フォロー
Tsz Hon Yuen
Tsz Hon Yuen
確認したメール アドレス: cs.hku.hk - ホームページ
タイトル
引用先
引用先
Ringct 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero
SF Sun, MH Au, JK Liu, TH Yuen
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
2652017
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles
Z Liu, Z Cao, Q Huang, DS Wong, TH Yuen
European Symposium on Research in Computer Security, 278-297, 2011
1432011
ID-based ring signature scheme secure in the standard model
MH Au, JK Liu, TH Yuen, DS Wong
International Workshop on Security, 1-16, 2006
1292006
Identity-Based Encryption Resilient to Continual Auxiliary Leakage
T Yuen, S Chow, Y Zhang, S Yiu
Advances in Cryptology–EUROCRYPT 2012, 117-134, 2012
1282012
Certificate based (linkable) ring signature
MH Au, JK Liu, W Susilo, TH Yuen
Information Security Practice and Experience: Third International Conference …, 2007
1182007
Ring signatures without random oracles
SSM Chow, VK Wei, JK Liu, TH Yuen
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
1182006
An efficient non-interactive multi-client searchable encryption with support for boolean queries
SF Sun, JK Liu, A Sakzad, R Steinfeld, TH Yuen
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
1162016
Improvements on an authentication scheme for vehicular sensor networks
JK Liu, TH Yuen, MH Au, W Susilo
Expert Systems with Applications 41 (5), 2559-2564, 2014
1162014
A general framework for secure sharing of personal health records in cloud system
MH Au, TH Yuen, JK Liu, W Susilo, X Huang, Y Xiang, ZL Jiang
Journal of computer and system sciences 90, 46-62, 2017
832017
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction
MH Au, JK Liu, W Susilo, TH Yuen
Theoretical Computer Science 469, 1-14, 2013
802013
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction
MH Au, JK Liu, W Susilo, TH Yuen
Theoretical Computer Science 469, 1-14, 2013
802013
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction
MH Au, JK Liu, W Susilo, TH Yuen
Theoretical Computer Science 469, 1-14, 2013
802013
Fast and proven secure blind identity-based signcryption from pairings
TH Yuen, VK Wei
Cryptographers’ Track at the RSA Conference, 305-322, 2005
802005
Ringct 3.0 for blockchain confidential transaction: Shorter size and stronger security
TH Yuen, S Sun, JK Liu, MH Au, MF Esgin, Q Zhang, D Gu
Financial Cryptography and Data Security: 24th International Conference, FC …, 2020
732020
Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list
JK Liu, TH Yuen, P Zhang, K Liang
Applied Cryptography and Network Security: 16th International Conference …, 2018
702018
Constant-size ID-based linkable and revocable-iff-linked ring signature
MH Au, JK Liu, W Susilo, TH Yuen
International Conference on Cryptology in India, 364-378, 2006
672006
Efficient Linkable and/or Threshold Ring Signature Without Random Oracles
TH Yuen, JK Liu, MH Au, W Susilo, J Zhou
The Computer Journal 56 (4), 407-421, 2013
632013
Privacy-preserving COVID-19 contact tracing app: a zero-knowledge proof approach
JK Liu, MH Au, TH Yuen, C Zuo, J Wang, A Sakzad, X Luo, L Li, ...
Cryptology ePrint Archive, 2020
592020
Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks
TH Yuen, Y Zhang, SM Yiu, JK Liu
European Symposium on Research in Computer Security, 130-147, 2014
582014
Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks
TH Yuen, Y Zhang, SM Yiu, JK Liu
European Symposium on Research in Computer Security, 130-147, 2014
582014
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20