Leakage-resilient chosen-ciphertext secure public-key encryption from hash proof system and one-time lossy filter. Zbl 1326.94117
Qin, Baodong; Liu, Shengli |
|
2013
|
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks. Zbl 1312.94071
Liu, Shengli; Weng, Jian; Zhao, Yunlei |
|
2013
|
Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited. Zbl 1314.94075
Huang, Zhengan; Liu, Shengli; Qin, Baodong |
|
2013
|
Chosen-ciphertext secure proxy re-encryption without pairings. Zbl 1362.94026
Deng, Robert H.; Weng, Jian; Liu, Shengli; Chen, Kefei |
|
2008
|
Simulation-based selective opening CCA security for PKE from key encapsulation mechanisms. Zbl 1319.94078
Liu, Shengli; Paterson, Kenneth G. |
|
2015
|
Continuous non-malleable key derivation and its application to related-key security. Zbl 1345.94085
Qin, Baodong; Liu, Shengli; Yuen, Tsz Hon; Deng, Robert H.; Chen, Kefei |
|
2015
|
Leakage-flexible CCA-secure public-key encryption: simple construction and free of pairing. Zbl 1335.94074
Qin, Baodong; Liu, Shengli |
|
2014
|
Server-aided revocable identity-based encryption. Zbl 1499.68057
Qin, Baodong; Deng, Robert H.; Li, Yingjiu; Liu, Shengli |
|
2015
|
Two-pass authenticated key exchange with explicit authentication and tight security. Zbl 1511.94184
Liu, Xiangyu; Liu, Shengli; Gu, Dawu; Weng, Jian |
|
2020
|
Robustly reusable fuzzy extractor from standard assumptions. Zbl 1447.94058
Wen, Yunhua; Liu, Shengli |
|
2018
|
Tight leakage-resilient CCA-security from quasi-adaptive hash proof system. Zbl 1507.68061
Han, Shuai; Liu, Shengli; Lyu, Lin; Gu, Dawu |
|
2019
|
Identity-based key-insulated signature with secure key-updates. Zbl 1172.94629
Weng, Jian; Liu, Shengli; Chen, Kefei; Li, Xiangxue |
|
2006
|
Authenticated key exchange and signatures with tight security in the standard model. Zbl 1489.94123
Han, Shuai; Jager, Tibor; Kiltz, Eike; Liu, Shengli; Pan, Jiaxin; Riepel, Doreen; Schäge, Sven |
|
2021
|
Insight of the protection for data security under selective opening attacks. Zbl 1435.68079
Huang, Zhengan; Liu, Shengli; Mao, Xianping; Chen, Kefei; Li, Jin |
|
2017
|
Identity-based encryption secure against selective opening chosen-ciphertext attack. Zbl 1326.94107
Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Weng, Jian; Zhao, Yunlei |
|
2014
|
Tightly SIM-SO-CCA secure public key encryption from standard assumptions. Zbl 1385.94058
Lyu, Lin; Liu, Shengli; Han, Shuai; Gu, Dawu |
|
2018
|
Reusable fuzzy extractor from the decisional Diffie-Hellman assumption. Zbl 1437.94077
Wen, Yunhua; Liu, Shengli; Han, Shuai |
|
2018
|
Efficient KDM-CCA secure public-key encryption for polynomial functions. Zbl 1407.94118
Han, Shuai; Liu, Shengli; Lyu, Lin |
|
2016
|
Efficient CCA-secure PKE from identity-based techniques. Zbl 1272.94047
Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Kou, Weidong |
|
2010
|
Identity-based threshold key-insulated encryption without random oracles. Zbl 1153.94437
Weng, Jian; Liu, Shengli; Chen, Kefei; Zheng, Dong; Qiu, Weidong |
|
2008
|
Reusable fuzzy extractor from LWE. Zbl 1444.94107
Wen, Yunhua; Liu, Shengli |
|
2018
|
Identity-based parallel key-insulated encryption without random oracles: Security notions and construction. Zbl 1175.94120
Weng, Jian; Liu, Shengli; Chen, Kefei; Ma, Changshe |
|
2006
|
Generic constructions of robustly reusable fuzzy extractor. Zbl 1509.94138
Wen, Yunhua; Liu, Shengli; Gu, Dawu |
|
2019
|
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings. Zbl 1204.94078
Weng, Jian; Deng, Robert H.; Liu, Shengli; Chen, Kefei |
|
2010
|
Analysis of information leakage in quantum key agreement. Zbl 1105.94319
Liu, Shengli; Zheng, Dong; Cheng, Kefei |
|
2006
|
A generic construction of tightly secure signatures in the multi-user setting. Zbl 1455.94221
Zhang, Xiao; Liu, Shengli; Gu, Dawu; Liu, Joseph K. |
|
2019
|
Efficient leakage-resilient identity-based encryption with CCA security. Zbl 1307.94101
Sun, Shi-Feng; Gu, Dawu; Liu, Shengli |
|
2014
|
Revocable identity-based encryption from the computational Diffie-Hellman problem. Zbl 1444.94071
Hu, Ziyuan; Liu, Shengli; Chen, Kefei; Liu, Joseph K. |
|
2018
|
Efficient computation outsourcing for inverting a class of homomorphic functions. Zbl 1355.68079
Zhang, Fangguo; Ma, Xu; Liu, Shengli |
|
2014
|
Chameleon all-but-one TDFs and their application to chosen-ciphertext security. Zbl 1291.94116
Lai, Junzuo; Deng, Robert H.; Liu, Shengli |
|
2011
|
Robustly reusable fuzzy extractor with imperfect randomness. Zbl 1462.94034
Cui, Nan; Liu, Shengli; Gu, Dawu; Weng, Jian |
|
2021
|
Identity-based strong key-insulated signature without random oracles. Zbl 1199.68150
Weng, Jian; Chen, Kefei; Liu, Shengli; Li, Xiangxue |
|
2008
|
A practical protocol for advantage distillation and information reconciliation. Zbl 1026.94534
Liu, Shengli; Van Tilborg, Henk C. A.; Van Dijk, Marten |
|
2003
|
Tightly-secure signatures from the decisional composite residuosity assumption. Zbl 1416.94063
Zhang, Xiao; Liu, Shengli; Gu, Dawu |
|
2017
|
Non-malleability under selective opening attacks: implication and separation. Zbl 1459.94115
Huang, Zhengan; Liu, Shengli; Mao, Xianping; Chen, Kefei |
|
2015
|
Key updating technique in identity-based encryption. Zbl 1217.94101
Liu, Shengli; Long, Yu; Chen, Kefei |
|
2011
|
Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness. Zbl 1514.94094
Han, Shuai; Liu, Shengli; Gu, Dawu |
|
2021
|
Certificateless key-insulated signature without random oracles. Zbl 1209.94051
Wan, Zhong-Mei; Lai, Xue-Jia; Weng, Jian; Liu, Sheng-Li; Long, Yu |
|
2009
|
Combined BFGS-chaos method for solving geometric constraint. Zbl 1130.93375
Ou-Yang, Yingxiu; Tang, Min; Liu, Shengli; Dong, Jinxiang |
|
2005
|
Efficient and proactive threshold signcryption. Zbl 1127.68389
Ma, Changshe; Chen, Kefei; Zheng, Dong; Liu, Shengli |
|
2005
|
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness. Zbl 1391.68028
Han, Shuai; Liu, Shengli; Qin, Baodong; Gu, Dawu |
|
2018
|
ID-based threshold decryption secure against adaptive chosen-ciphertext attack. Zbl 1120.68051
Long, Yu; Chen, Kefei; Liu, Shengli |
|
2007
|
Almost tight multi-user security under adaptive corruptions & leakages in the standard model. Zbl 07776100
Han, Shuai; Liu, Shengli; Gu, Dawu |
|
2023
|
Cryptanalysis of LKK proxy signature. Zbl 1084.94522
Zheng, Dong; Liu, Shengli; Chen, Kefei |
|
2004
|
The Hamiltonian structure-preserving control and some applications to nonlinear astrodynamics. Zbl 1266.37056
Xu, Ming; Wei, Yan; Liu, Shengli |
|
2013
|
Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited. Zbl 1322.68069
Huang, Zhengan; Liu, Shengli; Qin, Baodong; Chen, Kefei |
|
2015
|
Tightly secure chameleon hash functions in the multi-user setting and their applications. Zbl 1464.94040
Liu, Xiangyu; Liu, Shengli; Gu, Dawu |
|
2020
|
EKE meets tight security in the universally composable framework. Zbl 07770272
Liu, Xiangyu; Liu, Shengli; Han, Shuai; Gu, Dawu |
|
2023
|
Strong key-insulated signature in the standard model. Zbl 1218.94046
Wan, Zhong-mei; Lai, Xue-jia; Weng, Jian; Liu, Sheng-li; Long, Yu; Hong, Xuan |
|
2010
|
Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system. Zbl 1420.94071
Han, Shuai; Liu, Shengli; Lyu, Lin |
|
2018
|
Solving ECDLP via list decoding. Zbl 1426.94140
Zhang, Fangguo; Liu, Shengli |
|
2019
|
Verifiable encrypted signatures without random oracles. Zbl 1105.94316
Li, Xiangxue; Chen, Kefei; Liu, Shengli; Li, Shiqun |
|
2006
|
Tightly CCA-secure inner product functional encryption scheme. Zbl 1481.94114
Liu, Xiangyu; Liu, Shengli; Han, Shuai; Gu, Dawu |
|
2022
|
Privacy-preserving authenticated key exchange in the standard model. Zbl 1519.94170
Lyu, You; Liu, Shengli; Han, Shuai; Gu, Dawu |
|
2023
|
Fuzzy authenticated key exchange with tight security. Zbl 1524.94067
Jiang, Mingming; Liu, Shengli; Han, Shuai; Gu, Dawu |
|
2022
|
Almost tight multi-user security under adaptive corruptions & leakages in the standard model. Zbl 07776100
Han, Shuai; Liu, Shengli; Gu, Dawu |
|
2023
|
EKE meets tight security in the universally composable framework. Zbl 07770272
Liu, Xiangyu; Liu, Shengli; Han, Shuai; Gu, Dawu |
|
2023
|
Privacy-preserving authenticated key exchange in the standard model. Zbl 1519.94170
Lyu, You; Liu, Shengli; Han, Shuai; Gu, Dawu |
|
2023
|
Tightly CCA-secure inner product functional encryption scheme. Zbl 1481.94114
Liu, Xiangyu; Liu, Shengli; Han, Shuai; Gu, Dawu |
|
2022
|
Fuzzy authenticated key exchange with tight security. Zbl 1524.94067
Jiang, Mingming; Liu, Shengli; Han, Shuai; Gu, Dawu |
|
2022
|
Authenticated key exchange and signatures with tight security in the standard model. Zbl 1489.94123
Han, Shuai; Jager, Tibor; Kiltz, Eike; Liu, Shengli; Pan, Jiaxin; Riepel, Doreen; Schäge, Sven |
|
2021
|
Robustly reusable fuzzy extractor with imperfect randomness. Zbl 1462.94034
Cui, Nan; Liu, Shengli; Gu, Dawu; Weng, Jian |
|
2021
|
Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness. Zbl 1514.94094
Han, Shuai; Liu, Shengli; Gu, Dawu |
|
2021
|
Two-pass authenticated key exchange with explicit authentication and tight security. Zbl 1511.94184
Liu, Xiangyu; Liu, Shengli; Gu, Dawu; Weng, Jian |
|
2020
|
Tightly secure chameleon hash functions in the multi-user setting and their applications. Zbl 1464.94040
Liu, Xiangyu; Liu, Shengli; Gu, Dawu |
|
2020
|
Tight leakage-resilient CCA-security from quasi-adaptive hash proof system. Zbl 1507.68061
Han, Shuai; Liu, Shengli; Lyu, Lin; Gu, Dawu |
|
2019
|
Generic constructions of robustly reusable fuzzy extractor. Zbl 1509.94138
Wen, Yunhua; Liu, Shengli; Gu, Dawu |
|
2019
|
A generic construction of tightly secure signatures in the multi-user setting. Zbl 1455.94221
Zhang, Xiao; Liu, Shengli; Gu, Dawu; Liu, Joseph K. |
|
2019
|
Solving ECDLP via list decoding. Zbl 1426.94140
Zhang, Fangguo; Liu, Shengli |
|
2019
|
Robustly reusable fuzzy extractor from standard assumptions. Zbl 1447.94058
Wen, Yunhua; Liu, Shengli |
|
2018
|
Tightly SIM-SO-CCA secure public key encryption from standard assumptions. Zbl 1385.94058
Lyu, Lin; Liu, Shengli; Han, Shuai; Gu, Dawu |
|
2018
|
Reusable fuzzy extractor from the decisional Diffie-Hellman assumption. Zbl 1437.94077
Wen, Yunhua; Liu, Shengli; Han, Shuai |
|
2018
|
Reusable fuzzy extractor from LWE. Zbl 1444.94107
Wen, Yunhua; Liu, Shengli |
|
2018
|
Revocable identity-based encryption from the computational Diffie-Hellman problem. Zbl 1444.94071
Hu, Ziyuan; Liu, Shengli; Chen, Kefei; Liu, Joseph K. |
|
2018
|
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness. Zbl 1391.68028
Han, Shuai; Liu, Shengli; Qin, Baodong; Gu, Dawu |
|
2018
|
Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system. Zbl 1420.94071
Han, Shuai; Liu, Shengli; Lyu, Lin |
|
2018
|
Insight of the protection for data security under selective opening attacks. Zbl 1435.68079
Huang, Zhengan; Liu, Shengli; Mao, Xianping; Chen, Kefei; Li, Jin |
|
2017
|
Tightly-secure signatures from the decisional composite residuosity assumption. Zbl 1416.94063
Zhang, Xiao; Liu, Shengli; Gu, Dawu |
|
2017
|
Efficient KDM-CCA secure public-key encryption for polynomial functions. Zbl 1407.94118
Han, Shuai; Liu, Shengli; Lyu, Lin |
|
2016
|
Simulation-based selective opening CCA security for PKE from key encapsulation mechanisms. Zbl 1319.94078
Liu, Shengli; Paterson, Kenneth G. |
|
2015
|
Continuous non-malleable key derivation and its application to related-key security. Zbl 1345.94085
Qin, Baodong; Liu, Shengli; Yuen, Tsz Hon; Deng, Robert H.; Chen, Kefei |
|
2015
|
Server-aided revocable identity-based encryption. Zbl 1499.68057
Qin, Baodong; Deng, Robert H.; Li, Yingjiu; Liu, Shengli |
|
2015
|
Non-malleability under selective opening attacks: implication and separation. Zbl 1459.94115
Huang, Zhengan; Liu, Shengli; Mao, Xianping; Chen, Kefei |
|
2015
|
Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited. Zbl 1322.68069
Huang, Zhengan; Liu, Shengli; Qin, Baodong; Chen, Kefei |
|
2015
|
Leakage-flexible CCA-secure public-key encryption: simple construction and free of pairing. Zbl 1335.94074
Qin, Baodong; Liu, Shengli |
|
2014
|
Identity-based encryption secure against selective opening chosen-ciphertext attack. Zbl 1326.94107
Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Weng, Jian; Zhao, Yunlei |
|
2014
|
Efficient leakage-resilient identity-based encryption with CCA security. Zbl 1307.94101
Sun, Shi-Feng; Gu, Dawu; Liu, Shengli |
|
2014
|
Efficient computation outsourcing for inverting a class of homomorphic functions. Zbl 1355.68079
Zhang, Fangguo; Ma, Xu; Liu, Shengli |
|
2014
|
Leakage-resilient chosen-ciphertext secure public-key encryption from hash proof system and one-time lossy filter. Zbl 1326.94117
Qin, Baodong; Liu, Shengli |
|
2013
|
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks. Zbl 1312.94071
Liu, Shengli; Weng, Jian; Zhao, Yunlei |
|
2013
|
Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited. Zbl 1314.94075
Huang, Zhengan; Liu, Shengli; Qin, Baodong |
|
2013
|
The Hamiltonian structure-preserving control and some applications to nonlinear astrodynamics. Zbl 1266.37056
Xu, Ming; Wei, Yan; Liu, Shengli |
|
2013
|
Chameleon all-but-one TDFs and their application to chosen-ciphertext security. Zbl 1291.94116
Lai, Junzuo; Deng, Robert H.; Liu, Shengli |
|
2011
|
Key updating technique in identity-based encryption. Zbl 1217.94101
Liu, Shengli; Long, Yu; Chen, Kefei |
|
2011
|
Efficient CCA-secure PKE from identity-based techniques. Zbl 1272.94047
Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Kou, Weidong |
|
2010
|
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings. Zbl 1204.94078
Weng, Jian; Deng, Robert H.; Liu, Shengli; Chen, Kefei |
|
2010
|
Strong key-insulated signature in the standard model. Zbl 1218.94046
Wan, Zhong-mei; Lai, Xue-jia; Weng, Jian; Liu, Sheng-li; Long, Yu; Hong, Xuan |
|
2010
|
Certificateless key-insulated signature without random oracles. Zbl 1209.94051
Wan, Zhong-Mei; Lai, Xue-Jia; Weng, Jian; Liu, Sheng-Li; Long, Yu |
|
2009
|
Chosen-ciphertext secure proxy re-encryption without pairings. Zbl 1362.94026
Deng, Robert H.; Weng, Jian; Liu, Shengli; Chen, Kefei |
|
2008
|
Identity-based threshold key-insulated encryption without random oracles. Zbl 1153.94437
Weng, Jian; Liu, Shengli; Chen, Kefei; Zheng, Dong; Qiu, Weidong |
|
2008
|
Identity-based strong key-insulated signature without random oracles. Zbl 1199.68150
Weng, Jian; Chen, Kefei; Liu, Shengli; Li, Xiangxue |
|
2008
|
ID-based threshold decryption secure against adaptive chosen-ciphertext attack. Zbl 1120.68051
Long, Yu; Chen, Kefei; Liu, Shengli |
|
2007
|
Identity-based key-insulated signature with secure key-updates. Zbl 1172.94629
Weng, Jian; Liu, Shengli; Chen, Kefei; Li, Xiangxue |
|
2006
|
Identity-based parallel key-insulated encryption without random oracles: Security notions and construction. Zbl 1175.94120
Weng, Jian; Liu, Shengli; Chen, Kefei; Ma, Changshe |
|
2006
|
Analysis of information leakage in quantum key agreement. Zbl 1105.94319
Liu, Shengli; Zheng, Dong; Cheng, Kefei |
|
2006
|
Verifiable encrypted signatures without random oracles. Zbl 1105.94316
Li, Xiangxue; Chen, Kefei; Liu, Shengli; Li, Shiqun |
|
2006
|
Combined BFGS-chaos method for solving geometric constraint. Zbl 1130.93375
Ou-Yang, Yingxiu; Tang, Min; Liu, Shengli; Dong, Jinxiang |
|
2005
|
Efficient and proactive threshold signcryption. Zbl 1127.68389
Ma, Changshe; Chen, Kefei; Zheng, Dong; Liu, Shengli |
|
2005
|
Cryptanalysis of LKK proxy signature. Zbl 1084.94522
Zheng, Dong; Liu, Shengli; Chen, Kefei |
|
2004
|
A practical protocol for advantage distillation and information reconciliation. Zbl 1026.94534
Liu, Shengli; Van Tilborg, Henk C. A.; Van Dijk, Marten |
|
2003
|