Attribute-based signatures for circuits from multilinear maps F Tang, H Li, B Liang
International Conference on Information Security, 54-71, 2014
29 2014 Non-interactive, secure verifiable aggregation for decentralized, privacy-preserving learning C Brunetta, G Tsaloli, B Liang, G Banegas, A Mitrokotsa
Australasian Conference on Information Security and Privacy, 510-528, 2021
17 2021 Verifiable homomorphic secret sharing G Tsaloli, B Liang, A Mitrokotsa
International Conference on Provable Security, 40-55, 2018
16 2018 : Decentralized, Verifiable Secure Aggregation for Privacy-Preserving LearningG Tsaloli, B Liang, C Brunetta, G Banegas, A Mitrokotsa
International Conference on Information Security, 296-319, 2021
15 2021 Efficient leakage-resilient signature schemes in the generic bilinear group model F Tang, H Li, Q Niu, B Liang
International Conference on Information Security Practice and Experience …, 2014
15 2014 Understanding and constructing AKE via double-key key encapsulation mechanism H Xue, X Lu, B Li, B Liang, J He
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
13 2018 The generic transformation from standard signatures to identity-based aggregate signatures B Liang, H Li, J Chang
Information Security: 18th International Conference, ISC 2015, Trondheim …, 2015
9 2015 Code-based zero knowledge PRF arguments C Brunetta, B Liang, A Mitrokotsa
Information Security: 22nd International Conference, ISC 2019, New York City …, 2019
7 2019 Statically aggregate verifiable random functions and application to e-lottery B Liang, G Banegas, A Mitrokotsa
Cryptography 4 (4), 37, 2020
6 2020 Homomorphic signcryption with public plaintext‐result checkability S Li, B Liang, A Mitrokotsa, R Xue
IET Information Security 15 (5), 333-350, 2021
5 2021 Decentralised functional signatures B Liang, A Mitrokotsa
Mobile Networks and Applications 24, 934-946, 2019
5 2019 Lattice-Based Simulatable VRFs: Challenges and Future Directions. C Brunetta, B Liang, A Mitrokotsa
J. Internet Serv. Inf. Secur. 8 (4), 57-69, 2018
5 2018 Strongly Secure Authenticated Key Exchange from Supersingular Isogeny. X Xu, H Xue, K Wang, S Tian, B Liang, W Yu
IACR Cryptol. ePrint Arch. 2018, 760, 2018
5 2018 A differentially private encryption scheme C Brunetta, C Dimitrakakis, B Liang, A Mitrokotsa
International Conference on Information Security, 309-326, 2017
4 2017 One-round witness indistinguishability from indistinguishability obfuscation Q Niu, H Li, G Huang, B Liang, F Tang
International Conference on Information Security Practice and Experience …, 2015
4 2015 Compact authenticated key exchange in the quantum random oracle model H Xue, MH Au, R Yang, B Liang, H Jiang
Cryptology ePrint Archive, 2020
3 2020 Hierarchical functional signcryption: notion and construction D Pan, B Liang, H Li, P Ni
Provable Security: 13th International Conference, ProvSec 2019, Cairns, QLD …, 2019
3 2019 Witness encryption with (weak) unique decryption and message indistinguishability: constructions and applications D Pan, B Liang, H Li, P Ni
Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019
3 2019 Private functional signatures: definition and construction S Li, B Liang, R Xue
Australasian Conference on Information Security and Privacy, 284-303, 2018
3 2018 Fast and adaptively secure signatures in the random oracle model from indistinguishability obfuscation B Liang, A Mitrokotsa
Cryptology ePrint Archive, 2017
3 2017