo:
(Convertible) Undeniable Signatures Without Random Oracles. ICICS 2007: 83-97 - [c11]Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen:
Certificate Based (Linkable) Ring Signature. ISPEC 2007: 79-92 - [c10]Jin Li, Tsz Hon Yuen, Kwangjo Kim:
Practical Threshold Signatures Without Random Oracles. ProvSec 2007: 198-207 - [i9]Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo:
(Convertible) Undeniable Signatures without Random Oracles. IACR Cryptol. ePrint Arch. 2007: 386 (2007) - 2006
- [c9]Sherman S. M. Chow, Victor K.-W. Wei, Joseph K. Liu, Tsz Hon Yuen:
Ring signatures without random oracles. AsiaCCS 2006: 297-302 - [c8]Jin Li, Xiaofeng Chen, Tsz Hon Yuen, Yanming Wang:
Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant. CIS 2006: 545-555 - [c7]Sebastian Fleissner, Yuen-Yan Chan, Tsz Hon Yuen, Victor Ng:
WebQuest Markup Language (WQML) for Sharable Inquiry-Based Learning. ICCSA (1) 2006: 383-392 - [c6]Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen:
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature. INDOCRYPT 2006: 364-378 - [c5]Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong:
ID-Based Ring Signature Scheme Secure in the Standard Model. IWSEC 2006: 1-16 - [c4]Sherman S. M. Chow, Willy Susilo, Tsz Hon Yuen:
Escrowed Linkability of Ring Signatures and Its Applications. VIETCRYPT 2006: 175-192 - [i8]Victor K. Wei, Tsz Hon Yuen:
(Hierarchical Identity-Based) Threshold Ring Signatures. IACR Cryptol. ePrint Arch. 2006: 193 (2006) - [i7]Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong:
Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles. IACR Cryptol. ePrint Arch. 2006: 368 (2006) - 2005
- [c3]Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang:
Group Signature Where Group Manager, Members and Open Authority Are Identity-Based. ACISP 2005: 468-480 - [c2]Tsz Hon Yuen, Victor K. Wei:
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings. CT-RSA 2005: 305-322 - [c1]Sherman S. M. Chow, Tsz Hon Yuen, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Signcryption in Hierarchical Identity Based Cryptosystem. SEC 2005: 443-457 - [i6]Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang:
Group Signature where Group Manager, Members and Open Authority are Identity-Based. IACR Cryptol. ePrint Arch. 2005: 188 (2005) - [i5]Sherman S. M. Chow, Joseph K. Liu, Victor K. Wei, Tsz Hon Yuen:
Ring Signatures without Random Oracles. IACR Cryptol. ePrint Arch. 2005: 317 (2005) - [i4]Tsz Hon Yuen, Victor K. Wei:
Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles. IACR Cryptol. ePrint Arch. 2005: 412 (2005) - [i3]Victor K. Wei, Tsz Hon Yuen:
More short signatures without random oracles. IACR Cryptol. ePrint Arch. 2005: 463 (2005) - 2004
- [i2]Tsz Hon Yuen, Victor K. Wei:
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings. IACR Cryptol. ePrint Arch. 2004: 121 (2004) - [i1]Sherman S. M. Chow, Tsz Hon Yuen, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Signcryption in Hierarchical Identity Based Cryptosystem. IACR Cryptol. ePrint Arch. 2004: 244 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint