Qiang Tang

Orcid: 0000-0003-1113-6352

Affiliations:
  • University of Sydney, Sydney, Australia
  • New Jersey Institute of Technology, Newark, NJ, USA (former)
  • Cornell University, Ithaca, NY, USA (former)
  • University of Athens, Greece (former)
  • University of Connecticut, Mansfield, CT, USA (former)
  • Graduate University of Chinese Academy of Sciences, Beijing, China (former)


According to our database1, Qiang Tang authored at least 86 papers between 2010 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
EpiOracle: Privacy-Preserving Cross-Facility Early Warning for Unknown Epidemics.
Proc. Priv. Enhancing Technol., 2025

2024
Modeling Mobile Crash in Byzantine Consensus.
IACR Cryptol. ePrint Arch., 2024

Crooked Indifferentiability of the Feistel Construction.
IACR Cryptol. ePrint Arch., 2024

Optimal Asynchronous Byzantine Consensus with Fair Separability.
IACR Cryptol. ePrint Arch., 2024

$\widetilde{\mbox{O}}$ptimal Adaptively Secure Hash-based Asynchronous Common Subset.
IACR Cryptol. ePrint Arch., 2024

Breaking the Cubic Barrier: Distributed Key and Randomness Generation through Deterministic Sharding.
IACR Cryptol. ePrint Arch., 2024

Making Hash-based MVBA Great Again.
IACR Cryptol. ePrint Arch., 2024

JUMBO: Fully Asynchronous BFT Consensus Made Truly Scalable.
CoRR, 2024

Dragon: Decentralization at the cost of Representation after Arbitrary Grouping and Its Applications to Sub-cubic DKG and Interactive Consistency.
Proceedings of the 43rd ACM Symposium on Principles of Distributed Computing, 2024

CORE: Transaction Commit-Controlled Release of Private Data Over Blockchains.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

Resilience to Chain-Quality Attacks in Fair Separability.
Proceedings of the Computer Security - ESORICS 2024, 2024

AOAB: Optimal and Fair Ordering of Financial Transactions.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

2023
The Future of Blockchain Consensus.
Commun. ACM, July, 2023

Blockchain-Based P2P Content Delivery With Monetary Incentivization and Fairness Guarantee.
IEEE Trans. Parallel Distributed Syst., February, 2023

Escaping From Consensus: Instantly Redactable Blockchain Protocols in Permissionless Setting.
IEEE Trans. Dependable Secur. Comput., 2023

There Is Always a Way Out! Destruction-Resistant Key Management: Formal Definition and Practical Instantiation.
IACR Cryptol. ePrint Arch., 2023

Predicate Aggregate Signatures and Applications.
IACR Cryptol. ePrint Arch., 2023

Privacy-Preserving Cross-Facility Early Warning for Unknown Epidemics.
IACR Cryptol. ePrint Arch., 2023

Pisces: Private and Compliable Cryptocurrency Exchange.
IACR Cryptol. ePrint Arch., 2023

Witness Authenticating NIZKs and Applications.
IACR Cryptol. ePrint Arch., 2023

Scalable and Adaptively Secure Any-Trust Distributed Key Generation and All-hands Checkpointing.
IACR Cryptol. ePrint Arch., 2023

Efficient Secure Storage with Version Control and Key Rotation.
IACR Cryptol. ePrint Arch., 2023

Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity - (Revisiting Space-Based Security in the Adaptive Setting).
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

2022
Sidechains With Fast Cross-Chain Transfers.
IEEE Trans. Dependable Secur. Comput., 2022

Blockchain-based automated and robust cyber security management.
J. Parallel Distributed Comput., 2022

Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice.
IACR Cryptol. ePrint Arch., 2022

End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage.
Proceedings of the 31st USENIX Security Symposium, 2022

Secure Collaboration Between Consortiums in Permissioned Blockchains.
Proceedings of the Provable and Practical Security, 2022

Leopard: Towards High Throughput-Preserving BFT for Large-scale Systems.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Anonymous Traceback for End-to-End Encryption.
Proceedings of the Computer Security - ESORICS 2022, 2022

Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Bolt-Dumbo Transformer: Asynchronous Consensus As Fast As the Pipelined BFT.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Secure and Efficient Agreement Signing Atop Blockchain and Decentralized Identity.
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022

2021
Enhancing the Retailer Gift Card via Blockchain: Trusted Resale and More.
J. Database Manag., 2021

Correcting Subverted Random Oracles.
IACR Cryptol. ePrint Arch., 2021

Efficient Asynchronous Byzantine Agreement without Private Setups.
IACR Cryptol. ePrint Arch., 2021

Computational Robust (Fuzzy) Extractors for CRS-dependent Sources with Minimal Min-entropy.
IACR Cryptol. ePrint Arch., 2021

Hierarchical Integrated Signature and Encryption.
IACR Cryptol. ePrint Arch., 2021

Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity.
IACR Cryptol. ePrint Arch., 2021

Redactable Blockchain Protocol with Instant Redaction.
IACR Cryptol. ePrint Arch., 2021

Don't Count on One to Carry the Ball: Scaling BFT without Sacrifing Efficiency.
CoRR, 2021

Peer-to-Peer Content Delivery via Blockchain.
CoRR, 2021

Fair Peer-to-Peer Content Delivery via Blockchain.
Proceedings of the Computer Security - ESORICS 2021, 2021

Fooling an Unbounded Adversary with a Short Key, Repeatedly: The Honey Encryption Perspective.
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021

Hierarchical Integrated Signature and Encryption - (or: Key Separation vs. Key Reuse: Enjoy the Best of both Worlds).
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Guest Editorial Special Issue on Blockchain and Economic Knowledge Automation.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Decentralizing IoT Management Systems Using Blockchain for Censorship Resistance.
IEEE Trans. Ind. Informatics, 2020

A Security-Enhanced Certificateless Aggregate Signature Authentication Protocol for InVANETs.
IEEE Netw., 2020

Generic Superlight Client for Permissionless Blockchains.
IACR Cryptol. ePrint Arch., 2020

Dragoon: Private Decentralized HITs Made Practical.
IACR Cryptol. ePrint Arch., 2020

Dumbo-MVBA: Optimal Multi-valued Validated Asynchronous Byzantine Agreement, Revisited.
IACR Cryptol. ePrint Arch., 2020

Dumbo: Faster Asynchronous BFT Protocols.
IACR Cryptol. ePrint Arch., 2020

Proof of Storage-Time: Efficiently Checking Continuous Data Availability.
IACR Cryptol. ePrint Arch., 2020

Defending Use-After-Free via Relationship Between Memory and Pointer.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020

CCA Updatable Encryption Against Malicious Re-encryption Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

Multi-input Laconic Function Evaluation.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
A Behavior-Aware Profiling of Smart Contracts.
Proceedings of the Security and Privacy in Communication Networks, 2019

Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

On Distributed Information Composition in Big Data Systems.
Proceedings of the 15th International Conference on eScience, 2019

2018
Space Efficient Computational Multi-Secret Sharing and Its Applications.
IACR Cryptol. ePrint Arch., 2018

Making Public Key Functional Encryption Function Private, Distributively.
IACR Cryptol. ePrint Arch., 2018

People Who Live in Glass Houses Should not Throw Stones: Targeted Opening Message Franking Schemes.
IACR Cryptol. ePrint Arch., 2018

Enabling Efficient and Fine-Grained DNA Similarity Search with Access Control over Encrypted Cloud Data.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Censorship Resistant Decentralized IoT Management Systems.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

On Enabling Machine Learning Tasks atop Public Blockchains: A Crowdsourcing Approach.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

ZebraLancer: Private and Anonymous Crowdsourcing System atop Open Blockchain.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Making Any Attribute-Based Encryption Accountable, Efficiently.
Proceedings of the Computer Security, 2018

Correcting Subverted Random Oracles.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Generic Semantic Security against a Kleptographic Adversary.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Cliptography: Post-Snowden Cryptography.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
On the Security of Key Extraction From Measuring Physical Quantities.
IEEE Trans. Inf. Forensics Secur., 2016

Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption.
IACR Cryptol. ePrint Arch., 2016

Honey Encryption Beyond Message Recovery Security.
IACR Cryptol. ePrint Arch., 2016

Efficient Encrypted Keyword Search for Multi-user Data Sharing.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
Optimal Rate Private Information Retrieval from Homomorphic Encryption.
Proc. Priv. Enhancing Technol., 2015

Cliptography: Clipping the Power of Kleptographic Attacks.
IACR Cryptol. ePrint Arch., 2015

Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications.
Proceedings of the Information Security - 18th International Conference, 2015

Graded Signatures.
Proceedings of the Information Security - 18th International Conference, 2015

Making Any Identity-Based Encryption Accountable, Efficiently.
Proceedings of the Computer Security - ESORICS 2015, 2015

Communication Optimal Tardos-Based Asymmetric Fingerprinting.
Proceedings of the Topics in Cryptology, 2015

Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Near Optimal Rate Homomorphic Encryption for Branching Programs.
IACR Cryptol. ePrint Arch., 2014

Graded Encryption, or How to Play "Who Wants To Be A Millionaire?" Distributively.
Proceedings of the Information Security - 17th International Conference, 2014

2013
How to Keep a Secret: Leakage Deterring Public-key Cryptography.
IACR Cryptol. ePrint Arch., 2013

How to keep a secret: leakage deterring public-key cryptosystems.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2010
Verifiable Attribute Based Encryption.
Int. J. Netw. Secur., 2010


  Loading...