If you made any changes in Pure these will be visible here soon.

Research Output 2001 2019

2011
13 Citations (Scopus)

Threshold ring signature without random oracles

Yuen, T. H., Liu, J. K., Au, M. H. A., Susilo, W. & Zhou, J., 2011, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011). Sandhu, R. & Wong, D. S. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 261 - 267 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

2010
30 Citations (Scopus)

A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity

Tsang, P. P., Au, M. H. A., Liu, J. K., Susilo, W. & Wong, D. S., 2010, 4th International Conference on Provable Security (ProvSec 2010). Heng, S-H. & Kurosawa, K. (eds.). Heidelberg Germany: Springer, Vol. 6402. p. 166 - 183 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

82 Citations (Scopus)

Efficient online/offline identity-based signature for wireless sensor network

Liu, K. S. J., Baek, J., Zhou, J., Yang, Y. & Wong, J. W., 2010, In : International Journal of Information Security. 9, 4, p. 287 - 296 10 p.

Research output: Contribution to journalArticleResearchpeer-review

21 Citations (Scopus)

Online/offline identity-based signcryption revisited

Liu, J. K., Baek, J. & Zhou, J., 2010, Proceedings of the 6th International Conference on Information Security and Cryptology (Inscrypt 2010). Lai, X., Yung, M. & Lin, D. (eds.). Heidelberg Germany: Springer, Vol. 6584. p. 36 - 51 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

27 Citations (Scopus)

Practical ID-based encryption for wireless sensor network

Chu, C-K., Liu, J. K., Zhou, J., Bao, F. & Deng, R. H., 2010, Proceedings of the 5th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2010). Basin, D. & Liu, P. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 337 - 340 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Short generic transformation to strongly unforgeable signature in the standard model

Liu, J. K., Au, M. H. A., Susilo, W. & Zhou, J., 2010, Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS 2010). Gritzalis, D., Preneel, B. & Theoharidou, M. (eds.). Heidelberg Germany: Springer, Vol. 6345. p. 168 - 181 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2009
39 Citations (Scopus)

An efficient identity-based online/offline encryption scheme

Liu, J. K. & Zhou, J., 2009, Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 2009). Abdalla, M., Pointcheval, D., Fouque, P-A. & Vergnaud, D. (eds.). Heidelberg Germany: Springer, Vol. 5536. p. 156 - 167 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

8 Citations (Scopus)

A new variant of the cramer-shoup KEM secure against chosen ciphertext attack

Baek, J., Susilo, W., Liu, J. K. & Zhou, J., 2009, Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 2009). Abdalla, M., Pointcheval, D., Fouque, P-A. & Vergnaud, D. (eds.). Heidelberg Germany: Springer, Vol. 5536. p. 143 - 155 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

8 Citations (Scopus)

Certificate-Based Sequential Aggregate Signature

Liu, J. K., Baek, J. & Zhou, J., 2009, Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09. p. 21-28 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

10 Citations (Scopus)

Online/offline ring signature scheme

Liu, J. K., Au, M. H. A., Susilo, W. & Zhou, J., 2009, Proceedings of the 11th International Conference on Information and Communications Security (ICICS 2009). Qing, S., Mitchell, C. J. & Wang, G. (eds.). Heidelberg Germany: Springer, Vol. 5927. p. 80 - 90 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2008
66 Citations (Scopus)

Certificate-based signature schemes without pairings or random Oracles

Liu, J. K., Baek, J., Susilo, W. & Zhou, J., 28 Nov 2008, Information Security - 11th International Conference, ISC 2008, Proceedings. p. 285-297 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5222 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

46 Citations (Scopus)

Certificateless public key encryption secure against malicious KGC attacks in the standard model

Hwang, Y. H., Liu, K. S. & Chow, S. S-M., 2008, In : Journal of Universal Computer Science. 14, 3, p. 463 - 480 18 p.

Research output: Contribution to journalArticleResearchpeer-review

42 Citations (Scopus)

Efficient certificate-based encryption in the standard model

Liu, J. K. & Zhou, J., 25 Sep 2008, Security and Cryptography for Networks - 6th International Conference, SCN 2008, Proceedings. p. 144-155 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5229 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

15 Citations (Scopus)

Sanitizable signatures revisited

Yuen, T. H., Susilo, W., Liu, J. K. & Mu, Y., 1 Dec 2008, Cryptology and Network Security - 7th International Conference, CANS 2008, Proceedings. p. 80-97 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5339 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

16 Citations (Scopus)

Solutions to key exposure problem in ring signature

Liu, J. K. & Wong, D. S., 1 Dec 2008, In : International Journal of Network Security. 6, 2, p. 170-180 11 p.

Research output: Contribution to journalArticleResearchpeer-review

36 Citations (Scopus)

Traceable and retrievable identity-based encryption

Au, M. H., Huang, Q., Liu, J. K., Susilo, W., Wong, D. S. & Yang, G., 30 Jun 2008, Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings. p. 94-110 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5037 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2007
15 Citations (Scopus)

(Convertible) undeniable signatures without random oracles

Yuen, T. H., Au, M. H., Liu, J. K. & Susilo, W., 1 Dec 2007, Information and Communications Security - 9th International Conference, ICICS 2007, Proceedings. p. 83-97 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4861 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

55 Citations (Scopus)

Certificate based (linkable) ring signature

Au, M. H. A., Liu, J. K., Susilo, W. & Yuen, T. H., 2007, Proceedings of the 3rd International Conference on Information Security Practice and Experience (ISPEC 2007). Dawson, E. & Wong, D. S. (eds.). Heidelberg Germany: Springer, Vol. 4464. p. 79 - 92 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

171 Citations (Scopus)

Malicious KGC attacks in certificateless cryptography

Au, M. H., Mu, Y., Chen, J., Wong, D. S., Liu, J. K. & Yang, G., 2007, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07. New York NY USA: Association for Computing Machinery (ACM), p. 302-311 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Preface

Susilo, W. & Liu, J. K., 2007, 1st International Conference on Provable Security 2007. Springer, 1 p. (Lecture Notes in Computer Science; vol. 4784).

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

40 Citations (Scopus)

Revocable ring signature

Liu, D. Y. W., Liu, K. S., Mu, Y., Susilo, W. & Wong, D. S., 2007, In : Journal of Computer Science and Technology. 22, 6, p. 785 - 794 10 p.

Research output: Contribution to journalArticleResearchpeer-review

173 Citations (Scopus)

Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model

Liu, J. K., Au, M. H. & Susilo, W., 2007, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. New York NY USA: Association for Computing Machinery (ACM), p. 273-283 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

2006
31 Citations (Scopus)

Constant-size id-based linkable and revocable-iff-linked ring signature

Au, M. H., Liu, J. K., Susilo, W. & Yuen, T. H., 1 Jan 2006, Progress in Cryptology: INDOCRYPT 2006 - 7th International Conference on Cryptology, Proceedings. Barua, R. & Lange, T. (eds.). Springer, p. 364-378 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4329 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

15 Citations (Scopus)

Enhanced security models and a generic construction approach for linkable ring signature

Liu, J. K. & Wong, D. S., 1 Dec 2006, In : International Journal of Foundations of Computer Science. 17, 6, p. 1403-1422 20 p.

Research output: Contribution to journalArticleResearchpeer-review

57 Citations (Scopus)

ID-based ring signature scheme secure in the standard model

Au, M. H., Liu, J. K., Yuen, T. H. & Wong, D. S., 1 Jan 2006, Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer, p. 1-16 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4266 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

61 Citations (Scopus)

Ring signatures without random oracles

Chow, S. S. M., Wei, V. K., Liu, J. K. & Yuen, T. H., 2006, Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06. New York NY USA : Association for Computing Machinery (ACM), p. 297-302 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

17 Citations (Scopus)

Ring signature with designated linkability

Liu, J. K., Susilo, W. & Wong, D. S., 1 Jan 2006, Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer, p. 104-119 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4266 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Single sign-on and key establishment for ubiquitous smart environments

Chan, Y. Y., Fleissner, S., Liu, J. K. & Li, J., 2006, Computational Science and Its Applications - ICCSA 2006. Springer, p. 406-415 10 p. (Lecture Notes in Computer Science ; vol. 3983).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

7 Citations (Scopus)

Universal custodian-hiding verifiable encryption for discrete logarithms

Liu, J. K., Tsang, P. P., Wong, D. S. & Zhu, R. W., 1 Jan 2006, Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers. Springer, p. 389-409 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3935 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2005
2 Citations (Scopus)

A restricted multi-show credential system and its application on e-voting

Liu, J. K. & Wong, D. S., 2005, First International Conference on Information Security, Practice and Experience, ISPEC 2005. Springer, p. 268-279 12 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

23 Citations (Scopus)

Blind spontaneous anonymous group signatures for ad hoc groups

Chan, T. K., Fung, K., Liu, J. K. & Wei, V. K., 2005, First European Workshop, ESAS 2004. Springer, p. 82-94 13 p. (Lecture Notes in Computer Science; vol. 3313).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

Custodian-hiding verifiable encryption

Liu, J. K., Wei, V. K. & Wong, D. S., 2005, 5th International Workshop on Information Security Applications, WISA 2004. Springer, p. 51-64 14 p. (Lecture Notes in Computer Science; vol. 3325).

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

3 Citations (Scopus)

Efficient verifiable ring encryption for ad hoc groups

Liu, J. K., Tsang, P. P. & Wong, D. S., 1 Dec 2005, Security and Privacy in Ad-hoc and Sensor Networks - Second European Workshop, ESAS 2005, Revised Selected Papers. p. 1-13 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3813 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

37 Citations (Scopus)

Linkable ring signatures: security models and new schemes

Liu, J. K. & Wong, D. S., 2005, International Conference on Computational Science and Its Applications - ICCSA 2005. Springer, p. 614-623 10 p. (Lecture Notes in Computer Science; vol. 3481).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

24 Citations (Scopus)

On the security models of (threshold) ring signature schemes

Liu, J. K. & Wong, D. S., 2005, 7th International Conference on Information Security and Cryptology - ICISC 2004. Springer, p. 204-217 14 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

14 Citations (Scopus)

Recoverable and untraceable E-cash

Liu, J. K., Tsang, P. P. & Wong, D. S., 1 Dec 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 206-214 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3545 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Security analysis of three cryptographic schemes from other cryptographic schemes

Chow, S. S. M., Cao, Z. & Liu, J. K., 1 Dec 2005, Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Proceedings. p. 290-301 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3822 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Transferable e-cash revisit

Liu, J. K., Wong, S. H. & Wong, D. S., 1 Dec 2005, Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference. p. 171-188 18 p. (IFIP Advances in Information and Communication Technology; vol. 181).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2003
1 Citation (Scopus)

Evaluation on security and privacy of Web-based learning systems

Chan, Y. Y., Leung, C. H. & Liu, J. K., 2003, Proceedings - 3rd IEEE International Conference on Advanced Learning Technologies, ICALT 2003. IEEE, Institute of Electrical and Electronics Engineers, p. 308-309 2 p. 1215097

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2001
5 Citations (Scopus)

Recoverable and untraceable E-cash

Liu, J. K., Wei, V. K. & Wong, S. H., 2001, EUROCON 2001 - International Conference on Trends in Communications, Proceedings. IEEE, Institute of Electrical and Electronics Engineers, p. 132-135 4 p. 937781

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review