Liqun Chen

Orcid: 0000-0003-2680-4907

Affiliations:
  • University of Surrey, Surrey Centre for Cyber Security, Guildford, UK
  • Hewlett-Packard Laboratories, Bristol, UK (former)


According to our database1, Liqun Chen authored at least 171 papers between 1995 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Integrated and Accountable Data Sharing for Smart Grids With Fog and Dual-Blockchain Assistance.
IEEE Trans. Ind. Informatics, March, 2024

Sphinx-in-the-Head: Group Signatures from Symmetric Primitives.
ACM Trans. Priv. Secur., 2024

On the Privacy of Elementary Matrices Masking-Based Verifiable (Outsourced) Computation.
IEEE Trans. Dependable Secur. Comput., 2024

Privacy-Preserving Decentralized Functional Encryption for Inner Product.
IEEE Trans. Dependable Secur. Comput., 2024

Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation, Revisited.
IEEE Trans. Dependable Secur. Comput., 2024

FEASE: Fast and Expressive Asymmetric Searchable Encryption.
IACR Cryptol. ePrint Arch., 2024

FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumption.
IACR Cryptol. ePrint Arch., 2024

Collaborative, Segregated NIZK (CoSNIZK) and More Efficient Lattice-Based Direct Anonymous Attestation.
IACR Cryptol. ePrint Arch., 2024

A New Hash-based Enhanced Privacy ID Signature Scheme.
IACR Cryptol. ePrint Arch., 2024

Hash-based Direct Anonymous Attestation.
IACR Cryptol. ePrint Arch., 2024

On the Design and Security of Collective Remote Attestation Protocols.
CoRR, 2024

How To Bind A TPM's Attestation Keys With Its Endorsement Key.
Comput. J., 2024

Long-Term Time-Stamping Schemes Based on MACs, Archives, and Transient Keys.
Proceedings of the 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2024

Reconstructing Chameleon Hash: Full Security and the Multi-Party Setting.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
DFE-IP: Delegatable functional encryption for inner product.
Inf. Sci., November, 2023

Owl: An Augmented Password-Authenticated Key Exchange Scheme.
IACR Cryptol. ePrint Arch., 2023

Achieving Higher Level of Assurance in Privacy Preserving Identity Wallets.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

BAHS: A Blockchain-Aided Hash-Based Signature Scheme.
Proceedings of the Information Security Practice and Experience, 2023

DRoT: A Decentralised Root of Trust for Trusted Networks.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

2022
Securing emergent behaviour in swarm robotics.
J. Inf. Secur. Appl., 2022

A Blockchain-based Long-term Time-Stamping Scheme.
IACR Cryptol. ePrint Arch., 2022

Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things.
Comput. J., 2022

Practical EMV Relay Protection.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
Direct Anonymous Attestation With Optimal TPM Signing Efficiency.
IEEE Trans. Inf. Forensics Secur., 2021

Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials.
IEEE Trans. Dependable Secur. Comput., 2021

Password-authenticated searchable encryption.
Int. J. Inf. Sec., 2021

An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile.
IACR Cryptol. ePrint Arch., 2021

An Enhanced Long-term Blockchain Scheme Against Compromise of Cryptography.
IACR Cryptol. ePrint Arch., 2021

Reviewing ISO/IEC Standard for Time-stamping Services.
IACR Cryptol. ePrint Arch., 2021

Analysis of Client-side Security for Long-term Time-stamping Services.
IACR Cryptol. ePrint Arch., 2021

Reviewing the ISO/IEC Standard for Timestamping Services.
IEEE Commun. Stand. Mag., 2021

Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols.
Proceedings of the Security and Trust Management - 17th International Workshop, 2021

A Survey of Technologies for Building Trusted Networks.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

2020
Anonymous Single Sign-On With Proxy Re-Verification.
IEEE Trans. Inf. Forensics Secur., 2020

Sparse Matrix Masking-Based Non-Interactive Verifiable (Outsourced) Computation, Revisited.
IEEE Trans. Dependable Secur. Comput., 2020

On the Privacy of Matrix Masking-Based Verifiable (Outsourced) Computation.
IEEE Trans. Cloud Comput., 2020

Privacy preserving search services against online attack.
Comput. Secur., 2020

Adversarial Perturbation with ResNet.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020

Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Provable-Security Model for Strong Proximity-based Attacks: With Application to Contactless Payments.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs.
Secur. Commun. Networks, 2019

Efficient threshold password-authenticated secret sharing protocols for cloud computing.
J. Parallel Distributed Comput., 2019

Fine-grained information flow control using attributes.
Inf. Sci., 2019

Toward Practical Privacy-Preserving Processing Over Encrypted Data in IoT: An Assistive Healthcare Use Case.
IEEE Internet Things J., 2019

Lattice-based deniable ring signatures.
Int. J. Inf. Sec., 2019

A Lattice-based Enhanced Privacy ID.
IACR Cryptol. ePrint Arch., 2019

More efficient, provably-secure direct anonymous attestation from lattices.
Future Gener. Comput. Syst., 2019

REWARDS: Privacy-preserving rewarding and incentive schemes for the smart electricity grid and other loyalty systems.
Comput. Commun., 2019

Attribute-Based Information Flow Control.
Comput. J., 2019

Short Paper: Making Contactless EMV Robust Against Rogue Readers Colluding with Relay Attackers.
Proceedings of the Financial Cryptography and Data Security, 2019

A Symbolic Analysis of ECC-Based Direct Anonymous Attestation.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

A Framework for Efficient Lattice-Based DAA.
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, 2019

2018
Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures.
Sensors, 2018

Message from the Guest Editors.
Int. J. Inf. Sec., 2018

Direct Anonymous Attestation with Optimal TPM Signing Efficiency.
IACR Cryptol. ePrint Arch., 2018

L-DAA: Lattice-Based Direct Anonymous Attestation.
IACR Cryptol. ePrint Arch., 2018

Certificateless Public Key Signature Schemes from Standard Algorithms.
IACR Cryptol. ePrint Arch., 2018

A foggy research future: Advances and future opportunities in fog computing research.
Future Gener. Comput. Syst., 2018

Delegation of Decryption Rights With Revocability From Learning With Errors.
IEEE Access, 2018

Anonymous Single-Sign-On for n Designated Services with Traceability.
Proceedings of the Computer Security, 2018

A Linear Distinguisher and its Application for Analyzing Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs.
IET Inf. Secur., 2017

Authenticating compromisable storage systems.
IACR Cryptol. ePrint Arch., 2017

One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation.
IACR Cryptol. ePrint Arch., 2017

PPETS-FGP: Privacy-Preserving Electronic Ticket Scheme with Fine-Grained Pricing.
CoRR, 2017

Privacy-enhanced capabilities for VANETs using direct anonymous attestation.
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017

Formal Analysis of V2X Revocation Protocols.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

Password Authenticated Keyword Search.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

2016
Message from the guest editors.
Int. J. Inf. Sec., 2016

Revisiting and Extending the AONT-RS scheme: a Robust Computationally Secure Secret Sharing Scheme.
IACR Cryptol. ePrint Arch., 2016

Algorithm Agility - Discussion on TPM 2.0 ECC Functionalities.
Proceedings of the Security Standardisation Research - Third International Conference, 2016

Efficient, XOR-Based, Ideal (t, n)- threshold Schemes.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Short Dynamic Group Signature Scheme Supporting Controllable Linkability.
IEEE Trans. Inf. Forensics Secur., 2015

Formal analysis of privacy in Direct Anonymous Attestation schemes.
Sci. Comput. Program., 2015

The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group.
IACR Cryptol. ePrint Arch., 2015

DAA-A: Direct Anonymous Attestation with Attributes.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

Assessing Attack Surface with Component-Based Package Dependency.
Proceedings of the Network and System Security - 9th International Conference, 2015

Attribute-Based Signatures with Controllable Linkability.
Proceedings of the Trusted Systems - 7th International Conference, 2015

Practical Threshold Password-Authenticated Secret Sharing Protocol.
Proceedings of the Computer Security - ESORICS 2015, 2015

Du-Vote: Remote Electronic Voting with Untrusted Computers.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

2014
Cross-Domain Password-Based Authenticated Key Exchange Revisited.
ACM Trans. Inf. Syst. Secur., 2014

End-to-end policy based encryption techniques for multi-party data management.
Comput. Stand. Interfaces, 2014

A Fast Secure Dot Product Protocol with Application to Privacy Preserving Association Rule Mining.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

A Fast Single Server Private Information Retrieval Protocol with Low Communication Cost.
Proceedings of the Computer Security - ESORICS 2014, 2014

Balancing Societal Security and Individual Privacy: Accountable Escrow System.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

Attribute-Based Signatures with User-Controlled Linkability.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

Du-Vote: Remote Electronic Voting with Untrusted Computers.
Proceedings of the Formal Methods for Security Workshop co-located with the PetriNets-2014 Conference , 2014

2013
When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol.
IACR Cryptol. ePrint Arch., 2013

A privacy-aware reputation-based announcement scheme for VANETs.
Proceedings of the 5th IEEE International Symposium on Wireless Vehicular Communications, 2013

Group Signatures on Mobile Devices: Practical Experiences.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Flexible and scalable digital signatures in TPM 2.0.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
The n-Diffie-Hellman problem and multiple-key encryption.
Int. J. Inf. Sec., 2012

Fair Private Set Intersection with a Semi-trusted Arbiter.
IACR Cryptol. ePrint Arch., 2012

Ring Group Signatures.
IACR Cryptol. ePrint Arch., 2012

A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes.
Proceedings of the Trusted Systems, 4th International Conference, 2012

An historical examination of open source releases and their vulnerabilities.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Threshold Anonymous Announcement in VANETs.
IEEE J. Sel. Areas Commun., 2011

Extended KCI attack against two-party key establishment protocols.
Inf. Process. Lett., 2011

Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
IACR Cryptol. ePrint Arch., 2011

CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model.
IACR Cryptol. ePrint Arch., 2011

Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes.
IACR Cryptol. ePrint Arch., 2011

The n-Diffie-Hellman Problem and its Applications.
IACR Cryptol. ePrint Arch., 2011

Publicly Posted Composite Documents in Variably Ordered Workflows.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Security of the Enhanced TCG Privacy-CA Solution.
Proceedings of the Trustworthy Global Computing - 6th International Symposium, 2011

Premature silent workflow termination in publicly posted composite documents.
Proceedings of the IEEE International Conference on Systems, 2011

Enforcing Sticky Policies with TPM and Virtualization.
Proceedings of the Trusted Systems - Third International Conference, 2011

A (Corrected) DAA Scheme Using Batch Proof and Verification.
Proceedings of the Trusted Systems - Third International Conference, 2011

Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes.
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011

Publicly posted composite documents with identity based encryption.
Proceedings of the 2011 ACM Symposium on Document Engineering, 2011

End-to-End Policy-Based Encryption and Management of Data in the Cloud.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

2010
Comments on "Proving Reliability of Anonymous Information in VANETs" by Kounga.
IEEE Trans. Veh. Technol., 2010

A note on the Chen-Morrissey-Smart DAA scheme.
Inf. Process. Lett., 2010

Parsing ambiguities in authentication and key establishment protocols.
Int. J. Electron. Secur. Digit. Forensics, 2010

A DAA Scheme Requiring Less TPM Resources.
IACR Cryptol. ePrint Arch., 2010

A DAA Scheme Using Batch Proof and Verification.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

VLR Group Signatures with Indisputable Exculpability and Efficient Revocation.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Anonymous Authentication for RFID Systems.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Revocation of Direct Anonymous Attestation.
Proceedings of the Trusted Systems - Second International Conference, 2010

The Twin Bilinear Diffie-Hellman Inversion Problem and Applications.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

Security of the TCG Privacy-CA Solution.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
On the Design and Implementation of an Efficient DAA Scheme.
IACR Cryptol. ePrint Arch., 2009

Security Notions and Generic Constructions for Client Puzzles.
IACR Cryptol. ePrint Arch., 2009

Anti-counterfeiting Using Memory Spots.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009

Trusted Integrity Measurement and Reporting for Virtualized Platforms.
Proceedings of the Trusted Systems, First International Conference, 2009

Certificate-Free Attribute Authentication.
Proceedings of the Cryptography and Coding, 2009

Attack, Solution and Verification for Shared Authorisation Data in TCG TPM.
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009

Public-Key Encryption with Registered Keyword Search.
Proceedings of the Public Key Infrastructures, Services and Applications, 2009

2008
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols.
J. Univers. Comput. Sci., 2008

Cryptography in Computer System Security.
J. Univers. Comput. Sci., 2008

A pairing SW implementation for Smart-Cards.
J. Syst. Softw., 2008

Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings.
IACR Cryptol. ePrint Arch., 2008

On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA).
Proceedings of the Trusted Computing, 2008

A New Direct Anonymous Attestation Scheme from Bilinear Maps.
Proceedings of the Trusted Computing, 2008

On Proofs of Security for DAA Schemes.
Proceedings of the Provable Security, Second International Conference, 2008

Pairings in Trusted Computing.
Proceedings of the Pairing-Based Cryptography, 2008

Property-Based Attestation without a Trusted Third Party.
Proceedings of the Information Security, 11th International Conference, 2008

2007
General and Efficient Certificateless Public Key Encryption Constructions.
Proceedings of the Pairing-Based Cryptography, 2007

An Interpretation of Identity-Based Cryptography.
Proceedings of the Foundations of Security Analysis and Design IV, 2007

A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting.
Proceedings of the Financial Cryptography and Data Security, 2007

Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007

07421 Abstracts Collection -- Formal Protocol Verification Applied.
Proceedings of the Formal Protocol Verification Applied, 14.10. - 19.10.2007, 2007

07421 Executive Summary -- Formal Protocol Verification Applied.
Proceedings of the Formal Protocol Verification Applied, 14.10. - 19.10.2007, 2007

2006
Identity-based Key Agreement Protocols From Pairings.
IACR Cryptol. ePrint Arch., 2006

A protocol for property-based attestation.
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, 2006

2005
Weaknesses in two group Diffie-Hellman key exchange protocols.
IACR Cryptol. ePrint Arch., 2005

Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings.
IACR Cryptol. ePrint Arch., 2005

On Security Proof of McCullagh-Barreto's Key Agreement Protocol and its Variants.
IACR Cryptol. ePrint Arch., 2005

An Efficient ID-KEM Based On The Sakai-Kasahara Key Construction.
IACR Cryptol. ePrint Arch., 2005

Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme.
IACR Cryptol. ePrint Arch., 2005

User-Friendly Grid Security Architecture and Protocols.
Proceedings of the Security Protocols, 2005

A Privacy-Protecting Coupon System.
Proceedings of the Financial Cryptography and Data Security, 2005

2004
Improved Identity-Based Signcryption.
IACR Cryptol. ePrint Arch., 2004

Direct Anonymous Attestation.
IACR Cryptol. ePrint Arch., 2004

Concurrent Signatures.
Proceedings of the Advances in Cryptology, 2004

2002
Identity Based Authenticated Key Agreement Protocols from Pairings.
IACR Cryptol. ePrint Arch., 2002

Certification of Public Keys within an Identity Based System.
Proceedings of the Information Security, 5th International Conference, 2002

Applications of Multiple Trust Authorities in Pairing Based Cryptosystems.
Proceedings of the Infrastructure Security, International Conference, 2002

2001
A trusted process to digitally sign a document.
Proceedings of the New Security Paradigms Workshop 2001, 2001

An Auditable Metering Scheme for Web Advertisement Applications.
Proceedings of the Information Security, 4th International Conference, 2001

2000
Computing Platform Security in Cyberspace.
Inf. Secur. Tech. Rep., 2000

On enhancing biometric authentication with data protection.
Proceedings of the Fourth International Conference on Knowledge-Based Intelligent Information Engineering Systems & Allied Technologies, 2000

Securing Intelligent Adjuncts Using Trusted Computing Platform Technology.
Proceedings of the Smart Card Research and Advanced Applications, 2000

1998
Efficient Fair Exchange with Verifiable Confirmation of Signatures.
Proceedings of the Advances in Cryptology, 1998

1997
Authentication Using Minimally Trusted Servers.
ACM SIGOPS Oper. Syst. Rev., 1997

An anonymous and undeniable payment scheme.
Proceedings of the Information and Communication Security, First International Conference, 1997

Secret Sharing with Reusable Polynomials.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
Comments on the S/KEY User Authentication Scheme.
ACM SIGOPS Oper. Syst. Rev., 1996

Key Escrow in Mutually Mistrusting Domains.
Proceedings of the Security Protocols, 1996

Tailoring authentication protocols to match underlying mechanisms.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

1995
Distributing Trust Amongst Multiple Authentication Servers.
J. Comput. Secur., 1995

Key distribution without individual trusted authentification servers.
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995


  Loading...