Shengli Liu
Orcid: 0000-0003-1366-8256Affiliations:
- Shanghai Jiao Tong University, Department of Computer Science and Engineering, Westone Cryptologic Research Center, China
- Xidian University, China (PhD 2000)
According to our database1,
Shengli Liu
authored at least 125 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Theor. Comput. Sci., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Public-Key Cryptography - PKC 2024, 2024
2023
IEEE Trans. Mob. Comput., December, 2023
Theor. Comput. Sci., May, 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Almost Tight Multi-User Security under Adaptive Corruptions from LWE in the Standard Model.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Almost Tight Multi-User Security under Adaptive Corruptions & Leakages in the Standard Model.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Public-Key Cryptography - PKC 2023, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
IEICE Trans. Inf. Syst., November, 2022
Theor. Comput. Sci., 2022
Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Tightly Secure Chameleon Hash Functions in the Multi-User Setting and Their Applications.
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting: Impossibility Result and Optimal Tightness.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Des. Codes Cryptogr., 2021
Des. Codes Cryptogr., 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
IACR Cryptol. ePrint Arch., 2020
2019
Theor. Comput. Sci., 2019
Theor. Comput. Sci., 2019
Theor. Comput. Sci., 2019
Theor. Comput. Sci., 2019
Int. J. Inf. Comput. Secur., 2019
Int. J. Comput. Sci. Eng., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Des. Codes Cryptogr., 2018
Des. Codes Cryptogr., 2018
Des. Codes Cryptogr., 2018
Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption.
Cryptogr., 2018
Comput. J., 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption.
Secur. Commun. Networks, 2017
Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman.
Inf. Sci., 2017
Inf. Sci., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Efficient chosen ciphertext secure identity-based encryption against key leakage attacks.
Secur. Commun. Networks, 2016
IET Inf. Secur., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Secur. Commun. Networks, 2015
Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience.
IET Inf. Secur., 2015
IACR Cryptol. ePrint Arch., 2015
Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing.
IACR Cryptol. ePrint Arch., 2015
Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited.
Int. J. Appl. Math. Comput. Sci., 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
2014
Inf. Sci., 2014
Public-key encryption scheme with selective opening chosen-ciphertext security based on the Decisional Diffie-Hellman assumption.
Concurr. Comput. Pract. Exp., 2014
Proceedings of the Information Security Practice and Experience, 2014
2013
Secur. Commun. Networks, 2013
Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
J. Internet Serv. Inf. Secur., 2011
On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption.
J. Inf. Sci. Eng., 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
2010
J. Comput. Sci. Technol., 2010
Inf. Sci., 2010
Proceedings of the Topics in Cryptology, 2010
2009
Int. J. Netw. Secur., 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the Information Security Practice and Experience, 2009
2008
J. Inf. Sci. Eng., 2008
Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme.
J. Comput. Sci. Technol., 2008
IACR Cryptol. ePrint Arch., 2008
J. Res. Pract. Inf. Technol., 2008
Proceedings of the Topics in Cryptology, 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
2007
J. Syst. Softw., 2007
On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature.
IACR Cryptol. ePrint Arch., 2007
Sci. China Ser. F Inf. Sci., 2007
Comput. Electr. Eng., 2007
Proceedings of the Information Security Practice and Experience, 2007
2006
Informatica, 2006
Comput. Stand. Interfaces, 2006
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction.
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
2005
Transitive Signatures Based on Bilinear Maps.
Proceedings of the Security in Information Systems, 2005
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
J. Comput. Sci. Technol., 2004
2003
Des. Codes Cryptogr., 2003
2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002