关注
Bei Liang
Bei Liang
Chalmers Uniiversity of Technology
在 chalmers.se 的电子邮件经过验证
标题
引用次数
引用次数
年份
Attribute-based signatures for circuits from multilinear maps
F Tang, H Li, B Liang
International Conference on Information Security, 54-71, 2014
292014
Verifiable homomorphic secret sharing
G Tsaloli, B Liang, A Mitrokotsa
International Conference on Provable Security, 40-55, 2018
162018
Non-interactive, secure verifiable aggregation for decentralized, privacy-preserving learning
C Brunetta, G Tsaloli, B Liang, G Banegas, A Mitrokotsa
Australasian Conference on Information Security and Privacy, 510-528, 2021
152021
Efficient leakage-resilient signature schemes in the generic bilinear group model
F Tang, H Li, Q Niu, B Liang
International Conference on Information Security Practice and Experience …, 2014
152014
Understanding and constructing AKE via double-key key encapsulation mechanism
H Xue, X Lu, B Li, B Liang, J He
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
132018
: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning
G Tsaloli, B Liang, C Brunetta, G Banegas, A Mitrokotsa
International Conference on Information Security, 296-319, 2021
122021
The generic transformation from standard signatures to identity-based aggregate signatures
B Liang, H Li, J Chang
Information Security: 18th International Conference, ISC 2015, Trondheim …, 2015
92015
Code-based zero knowledge PRF arguments
C Brunetta, B Liang, A Mitrokotsa
Information Security: 22nd International Conference, ISC 2019, New York City …, 2019
72019
Statically aggregate verifiable random functions and application to e-lottery
B Liang, G Banegas, A Mitrokotsa
Cryptography 4 (4), 37, 2020
62020
Homomorphic signcryption with public plaintext‐result checkability
S Li, B Liang, A Mitrokotsa, R Xue
IET Information Security 15 (5), 333-350, 2021
52021
Decentralised functional signatures
B Liang, A Mitrokotsa
Mobile Networks and Applications 24, 934-946, 2019
52019
Lattice-Based Simulatable VRFs: Challenges and Future Directions.
C Brunetta, B Liang, A Mitrokotsa
J. Internet Serv. Inf. Secur. 8 (4), 57-69, 2018
52018
Strongly Secure Authenticated Key Exchange from Supersingular Isogeny.
X Xu, H Xue, K Wang, S Tian, B Liang, W Yu
IACR Cryptol. ePrint Arch. 2018, 760, 2018
52018
A differentially private encryption scheme
C Brunetta, C Dimitrakakis, B Liang, A Mitrokotsa
International Conference on Information Security, 309-326, 2017
42017
One-round witness indistinguishability from indistinguishability obfuscation
Q Niu, H Li, G Huang, B Liang, F Tang
International Conference on Information Security Practice and Experience …, 2015
42015
Compact authenticated key exchange in the quantum random oracle model
H Xue, MH Au, R Yang, B Liang, H Jiang
Cryptology ePrint Archive, 2020
32020
Hierarchical functional signcryption: notion and construction
D Pan, B Liang, H Li, P Ni
Provable Security: 13th International Conference, ProvSec 2019, Cairns, QLD …, 2019
32019
Witness encryption with (weak) unique decryption and message indistinguishability: constructions and applications
D Pan, B Liang, H Li, P Ni
Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019
32019
Private functional signatures: definition and construction
S Li, B Liang, R Xue
Australasian Conference on Information Security and Privacy, 284-303, 2018
32018
Fast and adaptively secure signatures in the random oracle model from indistinguishability obfuscation
B Liang, A Mitrokotsa
Cryptology ePrint Archive, 2017
32017
系统目前无法执行此操作,请稍后再试。
文章 1–20