What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Tsz Hon Yuen
Google Scholar
ORCID:
0000-0002-0629-6792
55
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/acisp
SoK: A Deep Dive Into Anti-money Laundering Techniques for Blockchain Cryptocurrencies.
Qishuang Fu
Joseph K. Liu
Shirui Pan
Tsz Hon Yuen
2025
conf/asiaccs
Efficient Private Set Intersection by Utilizing Oblivious Transfer Extension.
Mingli Wu
Tsz Hon Yuen
Siu-Ming Yiu
2025
conf/provsec
More Practical Non-interactive Encrypted Conjunctive Search with Leakage and Storage Suppression.
Huu Ngoc Duc Nguyen
Shujie Cui
Shangqi Lai
Tsz Hon Yuen
Joseph K. Liu
2025
conf/provsec
Plum: SNARK-Friendly Post-Quantum Signature Based on Power Residue PRFs.
Xinyu Zhang
Qishuang Fu
Ron Steinfeld
Joseph K. Liu
Tsz Hon Yuen
Man Ho Au
2024
journals/cic
Exponent-Inversion P-Signatures and Accountable Identity-Based Encryption from SXDH.
Tsz Hon Yuen
Sherman S. M. Chow
Huangting Wu
Cong Zhang
Siu-Ming Yiu
2024
conf/uss
O-Ring and K-Star: Efficient Multi-party Private Set Intersection.
Mingli Wu
Tsz Hon Yuen
Kwan Yin Chan
2024
conf/provsec
Threshold Ring Signatures: From DualRing to the t+1 Rings.
Tsz Hon Yuen
Shimin Pan
2024
conf/asiaccs
zkMatrix: Batched Short Proof for Committed Matrix Multiplication.
Mingshu Cong
Tsz Hon Yuen
Siu-Ming Yiu
2024
conf/asiaccs
Reconstructing Chameleon Hash: Full Security and the Multi-Party Setting.
Kwan Yin Chan
Liqun Chen
Yangguang Tian
Tsz Hon Yuen
2023
conf/ccs
Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA.
Haiyang Xue
Man Ho Au
Mengling Liu
Kwan Yin Chan
Handong Cui
Xiang Xie
Tsz Hon Yuen
Chengru Zhang
2023
conf/uss
Efficient Unbalanced Private Set Intersection Cardinality and User-friendly Privacy-preserving Contact Tracing.
Mingli Wu
Tsz Hon Yuen
2023
conf/acisp
Practical Verifiable Random Function with RKA Security.
Tsz Hon Yuen
Shimin Pan
Sheng Huang
Xiaoting Zhang
2023
conf/sp
BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts.
Xianrui Qin
Shimin Pan
Arash Mirzaei
Zhimei Sui
Oguzhan Ersoy
Amin Sakzad
Muhammed F. Esgin
Joseph K. Liu
Jiangshan Yu
Tsz Hon Yuen
2023
conf/acns
Scored Anonymous Credentials.
Sherman S. M. Chow
Jack P. K. Ma
Tsz Hon Yuen
2023
conf/cans
A Practical Forward-Secure DualRing.
Nan Li
Yingjiu Li
Atsuko Miyaji
Yangguang Tian
Tsz Hon Yuen
2022
conf/acisp
Multi-signatures for ECDSA and Its Applications in Blockchain.
Shimin Pan
Kwan Yin Chan
Handong Cui
Tsz Hon Yuen
2022
conf/acns
Don't Tamper with Dual System Encryption - Beyond Polynomial Related-Key Security of IBE.
Tsz Hon Yuen
Cong Zhang
Sherman S. M. Chow
2022
conf/asiaccs
Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting.
Cailing Cai
Xianrui Qin
Tsz Hon Yuen
Siu-Ming Yiu
2022
conf/cans
Attribute-Based Anonymous Credential: Optimization for Single-Use and Multi-Use.
Kwan Yin Chan
Tsz Hon Yuen
2021
conf/ccs
Efficient Online-friendly Two-Party ECDSA Signature.
Haiyang Xue
Man Ho Au
Xiang Xie
Tsz Hon Yuen
Handong Cui
2021
conf/acisp
A Trustless GQ Multi-signature Scheme with Identifiable Abort.
Handong Cui
Tsz Hon Yuen
2021
conf/crypto
DualRing: Generic Construction of Ring Signatures with Efficient Instantiations.
Tsz Hon Yuen
Muhammed F. Esgin
Joseph K. Liu
Man Ho Au
Zhimin Ding
2021
conf/esorics
One-More Unforgeability of Blind ECDSA.
Xianrui Qin
Cailing Cai
Tsz Hon Yuen
2021
conf/pkc
Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup.
Tsz Hon Yuen
Handong Cui
Xiang Xie
2020
conf/fc
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security.
Tsz Hon Yuen
Shifeng Sun
Joseph K. Liu
Man Ho Au
Muhammed F. Esgin
Qingzhao Zhang
Dawu Gu
2019
conf/cans
PAChain: Private, Authenticated and Auditable Consortium Blockchain.
Tsz Hon Yuen
2018
conf/acns
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List.
Joseph K. Liu
Tsz Hon Yuen
Peng Zhang
Kaitai Liang
2017
conf/esorics
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
Shifeng Sun
Man Ho Au
Joseph K. Liu
Tsz Hon Yuen
2016
conf/ccs
Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption.
Shifeng Sun
Dawu Gu
Joseph K. Liu
Udaya Parampalli
Tsz Hon Yuen
2016
conf/acisp
Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions.
Shifeng Sun
Udaya Parampalli
Tsz Hon Yuen
Yu Yu
Dawu Gu
2016
conf/esorics
An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries.
Shifeng Sun
Joseph K. Liu
Amin Sakzad
Ron Steinfeld
Tsz Hon Yuen
2015
conf/ccs
Related Randomness Attacks for Public Key Cryptosystems.
Tsz Hon Yuen
Cong Zhang
Sherman S. M. Chow
Siu-Ming Yiu
2015
conf/pkc
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security.
Baodong Qin
Shengli Liu
Tsz Hon Yuen
Robert H. Deng
Kefei Chen
2014
conf/esorics
Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks.
Tsz Hon Yuen
Ye Zhang
Siu-Ming Yiu
Joseph K. Liu
2013
conf/ccs
Multi-key leakage-resilient threshold cryptography.
Cong Zhang
Tsz Hon Yuen
Hao Xiong
Sherman S. M. Chow
Siu-Ming Yiu
Yi Jun He
2013
conf/ccs
Leakage-resilient certificateless public key encryption.
Hao Xiong
Tsz Hon Yuen
Cong Zhang
Siu-Ming Yiu
Yi Jun He
2013
conf/provsec
Towards Anonymous Ciphertext Indistinguishability with Identity Leakage.
Tsz Hon Yuen
Cong Zhang
Sherman S. M. Chow
Joseph K. Liu
2012
conf/acisp
Fully Leakage-Resilient Signatures with Auxiliary Inputs.
Tsz Hon Yuen
Siu-Ming Yiu
Lucas Chi Kwong Hui
2012
conf/esorics
PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation.
Kin Ying Yu
Tsz Hon Yuen
Sherman S. M. Chow
Siu-Ming Yiu
Lucas Chi Kwong Hui
2012
conf/icics
Forward Secure Attribute-Based Signatures.
Tsz Hon Yuen
Joseph K. Liu
Xinyi Huang
Man Ho Au
Willy Susilo
Jianying Zhou
2012
conf/icics
Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model.
Hao Xiong
Cong Zhang
Tsz Hon Yuen
Echo P. Zhang
Siu-Ming Yiu
Sihan Qing
2012
conf/eurocrypt
Identity-Based Encryption Resilient to Continual Auxiliary Leakage.
Tsz Hon Yuen
Sherman S. M. Chow
Ye Zhang
Siu-Ming Yiu
2011
conf/ccs
Threshold ring signature without random oracles.
Tsz Hon Yuen
Joseph K. Liu
Man Ho Au
Willy Susilo
Jianying Zhou
2011
conf/provsec
Concurrent Signatures with Fully Negotiable Binding Control.
Tsz Hon Yuen
Duncan S. Wong
Willy Susilo
Qiong Huang
2011
conf/esorics
Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles.
Zhen Liu
Zhenfu Cao
Qiong Huang
Duncan S. Wong
Tsz Hon Yuen
2011
conf/icics
Forward Secure Ring Signature without Random Oracles.
Joseph K. Liu
Tsz Hon Yuen
Jianying Zhou
2010
conf/cans
Towards a Cryptographic Treatment of Publish/Subscribe Systems.
Tsz Hon Yuen
Willy Susilo
Yi Mu
2008
conf/cans
Sanitizable Signatures Revisited.
Tsz Hon Yuen
Willy Susilo
Joseph K. Liu
Yi Mu
2007
conf/provsec
Practical Threshold Signatures Without Random Oracles.
Jin Li
Tsz Hon Yuen
Kwangjo Kim
2007
conf/icics
(Convertible) Undeniable Signatures Without Random Oracles.
Tsz Hon Yuen
Man Ho Au
Joseph K. Liu
Willy Susilo
2006
conf/ccs
Ring signatures without random oracles.
Sherman S. M. Chow
Victor K.-W. Wei
Joseph K. Liu
Tsz Hon Yuen
2006
conf/iwsec
ID-Based Ring Signature Scheme Secure in the Standard Model.
Man Ho Au
Joseph K. Liu
Tsz Hon Yuen
Duncan S. Wong
2005
conf/sec
Signcryption in Hierarchical Identity Based Cryptosystem.
Sherman S. M. Chow
Tsz Hon Yuen
Lucas Chi Kwong Hui
Siu-Ming Yiu
2005
conf/acisp
Group Signature Where Group Manager, Members and Open Authority Are Identity-Based.
Victor K. Wei
Tsz Hon Yuen
Fangguo Zhang
2005
conf/ctrsa
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings.
Tsz Hon Yuen
Victor K. Wei
Coauthors
Amin Sakzad
(2)
Arash Mirzaei
(1)
Atsuko Miyaji
(1)
Baodong Qin
(1)
Cailing Cai
(2)
Chengru Zhang
(1)
Cong Zhang
(7)
Dawu Gu
(3)
Duncan S. Wong
(3)
Echo P. Zhang
(1)
Fangguo Zhang
(1)
Haiyang Xue
(2)
Handong Cui
(5)
Hao Xiong
(3)
Huangting Wu
(1)
Huu Ngoc Duc Nguyen
(1)
Jack P. K. Ma
(1)
Jiangshan Yu
(1)
Jianying Zhou
(3)
Jin Li
(1)
Joseph K. Liu
(19)
Kaitai Liang
(1)
Kefei Chen
(1)
Kin Ying Yu
(1)
Kwan Yin Chan
(5)
Kwangjo Kim
(1)
Liqun Chen
(1)
Lucas Chi Kwong Hui
(3)
Man Ho Au
(10)
Mengling Liu
(1)
Mingli Wu
(3)
Mingshu Cong
(1)
Muhammed F. Esgin
(3)
Nan Li
(1)
Oguzhan Ersoy
(1)
Peng Zhang
(1)
Qingzhao Zhang
(1)
Qiong Huang
(2)
Qishuang Fu
(2)
Robert H. Deng
(1)
Ron Steinfeld
(2)
Shangqi Lai
(1)
Sheng Huang
(1)
Shengli Liu
(1)
Sherman S. M. Chow
(10)
Shifeng Sun
(5)
Shimin Pan
(4)
Shirui Pan
(1)
Shujie Cui
(1)
Sihan Qing
(1)
Siu-Ming Yiu
(13)
Tsz Hon Yuen
(55)
Udaya Parampalli
(2)
Victor K. Wei
(2)
Victor K.-W. Wei
(1)
Willy Susilo
(6)
Xiang Xie
(3)
Xianrui Qin
(3)
Xiaoting Zhang
(1)
Xinyi Huang
(1)
Xinyu Zhang
(1)
Yangguang Tian
(2)
Ye Zhang
(2)
Yi Jun He
(2)
Yi Mu
(2)
Yingjiu Li
(1)
Yu Yu
(1)
Zhen Liu
(1)
Zhenfu Cao
(1)
Zhimei Sui
(1)
Zhimin Ding
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to