Tsz Hon Yuen
Tsz Hon Yuen
Verified email at cs.hku.hk - Homepage
TitleCited byYear
ID-based ring signature scheme secure in the standard model
MH Au, JK Liu, TH Yuen, DS Wong
International Workshop on Security, 1-16, 2006
1092006
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles
Z Liu, Z Cao, Q Huang, DS Wong, TH Yuen
European Symposium on Research in Computer Security, 278-297, 2011
1082011
Identity-Based Encryption Resilient to Continual Auxiliary Leakage
T Yuen, S Chow, Y Zhang, S Yiu
Advances in Cryptology–EUROCRYPT 2012, 117-134, 2012
932012
Certificate based (linkable) ring signature
MH Au, JK Liu, W Susilo, TH Yuen
International Conference on Information Security Practice and Experience, 79-92, 2007
932007
Ring signatures without random oracles
SSM Chow, VK Wei, JK Liu, TH Yuen
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
932006
Improvements on an authentication scheme for vehicular sensor networks
JK Liu, TH Yuen, MH Au, W Susilo
Expert Systems with Applications 41 (5), 2559-2564, 2014
682014
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero
SF Sun, MH Au, JK Liu, TH Yuen
European Symposium on Research in Computer Security, 456-474, 2017
652017
Fast and proven secure blind identity-based signcryption from pairings
TH Yuen, VK Wei
Cryptographers’ Track at the RSA Conference, 305-322, 2005
652005
Constant-size ID-based linkable and revocable-iff-linked ring signature
MH Au, JK Liu, W Susilo, TH Yuen
International Conference on Cryptology in India, 364-378, 2006
462006
An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries
SF Sun, JK Liu, A Sakzad, R Steinfeld, TH Yuen
European Symposium on Research in Computer Security, 154-172, 2016
432016
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction
MH Au, JK Liu, W Susilo, TH Yuen
Theoretical Computer Science 469, 1-14, 2013
432013
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction
MH Au, JK Liu, W Susilo, TH Yuen
Theoretical Computer Science 469, 1-14, 2013
432013
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction
MH Au, JK Liu, W Susilo, TH Yuen
Theoretical Computer Science 469, 1-14, 2013
432013
Escrowed linkability of ring signatures and its applications
S Chow, W Susilo, T Yuen
Progress in Cryptology-VIETCRYPT 2006, 175-192, 2006
432006
Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks
TH Yuen, Y Zhang, SM Yiu, JK Liu
European Symposium on Research in Computer Security, 130-147, 2014
402014
Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks
TH Yuen, Y Zhang, SM Yiu, JK Liu
European Symposium on Research in Computer Security, 130-147, 2014
402014
Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles.
MH Au, JK Liu, TH Yuen, DS Wong
IACR Cryptology ePrint Archive 2006, 368, 2006
392006
Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles.
TH Yuen, VK Wei
IACR Cryptology ePrint Archive 2005, 412, 2005
392005
Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles.
TH Yuen, VK Wei
IACR Cryptology ePrint Archive 2005, 412, 2005
392005
Group signature where group manager, members and open authority are identity-based
VK Wei, TH Yuen, F Zhang
Australasian Conference on Information Security and Privacy, 468-480, 2005
342005
The system can't perform the operation now. Try again later.
Articles 1–20