default search action
BibTeX records: Bei Liang
@article{DBLP:journals/iacr/WuLLD23, author = {Dongyu Wu and Bei Liang and Zijie Lu and Jintai Ding}, title = {Efficient Secure Multiparty Computation for Multidimensional Arithmetics and Its Application in Privacy-Preserving Biometric Identification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1863}, year = {2023}, url = {https://eprint.iacr.org/2023/1863}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WuLLD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/LiLM021, author = {Shimin Li and Bei Liang and Aikaterini Mitrokotsa and Rui Xue}, title = {Homomorphic signcryption with public plaintext-result checkability}, journal = {{IET} Inf. Secur.}, volume = {15}, number = {5}, pages = {333--350}, year = {2021}, url = {https://doi.org/10.1049/ise2.12026}, doi = {10.1049/ISE2.12026}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/LiLM021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BrunettaTLBM21, author = {Carlo Brunetta and Georgia Tsaloli and Bei Liang and Gustavo Banegas and Aikaterini Mitrokotsa}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Non-interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {510--528}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_26}, doi = {10.1007/978-3-030-90567-5\_26}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BrunettaTLBM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/TsaloliLBBM21, author = {Georgia Tsaloli and Bei Liang and Carlo Brunetta and Gustavo Banegas and Aikaterini Mitrokotsa}, editor = {Joseph K. Liu and Sokratis K. Katsikas and Weizhi Meng and Willy Susilo and Rolly Intan}, title = {sf {DEVA:} Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning}, booktitle = {Information Security - 24th International Conference, {ISC} 2021, Virtual Event, November 10-12, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13118}, pages = {296--319}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91356-4\_16}, doi = {10.1007/978-3-030-91356-4\_16}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/TsaloliLBBM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/BrunettaLLMT21, author = {Carlo Brunetta and Mario Larangeira and Bei Liang and Aikaterini Mitrokotsa and Keisuke Tanaka}, editor = {Qiong Huang and Yu Yu}, title = {Turn-Based Communication Channels}, booktitle = {Provable and Practical Security - 15th International Conference, ProvSec 2021, Guangzhou, China, November 5-8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13059}, pages = {376--392}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90402-9\_21}, doi = {10.1007/978-3-030-90402-9\_21}, timestamp = {Fri, 05 Nov 2021 15:08:15 +0100}, biburl = {https://dblp.org/rec/conf/provsec/BrunettaLLMT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrunettaTLBM21, author = {Carlo Brunetta and Georgia Tsaloli and Bei Liang and Gustavo Banegas and Aikaterini Mitrokotsa}, title = {Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {654}, year = {2021}, url = {https://eprint.iacr.org/2021/654}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrunettaTLBM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrunettaLLMT21, author = {Carlo Brunetta and Mario Larangeira and Bei Liang and Aikaterini Mitrokotsa and Keisuke Tanaka}, title = {Turn-Based Communication Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1126}, year = {2021}, url = {https://eprint.iacr.org/2021/1126}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrunettaLLMT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/LiangBM20, author = {Bei Liang and Gustavo Banegas and Aikaterini Mitrokotsa}, title = {Statically Aggregate Verifiable Random Functions and Application to E-Lottery}, journal = {Cryptogr.}, volume = {4}, number = {4}, pages = {37}, year = {2020}, url = {https://doi.org/10.3390/cryptography4040037}, doi = {10.3390/CRYPTOGRAPHY4040037}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/LiangBM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XueAYLJ20, author = {Haiyang Xue and Man Ho Au and Rupeng Yang and Bei Liang and Haodong Jiang}, title = {Compact Authenticated Key Exchange in the Quantum Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1282}, year = {2020}, url = {https://eprint.iacr.org/2020/1282}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/XueAYLJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WangWLX19, author = {Xueqing Wang and Biao Wang and Bei Liang and Rui Xue}, title = {A more compact multi-id identity-based {FHE} scheme in the standard model and its applications}, journal = {Sci. China Inf. Sci.}, volume = {62}, number = {3}, pages = {39101:1--39101:3}, year = {2019}, url = {https://doi.org/10.1007/s11432-017-9412-3}, doi = {10.1007/S11432-017-9412-3}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/WangWLX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/LiangM19, author = {Bei Liang and Aikaterini Mitrokotsa}, title = {Decentralised Functional Signatures}, journal = {Mob. Networks Appl.}, volume = {24}, number = {3}, pages = {934--946}, year = {2019}, url = {https://doi.org/10.1007/s11036-018-1149-1}, doi = {10.1007/S11036-018-1149-1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/LiangM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PanLLN19, author = {Dongxue Pan and Bei Liang and Hongda Li and Peifang Ni}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Witness Encryption with (Weak) Unique Decryption and Message Indistinguishability: Constructions and Applications}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {609--619}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_33}, doi = {10.1007/978-3-030-21548-4\_33}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PanLLN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/PanLLN19, author = {Dongxue Pan and Bei Liang and Hongda Li and Peifang Ni}, editor = {Feng Hao and Sushmita Ruj and Sourav Sen Gupta}, title = {Public-Coin Differing-Inputs Obfuscator for Hiding-Input Point Function with Multi-bit Output and Its Applications}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11898}, pages = {297--317}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35423-7\_15}, doi = {10.1007/978-3-030-35423-7\_15}, timestamp = {Wed, 20 Mar 2024 15:23:22 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/PanLLN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/LiangM19, author = {Bei Liang and Aikaterini Mitrokotsa}, editor = {Zhiqiang Lin and Charalampos Papamanthou and Michalis Polychronakis}, title = {Robust Distributed Pseudorandom Functions for mNP Access Structures}, booktitle = {Information Security - 22nd International Conference, {ISC} 2019, New York City, NY, USA, September 16-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11723}, pages = {107--126}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30215-3\_6}, doi = {10.1007/978-3-030-30215-3\_6}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/LiangM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BrunettaLM19, author = {Carlo Brunetta and Bei Liang and Aikaterini Mitrokotsa}, editor = {Zhiqiang Lin and Charalampos Papamanthou and Michalis Polychronakis}, title = {Code-Based Zero Knowledge {PRF} Arguments}, booktitle = {Information Security - 22nd International Conference, {ISC} 2019, New York City, NY, USA, September 16-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11723}, pages = {171--189}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30215-3\_9}, doi = {10.1007/978-3-030-30215-3\_9}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/BrunettaLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/PanLLN19, author = {Dongxue Pan and Bei Liang and Hongda Li and Peifang Ni}, editor = {Ron Steinfeld and Tsz Hon Yuen}, title = {Hierarchical Functional Signcryption: Notion and Construction}, booktitle = {Provable Security - 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1-4, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11821}, pages = {167--185}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31919-9\_10}, doi = {10.1007/978-3-030-31919-9\_10}, timestamp = {Tue, 07 May 2024 20:13:43 +0200}, biburl = {https://dblp.org/rec/conf/provsec/PanLLN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/BrunettaLM18, author = {Carlo Brunetta and Bei Liang and Aikaterini Mitrokotsa}, title = {Lattice-Based Simulatable VRFs: Challenges and Future Directions}, journal = {J. Internet Serv. Inf. Secur.}, volume = {8}, number = {4}, pages = {57--69}, year = {2018}, url = {https://doi.org/10.22667/JISIS.2018.11.30.057}, doi = {10.22667/JISIS.2018.11.30.057}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/BrunettaLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiLX18, author = {Shimin Li and Bei Liang and Rui Xue}, editor = {Willy Susilo and Guomin Yang}, title = {Private Functional Signatures: Definition and Construction}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {284--303}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_17}, doi = {10.1007/978-3-319-93638-3\_17}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiLX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/XueLLLH18, author = {Haiyang Xue and Xianhui Lu and Bao Li and Bei Liang and Jingnan He}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {Understanding and Constructing {AKE} via Double-Key Key Encapsulation Mechanism}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11273}, pages = {158--189}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03329-3\_6}, doi = {10.1007/978-3-030-03329-3\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/XueLLLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/WangLLX18, author = {Xin Wang and Bei Liang and Shimin Li and Rui Xue}, editor = {Liqun Chen and Mark Manulis and Steve A. Schneider}, title = {On Constructing Pairing-Free Identity-Based Encryptions}, booktitle = {Information Security - 21st International Conference, {ISC} 2018, Guildford, UK, September 9-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11060}, pages = {308--327}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99136-8\_17}, doi = {10.1007/978-3-319-99136-8\_17}, timestamp = {Tue, 20 Aug 2024 07:54:43 +0200}, biburl = {https://dblp.org/rec/conf/isw/WangLLX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/TsaloliLM18, author = {Georgia Tsaloli and Bei Liang and Aikaterini Mitrokotsa}, editor = {Joonsang Baek and Willy Susilo and Jongkil Kim}, title = {Verifiable Homomorphic Secret Sharing}, booktitle = {Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11192}, pages = {40--55}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01446-9\_3}, doi = {10.1007/978-3-030-01446-9\_3}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/TsaloliLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuXWTLY18, author = {Xiu Xu and Haiyang Xue and Kunpeng Wang and Song Tian and Bei Liang and Wei Yu}, title = {Strongly Secure Authenticated Key Exchange from Supersingular Isogeny}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {760}, year = {2018}, url = {https://eprint.iacr.org/2018/760}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuXWTLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XueLLLH18, author = {Haiyang Xue and Xianhui Lu and Bao Li and Bei Liang and Jingnan He}, title = {Understanding and Constructing {AKE} via Double-key Key Encapsulation Mechanism}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {817}, year = {2018}, url = {https://eprint.iacr.org/2018/817}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XueLLLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiangM17, author = {Bei Liang and Aikaterini Mitrokotsa}, editor = {Sihan Qing and Chris Mitchell and Liqun Chen and Dongmei Liu}, title = {Distributed Pseudorandom Functions for General Access Structures in {NP}}, booktitle = {Information and Communications Security - 19th International Conference, {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10631}, pages = {81--87}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-89500-0\_7}, doi = {10.1007/978-3-319-89500-0\_7}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LiangM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhangFLXL17, author = {Daode Zhang and Fuyang Fang and Bao Li and Haiyang Xue and Bei Liang}, editor = {Sihan Qing and Chris Mitchell and Liqun Chen and Dongmei Liu}, title = {Compact Hierarchical {IBE} from Lattices in the Standard Model}, booktitle = {Information and Communications Security - 19th International Conference, {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10631}, pages = {210--221}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-89500-0\_19}, doi = {10.1007/978-3-319-89500-0\_19}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ZhangFLXL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiangM17, author = {Bei Liang and Aikaterini Mitrokotsa}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation (Short Paper)}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {422--431}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_25}, doi = {10.1007/978-3-319-72359-4\_25}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LiangM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BrunettaDLM17, author = {Carlo Brunetta and Christos Dimitrakakis and Bei Liang and Aikaterini Mitrokotsa}, editor = {Phong Q. Nguyen and Jianying Zhou}, title = {A Differentially Private Encryption Scheme}, booktitle = {Information Security - 20th International Conference, {ISC} 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10599}, pages = {309--326}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69659-1\_17}, doi = {10.1007/978-3-319-69659-1\_17}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/BrunettaDLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiangM17, author = {Bei Liang and Aikaterini Mitrokotsa}, title = {Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {969}, year = {2017}, url = {http://eprint.iacr.org/2017/969}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiangM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/TangLNL15, author = {Fei Tang and Hongda Li and Qihua Niu and Bei Liang}, title = {Secure Mobile Agent from Leakage-Resilient Proxy Signatures}, journal = {Mob. Inf. Syst.}, volume = {2015}, pages = {901418:1--901418:12}, year = {2015}, url = {https://doi.org/10.1155/2015/901418}, doi = {10.1155/2015/901418}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/TangLNL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/LiangLC15, author = {Bei Liang and Hongda Li and Jinyong Chang}, editor = {Michael K. Reiter and David Naccache}, title = {Verifiable Random Functions from (Leveled) Multilinear Maps}, booktitle = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, pages = {129--143}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1\_10}, doi = {10.1007/978-3-319-26823-1\_10}, timestamp = {Mon, 02 Jan 2023 08:05:35 +0100}, biburl = {https://dblp.org/rec/conf/cans/LiangLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/NiuLHLT15, author = {Qihua Niu and Hongda Li and Guifang Huang and Bei Liang and Fei Tang}, editor = {Javier L{\'{o}}pez and Yongdong Wu}, title = {One-Round Witness Indistinguishability from Indistinguishability Obfuscation}, booktitle = {Information Security Practice and Experience - 11th International Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9065}, pages = {559--574}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17533-1\_38}, doi = {10.1007/978-3-319-17533-1\_38}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/NiuLHLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/LiangLC15, author = {Bei Liang and Hongda Li and Jinyong Chang}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {21--41}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_2}, doi = {10.1007/978-3-319-23318-5\_2}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/LiangLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/LiangLC15, author = {Bei Liang and Hongda Li and Jinyong Chang}, editor = {Man Ho Au and Atsuko Miyaji}, title = {Constrained Verifiable Random Functions from Indistinguishability Obfuscation}, booktitle = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9451}, pages = {43--60}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26059-4\_3}, doi = {10.1007/978-3-319-26059-4\_3}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/LiangLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiangZL14, author = {Bei Liang and Rui Zhang and Hongda Li}, editor = {Dongdai Lin and Moti Yung and Jianying Zhou}, title = {Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions}, booktitle = {Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8957}, pages = {193--206}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16745-9\_11}, doi = {10.1007/978-3-319-16745-9\_11}, timestamp = {Sat, 27 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiangZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/TangLNL14, author = {Fei Tang and Hongda Li and Qihua Niu and Bei Liang}, editor = {Xinyi Huang and Jianying Zhou}, title = {Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {418--432}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_31}, doi = {10.1007/978-3-319-06320-1\_31}, timestamp = {Tue, 20 Aug 2024 07:54:44 +0200}, biburl = {https://dblp.org/rec/conf/ispec/TangLNL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/TangLL14, author = {Fei Tang and Hongda Li and Bei Liang}, editor = {Sherman S. M. Chow and Jan Camenisch and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Attribute-Based Signatures for Circuits from Multilinear Maps}, booktitle = {Information Security - 17th International Conference, {ISC} 2014, Hong Kong, China, October 12-14, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8783}, pages = {54--71}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13257-0\_4}, doi = {10.1007/978-3-319-13257-0\_4}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/TangLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/TangLNL13, author = {Fei Tang and Hongda Li and Qihua Niu and Bei Liang}, title = {Leakage-Resilient Proxy Signatures}, booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013}, pages = {495--502}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INCoS.2013.94}, doi = {10.1109/INCOS.2013.94}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incos/TangLNL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/LiNL13, author = {Hongda Li and Qihua Niu and Bei Liang}, editor = {Javier L{\'{o}}pez and Xinyi Huang and Ravi S. Sandhu}, title = {Leakage-Resilient Zero-Knowledge Proofs of Knowledge for {NP}}, booktitle = {Network and System Security - 7th International Conference, {NSS} 2013, Madrid, Spain, June 3-4, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7873}, pages = {365--380}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38631-2\_27}, doi = {10.1007/978-3-642-38631-2\_27}, timestamp = {Tue, 20 Aug 2024 07:54:43 +0200}, biburl = {https://dblp.org/rec/conf/nss/LiNL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangLNL13, author = {Fei Tang and Hongda Li and Qihua Niu and Bei Liang}, title = {Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {785}, year = {2013}, url = {http://eprint.iacr.org/2013/785}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TangLNL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.