Tsz Hon Yuen
Orcid: 0000-0002-0629-6792
According to our database1,
Tsz Hon Yuen
authored at least 92 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
IACR Commun. Cryptol., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Future Gener. Comput. Syst., April, 2023
Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Efficient Unbalanced Private Set Intersection Cardinality and User-friendly Privacy-preserving Contact Tracing.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Applied Cryptography and Network Security, 2023
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
IACR Cryptol. ePrint Arch., 2022
BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Don't Tamper with Dual System Encryption - Beyond Polynomial Related-Key Security of IBE.
Proceedings of the Applied Cryptography and Network Security, 2022
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
2020
IACR Cryptol. ePrint Arch., 2020
PAChain: Private, authenticated & auditable consortium blockchain and its implementation.
Future Gener. Comput. Syst., 2020
Concurr. Comput. Pract. Exp., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Information Security - 23rd International Conference, 2020
LPPRS: New Location Privacy Preserving Schemes Based on Ring Signature over Mobile Social Networks.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
2019
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
2018
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
J. Comput. Syst. Sci., 2017
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
IACR Cryptol. ePrint Arch., 2017
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
Proceedings of the Computer Security - ESORICS 2017, 2017
2016
Secur. Commun. Networks, 2016
Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption.
Inf. Sci., 2016
An Efficient Non-Interactive Multi-client Searchable Encryption with Support for Boolean Queries.
IACR Cryptol. ePrint Arch., 2016
Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles.
Comput. J., 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
IEEE Trans. Computers, 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
J. Comput. Secur., 2014
IACR Cryptol. ePrint Arch., 2014
Expert Syst. Appl., 2014
Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction.
Theor. Comput. Sci., 2013
IACR Cryptol. ePrint Arch., 2013
Comput. J., 2013
Proceedings of the Provable Security - 7th International Conference, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Information Security Practice and Experience, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013
2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Provable Security - 5th International Conference, 2011
Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles.
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Computing and Combinatorics, 15th Annual International Conference, 2009
2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Provable Security, 2007
Proceedings of the Information Security Practice and Experience, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles.
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Progressin Cryptology, 2006
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
2005
Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles.
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004