Qiang Tang
Orcid: 0000-0003-1113-6352Affiliations:
- University of Sydney, Sydney, Australia
- New Jersey Institute of Technology, Newark, NJ, USA (former)
- Cornell University, Ithaca, NY, USA (former)
- University of Athens, Greece (former)
- University of Connecticut, Mansfield, CT, USA (former)
- Graduate University of Chinese Academy of Sciences, Beijing, China (former)
According to our database1,
Qiang Tang
authored at least 86 papers
between 2010 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on web.njit.edu
-
on orcid.org
On csauthors.net:
Bibliography
2025
Proc. Priv. Enhancing Technol., 2025
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
$\widetilde{\mbox{O}}$ptimal Adaptively Secure Hash-based Asynchronous Common Subset.
IACR Cryptol. ePrint Arch., 2024
Breaking the Cubic Barrier: Distributed Key and Randomness Generation through Deterministic Sharding.
IACR Cryptol. ePrint Arch., 2024
Dragon: Decentralization at the cost of Representation after Arbitrary Grouping and Its Applications to Sub-cubic DKG and Interactive Consistency.
Proceedings of the 43rd ACM Symposium on Principles of Distributed Computing, 2024
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
2023
Blockchain-Based P2P Content Delivery With Monetary Incentivization and Fairness Guarantee.
IEEE Trans. Parallel Distributed Syst., February, 2023
Escaping From Consensus: Instantly Redactable Blockchain Protocols in Permissionless Setting.
IEEE Trans. Dependable Secur. Comput., 2023
There Is Always a Way Out! Destruction-Resistant Key Management: Formal Definition and Practical Instantiation.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Scalable and Adaptively Secure Any-Trust Distributed Key Generation and All-hands Checkpointing.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity - (Revisiting Space-Based Security in the Adaptive Setting).
Proceedings of the Public-Key Cryptography - PKC 2023, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
J. Parallel Distributed Comput., 2022
IACR Cryptol. ePrint Arch., 2022
End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the Provable and Practical Security, 2022
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022
2021
J. Database Manag., 2021
IACR Cryptol. ePrint Arch., 2021
Computational Robust (Fuzzy) Extractors for CRS-dependent Sources with Minimal Min-entropy.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
CoRR, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Fooling an Unbounded Adversary with a Short Key, Repeatedly: The Honey Encryption Perspective.
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021
Hierarchical Integrated Signature and Encryption - (or: Key Separation vs. Key Reuse: Enjoy the Best of both Worlds).
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
IEEE Trans. Syst. Man Cybern. Syst., 2020
IEEE Trans. Ind. Informatics, 2020
A Security-Enhanced Certificateless Aggregate Signature Authentication Protocol for InVANETs.
IEEE Netw., 2020
IACR Cryptol. ePrint Arch., 2020
Dumbo-MVBA: Optimal Multi-valued Validated Asynchronous Byzantine Agreement, Revisited.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
Proceedings of the 15th International Conference on eScience, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
People Who Live in Glass Houses Should not Throw Stones: Targeted Opening Message Franking Schemes.
IACR Cryptol. ePrint Arch., 2018
Enabling Efficient and Fine-Grained DNA Similarity Search with Access Control over Encrypted Cloud Data.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018
On Enabling Machine Learning Tasks atop Public Blockchains: A Crowdsourcing Approach.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
Proceedings of the Computer Security, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
2015
Proc. Priv. Enhancing Technol., 2015
IACR Cryptol. ePrint Arch., 2015
Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications.
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the Topics in Cryptology, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Information Security - 17th International Conference, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2010