What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Zhen Liu
Google Scholar
27
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Forward-Secure Hierarchical Delegable Signature for Smart Homes.
Jianfei Sun
Guowen Xu
Yang Yang
Xuehuan Yang
Xiaoguo Li
Cong Wu
Zhen Liu
Guomin Yang
Robert H. Deng
2025
conf/ndss
The Philosopher's Stone: Trojaning Plugins of Large Language Models.
Tian Dong
Minhui Xue
Guoxing Chen
Rayne Holland
Yan Meng
Shaofeng Li
Zhen Liu
Haojin Zhu
2025
conf/uss
Depth Gives a False Sense of Privacy: LLM Internal States Inversion.
Tian Dong
Yan Meng
Shaofeng Li
Guoxing Chen
Zhen Liu
Haojin Zhu
2023
conf/ndss
RAI2: Responsible Identity Audit Governing the Artificial Intelligence.
Tian Dong
Shaofeng Li
Guoxing Chen
Minhui Xue
Haojin Zhu
Zhen Liu
2022
conf/acisp
DeChain: A Blockchain Framework Enhancing Decentralization via Sharding.
Shenwei Chen
Zhen Liu
Yu Long
Dawu Gu
2022
conf/esorics
Secure Hierarchical Deterministic Wallet Supporting Stealth Address.
Xin Yin
Zhen Liu
Guomin Yang
Guoxing Chen
Haojin Zhu
2022
conf/esorics
MixCT: Mixing Confidential Transactions from Homomorphic Commitment.
Jiajun Du
Zhonghui Ge
Yu Long
Zhen Liu
Shifeng Sun
Xian Xu
Dawu Gu
2022
conf/esorics
Grape: Efficient Hybrid Consensus Protocol Using DAG.
Yu Song
Guoshun Fan
Yu Long
Zhen Liu
Xian Xu
Dawu Gu
2022
conf/esorics
Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption.
Xingkai Wang
Zhenfu Cao
Zhen Liu
Kaitai Liang
2021
conf/esorics
MPC-in-Multi-Heads: A Multi-Prover Zero-Knowledge Proof System - (or: How to Jointly Prove Any NP Statements in ZK).
Hongrui Cui
Kaiyi Zhang
Yu Chen
Zhen Liu
Yu Yu
2020
conf/esorics
A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.
Wenling Liu
Zhen Liu
Khoa Nguyen
Guomin Yang
Yu Yu
2019
journals/compsec
Z-Channel: Scalable and efficient scheme in Zerocash.
Yuncong Zhang
Yu Long
Zhen Liu
Zhiqiang Liu
Dawu Gu
2019
conf/eurosp
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.
Zhen Liu
Guomin Yang
Duncan S. Wong
Khoa Nguyen
Huaxiong Wang
2019
conf/provsec
TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-Invisibility.
Yi Liu
Zhen Liu
Yu Long
Zhiqiang Liu
Dawu Gu
Fei Huan
Yanxue Jia
2019
conf/esorics
A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses.
Zhen Liu
Khoa Nguyen
Guomin Yang
Huaxiong Wang
Duncan S. Wong
2019
conf/icics
Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption.
Geng Wang
Zhen Liu
Dawu Gu
2018
conf/acisp
Z-Channel: Scalable and Efficient Scheme in Zerocash.
Yuncong Zhang
Yu Long
Zhen Liu
Zhiqiang Liu
Dawu Gu
2018
conf/cns
Dynamic Practical Byzantine Fault Tolerance.
Hao Xu
Yu Long
Zhiqiang Liu
Zhen Liu
Dawu Gu
2016
conf/ccs
Dealerless Corporate Key Generation for Identity-Based Encryption Schemes.
Zhen Liu
Duncan S. Wong
Jack Poon
2015
journals/tifs
Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild.
Zhen Liu
Zhenfu Cao
Duncan S. Wong
2015
conf/acns
Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe.
Zhen Liu
Duncan S. Wong
2015
conf/icics
Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-Resistant Blackbox Traceable.
Zhen Liu
Duncan S. Wong
2014
conf/esorics
Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage.
Yujue Wang
Qianhong Wu
Duncan S. Wong
Bo Qin
Sherman S. M. Chow
Zhen Liu
Xiao Tan
2013
journals/tifs
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures.
Zhen Liu
Zhenfu Cao
Duncan S. Wong
2013
conf/ccs
Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay.
Zhen Liu
Zhenfu Cao
Duncan S. Wong
2012
conf/icisc
A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles.
Kaitai Liang
Zhen Liu
Xiao Tan
Duncan S. Wong
Chunming Tang
2011
conf/esorics
Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles.
Zhen Liu
Zhenfu Cao
Qiong Huang
Duncan S. Wong
Tsz Hon Yuen
Coauthors
Bo Qin
(1)
Chunming Tang
(1)
Cong Wu
(1)
Dawu Gu
(8)
Duncan S. Wong
(11)
Fei Huan
(1)
Geng Wang
(1)
Guomin Yang
(5)
Guoshun Fan
(1)
Guowen Xu
(1)
Guoxing Chen
(4)
Hao Xu
(1)
Haojin Zhu
(4)
Hongrui Cui
(1)
Huaxiong Wang
(2)
Jack Poon
(1)
Jiajun Du
(1)
Jianfei Sun
(1)
Kaitai Liang
(2)
Kaiyi Zhang
(1)
Khoa Nguyen
(3)
Minhui Xue
(2)
Qianhong Wu
(1)
Qiong Huang
(1)
Rayne Holland
(1)
Robert H. Deng
(1)
Shaofeng Li
(3)
Shenwei Chen
(1)
Sherman S. M. Chow
(1)
Shifeng Sun
(1)
Tian Dong
(3)
Tsz Hon Yuen
(1)
Wenling Liu
(1)
Xian Xu
(2)
Xiao Tan
(2)
Xiaoguo Li
(1)
Xin Yin
(1)
Xingkai Wang
(1)
Xuehuan Yang
(1)
Yan Meng
(2)
Yang Yang
(1)
Yanxue Jia
(1)
Yi Liu
(1)
Yu Chen
(1)
Yu Long
(7)
Yu Song
(1)
Yu Yu
(2)
Yujue Wang
(1)
Yuncong Zhang
(2)
Zhen Liu
(27)
Zhenfu Cao
(5)
Zhiqiang Liu
(4)
Zhonghui Ge
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to