Takip et
shengli liu
shengli liu
Professor of Computer Science, Shanghai Jiao Tong University
sjtu.edu.cn üzerinde doğrulanmış e-posta adresine sahip
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Chosen-ciphertext secure proxy re-encryption without pairings
RH Deng, J Weng, S Liu, K Chen
International Conference on Cryptology and Network Security, 1-17, 2008
3652008
Attribute-based encryption with efficient verifiable outsourced decryption
B Qin, RH Deng, S Liu, S Ma
IEEE Transactions on Information Forensics and Security 10 (7), 1384-1393, 2015
2402015
Insight of the protection for data security under selective opening attacks
Z Huang, S Liu, X Mao, K Chen, J Li
Information Sciences 412, 223-241, 2017
1662017
ID-based one round authenticated tripartite key agreement protocol with pairings
F Zhang, S Liu, K Kim
Cryptology ePrint Archive, 2002
1302002
ID-based restrictive partially blind signatures and applications
X Chen, F Zhang, S Liu
Journal of Systems and Software 80 (2), 164-171, 2007
952007
Identity-based conditional proxy re-encryption
D Zhou, K Chen, S Liu, D Zheng
Chinese Journal of Electronics 22 (1), 61-66, 2013
772013
Server-aided revocable identity-based encryption
B Qin, RH Deng, Y Li, S Liu
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
712015
Leakage-resilient chosen-ciphertext secure public-key encryption from hash proof system and one-time lossy filter
B Qin, S Liu
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
702013
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks
S Liu, J Weng, Y Zhao
Cryptographers’ Track at the RSA Conference, 84-100, 2013
682013
A practical protocol for advantage distillation and information reconciliation
S Liu, HCA Van Tilborg, M Van Dijk
Designs, Codes and Cryptography 30, 39-62, 2003
662003
Efficient CCA-secure PKE from identity-based techniques
J Lai, RH Deng, S Liu, W Kou
Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA …, 2010
592010
Identity-based key-insulated signature with secure key-updates
J Weng, S Liu, K Chen, X Li
Information Security and Cryptology: Second SKLOIS Conference, Inscrypt 2006 …, 2006
532006
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
J Weng, RH Deng, S Liu, K Chen
Information Sciences 180 (24), 5077-5089, 2010
522010
Robustly reusable fuzzy extractor from standard assumptions
Y Wen, S Liu
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
502018
Reusable fuzzy extractor from the decisional Diffie–Hellman assumption
Y Wen, S Liu, S Han
Designs, Codes and Cryptography 86, 2495-2512, 2018
492018
Identity-based threshold key-insulated encryption without random oracles
J Weng, S Liu, K Chen, D Zheng, W Qiu
Cryptographers’ Track at the RSA Conference, 203-220, 2008
472008
Single hop detection of node clone attacks in mobile wireless sensor networks
Y Lou, Y Zhang, S Liu
Procedia Engineering 29, 2798-2803, 2012
452012
Authenticated key exchange and signatures with tight security in the standard model
S Han, T Jager, E Kiltz, S Liu, J Pan, D Riepel, S Schäge
Annual International Cryptology Conference, 670-700, 2021
402021
Identity-based encryption secure against selective opening chosen-ciphertext attack
J Lai, RH Deng, S Liu, J Weng, Y Zhao
Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014
392014
Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited
Z Huang, S Liu, B Qin
International Workshop on Public Key Cryptography, 369-385, 2013
382013
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20