If you made any changes in Pure these will be visible here soon.

Research Output 2001 2019

2010
30 Citations (Scopus)

A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity

Tsang, P. P., Au, M. H. A., Liu, J. K., Susilo, W. & Wong, D. S., 2010, 4th International Conference on Provable Security (ProvSec 2010). Heng, S-H. & Kurosawa, K. (eds.). Heidelberg Germany: Springer, Vol. 6402. p. 166 - 183 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

78 Citations (Scopus)

Efficient online/offline identity-based signature for wireless sensor network

Liu, K. S. J., Baek, J., Zhou, J., Yang, Y. & Wong, J. W., 2010, In : International Journal of Information Security. 9, 4, p. 287 - 296 10 p.

Research output: Contribution to journalArticleResearchpeer-review

20 Citations (Scopus)

Online/offline identity-based signcryption revisited

Liu, J. K., Baek, J. & Zhou, J., 2010, Proceedings of the 6th International Conference on Information Security and Cryptology (Inscrypt 2010). Lai, X., Yung, M. & Lin, D. (eds.). Heidelberg Germany: Springer, Vol. 6584. p. 36 - 51 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

26 Citations (Scopus)

Practical ID-based encryption for wireless sensor network

Chu, C-K., Liu, J. K., Zhou, J., Bao, F. & Deng, R. H., 2010, Proceedings of the 5th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2010). Basin, D. & Liu, P. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 337 - 340 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Short generic transformation to strongly unforgeable signature in the standard model

Liu, J. K., Au, M. H. A., Susilo, W. & Zhou, J., 2010, Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS 2010). Gritzalis, D., Preneel, B. & Theoharidou, M. (eds.). Heidelberg Germany: Springer, Vol. 6345. p. 168 - 181 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2009
39 Citations (Scopus)

An efficient identity-based online/offline encryption scheme

Liu, J. K. & Zhou, J., 2009, Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 2009). Abdalla, M., Pointcheval, D., Fouque, P-A. & Vergnaud, D. (eds.). Heidelberg Germany: Springer, Vol. 5536. p. 156 - 167 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

7 Citations (Scopus)

A new variant of the cramer-shoup KEM secure against chosen ciphertext attack

Baek, J., Susilo, W., Liu, J. K. & Zhou, J., 2009, Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 2009). Abdalla, M., Pointcheval, D., Fouque, P-A. & Vergnaud, D. (eds.). Heidelberg Germany: Springer, Vol. 5536. p. 143 - 155 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

8 Citations (Scopus)

Certificate-Based Sequential Aggregate Signature

Liu, J. K., Baek, J. & Zhou, J., 2009, Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09. p. 21-28 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

10 Citations (Scopus)

Online/offline ring signature scheme

Liu, J. K., Au, M. H. A., Susilo, W. & Zhou, J., 2009, Proceedings of the 11th International Conference on Information and Communications Security (ICICS 2009). Qing, S., Mitchell, C. J. & Wang, G. (eds.). Heidelberg Germany: Springer, Vol. 5927. p. 80 - 90 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2008
66 Citations (Scopus)

Certificate-based signature schemes without pairings or random Oracles

Liu, J. K., Baek, J., Susilo, W. & Zhou, J., 28 Nov 2008, Information Security - 11th International Conference, ISC 2008, Proceedings. p. 285-297 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5222 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

46 Citations (Scopus)

Certificateless public key encryption secure against malicious KGC attacks in the standard model

Hwang, Y. H., Liu, K. S. & Chow, S. S-M., 2008, In : Journal of Universal Computer Science. 14, 3, p. 463 - 480 18 p.

Research output: Contribution to journalArticleResearchpeer-review

42 Citations (Scopus)

Efficient certificate-based encryption in the standard model

Liu, J. K. & Zhou, J., 25 Sep 2008, Security and Cryptography for Networks - 6th International Conference, SCN 2008, Proceedings. p. 144-155 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5229 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

15 Citations (Scopus)

Sanitizable signatures revisited

Yuen, T. H., Susilo, W., Liu, J. K. & Mu, Y., 1 Dec 2008, Cryptology and Network Security - 7th International Conference, CANS 2008, Proceedings. p. 80-97 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5339 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

15 Citations (Scopus)

Solutions to key exposure problem in ring signature

Liu, J. K. & Wong, D. S., 1 Dec 2008, In : International Journal of Network Security. 6, 2, p. 170-180 11 p.

Research output: Contribution to journalArticleResearchpeer-review

35 Citations (Scopus)

Traceable and retrievable identity-based encryption

Au, M. H., Huang, Q., Liu, J. K., Susilo, W., Wong, D. S. & Yang, G., 30 Jun 2008, Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings. p. 94-110 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5037 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2007
15 Citations (Scopus)

(Convertible) undeniable signatures without random oracles

Yuen, T. H., Au, M. H., Liu, J. K. & Susilo, W., 1 Dec 2007, Information and Communications Security - 9th International Conference, ICICS 2007, Proceedings. p. 83-97 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4861 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

55 Citations (Scopus)

Certificate based (linkable) ring signature

Au, M. H. A., Liu, J. K., Susilo, W. & Yuen, T. H., 2007, Proceedings of the 3rd International Conference on Information Security Practice and Experience (ISPEC 2007). Dawson, E. & Wong, D. S. (eds.). Heidelberg Germany: Springer, Vol. 4464. p. 79 - 92 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

169 Citations (Scopus)

Malicious KGC attacks in certificateless cryptography

Au, M. H., Mu, Y., Chen, J., Wong, D. S., Liu, J. K. & Yang, G., 2007, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07. New York NY USA: Association for Computing Machinery (ACM), p. 302-311 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Preface

Susilo, W. & Liu, J. K., 2007, 1st International Conference on Provable Security 2007. Springer, 1 p. (Lecture Notes in Computer Science; vol. 4784).

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

40 Citations (Scopus)
40 Citations (Scopus)
40 Citations (Scopus)
40 Citations (Scopus)

Revocable ring signature

Liu, D. Y. W., Liu, K. S., Mu, Y., Susilo, W. & Wong, D. S., 2007, In : Journal of Computer Science and Technology. 22, 6, p. 785 - 794 10 p.

Research output: Contribution to journalArticleResearchpeer-review

171 Citations (Scopus)

Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model

Liu, J. K., Au, M. H. & Susilo, W., 2007, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. New York NY USA: Association for Computing Machinery (ACM), p. 273-283 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

2006
31 Citations (Scopus)

Constant-size id-based linkable and revocable-iff-linked ring signature

Au, M. H., Liu, J. K., Susilo, W. & Yuen, T. H., 1 Jan 2006, Progress in Cryptology: INDOCRYPT 2006 - 7th International Conference on Cryptology, Proceedings. Barua, R. & Lange, T. (eds.). Springer, p. 364-378 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4329 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

15 Citations (Scopus)

Enhanced security models and a generic construction approach for linkable ring signature

Liu, J. K. & Wong, D. S., 1 Dec 2006, In : International Journal of Foundations of Computer Science. 17, 6, p. 1403-1422 20 p.

Research output: Contribution to journalArticleResearchpeer-review

56 Citations (Scopus)

ID-based ring signature scheme secure in the standard model

Au, M. H., Liu, J. K., Yuen, T. H. & Wong, D. S., 1 Jan 2006, Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer, p. 1-16 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4266 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

61 Citations (Scopus)

Ring signatures without random oracles

Chow, S. S. M., Wei, V. K., Liu, J. K. & Yuen, T. H., 2006, Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06. New York NY USA : Association for Computing Machinery (ACM), p. 297-302 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

16 Citations (Scopus)

Ring signature with designated linkability

Liu, J. K., Susilo, W. & Wong, D. S., 1 Jan 2006, Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer, p. 104-119 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4266 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Single sign-on and key establishment for ubiquitous smart environments

Chan, Y. Y., Fleissner, S., Liu, J. K. & Li, J., 2006, Computational Science and Its Applications - ICCSA 2006. Springer, p. 406-415 10 p. (Lecture Notes in Computer Science ; vol. 3983).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

7 Citations (Scopus)

Universal custodian-hiding verifiable encryption for discrete logarithms

Liu, J. K., Tsang, P. P., Wong, D. S. & Zhu, R. W., 1 Jan 2006, Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers. Springer, p. 389-409 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3935 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2005
2 Citations (Scopus)

A restricted multi-show credential system and its application on e-voting

Liu, J. K. & Wong, D. S., 2005, First International Conference on Information Security, Practice and Experience, ISPEC 2005. Springer, p. 268-279 12 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

22 Citations (Scopus)

Blind spontaneous anonymous group signatures for ad hoc groups

Chan, T. K., Fung, K., Liu, J. K. & Wei, V. K., 2005, First European Workshop, ESAS 2004. Springer, p. 82-94 13 p. (Lecture Notes in Computer Science; vol. 3313).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

Custodian-hiding verifiable encryption

Liu, J. K., Wei, V. K. & Wong, D. S., 2005, 5th International Workshop on Information Security Applications, WISA 2004. Springer, p. 51-64 14 p. (Lecture Notes in Computer Science; vol. 3325).

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

3 Citations (Scopus)

Efficient verifiable ring encryption for ad hoc groups

Liu, J. K., Tsang, P. P. & Wong, D. S., 1 Dec 2005, Security and Privacy in Ad-hoc and Sensor Networks - Second European Workshop, ESAS 2005, Revised Selected Papers. p. 1-13 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3813 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

34 Citations (Scopus)

Linkable ring signatures: security models and new schemes

Liu, J. K. & Wong, D. S., 2005, International Conference on Computational Science and Its Applications - ICCSA 2005. Springer, p. 614-623 10 p. (Lecture Notes in Computer Science; vol. 3481).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

24 Citations (Scopus)

On the security models of (threshold) ring signature schemes

Liu, J. K. & Wong, D. S., 2005, 7th International Conference on Information Security and Cryptology - ICISC 2004. Springer, p. 204-217 14 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

14 Citations (Scopus)

Recoverable and untraceable E-cash

Liu, J. K., Tsang, P. P. & Wong, D. S., 1 Dec 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 206-214 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3545 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Security analysis of three cryptographic schemes from other cryptographic schemes

Chow, S. S. M., Cao, Z. & Liu, J. K., 1 Dec 2005, Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Proceedings. p. 290-301 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3822 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Transferable e-cash revisit

Liu, J. K., Wong, S. H. & Wong, D. S., 1 Dec 2005, Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference. p. 171-188 18 p. (IFIP Advances in Information and Communication Technology; vol. 181).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2003
1 Citation (Scopus)

Evaluation on security and privacy of Web-based learning systems

Chan, Y. Y., Leung, C. H. & Liu, J. K., 2003, Proceedings - 3rd IEEE International Conference on Advanced Learning Technologies, ICALT 2003. IEEE, Institute of Electrical and Electronics Engineers, p. 308-309 2 p. 1215097

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2001
5 Citations (Scopus)

Recoverable and untraceable E-cash

Liu, J. K., Wei, V. K. & Wong, S. H., 2001, EUROCON 2001 - International Conference on Trends in Communications, Proceedings. IEEE, Institute of Electrical and Electronics Engineers, p. 132-135 4 p. 937781

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review