If you made any changes in Pure these will be visible here soon.

Research Output 2001 2019

Filter
Conference Paper
2019

A flexible instant payment system based on blockchain

Zhong, L., Wang, H., Xie, J., Qin, B., Liu, J. K. & Wu, Q., 2019, Information Security and Privacy: 24th Australasian Conference, ACISP 2019 Christchurch, New Zealand, July 3–5, 2019 Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Cham Switzerland: Springer, p. 289-306 18 p. (Lecture Notes in Computer Science ; vol. 11547 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

A multi-client DSSE scheme supporting range queries

Loh, R., Zuo, C., Liu, J. K. & Sun, S. F., 2019, Information Security and Cryptology : 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 289-307 19 p. (Lecture Notes in Computer Science ; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Analyzing use of high privileges on android: an empirical case study of screenshot and screen recording applications

Meng, M. H., Bai, G., Liu, J. K., Luo, X. & Wang, Y., 2019, Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 349-369 21 p. (Lecture Notes in Computer Science ; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

An encrypted database with enforced access control and blockchain validation

Sui, Z., Lai, S., Zuo, C., Yuan, X., Liu, J. K. & Qian, H., 2019, Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 260-273 14 p. (Lecture Notes in Computer Science ; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Anonymity reduction attacks to Monero

Wijaya, D. A., Liu, J., Steinfeld, R., Liu, D. & Yuen, T. H., 2019, Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 86-100 15 p. (Lecture Notes in Computer Science; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

DGM: a dynamic and revocable Group Merkle signature

Buser, M., Liu, J., Steinfeld, R., Sakzad, A. & Sun, S-F., 2019, Computer Security - ESORICS 2019: 24th European Symposium on Research in Computer Security Luxembourg, September 23–27, 2019 Proceedings, Part I. Sako, K., Schneider, S. & Y. A. Ryan, P. (eds.). Cham Switzerland: Springer, p. 194-214 21 p. (Lecture Notes in Computer Science; vol. 11735).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Evaluating CryptoNote-style blockchains

Han, R., Yu, J., Liu, J. & Zhang, P., 2019, Information Security and Cryptology : 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Guo, F., Huang, X. & Yung, M. (eds.). Cham Switzerland: Springer, p. 29-48 20 p. (Lecture Notes in Computer Science ; vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Fast-to-finalize Nakamoto-like consensus

Tang, S., Chow, S. S. M., Liu, Z. & Liu, J. K., 2019, Information Security and Privacy: 24th Australasian Conference, ACISP 2019 Christchurch, New Zealand, July 3–5, 2019 Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Cham Switzerland: Springer, p. 271-288 18 p. (Lecture Notes in Computer Science ; vol. 11547 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Generic multi-keyword ranked search on encrypted cloud data

Kasra Kermanshahi, S., Liu, J. K., Steinfeld, R. & Nepal, S., 2019, Computer Security - ESORICS 2019: 24th European Symposium on Research in Computer Security Luxembourg, September 23–27, 2019 Proceedings, Part I. Sako, K., Schneider, S. & Y. A. Ryan, P. (eds.). Cham Switzerland: Springer, p. 322-343 22 p. (Lecture Notes in Computer Science ; vol. 11735).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

GraphSE2: an encrypted graph database for privacy-preserving social search

Lai, S., Yuan, X., Sun, S-F., Liu, J. K., Liu, Y. & Liu, D., 2019, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Gollmann, D., Kirda, E. & Liang, Z. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 41-54 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Lattice-based zero-knowledge proofs: new techniques for shorter and faster constructions and applications

Esgin, M. F., Steinfeld, R., Liu, J. K. & Liu, D., 2019, Advances in Cryptology – CRYPTO 2019 : 39th Annual International Cryptology Conference Santa Barbara, CA, USA, August 18–22, 2019 Proceedings, Part I. Boldyreva, A. & Micciancio, D. (eds.). Cham Switzerland: Springer, p. 115-146 32 p. (Lecture Notes in Computer Science ; vol. 11692 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Lattice RingCT V2.0 with Multiple Input and Multiple Output Wallets

Alberto Torres, W., Kuchta, V., Steinfeld, R., Sakzad, A., Liu, J. K. & Cheng, J., 2019, Information Security and Privacy: 24th Australasian Conference, ACISP 2019 Christchurch, New Zealand, July 3–5, 2019 Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Cham Switzerland: Springer, p. 156-175 20 p. (Lecture Notes in Computer Science ; vol. 11547 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

1 Citation (Scopus)

On the unforkability of Monero

Wijaya, D. A., Liu, J. K., Steinfeld, R., Liu, D. & Yu, J., 2019, Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Gollmann, D., Kirda, E. & Liang, Z. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 621-632 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Open Access
File

Risk of asynchronous protocol update: attacks to Monero protocols

Wijaya, D. A., Liu, J. K., Steinfeld, R. & Liu, D., 2019, Information Security and Privacy: 24th Australasian Conference, ACISP 2019 Christchurch, New Zealand, July 3–5, 2019 Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Cham Switzerland: Springer, p. 307-321 15 p. (Lecture Notes in Computer Science ; vol. 11547 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Short lattice-based one-out-of-many proofs and applications to ring signatures

Esgin, M. F., Steinfeld, R., Sakzad, A., Liu, J. K. & Liu, D., 2019, Applied Cryptography and Network Security: 17th International Conference, ACNS 2019 Bogota, Colombia, June 5–7, 2019 Proceedings. Deng, R. H., Gauthier-Umaña, V., Ochoa, M. & Yung, M. (eds.). Cham Switzerland: Springer, p. 67-88 22 p. (Lecture Notes in Computer Science ; vol. 11464 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Strong leakage and tamper-resilient PKE from refined hash proof system

Sun, S. F., Gu, D., Au, M. H., Han, S., Yu, Y. & Liu, J., 2019, Applied Cryptography and Network Security: 17th International Conference, ACNS 2019 Bogota, Colombia, June 5–7, 2019 Proceedings. Deng, R. H., Gauthier-Umaña, V., Ochoa, M. & Yung, M. (eds.). Cham Switzerland: Springer, p. 486-506 21 p. (Lecture Notes in Computer Science; vol. 11464 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Time-dependent decision-making and decentralization in Proof-of-Work Cryptocurrencies

Zolotavkin, Y., Garcia, J. & Liu, J., 2019, Proceedings - 2019 IEEE 32nd Computer Security Foundations Symposium, CSF 2019. Delaune, S. & Jia, L. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 108-121 14 p. 8823663

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2018

Adding confidential transactions to cryptocurrency IOTA with Bulletproofs

Ince, P., Liu, J. K. & Zhang, P., 2018, Network and System Security : 12th International Conference, NSS 2018 Hong Kong, China, August 27–29, 2018 Proceedings. Au, M. H., Yiu, S. M., Li, J., Luo, X., Wang, C., Castiglione, A. & Kluczniak, K. (eds.). Cham Switzerland: Springer, p. 32-45 14 p. (Lecture Notes in Computer Science; vol. 11058 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

1 Citation (Scopus)

A multi-client dynamic searchable symmetric encryption system with physical deletion

Xu, L., Xu, C., Liu, J. K., Zuo, C. & Zhang, P., 2018, Information and Communications Security : 19th International Conference, ICICS 2017 Beijing, China, December 6–8, 2017 Proceedings. Qing, S., Mitchell, C., Chen, L. & Liu, D. (eds.). Cham Switzerland: Springer, p. 516-528 13 p. (Lecture Notes in Computer Science ; vol. 10631 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Compact ring signature in the standard model for blockchain

Ren, H., Zhang, P., Shentu, Q., Liu, J. K. & Yuen, T. H., 2018, Information Security Practice and Experience : 14th International Conference, ISPEC 2018 Tokyo, Japan, September 25–27, 2018 Proceedings. Su, C. & Kikuchi, H. (eds.). Cham Switzerland: Springer, p. 50-65 16 p. (Lecture Notes in Computer Science ; vol. 11125 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

6 Citations (Scopus)

Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security

Zuo, C., Sun, S. F., Liu, J. K., Shao, J. & Pieprzyk, J., 2018, Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018 Barcelona, Spain, September 3–7, 2018 Proceedings, Part II. Lopez, J., Zhou, J. & Soriano, M. (eds.). Cham Switzerland: Springer, p. 228-246 19 p. (Lecture Notes in Computer Science ; vol. 11099 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Forward secure searchable encryption using key-based blocks chain technique

Lv, S., Huang, Y., Li, B., Wei, Y., Liu, Z., Liu, J. K. & Lee, D. H., 2018, Algorithms and Architectures for Parallel Processing : 18th International Conference, ICA3PP 2018 Guangzhou, China, November 15–17, 2018 Proceedings, Part IV. Vaidya, J. & Li, J. (eds.). Cham Switzerland: Springer, p. 85-97 13 p. (Lecture Notes in Computer Science ; vol. 11337 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Leakage-resilient chosen-ciphertext secure functional encryption from garbled circuits

Wang, H., Chen, K., Liu, J. K. & Hu, Z., 2018, Information Security Practice and Experience : 14th International Conference, ISPEC 2018 Tokyo, Japan, September 25–27, 2018 Proceedings. Su, C. & Kikuchi, H. (eds.). Cham Switzerland: Springer, p. 119-140 22 p. (Lecture Notes in Computer Science ; vol. 11125 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

4 Citations (Scopus)

Monero ring attack: recreating zero mixin transaction effect

Wijaya, D. A., Liu, J., Steinfeld, R. & Liu, D., 5 Sep 2018, Proceedings - The 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018) - The 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2018): 2018 IEEE Trustcom/BigDataSE. Choo, K-K. R., Zhu, Y., Fei, Z., Thuraisingham, B. & Xiang, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1196-1201 6 p. 8456034

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

9 Citations (Scopus)

Platform-independent secure blockchain-based voting system

Yu, B., Liu, J. K., Sakzad, A., Nepal, S., Steinfeld, R., Rimba, P. & Au, M. H., 2018, Information Security: 21st International Conference, ISC 2018 Guildford, UK, September 9–12, 2018 Proceedings. Chen, L., Manulis, M. & Schneider, S. (eds.). Cham Switzerland: Springer, p. 369-386 18 p. (Lecture Notes in Computer Science ; vol. 11060 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)

Position paper on blockchain technology: smart contract and applications

Meng, W., Wang, J., Wang, X., Liu, J., Yu, Z., Li, J., Zhao, Y. & Chow, S. S. M., 2018, Network and System Security: 12th International Conference, NSS 2018 Hong Kong, China, August 27–29, 2018 Proceedings. Au, M. H., Yiu, S. M., Li, J., Luo, X., Wang, C., Castiglione, A. & Kluczniak, K. (eds.). Cham Switzerland : Springer, p. 474-483 10 p. (Lecture Notes in Computer Science; vol. 11058 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

9 Citations (Scopus)

Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (Lattice RingCT v1.0)

Alberto Torres, W. A., Steinfeld, R., Sakzad, A., Liu, J. K., Kuchta, V., Bhattacharjee, N., Au, M. H. & Cheng, J., 2018, Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 Wollongong, NSW, Australia, July 11–13, 2018 Proceedings. Susilo, W. & Yang, G. (eds.). Cham Switzerland: Springer, p. 558-576 19 p. (Lecture Notes in Computer Science ; vol. 10946).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

14 Citations (Scopus)

Practical backward-Secure Searchable Encryption from symmetric puncturable encryption

Sun, S-F., Yuan, X., Liu, J. K., Steinfeld, R., Sakzad, A., Vo, V. & Nepal, S., 2018, CCS’18 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security: October 15-19, 2018 Toronto, ON, Canada . Backes, M. & Wang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 763-780 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

8 Citations (Scopus)

Result pattern hiding searchable encryption for conjunctive queries

Lai, S., Patranabis, S., Sakzad, A., Liu, J. K., Mukhopadhyay, D., Steinfeld, R., Sun, S-F., Liu, D. & Zuo, C., 2018, CCS’18 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security: October 15-19, 2018 Toronto, ON, Canada. Backes, M. & Wang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 745-762 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Revocable Identity-based encryption from the Computational Diffie-Hellman problem

Hu, Z., Liu, S., Chen, K. & Liu, J. K., 2018, Information Security and Privacy : 23rd Australasian Conference, ACISP 2018 Wollongong, NSW, Australia, July 11–13, 2018 Proceedings. Susilo, W. & Yang, G. (eds.). Cham Switzerland: Springer, p. 265-283 19 p. (Lecture Notes in Computer Science ; vol. 10946).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

7 Citations (Scopus)

Time-based direct revocable Ciphertext-Policy Attribute-Based Encryption with short revocation list

Liu, J. K., Yuen, T. H., Zhang, P. & Liang, K., 2018, Applied Cryptography and Network Security: 16th International Conference, ACNS 2018 Leuven, Belgium, July 2–4, 2018 Proceedings. Preneel, B. & Vercauteren, F. (eds.). Cham Switzerland: Springer, p. 516-534 19 p. (Lecture Notes in Computer Science ; vol. 10892 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

5 Citations (Scopus)

Towards efficient verifiable conjunctive keyword search for large encrypted database

Wang, J., Chen, X., Sun, S-F., Liu, J. K., Au, M. H. & Zhan, Z-H., 2018, Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018 Barcelona, Spain, September 3–7, 2018 Proceedings, Part II. Lopez, J., Zhou, J. & Soriano, M. (eds.). Cham Switzerland: Springer, p. 83-100 18 p. (Lecture Notes in Computer Science ; vol. 11099 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Towards privacy-preserving forensic analysis for time-series medical data

Liu, X., Yuan, X. & Liu, J., 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018) - 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2018): 31 July–3 August 2018 New York, New York. Choo, K-K. R., Zhu, Y., Fei, Z., Thuraisingham, B. & Xiang, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1664-1668 5 p. 8456115

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2017
11 Citations (Scopus)

A new blockchain-based Value-Added Tax system

Wijaya, D. A., Liu, J. K., Suwarsono, D. A. & Zhang, P., 2017, Provable Security : 11th International Conference, ProvSec 2017 Xi’an, China, October 23–25, 2017 Proceedings. Okamoto, T., Yu, Y., Au, M. H. & Li, Y. (eds.). Cham Switzerland: Springer, p. 471-486 16 p. (Lecture Notes in Computer Science; vol. 10592 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

An implementation of access-control protocol for IoT home scenario

Wu, X., Steinfeld, R., Liu, J. & Rudolph, C., 2017, Proceedings - 16th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2017). Zhu, G., Yao, S., Cui, X. & Xu, S. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 31-37 7 p. 7959965

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Open Access
File
1 Citation (Scopus)

Anonymous anti-Sybil attack protocol for mobile healthcare networks analytics

Zhang, P., Zhang, X., Sun, X., Liu, J. K., Yu, J. & Jiang, Z. L., 7 Sep 2017, Proceedings - The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, The 11th IEEE International Conference on Big Data Science and Engineering and the 14th IEEE International Conference on Embedded Software and Systems: 2017 IEEE Trustcom/BigDataSE/ICESS. Nanda, P., Xiang, Y. & Mu, Y. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 668-674 7 p. 8029501

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

10 Citations (Scopus)

A trust and privacy preserving handover authentication protocol for wireless networks

Yang, X., Zhang, Y., Liu, J. K. & Zeng, Y., 7 Feb 2017, 2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings]. Xiang, Y., Ren, K. & Feng, D. (eds.). Piscataway, NJ : IEEE, Institute of Electrical and Electronics Engineers, p. 138-143 6 p. 7846939

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

4 Citations (Scopus)

Attribute-based encryption with expressive and authorized keyword search

Cui, K-H., Deng, R. H., Liu, J. K. & Li, Y., 2017, Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I. Pieprzyk, J. & Suriadi, S. (eds.). Cham, Switzerland: Springer, p. 106-126 21 p. (Lecture Notes in Computer Science ; vol. 10342 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

7 Citations (Scopus)

Multi-user cloud-based secure keyword search

Kasra Kermanshahi, S., Liu, J. K. & Steinfeld, R., 2017, Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I. Pieprzyk, J. & Suriadi, S. (eds.). Cham, Switzerland: Springer, p. 227-247 21 p. (Lecture Notes in Computer Science ; vol. 10342).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

38 Citations (Scopus)

RingCT 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero

Sun, S-F., Au, M. H., Liu, J. K. & Yuen, T. H., 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Foley, S., Snekkenes, E. & Gollmann, D. (eds.). Cham, Switzerland: Springer, Vol. 10493 . p. 456-474 19 p. (Lecture Notes in Computer Science; vol. 10493 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Towards multi-user searchable encryption supporting boolean query and fast decryption

Wang, Y., Wang, J., Sun, S-F., Liu, J. K., Susilo, W. & Chen, X., 2017, Provable Security: 11th International Conference, ProvSec 2017, 2017, Xi'an, China, October 23-25, 2017. Okamoto, T., Yu, Y., Ao, M. H. & Li, Y. (eds.). Cham Switzerland: Springer, Vol. 10592 . p. 24-38 15 p. (Lecture Notes in Computer Science ; vol. 10592 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

Towards revocable fine-grained encryption of cloud data: Reducing trust upon cloud

Yang, Y., Liu, J., Wei, Z. & Huang, X., 2017, Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I. Pieprzyk, J. & Suriadi, S. (eds.). Cham, Switzerland: Springer, p. 127-144 18 p. (Lecture Notes in Computer Science ; vol. 10342 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

4 Citations (Scopus)

Trust enhancement over range search for encrypted data

Yang, X., Lee, T. T., Liu, J. K. & Huang, X., 7 Feb 2017, 2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings]. Xiang, Y., Ren, K. & Feng, D. (eds.). Piscataway, NJ : IEEE, Institute of Electrical and Electronics Engineers, p. 66-73 8 p. 7846930

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2016
31 Citations (Scopus)

An efficient non-interactive multi-client searchable encryption with support for boolean queries

Sun, S-F., Liu, J. K., Sakzad, A., Steinfeld, R. & Yuen, T. H., 15 Sep 2016, Computer Security - ESORICS 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26–30, 2016, Proceedings, Part I. Askoxylakis, I., Ioannidis, S., Katsikas, S. & Meadows, C. (eds.). Switzerland: Springer, p. 154-172 19 p. (Lecture Notes in Computer Science ; vol. 9878 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

Anonymizing bitcoin transaction

Wijaya, D. A., Liu, J. K., Steinfeld, R., Sun, S. F. & Huang, X., 2016, Information Security Practice and Experience : 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16–18, 2016, Proceedings. Bao, F., Chen, L., Deng, R. H. & Wang, G. (eds.). Cham, Switzerland: Springer, p. 271-283 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10060 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

11 Citations (Scopus)

Anonymous identity-based broadcast encryption with chosen-ciphertext security

He, K., Weng, J., Liu, J-N., Liu, J. K., Liu, W. & Deng, R. H., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security: May 30–June 3, 2016, Xi’an, China. Wang, X. & Huang, X. (eds.). New York, NY: Association for Computing Machinery (ACM), p. 247-255 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

3 Citations (Scopus)

Credential wrapping: From anonymous password authentication to anonymous biometric authentication

Yang, Y., Weng, J., Lu, H., Zhang, Y., Liu, J. K. & Zhou, J., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security: May 30 – June 3, 2016, Xi’an, China. Wang, X. & Huang, X. (eds.). New York, NY: Association for Computing Machinery (ACM), p. 141-151 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Efficient construction of completely non-malleable CCA secure public key encryption

Sun, S. F., Gu, D., Liu, J. K., Parampalli, U. & Yuen, T. H., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security. Wang, X. & Huang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 901-906 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

Efficient fine-grained access control for secure personal health records in cloud computing

He, K., Weng, J., Liu, J. K., Zhou, W. & Liu, J. N., 2016, Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28–30, 2016, Proceedings. Chen, J., Su, C., Piuri, V. & Yung, M. (eds.). Cham, Switzerland: Springer, p. 65-79 15 p. (Lecture Notes in Computer Science ; vol. 9955 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

16 Citations (Scopus)

Efficient multi-function data sharing and searching mechanism for cloud-based encrypted data

Liang, K. A., Su, C., Liu, J. K. & Chen, J., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security: May 30 – June 3, 2016, Xi’an, China. Wang, X. & Huang, X. (eds.). New York, NY: Association for Computing Machinery (ACM), p. 83-94 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch