If you made any changes in Pure these will be visible here soon.

Research Output 2005 2019

Filter
Conference Paper
2012

Verifier-local revocation group signatures with time-bound keys

Chu, C-K., Liu, J. K., Huang, X. & Zhou, J., 2012, Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2012). Lai, X. & Reiter, M. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 1 - 11 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2011

Forward secure ring signature without random oracles

Liu, J. K., Yuen, T. H. & Zhou, J., 2011, Proceedings of the 13th International Conference on Information and Communications Security (ICICS 2011). Qing, S., Susilo, W., Wang, G. & Liu, D. (eds.). Heidelberg Germany: Springer, Vol. 7043. p. 1 - 14 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Identity-based online/offline key encapsulation and encryption

Chow, S. S-M., Liu, J. K. & Zhou, J., 2011, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011). Sandhu, R. & Wong, D. S. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 52 - 60 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Identity-based server-aided decryption

Liu, J. K., Chu, C-K. & Zhou, J., 2011, Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Proceedings. Springer, Vol. 6812 LNCS. p. 337-352 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6812 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Short and efficient certificate-based signature

Liu, J. K., Bao, F. & Zhou, J., 2011, Proceedings of the Networking 2011 Workshops: Workshop on Wireless Cooperative Networks Security (WCNS 2011). Casares-Giner, V., Manzoni, P. & Pont, A. (eds.). Heidelberg Germany: Springer, Vol. 6827. p. 167 - 178 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Threshold ring signature without random oracles

Yuen, T. H., Liu, J. K., Au, M. H. A., Susilo, W. & Zhou, J., 2011, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011). Sandhu, R. & Wong, D. S. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 261 - 267 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

2010

A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity

Tsang, P. P., Au, M. H. A., Liu, J. K., Susilo, W. & Wong, D. S., 2010, 4th International Conference on Provable Security (ProvSec 2010). Heng, S-H. & Kurosawa, K. (eds.). Heidelberg Germany: Springer, Vol. 6402. p. 166 - 183 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Online/offline identity-based signcryption revisited

Liu, J. K., Baek, J. & Zhou, J., 2010, Proceedings of the 6th International Conference on Information Security and Cryptology (Inscrypt 2010). Lai, X., Yung, M. & Lin, D. (eds.). Heidelberg Germany: Springer, Vol. 6584. p. 36 - 51 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Practical ID-based encryption for wireless sensor network

Chu, C-K., Liu, J. K., Zhou, J., Bao, F. & Deng, R. H., 2010, Proceedings of the 5th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2010). Basin, D. & Liu, P. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 337 - 340 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Short generic transformation to strongly unforgeable signature in the standard model

Liu, J. K., Au, M. H. A., Susilo, W. & Zhou, J., 2010, Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS 2010). Gritzalis, D., Preneel, B. & Theoharidou, M. (eds.). Heidelberg Germany: Springer, Vol. 6345. p. 168 - 181 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2009

An efficient identity-based online/offline encryption scheme

Liu, J. K. & Zhou, J., 2009, Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 2009). Abdalla, M., Pointcheval, D., Fouque, P-A. & Vergnaud, D. (eds.). Heidelberg Germany: Springer, Vol. 5536. p. 156 - 167 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

A new variant of the cramer-shoup KEM secure against chosen ciphertext attack

Baek, J., Susilo, W., Liu, J. K. & Zhou, J., 2009, Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 2009). Abdalla, M., Pointcheval, D., Fouque, P-A. & Vergnaud, D. (eds.). Heidelberg Germany: Springer, Vol. 5536. p. 143 - 155 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Certificate-Based Sequential Aggregate Signature

Liu, J. K., Baek, J. & Zhou, J., 2009, Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09. p. 21-28 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Online/offline ring signature scheme

Liu, J. K., Au, M. H. A., Susilo, W. & Zhou, J., 2009, Proceedings of the 11th International Conference on Information and Communications Security (ICICS 2009). Qing, S., Mitchell, C. J. & Wang, G. (eds.). Heidelberg Germany: Springer, Vol. 5927. p. 80 - 90 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2008

Certificate-based signature schemes without pairings or random Oracles

Liu, J. K., Baek, J., Susilo, W. & Zhou, J., 28 Nov 2008, Information Security - 11th International Conference, ISC 2008, Proceedings. p. 285-297 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5222 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Efficient certificate-based encryption in the standard model

Liu, J. K. & Zhou, J., 25 Sep 2008, Security and Cryptography for Networks - 6th International Conference, SCN 2008, Proceedings. p. 144-155 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5229 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Sanitizable signatures revisited

Yuen, T. H., Susilo, W., Liu, J. K. & Mu, Y., 1 Dec 2008, Cryptology and Network Security - 7th International Conference, CANS 2008, Proceedings. p. 80-97 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5339 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Traceable and retrievable identity-based encryption

Au, M. H., Huang, Q., Liu, J. K., Susilo, W., Wong, D. S. & Yang, G., 30 Jun 2008, Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings. p. 94-110 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5037 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2007

(Convertible) undeniable signatures without random oracles

Yuen, T. H., Au, M. H., Liu, J. K. & Susilo, W., 1 Dec 2007, Information and Communications Security - 9th International Conference, ICICS 2007, Proceedings. p. 83-97 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4861 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Certificate based (linkable) ring signature

Au, M. H. A., Liu, J. K., Susilo, W. & Yuen, T. H., 2007, Proceedings of the 3rd International Conference on Information Security Practice and Experience (ISPEC 2007). Dawson, E. & Wong, D. S. (eds.). Heidelberg Germany: Springer, Vol. 4464. p. 79 - 92 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2006

Constant-size id-based linkable and revocable-iff-linked ring signature

Au, M. H., Liu, J. K., Susilo, W. & Yuen, T. H., 1 Jan 2006, Progress in Cryptology: INDOCRYPT 2006 - 7th International Conference on Cryptology, Proceedings. Barua, R. & Lange, T. (eds.). Springer, p. 364-378 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4329 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

ID-based ring signature scheme secure in the standard model

Au, M. H., Liu, J. K., Yuen, T. H. & Wong, D. S., 1 Jan 2006, Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer, p. 1-16 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4266 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Ring signature with designated linkability

Liu, J. K., Susilo, W. & Wong, D. S., 1 Jan 2006, Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer, p. 104-119 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4266 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Universal custodian-hiding verifiable encryption for discrete logarithms

Liu, J. K., Tsang, P. P., Wong, D. S. & Zhu, R. W., 1 Jan 2006, Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers. Springer, p. 389-409 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3935 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2005

Efficient verifiable ring encryption for ad hoc groups

Liu, J. K., Tsang, P. P. & Wong, D. S., 1 Dec 2005, Security and Privacy in Ad-hoc and Sensor Networks - Second European Workshop, ESAS 2005, Revised Selected Papers. p. 1-13 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3813 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Recoverable and untraceable E-cash

Liu, J. K., Tsang, P. P. & Wong, D. S., 1 Dec 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 206-214 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3545 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Security analysis of three cryptographic schemes from other cryptographic schemes

Chow, S. S. M., Cao, Z. & Liu, J. K., 1 Dec 2005, Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Proceedings. p. 290-301 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3822 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Transferable e-cash revisit

Liu, J. K., Wong, S. H. & Wong, D. S., 1 Dec 2005, Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference. p. 171-188 18 p. (IFIP Advances in Information and Communication Technology; vol. 181).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review