BibTeX records: Bei Liang

download as .bib file

@article{DBLP:journals/iacr/WuLLD23,
  author       = {Dongyu Wu and
                  Bei Liang and
                  Zijie Lu and
                  Jintai Ding},
  title        = {Efficient Secure Multiparty Computation for Multidimensional Arithmetics
                  and Its Application in Privacy-Preserving Biometric Identification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1863},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1863},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WuLLD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/LiLM021,
  author       = {Shimin Li and
                  Bei Liang and
                  Aikaterini Mitrokotsa and
                  Rui Xue},
  title        = {Homomorphic signcryption with public plaintext-result checkability},
  journal      = {{IET} Inf. Secur.},
  volume       = {15},
  number       = {5},
  pages        = {333--350},
  year         = {2021},
  url          = {https://doi.org/10.1049/ise2.12026},
  doi          = {10.1049/ISE2.12026},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LiLM021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BrunettaTLBM21,
  author       = {Carlo Brunetta and
                  Georgia Tsaloli and
                  Bei Liang and
                  Gustavo Banegas and
                  Aikaterini Mitrokotsa},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Non-interactive, Secure Verifiable Aggregation for Decentralized,
                  Privacy-Preserving Learning},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {510--528},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_26},
  doi          = {10.1007/978-3-030-90567-5\_26},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BrunettaTLBM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/TsaloliLBBM21,
  author       = {Georgia Tsaloli and
                  Bei Liang and
                  Carlo Brunetta and
                  Gustavo Banegas and
                  Aikaterini Mitrokotsa},
  editor       = {Joseph K. Liu and
                  Sokratis K. Katsikas and
                  Weizhi Meng and
                  Willy Susilo and
                  Rolly Intan},
  title        = {sf {DEVA:} Decentralized, Verifiable Secure Aggregation for Privacy-Preserving
                  Learning},
  booktitle    = {Information Security - 24th International Conference, {ISC} 2021,
                  Virtual Event, November 10-12, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13118},
  pages        = {296--319},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91356-4\_16},
  doi          = {10.1007/978-3-030-91356-4\_16},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/TsaloliLBBM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/BrunettaLLMT21,
  author       = {Carlo Brunetta and
                  Mario Larangeira and
                  Bei Liang and
                  Aikaterini Mitrokotsa and
                  Keisuke Tanaka},
  editor       = {Qiong Huang and
                  Yu Yu},
  title        = {Turn-Based Communication Channels},
  booktitle    = {Provable and Practical Security - 15th International Conference, ProvSec
                  2021, Guangzhou, China, November 5-8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13059},
  pages        = {376--392},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90402-9\_21},
  doi          = {10.1007/978-3-030-90402-9\_21},
  timestamp    = {Fri, 05 Nov 2021 15:08:15 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/BrunettaLLMT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrunettaTLBM21,
  author       = {Carlo Brunetta and
                  Georgia Tsaloli and
                  Bei Liang and
                  Gustavo Banegas and
                  Aikaterini Mitrokotsa},
  title        = {Non-Interactive, Secure Verifiable Aggregation for Decentralized,
                  Privacy-Preserving Learning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {654},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/654},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrunettaTLBM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrunettaLLMT21,
  author       = {Carlo Brunetta and
                  Mario Larangeira and
                  Bei Liang and
                  Aikaterini Mitrokotsa and
                  Keisuke Tanaka},
  title        = {Turn-Based Communication Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1126},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1126},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrunettaLLMT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/LiangBM20,
  author       = {Bei Liang and
                  Gustavo Banegas and
                  Aikaterini Mitrokotsa},
  title        = {Statically Aggregate Verifiable Random Functions and Application to
                  E-Lottery},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {4},
  pages        = {37},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4040037},
  doi          = {10.3390/CRYPTOGRAPHY4040037},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/LiangBM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XueAYLJ20,
  author       = {Haiyang Xue and
                  Man Ho Au and
                  Rupeng Yang and
                  Bei Liang and
                  Haodong Jiang},
  title        = {Compact Authenticated Key Exchange in the Quantum Random Oracle Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1282},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1282},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/XueAYLJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WangWLX19,
  author       = {Xueqing Wang and
                  Biao Wang and
                  Bei Liang and
                  Rui Xue},
  title        = {A more compact multi-id identity-based {FHE} scheme in the standard
                  model and its applications},
  journal      = {Sci. China Inf. Sci.},
  volume       = {62},
  number       = {3},
  pages        = {39101:1--39101:3},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11432-017-9412-3},
  doi          = {10.1007/S11432-017-9412-3},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/WangWLX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/LiangM19,
  author       = {Bei Liang and
                  Aikaterini Mitrokotsa},
  title        = {Decentralised Functional Signatures},
  journal      = {Mob. Networks Appl.},
  volume       = {24},
  number       = {3},
  pages        = {934--946},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11036-018-1149-1},
  doi          = {10.1007/S11036-018-1149-1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/LiangM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PanLLN19,
  author       = {Dongxue Pan and
                  Bei Liang and
                  Hongda Li and
                  Peifang Ni},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Witness Encryption with (Weak) Unique Decryption and Message Indistinguishability:
                  Constructions and Applications},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {609--619},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_33},
  doi          = {10.1007/978-3-030-21548-4\_33},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PanLLN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/PanLLN19,
  author       = {Dongxue Pan and
                  Bei Liang and
                  Hongda Li and
                  Peifang Ni},
  editor       = {Feng Hao and
                  Sushmita Ruj and
                  Sourav Sen Gupta},
  title        = {Public-Coin Differing-Inputs Obfuscator for Hiding-Input Point Function
                  with Multi-bit Output and Its Applications},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2019 - 20th International Conference
                  on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11898},
  pages        = {297--317},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35423-7\_15},
  doi          = {10.1007/978-3-030-35423-7\_15},
  timestamp    = {Wed, 20 Mar 2024 15:23:22 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/PanLLN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LiangM19,
  author       = {Bei Liang and
                  Aikaterini Mitrokotsa},
  editor       = {Zhiqiang Lin and
                  Charalampos Papamanthou and
                  Michalis Polychronakis},
  title        = {Robust Distributed Pseudorandom Functions for mNP Access Structures},
  booktitle    = {Information Security - 22nd International Conference, {ISC} 2019,
                  New York City, NY, USA, September 16-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11723},
  pages        = {107--126},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30215-3\_6},
  doi          = {10.1007/978-3-030-30215-3\_6},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/LiangM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BrunettaLM19,
  author       = {Carlo Brunetta and
                  Bei Liang and
                  Aikaterini Mitrokotsa},
  editor       = {Zhiqiang Lin and
                  Charalampos Papamanthou and
                  Michalis Polychronakis},
  title        = {Code-Based Zero Knowledge {PRF} Arguments},
  booktitle    = {Information Security - 22nd International Conference, {ISC} 2019,
                  New York City, NY, USA, September 16-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11723},
  pages        = {171--189},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30215-3\_9},
  doi          = {10.1007/978-3-030-30215-3\_9},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/BrunettaLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/PanLLN19,
  author       = {Dongxue Pan and
                  Bei Liang and
                  Hongda Li and
                  Peifang Ni},
  editor       = {Ron Steinfeld and
                  Tsz Hon Yuen},
  title        = {Hierarchical Functional Signcryption: Notion and Construction},
  booktitle    = {Provable Security - 13th International Conference, ProvSec 2019, Cairns,
                  QLD, Australia, October 1-4, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11821},
  pages        = {167--185},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31919-9\_10},
  doi          = {10.1007/978-3-030-31919-9\_10},
  timestamp    = {Tue, 07 May 2024 20:13:43 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/PanLLN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/BrunettaLM18,
  author       = {Carlo Brunetta and
                  Bei Liang and
                  Aikaterini Mitrokotsa},
  title        = {Lattice-Based Simulatable VRFs: Challenges and Future Directions},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {57--69},
  year         = {2018},
  url          = {https://doi.org/10.22667/JISIS.2018.11.30.057},
  doi          = {10.22667/JISIS.2018.11.30.057},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/BrunettaLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiLX18,
  author       = {Shimin Li and
                  Bei Liang and
                  Rui Xue},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Private Functional Signatures: Definition and Construction},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {284--303},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_17},
  doi          = {10.1007/978-3-319-93638-3\_17},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiLX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/XueLLLH18,
  author       = {Haiyang Xue and
                  Xianhui Lu and
                  Bao Li and
                  Bei Liang and
                  Jingnan He},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {Understanding and Constructing {AKE} via Double-Key Key Encapsulation
                  Mechanism},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11273},
  pages        = {158--189},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03329-3\_6},
  doi          = {10.1007/978-3-030-03329-3\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/XueLLLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WangLLX18,
  author       = {Xin Wang and
                  Bei Liang and
                  Shimin Li and
                  Rui Xue},
  editor       = {Liqun Chen and
                  Mark Manulis and
                  Steve A. Schneider},
  title        = {On Constructing Pairing-Free Identity-Based Encryptions},
  booktitle    = {Information Security - 21st International Conference, {ISC} 2018,
                  Guildford, UK, September 9-12, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11060},
  pages        = {308--327},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99136-8\_17},
  doi          = {10.1007/978-3-319-99136-8\_17},
  timestamp    = {Tue, 20 Aug 2024 07:54:43 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/WangLLX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/TsaloliLM18,
  author       = {Georgia Tsaloli and
                  Bei Liang and
                  Aikaterini Mitrokotsa},
  editor       = {Joonsang Baek and
                  Willy Susilo and
                  Jongkil Kim},
  title        = {Verifiable Homomorphic Secret Sharing},
  booktitle    = {Provable Security - 12th International Conference, ProvSec 2018, Jeju,
                  South Korea, October 25-28, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11192},
  pages        = {40--55},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01446-9\_3},
  doi          = {10.1007/978-3-030-01446-9\_3},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/TsaloliLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuXWTLY18,
  author       = {Xiu Xu and
                  Haiyang Xue and
                  Kunpeng Wang and
                  Song Tian and
                  Bei Liang and
                  Wei Yu},
  title        = {Strongly Secure Authenticated Key Exchange from Supersingular Isogeny},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {760},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/760},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuXWTLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XueLLLH18,
  author       = {Haiyang Xue and
                  Xianhui Lu and
                  Bao Li and
                  Bei Liang and
                  Jingnan He},
  title        = {Understanding and Constructing {AKE} via Double-key Key Encapsulation
                  Mechanism},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {817},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/817},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XueLLLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiangM17,
  author       = {Bei Liang and
                  Aikaterini Mitrokotsa},
  editor       = {Sihan Qing and
                  Chris Mitchell and
                  Liqun Chen and
                  Dongmei Liu},
  title        = {Distributed Pseudorandom Functions for General Access Structures in
                  {NP}},
  booktitle    = {Information and Communications Security - 19th International Conference,
                  {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10631},
  pages        = {81--87},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-89500-0\_7},
  doi          = {10.1007/978-3-319-89500-0\_7},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/LiangM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhangFLXL17,
  author       = {Daode Zhang and
                  Fuyang Fang and
                  Bao Li and
                  Haiyang Xue and
                  Bei Liang},
  editor       = {Sihan Qing and
                  Chris Mitchell and
                  Liqun Chen and
                  Dongmei Liu},
  title        = {Compact Hierarchical {IBE} from Lattices in the Standard Model},
  booktitle    = {Information and Communications Security - 19th International Conference,
                  {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10631},
  pages        = {210--221},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-89500-0\_19},
  doi          = {10.1007/978-3-319-89500-0\_19},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ZhangFLXL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiangM17,
  author       = {Bei Liang and
                  Aikaterini Mitrokotsa},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Fast and Adaptively Secure Signatures in the Random Oracle Model from
                  Indistinguishability Obfuscation (Short Paper)},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {422--431},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_25},
  doi          = {10.1007/978-3-319-72359-4\_25},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LiangM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BrunettaDLM17,
  author       = {Carlo Brunetta and
                  Christos Dimitrakakis and
                  Bei Liang and
                  Aikaterini Mitrokotsa},
  editor       = {Phong Q. Nguyen and
                  Jianying Zhou},
  title        = {A Differentially Private Encryption Scheme},
  booktitle    = {Information Security - 20th International Conference, {ISC} 2017,
                  Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10599},
  pages        = {309--326},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69659-1\_17},
  doi          = {10.1007/978-3-319-69659-1\_17},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/BrunettaDLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiangM17,
  author       = {Bei Liang and
                  Aikaterini Mitrokotsa},
  title        = {Fast and Adaptively Secure Signatures in the Random Oracle Model from
                  Indistinguishability Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {969},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/969},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiangM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/TangLNL15,
  author       = {Fei Tang and
                  Hongda Li and
                  Qihua Niu and
                  Bei Liang},
  title        = {Secure Mobile Agent from Leakage-Resilient Proxy Signatures},
  journal      = {Mob. Inf. Syst.},
  volume       = {2015},
  pages        = {901418:1--901418:12},
  year         = {2015},
  url          = {https://doi.org/10.1155/2015/901418},
  doi          = {10.1155/2015/901418},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mis/TangLNL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/LiangLC15,
  author       = {Bei Liang and
                  Hongda Li and
                  Jinyong Chang},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {Verifiable Random Functions from (Leveled) Multilinear Maps},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  pages        = {129--143},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_10},
  doi          = {10.1007/978-3-319-26823-1\_10},
  timestamp    = {Mon, 02 Jan 2023 08:05:35 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/LiangLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/NiuLHLT15,
  author       = {Qihua Niu and
                  Hongda Li and
                  Guifang Huang and
                  Bei Liang and
                  Fei Tang},
  editor       = {Javier L{\'{o}}pez and
                  Yongdong Wu},
  title        = {One-Round Witness Indistinguishability from Indistinguishability Obfuscation},
  booktitle    = {Information Security Practice and Experience - 11th International
                  Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9065},
  pages        = {559--574},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17533-1\_38},
  doi          = {10.1007/978-3-319-17533-1\_38},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/NiuLHLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LiangLC15,
  author       = {Bei Liang and
                  Hongda Li and
                  Jinyong Chang},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {The Generic Transformation from Standard Signatures to Identity-Based
                  Aggregate Signatures},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {21--41},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_2},
  doi          = {10.1007/978-3-319-23318-5\_2},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/LiangLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LiangLC15,
  author       = {Bei Liang and
                  Hongda Li and
                  Jinyong Chang},
  editor       = {Man Ho Au and
                  Atsuko Miyaji},
  title        = {Constrained Verifiable Random Functions from Indistinguishability
                  Obfuscation},
  booktitle    = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa,
                  Japan, November 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9451},
  pages        = {43--60},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26059-4\_3},
  doi          = {10.1007/978-3-319-26059-4\_3},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/LiangLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiangZL14,
  author       = {Bei Liang and
                  Rui Zhang and
                  Hongda Li},
  editor       = {Dongdai Lin and
                  Moti Yung and
                  Jianying Zhou},
  title        = {Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions},
  booktitle    = {Information Security and Cryptology - 10th International Conference,
                  Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8957},
  pages        = {193--206},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16745-9\_11},
  doi          = {10.1007/978-3-319-16745-9\_11},
  timestamp    = {Sat, 27 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiangZL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/TangLNL14,
  author       = {Fei Tang and
                  Hongda Li and
                  Qihua Niu and
                  Bei Liang},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear
                  Group Model},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {418--432},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_31},
  doi          = {10.1007/978-3-319-06320-1\_31},
  timestamp    = {Tue, 20 Aug 2024 07:54:44 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/TangLNL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/TangLL14,
  author       = {Fei Tang and
                  Hongda Li and
                  Bei Liang},
  editor       = {Sherman S. M. Chow and
                  Jan Camenisch and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Attribute-Based Signatures for Circuits from Multilinear Maps},
  booktitle    = {Information Security - 17th International Conference, {ISC} 2014,
                  Hong Kong, China, October 12-14, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8783},
  pages        = {54--71},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13257-0\_4},
  doi          = {10.1007/978-3-319-13257-0\_4},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/TangLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/TangLNL13,
  author       = {Fei Tang and
                  Hongda Li and
                  Qihua Niu and
                  Bei Liang},
  title        = {Leakage-Resilient Proxy Signatures},
  booktitle    = {2013 5th International Conference on Intelligent Networking and Collaborative
                  Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages        = {495--502},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INCoS.2013.94},
  doi          = {10.1109/INCOS.2013.94},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/TangLNL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/LiNL13,
  author       = {Hongda Li and
                  Qihua Niu and
                  Bei Liang},
  editor       = {Javier L{\'{o}}pez and
                  Xinyi Huang and
                  Ravi S. Sandhu},
  title        = {Leakage-Resilient Zero-Knowledge Proofs of Knowledge for {NP}},
  booktitle    = {Network and System Security - 7th International Conference, {NSS}
                  2013, Madrid, Spain, June 3-4, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7873},
  pages        = {365--380},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38631-2\_27},
  doi          = {10.1007/978-3-642-38631-2\_27},
  timestamp    = {Tue, 20 Aug 2024 07:54:43 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/LiNL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangLNL13,
  author       = {Fei Tang and
                  Hongda Li and
                  Qihua Niu and
                  Bei Liang},
  title        = {Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear
                  Group Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {785},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/785},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TangLNL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}