Attribute-based signatures for circuits from multilinear maps F Tang, H Li, B Liang International Conference on Information Security, 54-71, 2014 | 29 | 2014 |
Verifiable homomorphic secret sharing G Tsaloli, B Liang, A Mitrokotsa International Conference on Provable Security, 40-55, 2018 | 16 | 2018 |
Non-interactive, secure verifiable aggregation for decentralized, privacy-preserving learning C Brunetta, G Tsaloli, B Liang, G Banegas, A Mitrokotsa Australasian Conference on Information Security and Privacy, 510-528, 2021 | 15 | 2021 |
Efficient leakage-resilient signature schemes in the generic bilinear group model F Tang, H Li, Q Niu, B Liang International Conference on Information Security Practice and Experience …, 2014 | 15 | 2014 |
Understanding and constructing AKE via double-key key encapsulation mechanism H Xue, X Lu, B Li, B Liang, J He Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018 | 13 | 2018 |
: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning G Tsaloli, B Liang, C Brunetta, G Banegas, A Mitrokotsa International Conference on Information Security, 296-319, 2021 | 12 | 2021 |
The generic transformation from standard signatures to identity-based aggregate signatures B Liang, H Li, J Chang Information Security: 18th International Conference, ISC 2015, Trondheim …, 2015 | 9 | 2015 |
Code-based zero knowledge PRF arguments C Brunetta, B Liang, A Mitrokotsa Information Security: 22nd International Conference, ISC 2019, New York City …, 2019 | 7 | 2019 |
Statically aggregate verifiable random functions and application to e-lottery B Liang, G Banegas, A Mitrokotsa Cryptography 4 (4), 37, 2020 | 6 | 2020 |
Homomorphic signcryption with public plaintext‐result checkability S Li, B Liang, A Mitrokotsa, R Xue IET Information Security 15 (5), 333-350, 2021 | 5 | 2021 |
Decentralised functional signatures B Liang, A Mitrokotsa Mobile Networks and Applications 24, 934-946, 2019 | 5 | 2019 |
Lattice-Based Simulatable VRFs: Challenges and Future Directions. C Brunetta, B Liang, A Mitrokotsa J. Internet Serv. Inf. Secur. 8 (4), 57-69, 2018 | 5 | 2018 |
Strongly Secure Authenticated Key Exchange from Supersingular Isogeny. X Xu, H Xue, K Wang, S Tian, B Liang, W Yu IACR Cryptol. ePrint Arch. 2018, 760, 2018 | 5 | 2018 |
A differentially private encryption scheme C Brunetta, C Dimitrakakis, B Liang, A Mitrokotsa International Conference on Information Security, 309-326, 2017 | 4 | 2017 |
One-round witness indistinguishability from indistinguishability obfuscation Q Niu, H Li, G Huang, B Liang, F Tang International Conference on Information Security Practice and Experience …, 2015 | 4 | 2015 |
Compact authenticated key exchange in the quantum random oracle model H Xue, MH Au, R Yang, B Liang, H Jiang Cryptology ePrint Archive, 2020 | 3 | 2020 |
Hierarchical functional signcryption: notion and construction D Pan, B Liang, H Li, P Ni Provable Security: 13th International Conference, ProvSec 2019, Cairns, QLD …, 2019 | 3 | 2019 |
Witness encryption with (weak) unique decryption and message indistinguishability: constructions and applications D Pan, B Liang, H Li, P Ni Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019 | 3 | 2019 |
Private functional signatures: definition and construction S Li, B Liang, R Xue Australasian Conference on Information Security and Privacy, 284-303, 2018 | 3 | 2018 |
Fast and adaptively secure signatures in the random oracle model from indistinguishability obfuscation B Liang, A Mitrokotsa Cryptology ePrint Archive, 2017 | 3 | 2017 |