If you made any changes in Pure these will be visible here soon.

Research Output 2001 2019

15 Citations (Scopus)

(Convertible) undeniable signatures without random oracles

Yuen, T. H., Au, M. H., Liu, J. K. & Susilo, W., 1 Dec 2007, Information and Communications Security - 9th International Conference, ICICS 2007, Proceedings. p. 83-97 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4861 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Access control encryption with efficient verifiable sanitized decryption

Wang, H., Chen, K., Liu, J. K., Hu, Z. & Long, Y., Oct 2018, In : Information Sciences. 465, p. 72-85 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Adding confidential transactions to cryptocurrency IOTA with Bulletproofs

Ince, P., Liu, J. K. & Zhang, P., 2018, Network and System Security : 12th International Conference, NSS 2018 Hong Kong, China, August 27–29, 2018 Proceedings. Au, M. H., Yiu, S. M., Li, J., Luo, X., Wang, C., Castiglione, A. & Kluczniak, K. (eds.). Cham Switzerland: Springer, p. 32-45 14 p. (Lecture Notes in Computer Science; vol. 11058 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

52 Citations (Scopus)

A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing

Liang, K., Au, M. H., Liu, J. K., Susilo, W., Wong, D. S., Yang, G., Phuong, T. V. X. & Xie, Q., Oct 2014, In : IEEE Transactions on Information Forensics and Security. 9, 10, p. 1667 - 1680 14 p.

Research output: Contribution to journalArticleResearchpeer-review

A flexible instant payment system based on blockchain

Zhong, L., Wang, H., Xie, J., Qin, B., Liu, J. K. & Wu, Q., 2019, Information Security and Privacy: 24th Australasian Conference, ACISP 2019 Christchurch, New Zealand, July 3–5, 2019 Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Cham Switzerland: Springer, p. 289-306 18 p. (Lecture Notes in Computer Science ; vol. 11547 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

8 Citations (Scopus)

A general framework for secure sharing of personal health records in cloud system

Au, M. H., Yuen, T. H., Liu, J. K., Susilo, W., Huang, X., Xiang, Y. & Jiang, Z. L., Dec 2017, In : Journal of Computer and System Sciences. 90, p. 46-62 17 p.

Research output: Contribution to journalArticleResearchpeer-review

A generic construction of tightly secure signatures in the multi-user setting

Zhang, X., Liu, S., Gu, D. & Liu, J. K., 5 Jul 2019, In : Theoretical Computer Science. 775, p. 32-52 21 p.

Research output: Contribution to journalArticleResearchpeer-review

A multi-client DSSE scheme supporting range queries

Loh, R., Zuo, C., Liu, J. K. & Sun, S. F., 2019, Information Security and Cryptology : 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 289-307 19 p. (Lecture Notes in Computer Science ; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

A multi-client dynamic searchable symmetric encryption system with physical deletion

Xu, L., Xu, C., Liu, J. K., Zuo, C. & Zhang, P., 2018, Information and Communications Security : 19th International Conference, ICICS 2017 Beijing, China, December 6–8, 2017 Proceedings. Qing, S., Mitchell, C., Chen, L. & Liu, D. (eds.). Cham Switzerland: Springer, p. 516-528 13 p. (Lecture Notes in Computer Science ; vol. 10631 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Analyzing use of high privileges on android: an empirical case study of screenshot and screen recording applications

Meng, M. H., Bai, G., Liu, J. K., Luo, X. & Wang, Y., 2019, Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 349-369 21 p. (Lecture Notes in Computer Science ; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

35 Citations (Scopus)

An efficient access control scheme with outsourcing capability and attribute update for fog computing

Zhang, P., Chen, Z., Liu, J. K., Liang, K. A. & Liu, H., Jan 2018, In : Future Generation Computer Systems. 78, Part 2, p. 753-762 10 p.

Research output: Contribution to journalArticleResearchpeer-review

73 Citations (Scopus)

An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing

Liang, K. A., Liu, J. K., Wong, D. S. & Susilo, W., 2014, Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security Wroclaw, Poland, September 7-11, 2014 - Proceedings, Part II. Kutylowski, M. & Vaidya, J. (eds.). Heidelberg Germany: Springer, p. 257-272 16 p. (Lecture Notes in Computer Science; vol. 8712).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

86 Citations (Scopus)

An efficient file hierarchy attribute-based encryption scheme in cloud computing

Wang, S., Zhou, J., Liu, J. K., Yu, J., Chen, J. & Xie, W., 1 Jun 2016, In : IEEE Transactions on Information Forensics and Security. 11, 6, p. 1265-1277 13 p.

Research output: Contribution to journalArticleResearchpeer-review

39 Citations (Scopus)

An efficient identity-based online/offline encryption scheme

Liu, J. K. & Zhou, J., 2009, Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 2009). Abdalla, M., Pointcheval, D., Fouque, P-A. & Vergnaud, D. (eds.). Heidelberg Germany: Springer, Vol. 5536. p. 156 - 167 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

29 Citations (Scopus)

An efficient non-interactive multi-client searchable encryption with support for boolean queries

Sun, S-F., Liu, J. K., Sakzad, A., Steinfeld, R. & Yuen, T. H., 15 Sep 2016, Computer Security - ESORICS 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26–30, 2016, Proceedings, Part I. Askoxylakis, I., Ioannidis, S., Katsikas, S. & Meadows, C. (eds.). Switzerland: Springer, p. 154-172 19 p. (Lecture Notes in Computer Science ; vol. 9878 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

40 Citations (Scopus)

An efficient PHR service system supporting fuzzy keyword search and fine-grained access control

Xhafa, F., Wang, J., Chen, X., Liu, J. K., Li, J. & Krause, P., Sep 2014, In : Soft Computing. 18, 9, p. 1795 - 1802 8 p.

Research output: Contribution to journalArticleResearchpeer-review

An encrypted database with enforced access control and blockchain validation

Sui, Z., Lai, S., Zuo, C., Yuan, X., Liu, J. K. & Qian, H., 2019, Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 260-273 14 p. (Lecture Notes in Computer Science ; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

10 Citations (Scopus)

A new blockchain-based Value-Added Tax system

Wijaya, D. A., Liu, J. K., Suwarsono, D. A. & Zhang, P., 2017, Provable Security : 11th International Conference, ProvSec 2017 Xi’an, China, October 23–25, 2017 Proceedings. Okamoto, T., Yu, Y., Au, M. H. & Li, Y. (eds.). Cham Switzerland: Springer, p. 471-486 16 p. (Lecture Notes in Computer Science; vol. 10592 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

33 Citations (Scopus)

A new payment system for enhancing location privacy of electric vehicles

Au, M. H. A., Liu, J. K., Fang, J., Jiang, Z. L., Susilo, W. & Zhou, J., Jan 2014, In : IEEE Transactions on Vehicular Technology. 63, 1, p. 3 - 18 16 p.

Research output: Contribution to journalArticleResearchpeer-review

3 Citations (Scopus)

A new public remote integrity checking scheme with user and data privacy

Feng, Y., Yang, G. & Liu, J. K., 2017, In : International Journal of Applied Cryptography. 3, 3, p. 196-209 14 p.

Research output: Contribution to journalArticleResearchpeer-review

4 Citations (Scopus)

A new public remote integrity checking scheme with user privacy

Feng, Y., Mu, Y., Yang, G. & Liu, K. S., 2015, Information Security and Privacy: 20th Australian Conference (ACISP 2015). Foo, E. & Stebila, D. (eds.). Cham Switzerland: Springer, Vol. 9144. p. 377 - 394 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

7 Citations (Scopus)

A new variant of the cramer-shoup KEM secure against chosen ciphertext attack

Baek, J., Susilo, W., Liu, J. K. & Zhou, J., 2009, Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 2009). Abdalla, M., Pointcheval, D., Fouque, P-A. & Vergnaud, D. (eds.). Heidelberg Germany: Springer, Vol. 5536. p. 143 - 155 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Anonymity reduction attacks to Monero

Wijaya, D. A., Liu, J., Steinfeld, R., Liu, D. & Yuen, T. H., 2019, Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 86-100 15 p. (Lecture Notes in Computer Science; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

Anonymizing bitcoin transaction

Wijaya, D. A., Liu, J. K., Steinfeld, R., Sun, S. F. & Huang, X., 2016, Information Security Practice and Experience : 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16–18, 2016, Proceedings. Bao, F., Chen, L., Deng, R. H. & Wang, G. (eds.). Cham, Switzerland: Springer, p. 271-283 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10060 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Anonymous anti-Sybil attack protocol for mobile healthcare networks analytics

Zhang, P., Zhang, X., Sun, X., Liu, J. K., Yu, J. & Jiang, Z. L., 7 Sep 2017, Proceedings - The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, The 11th IEEE International Conference on Big Data Science and Engineering and the 14th IEEE International Conference on Embedded Software and Systems: 2017 IEEE Trustcom/BigDataSE/ICESS. Nanda, P., Xiang, Y. & Mu, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 668-674 7 p. 8029501

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

11 Citations (Scopus)

Anonymous identity-based broadcast encryption with chosen-ciphertext security

He, K., Weng, J., Liu, J-N., Liu, J. K., Liu, W. & Deng, R. H., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security: May 30–June 3, 2016, Xi’an, China. Wang, X. & Huang, X. (eds.). New York, NY: Association for Computing Machinery (ACM), p. 247-255 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

1 Citation (Scopus)

A resolving set based algorithm for fault identification in wireless mesh networks

Wang, X., Xu, L., Zhou, S. & Liu, J. K., Mar 2015, In : Journal of Universal Computer Science. 21, 3, p. 384-405 22 p.

Research output: Contribution to journalArticleResearchpeer-review

2 Citations (Scopus)

A restricted multi-show credential system and its application on e-voting

Liu, J. K. & Wong, D. S., 2005, First International Conference on Information Security, Practice and Experience, ISPEC 2005. Springer, p. 268-279 12 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

64 Citations (Scopus)

A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing

Liang, K., Au, M. H., Liu, J. K., Susilo, W., Wong, D. S., Yang, G., Yu, Y. & Yang, A., Nov 2015, In : Future Generation Computer Systems. 52, p. 95-108 14 p.

Research output: Contribution to journalArticleResearchpeer-review

112 Citations (Scopus)

A secure cloud computing based framework for big data information management of smart grid

Baek, J., Vu, Q. H., Liu, J. K., Huang, X. & Xiang, Y., 2015, In : IEEE Transactions on Cloud Computing. 3, 2, p. 233-244 12 p.

Research output: Contribution to journalArticleResearchpeer-review

11 Citations (Scopus)

A secure remote data integrity checking cloud storage system from threshold encryption

Yao, C., Xu, L., Huang, X. & Liu, J. K., Dec 2014, In : Journal of Ambient Intelligence and Humanized Computing. 5, 6, p. 857-865 9 p.

Research output: Contribution to journalArticleResearchpeer-review

30 Citations (Scopus)

A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity

Tsang, P. P., Au, M. H. A., Liu, J. K., Susilo, W. & Wong, D. S., 2010, 4th International Conference on Provable Security (ProvSec 2010). Heng, S-H. & Kurosawa, K. (eds.). Heidelberg Germany: Springer, Vol. 6402. p. 166 - 183 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

20 Citations (Scopus)

A Survey on Access Control in Fog Computing

Zhang, P., Liu, J. K., Richard Yu, F., Sookhak, M., Au, M. H. & Luo, X., 1 Feb 2018, In : IEEE Communications Magazine. 56, 2, p. 144-149 6 p.

Research output: Contribution to journalArticleResearchpeer-review

9 Citations (Scopus)

Asymmetric cross-cryptosystem re-encryption applicable to efficient and secure mobile access to outsourced data

Deng, H., Wu, Q., Qin, B., Susilo, W., Liu, J. & Shi, W., 2015, ASIACCS'15 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. Zhou, J. & Ahn, G-J. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 393 - 404 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

10 Citations (Scopus)

A trust and privacy preserving handover authentication protocol for wireless networks

Yang, X., Zhang, Y., Liu, J. K. & Zeng, Y., 7 Feb 2017, 2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings]. Xiang, Y., Ren, K. & Feng, D. (eds.). Piscataway, NJ : IEEE, Institute of Electrical and Electronics Engineers, p. 138-143 6 p. 7846939

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

64 Citations (Scopus)

Attribute-based data sharing scheme revisited in cloud computing

Wang, S., Liang, K., Liu, J. K., Chen, J., Yu, J. & Xie, W., 1 Aug 2016, In : IEEE Transactions on Information Forensics and Security. 11, 8, p. 1661-1673 13 p., 7448433.

Research output: Contribution to journalArticleResearchpeer-review

4 Citations (Scopus)

Attribute-based encryption with expressive and authorized keyword search

Cui, K-H., Deng, R. H., Liu, J. K. & Li, Y., 2017, Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I. Pieprzyk, J. & Suriadi, S. (eds.). Cham, Switzerland: Springer, p. 106-126 21 p. (Lecture Notes in Computer Science ; vol. 10342 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

3 Citations (Scopus)

Attribute-based hybrid boolean keyword search over outsourced encrypted data

He, K., Guo, J., Weng, J., Weng, J., Liu, J. K. & Yi, X., 6 Aug 2018, (Accepted/In press) In : IEEE Transactions on Dependable and Secure Computing. 12 p.

Research output: Contribution to journalArticleResearchpeer-review

22 Citations (Scopus)

Blind spontaneous anonymous group signatures for ad hoc groups

Chan, T. K., Fung, K., Liu, J. K. & Wei, V. K., 2005, First European Workshop, ESAS 2004. Springer, p. 82-94 13 p. (Lecture Notes in Computer Science; vol. 3313).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Building a dynamic searchable encrypted medical database for multi-client

Xu, L., Xu, C., Liu, J. K., Zuo, C. & Zhang, P., 19 May 2019, In : Information Sciences. 28 p.

Research output: Contribution to journalArticleResearchpeer-review

55 Citations (Scopus)

Certificate based (linkable) ring signature

Au, M. H. A., Liu, J. K., Susilo, W. & Yuen, T. H., 2007, Proceedings of the 3rd International Conference on Information Security Practice and Experience (ISPEC 2007). Dawson, E. & Wong, D. S. (eds.). Heidelberg Germany: Springer, Vol. 4464. p. 79 - 92 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

8 Citations (Scopus)

Certificate-Based Sequential Aggregate Signature

Liu, J. K., Baek, J. & Zhou, J., 2009, Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09. p. 21-28 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

66 Citations (Scopus)

Certificate-based signature schemes without pairings or random Oracles

Liu, J. K., Baek, J., Susilo, W. & Zhou, J., 28 Nov 2008, Information Security - 11th International Conference, ISC 2008, Proceedings. p. 285-297 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5222 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

46 Citations (Scopus)

Certificateless public key encryption secure against malicious KGC attacks in the standard model

Hwang, Y. H., Liu, K. S. & Chow, S. S-M., 2008, In : Journal of Universal Computer Science. 14, 3, p. 463 - 480 18 p.

Research output: Contribution to journalArticleResearchpeer-review

24 Citations (Scopus)

Comments on 'Analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions'

Yeo, S. L., Yap, W-S., Liu, K. S. J. & Henricksen, M., 2013, In : IEEE Communications Letters. 17, 8, p. 1521 - 1523 3 p.

Research output: Contribution to journalArticleResearchpeer-review

2 Citations (Scopus)

Comments on 'efficient revocable certificateless encryption secure in the standard model'

Tang, Y., Chow, S. S. M. & Liu, J. K., 2015, In : Computer Journal. 58, 4, p. 779-781 3 p.

Research output: Contribution to journalComment / DebateResearchpeer-review

Compact ring signature in the standard model for blockchain

Ren, H., Zhang, P., Shentu, Q., Liu, J. K. & Yuen, T. H., 2018, Information Security Practice and Experience : 14th International Conference, ISPEC 2018 Tokyo, Japan, September 25–27, 2018 Proceedings. Su, C. & Kikuchi, H. (eds.). Cham Switzerland: Springer, p. 50-65 16 p. (Lecture Notes in Computer Science ; vol. 11125 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

31 Citations (Scopus)

Constant-size id-based linkable and revocable-iff-linked ring signature

Au, M. H., Liu, J. K., Susilo, W. & Yuen, T. H., 1 Jan 2006, Progress in Cryptology: INDOCRYPT 2006 - 7th International Conference on Cryptology, Proceedings. Barua, R. & Lange, T. (eds.). Springer, p. 364-378 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4329 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

Cooperative attribute-based access control for enterprise computing system

Li, M., Huang, X., Liu, J. K., Xu, L. & Wu, W., 2015, In : International Journal of Embedded Systems. 7, 3/4, p. 191-202 12 p.

Research output: Contribution to journalArticleResearchpeer-review

69 Citations (Scopus)

Cost-effective authentic and anonymous data sharing with forward security

Huang, X., Liu, J. K., Tang, S., Xiang, Y., Liang, K., Xu, L. & Zhou, J., 1 Apr 2015, In : IEEE Transactions on Computers. 64, 4, p. 971-983 13 p.

Research output: Contribution to journalArticleResearchpeer-review