Hongda Li
Affiliations:- Chinese Academy of Sciences, Institute of Information Engineering, State Key Lab of Information Security, Beijing, China
- University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China
- Chinese Academy of Sciences, Data Assurance and Communication Security Research Center, Beijing, China
According to our database1,
Hongda Li
authored at least 47 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
0
5
10
1
2
2
1
2
3
2
1
2
1
1
1
2
1
1
2
3
1
7
5
3
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Science of Cyber Security - 5th International Conference, 2023
2022
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022
Proceedings of the CCRIS 2022: 3rd International Conference on Control, Robotics and Intelligent System, Virtual Event, China, August 26, 2022
2020
Sci. China Inf. Sci., 2020
2019
UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Provable Security, 2019
Public-Coin Differing-Inputs Obfuscator for Hiding-Input Point Function with Multi-bit Output and Its Applications.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019
Witness Encryption with (Weak) Unique Decryption and Message Indistinguishability: Constructions and Applications.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
Candidate Differing-Inputs Obfuscation from Indistinguishability Obfuscation and Auxiliary-Input Point Obfuscation.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
2017
IACR Cryptol. ePrint Arch., 2017
2015
Multi-Use Unidirectional Proxy Re-Signatures of Constant Size without Random Oracles.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the Provable Security, 2015
Fully Leakage-Resilient Non-malleable Identification Schemes in the Bounded-Retrieval Model.
Proceedings of the Advances in Information and Computer Security, 2015
The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures.
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015
Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Constant-round zero-knowledge proofs of knowledge with strict polynomial-time extractors for NP.
Sci. China Inf. Sci., 2014
Proceedings of the Information Security Applications - 15th International Workshop, 2014
Proceedings of the Information Security - 17th International Conference, 2014
Proceedings of the Trusted Systems - 6th International Conference, 2014
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
2012
Proceedings of the Internet and Distributed Computing Systems, 2012
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
2010
Sci. China Inf. Sci., 2010
2008
Sci. China Ser. F Inf. Sci., 2008
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
2004
J. Comput. Sci. Technol., 2004