default search action
Sherman S. M. Chow
Person information
- affiliation: The Chinese University of Hong Kong, Sha Tin, Hong Kong
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c139]Jiafan Wang, Sherman S. M. Chow:
Unus pro omnibus: Multi-Client Searchable Encryption via Access Control. NDSS 2024 - [c138]Harry W. H. Wong, Jack P. K. Ma, Sherman S. M. Chow:
Secure Multiparty Computation of Threshold Signatures Made More Efficient. NDSS 2024 - [c137]Zongyang Zhang, Weihan Li, Yanpei Guo, Kexin Shi, Sherman S. M. Chow, Ximeng Liu, Jin Dong:
Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing. USENIX Security Symposium 2024 - [i40]Hoover H. F. Yin, Jie Wang, Sherman S. M. Chow:
Distributionally Robust Degree Optimization for BATS Codes. CoRR abs/2405.08194 (2024) - 2023
- [j39]Minxin Du, Peipei Jiang, Qian Wang, Sherman S. M. Chow, Lingchen Zhao:
Shielding Graph for eXact Analytics With SGX. IEEE Trans. Dependable Secur. Comput. 20(6): 5102-5112 (2023) - [c136]Huangting Wu, Sherman S. M. Chow:
Anonymous (Hierarchical) Identity-Based Encryption from Broader Assumptions. ACNS 2023: 366-395 - [c135]Sherman S. M. Chow, Jack P. K. Ma, Tsz Hon Yuen:
Scored Anonymous Credentials. ACNS 2023: 484-515 - [c134]Yu Zheng, Qizhi Zhang, Sherman S. M. Chow, Yuxiang Peng, Sijun Tan, Lichun Li, Shan Yin:
Secure Softmax/Sigmoid for Machine-learning Computation. ACSAC 2023: 463-476 - [c133]Yu Zheng, Wei Song, Minxin Du, Sherman S. M. Chow, Qian Lou, Yongjun Zhao, Xiuhua Wang:
Cryptography-Inspired Federated Learning for Generative Adversarial Networks and Meta Learning. ADMA (2) 2023: 393-407 - [c132]Minxin Du, Xiang Yue, Sherman S. M. Chow, Tianhao Wang, Chenyu Huang, Huan Sun:
DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass. CCS 2023: 2665-2679 - [c131]Sherman S. M. Chow, Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo:
On Sustainable Ring-Based Anonymous Systems. CSF 2023: 568-583 - [c130]Jack P. K. Ma, Sherman S. M. Chow:
SMART Credentials in the Multi-queue of Slackness (or Secure Management of Anonymous Reputation Traits without Global Halting). EuroS&P 2023: 896-912 - [c129]Shuyang Tang, Sherman S. M. Chow:
Towards Decentralized Adaptive Control of Cryptocurrency Liquidity via Auction. ICDCS 2023: 910-919 - [c128]Cheuk Ting Li, Sherman S. M. Chow:
Unconditionally Secure Access Control Encryption. ISIT 2023: 648-653 - [c127]Harry W. H. Wong, Jack P. K. Ma, Hoover H. F. Yin, Sherman S. M. Chow:
Real Threshold ECDSA. NDSS 2023 - [c126]Harry W. H. Wong, Jack P. K. Ma, Hoover H. F. Yin, Sherman S. M. Chow:
How (Not) to Build Threshold EdDSA. RAID 2023: 123-134 - [c125]Lucien K. L. Ng, Sherman S. M. Chow:
SoK: Cryptographic Neural-Network Computation. SP 2023: 497-514 - [c124]Minxin Du, Xiang Yue, Sherman S. M. Chow, Huan Sun:
Sanitizing Sentence Embeddings (and Labels) for Local Differential Privacy. WWW 2023: 2349-2359 - [i39]Cheuk Ting Li, Sherman S. M. Chow:
Unconditionally Secure Access Control Encryption. CoRR abs/2305.07593 (2023) - [i38]Minxin Du, Xiang Yue, Sherman S. M. Chow, Tianhao Wang, Chenyu Huang, Huan Sun:
DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass. CoRR abs/2309.06746 (2023) - [i37]Sherman S. M. Chow, Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo:
On Sustainable Ring-based Anonymous Systems. IACR Cryptol. ePrint Arch. 2023: 743 (2023) - 2022
- [j38]Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow:
Non-Malleable Functions and their Applications. J. Cryptol. 35(2): 11 (2022) - [j37]Jiafan Wang, Sherman S. M. Chow:
Forward and Backward-Secure Range-Searchable Symmetric Encryption. Proc. Priv. Enhancing Technol. 2022(1): 28-48 (2022) - [j36]Minghui Li, Sherman S. M. Chow, Shengshan Hu, Yuejing Yan, Chao Shen, Qian Wang:
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions. IEEE Trans. Dependable Secur. Comput. 19(3): 1592-1604 (2022) - [c123]Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow:
Don't Tamper with Dual System Encryption - Beyond Polynomial Related-Key Security of IBE. ACNS 2022: 419-439 - [c122]Jack P. K. Ma, Sherman S. M. Chow:
Secure-Computation-Friendly Private Set Intersection from Oblivious Compact Graph Evaluation. AsiaCCS 2022: 1086-1097 - [c121]Jiafan Wang, Sherman S. M. Chow:
Omnes pro uno: Practical Multi-Writer Encrypted Database. USENIX Security Symposium 2022: 2371-2388 - [i36]Shaoying Cai, Yingjiu Li, Changshe Ma, Sherman S. M. Chow, Robert H. Deng:
Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication. CoRR abs/2210.10244 (2022) - 2021
- [j35]Asma Aloufi, Peizhao Hu, Hang Liu, Sherman S. M. Chow, Kim-Kwang Raymond Choo:
Universal location referencing and homomorphic evaluation of geospatial query. Comput. Secur. 102: 102137 (2021) - [j34]Sherman S. M. Chow, Kim-Kwang Raymond Choo, Jinguang Han:
Editorial for accountability and privacy issues in blockchain and cryptocurrency. Future Gener. Comput. Syst. 114: 647-648 (2021) - [j33]Yongjun Zhao, Sherman S. M. Chow:
Updatable Block-Level Message-Locked Encryption. IEEE Trans. Dependable Secur. Comput. 18(4): 1620-1631 (2021) - [j32]Asma Aloufi, Peizhao Hu, Harry W. H. Wong, Sherman S. M. Chow:
Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption. IEEE Trans. Dependable Secur. Comput. 18(4): 1821-1835 (2021) - [c120]Lucien K. L. Ng, Sherman S. M. Chow, Anna P. Y. Woo, Donald P. H. Wong, Yongjun Zhao:
Goten: GPU-Outsourcing Trusted Execution of Neural Network Training. AAAI 2021: 14876-14883 - [c119]Xiang Yue, Minxin Du, Tianhao Wang, Yaliang Li, Huan Sun, Sherman S. M. Chow:
Differential Privacy for Text Analytics via Natural Text Sanitization. ACL/IJCNLP (Findings) 2021: 3853-3866 - [c118]Xiuhua Wang, Harry W. H. Wong, Sherman S. M. Chow:
Access Control Encryption from Group Encryption. ACNS (1) 2021: 417-441 - [c117]Sherman S. M. Chow, Ming Li, Yongjun Zhao, Wenqiang Jin:
Sipster: Settling IOU Privately and Quickly with Smart Meters. ACSAC 2021: 219-234 - [c116]Jiafan Wang, Sherman S. M. Chow:
Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-maps - (A Slot in Need is a Slot Indeed). DBSec 2021: 63-83 - [c115]Lucien K. L. Ng, Sherman S. M. Chow, Donald P. H. Wong, Anna P. Y. Woo:
LDSP: Shopping with Cryptocurrency Privately and Quickly under Leadership. ICDCS 2021: 261-271 - [c114]Jack P. K. Ma, Raymond K. H. Tai, Yongjun Zhao, Sherman S. M. Chow:
Let's Stride Blindfolded in a Forest: Sublinear Multi-Client Decision Trees Evaluation. NDSS 2021 - [c113]Xiuhua Wang, Sherman S. M. Chow:
Cross-Domain Access Control Encryption: Arbitrary-policy, Constant-size, Efficient. SP 2021: 748-761 - [c112]Lucien K. L. Ng, Sherman S. M. Chow:
GForce: GPU-Friendly Oblivious and Rapid Neural Network Inference. USENIX Security Symposium 2021: 2147-2164 - [i35]Xiang Yue, Minxin Du, Tianhao Wang, Yaliang Li, Huan Sun, Sherman S. M. Chow:
Differential Privacy for Text Analytics via Natural Text Sanitization. CoRR abs/2106.01221 (2021) - 2020
- [c111]Sherman S. M. Chow, Katharina Fech, Russell W. F. Lai, Giulio Malavolta:
Multi-client Oblivious RAM with Poly-logarithmic Communication. ASIACRYPT (2) 2020: 160-190 - [c110]Jiafan Wang, Minxin Du, Sherman S. M. Chow:
Stargazing in the Dark: Secure Skyline Queries with SGX. DASFAA (3) 2020: 322-338 - [c109]Harry W. H. Wong, Jack P. K. Ma, Donald P. H. Wong, Lucien K. L. Ng, Sherman S. M. Chow:
Learning Model with Error - Exposing the Hidden Model of BAYHENN. IJCAI 2020: 3529-3535 - [i34]Minghui Li, Sherman S. M. Chow, Shengshan Hu, Yuejing Yan, Minxin Du, Zhibo Wang:
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions. CoRR abs/2002.10944 (2020) - [i33]Sherman S. M. Chow, Katharina Fech, Russell W. F. Lai, Giulio Malavolta:
Multi-Client Oblivious RAM with Poly-Logarithmic Communication. IACR Cryptol. ePrint Arch. 2020: 1551 (2020)
2010 – 2019
- 2019
- [j31]Zhiqiang Liu, Shuyang Tang, Sherman S. M. Chow, Zhen Liu, Yu Long:
Fork-free hybrid consensus with flexible Proof-of-Activity. Future Gener. Comput. Syst. 96: 515-524 (2019) - [j30]Russell W. F. Lai, Kam-Fung Cheung, Sherman S. M. Chow, Anthony Man-Cho So:
Another Look at Anonymous Communication. IEEE Trans. Dependable Secur. Comput. 16(5): 731-742 (2019) - [j29]Lejla Batina, Sherman S. M. Chow, Gerhard P. Hancke, Zhe Liu:
Introduction to the Special Issue on Cryptographic Engineering for Internet of Things: Security Foundations, Lightweight Solutions, and Attacks. ACM Trans. Embed. Comput. Syst. 18(3): 22:1-22:3 (2019) - [c108]Shuyang Tang, Sherman S. M. Chow, Zhiqiang Liu, Joseph K. Liu:
Fast-to-Finalize Nakamoto-Like Consensus. ACISP 2019: 271-288 - [c107]Sherman S. M. Chow:
Can We Securely Outsource Big Data Analytics with Lightweight Cryptography? SCC@AsiaCCS 2019: 1 - [c106]Tao Zhang, Huangting Wu, Sherman S. M. Chow:
Structure-Preserving Certificateless Encryption and Its Application. CT-RSA 2019: 1-22 - [c105]Sherman S. M. Chow, Alexander Russell, Qiang Tang, Moti Yung, Yongjun Zhao, Hong-Sheng Zhou:
Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog. Public Key Cryptography (1) 2019: 221-251 - [i32]Jiafan Wang, Sherman S. M. Chow:
Forward and Backward-Secure Range-Searchable Symmetric Encryption. IACR Cryptol. ePrint Arch. 2019: 497 (2019) - [i31]Asma Aloufi, Peizhao Hu, Harry W. H. Wong, Sherman S. M. Chow:
Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2019: 819 (2019) - [i30]Asma Aloufi, Peizhao Hu, Hang Liu, Sherman S. M. Chow:
Universal Location Referencing and Homomorphic Evaluation of Geospatial Query. IACR Cryptol. ePrint Arch. 2019: 820 (2019) - 2018
- [j28]Jin Li, Xiaofeng Chen, Sherman S. M. Chow, Qiong Huang, Duncan S. Wong, Zheli Liu:
Multi-authority fine-grained access control with accountability and its application in cloud. J. Netw. Comput. Appl. 112: 89-96 (2018) - [j27]Qian Wang, Meiqi He, Minxin Du, Sherman S. M. Chow, Russell W. F. Lai, Qin Zou:
Searchable Encryption over Feature-Rich Data. IEEE Trans. Dependable Secur. Comput. 15(3): 496-510 (2018) - [j26]Shengshan Hu, Minghui Li, Qian Wang, Sherman S. M. Chow, Minxin Du:
Outsourced Biometric Identification With Privacy. IEEE Trans. Inf. Forensics Secur. 13(10): 2448-2463 (2018) - [c104]Russell W. F. Lai, Raymond K. H. Tai, Harry W. H. Wong, Sherman S. M. Chow:
Multi-key Homomorphic Signatures Unforgeable Under Insider Corruption. ASIACRYPT (2) 2018: 465-492 - [c103]Shuyang Tang, Sherman S. M. Chow:
Systematic Market Control of Cryptocurrency Inflations. BCC@AsiaCCS 2018: 61-63 - [c102]Sherman S. M. Chow:
Privacy-Preserving Machine Learning. FCS 2018: 3-6 - [c101]Minghui Li, Mingxue Zhang, Qian Wang, Sherman S. M. Chow, Minxin Du, Yanjiao Chen, Chenliang Li:
InstantCryptoGram: Secure Image Retrieval Service. INFOCOM 2018: 2222-2230 - [c100]Sherman S. M. Chow, Ziliang Lai, Chris Liu, Eric Lo, Yongjun Zhao:
Sharding Blockchain. iThings/GreenCom/CPSCom/SmartData 2018: 1665 - [c99]Weizhi Meng, Jianfeng Wang, Xianmin Wang, Joseph K. Liu, Zuoxia Yu, Jin Li, Yongjun Zhao, Sherman S. M. Chow:
Position Paper on Blockchain Technology: Smart Contract and Applications. NSS 2018: 474-483 - [c98]Russell W. F. Lai, Christoph Egger, Manuel Reinert, Sherman S. M. Chow, Matteo Maffei, Dominique Schröder:
Simple Password-Hardened Encryption Services. USENIX Security Symposium 2018: 1405-1421 - [c97]Yongjun Zhao, Sherman S. M. Chow:
Can You Find The One for Me? WPES@CCS 2018: 54-65 - [e4]Srdjan Capkun, Sherman S. M. Chow:
Cryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers. Lecture Notes in Computer Science 11261, Springer 2018, ISBN 978-3-030-02640-0 [contents] - [i29]Yongjun Zhao, Sherman S. M. Chow:
Can you find the one for me? Privacy-Preserving Matchmaking via Threshold PSI. IACR Cryptol. ePrint Arch. 2018: 184 (2018) - [i28]Peizhao Hu, Sherman S. M. Chow, Asma Aloufi:
Geosocial Query with User-Controlled Privacy. IACR Cryptol. ePrint Arch. 2018: 304 (2018) - 2017
- [j25]Yongjun Zhao, Sherman S. M. Chow:
Are you The One to Share? Secret Transfer with Access Structure. Proc. Priv. Enhancing Technol. 2017(1): 149-169 (2017) - [c96]Russell W. F. Lai, Sherman S. M. Chow:
Forward-Secure Searchable Encryption on Labeled Bipartite Graphs. ACNS 2017: 478-497 - [c95]Yongjun Zhao, Sherman S. M. Chow:
Updatable Block-Level Message-Locked Encryption. AsiaCCS 2017: 449-460 - [c94]Raymond K. H. Tai, Jack P. K. Ma, Yongjun Zhao, Sherman S. M. Chow:
Privacy-Preserving Decision Trees Evaluation via Linear Functions. ESORICS (2) 2017: 494-512 - [c93]Sherman S. M. Chow, Haibin Zhang, Tao Zhang:
Real Hidden Identity-Based Signatures. Financial Cryptography 2017: 21-38 - [c92]Jiafan Wang, Sherman S. M. Chow:
Secure Strategyproof Ascending-Price Spectrum Auction. PAC 2017: 96-106 - [c91]Russell W. F. Lai, Christoph Egger, Dominique Schröder, Sherman S. M. Chow:
Phoenix: Rebirth of a Cryptographic Password-Hardening Service. USENIX Security Symposium 2017: 899-916 - [c90]Peizhao Hu, Sherman S. M. Chow, Asma Aloufi:
Geosocial query with user-controlled privacy. WISEC 2017: 163-172 - [i27]Russell W. F. Lai, Tao Zhang, Sherman S. M. Chow, Dominique Schröder:
Efficient Sanitizable Signatures without Random Oracles. IACR Cryptol. ePrint Arch. 2017: 268 (2017) - [i26]Shuyang Tang, Zhiqiang Liu, Sherman S. M. Chow, Zhen Liu, Yu Long:
Forking-Free Hybrid Consensus with Generalized Proof-of-Activity. IACR Cryptol. ePrint Arch. 2017: 367 (2017) - [i25]Russell W. F. Lai, Sherman S. M. Chow:
Forward-Secure Searchable Encryption on Labeled Bipartite Graphs. IACR Cryptol. ePrint Arch. 2017: 659 (2017) - 2016
- [j24]Joseph K. Liu, Sze Ling Yeo, Wun-She Yap, Sherman S. M. Chow, Duncan S. Wong, Willy Susilo:
Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol. Comput. J. 59(7): 945-954 (2016) - [j23]Sherman S. M. Chow, Urs Hengartner, Joseph K. Liu, Kui Ren:
Special Issue on Security and Privacy in Mobile Clouds. Pervasive Mob. Comput. 28: 100-101 (2016) - [j22]Fei Chen, Tao Xiang, Yuanyuan Yang, Sherman S. M. Chow:
Secure Cloud Storage Meets with Secure Network Coding. IEEE Trans. Computers 65(6): 1936-1948 (2016) - [c89]Sherman S. M. Chow:
Functional Credentials for Internet of Things. IoTPTS@AsiaCCS 2016: 1 - [c88]Tao Zhang, Sherman S. M. Chow, Jinyuan Sun:
Password-Controlled Encryption with Accountable Break-Glass Access. AsiaCCS 2016: 235-246 - [c87]Zhe Zhou, Tao Zhang, Sherman S. M. Chow, Yupeng Zhang, Kehuan Zhang:
Efficient Authenticated Multi-Pattern Matching. AsiaCCS 2016: 593-604 - [c86]Cong Zhang, David Cash, Xiuhua Wang, Xiaoqi Yu, Sherman S. M. Chow:
Combiners for Chosen-Ciphertext Security. COCOON 2016: 257-268 - [c85]Russell W. F. Lai, Tao Zhang, Sherman S. M. Chow, Dominique Schröder:
Efficient Sanitizable Signatures Without Random Oracles. ESORICS (1) 2016: 363-380 - [c84]Yu-Chi Chen, Sherman S. M. Chow, Kai-Min Chung, Russell W. F. Lai, Wei-Kai Lin, Hong-Sheng Zhou:
Cryptography for Parallel RAM from Indistinguishability Obfuscation. ITCS 2016: 179-190 - [c83]Tao Zhang, Sherman S. M. Chow, Zhe Zhou, Ming Li:
Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization. IWSEC 2016: 215-233 - [c82]Russell W. F. Lai, Henry K. F. Cheung, Sherman S. M. Chow, Anthony Man-Cho So:
Another Look at Anonymous Communication - Security and Modular Constructions. Mycrypt 2016: 56-82 - [c81]Sherman S. M. Chow, Russell W. F. Lai, Xiuhua Wang, Yongjun Zhao:
Privacy Preserving Credit Systems. NSS 2016: 184-199 - [c80]Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow:
Non-Malleable Functions and Their Applications. Public Key Cryptography (2) 2016: 386-416 - [c79]Yongjun Zhao, Sherman S. M. Chow:
Towards Proofs of Ownership Beyond Bounded Leakage. ProvSec 2016: 340-350 - [c78]Sherman S. M. Chow:
A Framework of Multi-Authority Attribute-Based Encryption with Outsourcing and Revocation. SACMAT 2016: 215-226 - [c77]Tao Zhang, Xiuhua Wang, Sherman S. M. Chow:
Privacy-Preserving Multi-pattern Matching. SecureComm 2016: 199-218 - [c76]Russell W. F. Lai, Sherman S. M. Chow:
Parallel and Dynamic Structured Encryption. SecureComm 2016: 219-238 - [c75]Shengshan Hu, Qian Wang, Jingjun Wang, Sherman S. M. Chow, Qin Zou:
Securing Fast Learning! Ridge Regression over Encrypted Big Data. Trustcom/BigDataSE/ISPA 2016: 19-26 - [i24]Russell W. F. Lai, Raymond K. H. Tai, Harry W. H. Wong, Sherman S. M. Chow:
A Zoo of Homomorphic Signatures: Multi-Key and Key-Homomorphism. IACR Cryptol. ePrint Arch. 2016: 834 (2016) - 2015
- [j21]Ying-Kai Tang, Sherman S. M. Chow, Joseph K. Liu:
Comments on 'Efficient Revocable Certificateless Encryption Secure in the Standard Model'. Comput. J. 58(4): 779-781 (2015) - [j20]Zongyang Zhang, Sherman S. M. Chow, Zhenfu Cao:
Post-challenge leakage in public-key encryption. Theor. Comput. Sci. 572: 25-49 (2015) - [j19]Yujue Wang, Duncan S. Wong, Qianhong Wu, Sherman S. M. Chow, Bo Qin, Jianwei Liu, Yong Ding:
Practical (fully) distributed signatures provably secure in the standard model. Theor. Comput. Sci. 595: 143-158 (2015) - [j18]Joseph K. Liu, Cheng-Kang Chu, Sherman S. M. Chow, Xinyi Huang, Man Ho Au, Jianying Zhou:
Time-Bound Anonymous Authentication for Roaming Networks. IEEE Trans. Inf. Forensics Secur. 10(1): 178-189 (2015) - [c74]Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow, Siu-Ming Yiu:
Related Randomness Attacks for Public Key Cryptosystems. AsiaCCS 2015: 215-223 - [c73]Yongjun Zhao, Sherman S. M. Chow:
Privacy Preserving Collaborative Filtering from Asymmetric Randomized Encoding. Financial Cryptography 2015: 459-477 - [c72]Russell W. F. Lai, Sherman S. M. Chow:
Structured Encryption with Non-interactive Updates and Parallel Traversal. ICDCS 2015: 776-777 - [c71]Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao:
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model. ProvSec 2015: 435-454 - [e3]Feng Bao, Steven Miller, Sherman S. M. Chow, Danfeng Yao:
Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April 14, 2015. ACM 2015, ISBN 978-1-4503-3447-1 [contents] - [i23]Yu-Chi Chen, Sherman S. M. Chow, Kai-Min Chung, Russell W. F. Lai, Wei-Kai Lin, Hong-Sheng Zhou:
Computation-Trace Indistinguishability Obfuscation and its Applications. IACR Cryptol. ePrint Arch. 2015: 406 (2015) - [i22]Yongjun Zhao, Sherman S. M. Chow:
Are you The One to Share? Secret Transfer with Access Structure. IACR Cryptol. ePrint Arch. 2015: 929 (2015) - [i21]Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow:
Non-Malleable Functions and Their Applications. IACR Cryptol. ePrint Arch. 2015: 1253 (2015) - 2014
- [j17]Yue Tong, Jinyuan Sun, Sherman S. M. Chow, Pan Li:
Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability. IEEE J. Biomed. Health Informatics 18(2): 419-429 (2014) - [j16]Cheng-Kang Chu, Sherman S. M. Chow, Wen-Guey Tzeng, Jianying Zhou, Robert H. Deng:
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage. IEEE Trans. Parallel Distributed Syst. 25(2): 468-477 (2014) - [c70]Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao:
All-but-One Dual Projective Hashing and Its Applications. ACNS 2014: 181-198 - [c69]Hua Deng, Qianhong Wu, Bo Qin, Sherman S. M. Chow, Josep Domingo-Ferrer, Wenchang Shi:
Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data. AsiaCCS 2014: 425-434 - [c68]Tao Zhang, Sherman S. M. Chow:
Security of Direct Anonymous Authentication Using TPM 2.0 Signature - A Possible Implementation Flaw. Inscrypt 2014: 37-48 - [c67]Russell W. F. Lai, Henry K. F. Cheung, Sherman S. M. Chow:
Trapdoors for Ideal Lattices with Applications. Inscrypt 2014: 239-256 - [c66]Boyang Wang, Ming Li, Sherman S. M. Chow, Hui Li:
A tale of two clouds: Computing on data encrypted under multiple keys. CNS 2014: 337-345 - [c65]