Zhen Liu
Orcid: 0000-0001-9268-702XAffiliations:
- City University of Hong Kong, Department of Computer Science, Hong Kong
- Shanghai Jiao Tong University, Department of Computer Science and Engineering, Shanghai, China
According to our database1,
Zhen Liu
authored at least 51 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
2023
An Improved Lattice-Based Ring Signature With Unclaimable Anonymity in the Standard Model.
Comput. J., October, 2023
IEEE Trans. Veh. Technol., August, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key.
IEEE Trans. Dependable Secur. Comput., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
BRIEF but Powerful: Byzantine-Robust and Privacy-Preserving Federated Learning via Model Segmentation and Secure clustering.
CoRR, 2022
Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption.
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022
2021
Comput. J., 2021
MPC-in-Multi-Heads: A Multi-Prover Zero-Knowledge Proof System - (or: How to Jointly Prove Any NP Statements in ZK).
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
2020
A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
Pri-RTB: Privacy-preserving real-time bidding for securing mobile advertisement in ubiquitous computing.
Inf. Sci., 2019
Future Gener. Comput. Syst., 2019
All-But-Many Lossy Trapdoor Functions under Decisional RSA Subgroup Assumption and Application.
Comput. J., 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-Invisibility.
Proceedings of the Provable Security, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
IACR Cryptol. ePrint Arch., 2017
2016
Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups.
IACR Cryptol. ePrint Arch., 2016
Frontiers Comput. Sci., 2016
Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe.
Comput. J., 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable.
IACR Cryptol. ePrint Arch., 2015
Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe.
Proceedings of the Applied Cryptography and Network Security, 2015
2014
Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts.
IACR Cryptol. ePrint Arch., 2014
Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage.
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures.
IEEE Trans. Inf. Forensics Secur., 2013
Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
2011
Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles.
Proceedings of the Computer Security - ESORICS 2011, 2011
2010
On Efficiently Transferring the Linear Secret-Sharing Scheme Matrix in Ciphertext-Policy Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2010